Created (ET) |
Year |
DCN |
Rev |
Group ▲ |
Title |
Author (Affiliation) |
Uploaded (ET) |
Actions |
12-Sep-2010 ET |
2010 |
182 |
0 |
Security |
TGa September Meeting Agenda |
Yoshihiro Ohba (Toshiba) |
13-Sep-2010 08:00:30 ET |
Download |
09-Sep-2010 ET |
2010 |
78 |
4 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
09-Sep-2010 12:31:16 ET |
Download |
08-Sep-2010 ET |
2010 |
79 |
2 |
Security |
Option II: use (D)TLS to protect MIH. |
Subir Das (Telcordia) |
08-Sep-2010 23:41:16 ET |
Download |
06-Sep-2010 ET |
2010 |
123 |
1 |
Security |
option-A-for-work-item-I |
Dapeng Liu(China Mobile) |
06-Sep-2010 13:54:27 ET |
Download |
02-Sep-2010 ET |
2010 |
174 |
0 |
Security |
802.21a Aug31 Teleconference Minutes |
Yoshihiro Ohba (Toshiba) |
02-Sep-2010 05:56:19 ET |
Download |
31-Aug-2010 ET |
2010 |
120 |
3 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
31-Aug-2010 07:22:37 ET |
Download |
23-Aug-2010 ET |
2010 |
78 |
3 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
23-Aug-2010 13:40:44 ET |
Download |
19-Aug-2010 ET |
2010 |
172 |
0 |
Security |
802.21a Aug17 Teleconference Minutes |
Yoshihiro Ohba (Toshiba) |
19-Aug-2010 09:01:15 ET |
Download |
17-Aug-2010 ET |
2010 |
171 |
0 |
Security |
Q&A |
Subir Das (Telcordia) |
17-Aug-2010 08:54:29 ET |
Download |
17-Aug-2010 ET |
2010 |
170 |
0 |
Security |
Comments on Option ii work item 2 |
Lily Chen (NIST) |
17-Aug-2010 00:39:30 ET |
Download |
12-Aug-2010 ET |
2010 |
169 |
0 |
Security |
Options for Security IEs |
Lily Chen (NIST) |
12-Aug-2010 14:27:50 ET |
Download |
22-Jul-2010 ET |
2010 |
163 |
1 |
Security |
Security TG July 2010 meeting minutes |
Yoshihiro Ohba (Toshiba) |
22-Jul-2010 09:55:06 ET |
Download |
22-Jul-2010 ET |
2010 |
163 |
0 |
Security |
Security TG July 2010 meeting minutes |
Yoshihiro Ohba (Toshiba) |
22-Jul-2010 02:30:20 ET |
Download |
15-Jul-2010 ET |
2010 |
153 |
0 |
Security |
Presentation on draft 21a document proposal |
Lily Chen (NIST) |
15-Jul-2010 13:23:51 ET |
Download |
15-Jul-2010 ET |
2010 |
151 |
0 |
Security |
Security TG Closing Report |
Yoshihiro Ohba (Toshiba) |
15-Jul-2010 12:57:49 ET |
Download |
14-Jul-2010 ET |
2010 |
148 |
0 |
Security |
21a draft standard proposal |
Lily Chen (NIST) |
14-Jul-2010 17:49:24 ET |
Download |
14-Jul-2010 ET |
2010 |
124 |
2 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
14-Jul-2010 11:48:03 ET |
Download |
14-Jul-2010 ET |
2010 |
120 |
2 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
14-Jul-2010 10:53:17 ET |
Download |
13-Jul-2010 ET |
2010 |
143 |
1 |
Security |
Security TG Opening Note |
Yoshihiro Ohba (Toshiba) |
13-Jul-2010 10:40:59 ET |
Download |
13-Jul-2010 ET |
2010 |
143 |
0 |
Security |
Security TG Opening Note |
Yoshihiro Ohba (Toshiba) |
13-Jul-2010 01:44:49 ET |
Download |
09-Jul-2010 ET |
2010 |
124 |
1 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
09-Jul-2010 16:13:07 ET |
Download |
08-Jul-2010 ET |
2010 |
134 |
0 |
Security |
TGa July Meeting Agenda |
Yoshihiro Ohba (Toshiba) |
08-Jul-2010 21:17:47 ET |
Download |
28-Jun-2010 ET |
2010 |
79 |
1 |
Security |
Option II: use (D)TLS to protect MIH. |
Subir Das (Telcordia) |
28-Jun-2010 17:37:31 ET |
Download |
28-Jun-2010 ET |
2010 |
78 |
2 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
28-Jun-2010 17:11:16 ET |
Download |
28-Jun-2010 ET |
2010 |
120 |
1 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
28-Jun-2010 17:05:19 ET |
Download |
28-Jun-2010 ET |
2010 |
124 |
0 |
Security |
Presentation for Work Item 2 Option 1 |
Lily Chen (NIST) |
28-Jun-2010 16:51:40 ET |
Download |
28-Jun-2010 ET |
2010 |
84 |
1 |
Security |
Option I for Work Item 2 |
Lily Chen (NIST) |
28-Jun-2010 16:49:41 ET |
Download |
28-Jun-2010 ET |
2010 |
123 |
0 |
Security |
option-A-for-work-item-I |
Dapeng Liu(China Mobile) |
28-Jun-2010 09:33:52 ET |
Download |
28-Jun-2010 ET |
2010 |
122 |
0 |
Security |
Meeting Minutes of June 22 Teleconference |
Lily Chen (NIST) |
28-Jun-2010 08:26:02 ET |
Download |
28-Jun-2010 ET |
2010 |
121 |
1 |
Security |
Meeting Minutes of May 22 Teleconference |
Lily Chen (NIST) |
28-Jun-2010 08:24:33 ET |
Download |
25-Jun-2010 ET |
2010 |
121 |
0 |
Security |
Meeting Minutes of May 22 Teleconference |
Lily Chen (NIST) |
25-Jun-2010 15:35:00 ET |
Download |
22-Jun-2010 ET |
2010 |
120 |
0 |
Security |
Option III presentation |
Fernando Bernal, Rafa Marin-Lopez |
22-Jun-2010 08:38:33 ET |
Download |
22-Jun-2010 ET |
2010 |
78 |
1 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
22-Jun-2010 08:32:42 ET |
Download |
16-Jun-2010 ET |
2010 |
119 |
0 |
Security |
Minutes of June 15 Teleconference |
Lily Chen (NIST) |
16-Jun-2010 17:06:14 ET |
Download |
13-May-2010 ET |
2010 |
108 |
2 |
Security |
Security TG Closing Note |
Yoshihiro Ohba (Toshiba) |
13-May-2010 05:53:50 ET |
Download |
13-May-2010 ET |
2010 |
108 |
1 |
Security |
Security TG Closing Note |
Yoshihiro Ohba (Toshiba) |
13-May-2010 05:25:46 ET |
Download |
13-May-2010 ET |
2010 |
112 |
0 |
Security |
TGa May Meeting Minutes |
Yoshihiro Ohba (Toshiba) |
13-May-2010 05:11:54 ET |
Download |
13-May-2010 ET |
2010 |
108 |
0 |
Security |
Security TG Closing Note |
Yoshihiro Ohba (Toshiba) |
13-May-2010 02:18:06 ET |
Download |
12-May-2010 ET |
2010 |
100 |
2 |
Security |
Issue Summary |
Lily Chen (NIST) |
12-May-2010 06:06:12 ET |
Download |
12-May-2010 ET |
2010 |
102 |
0 |
Security |
Security TG Closing Node |
Yoshihiro Ohba (Toshiba) |
12-May-2010 05:56:11 ET |
Download |
12-May-2010 ET |
2010 |
100 |
1 |
Security |
Issue Summary |
Lily Chen (NIST) |
12-May-2010 03:14:06 ET |
Download |
11-May-2010 ET |
2010 |
100 |
0 |
Security |
Issue Summary |
Lily Chen (NIST) |
11-May-2010 08:03:04 ET |
Download |
10-May-2010 ET |
2010 |
96 |
0 |
Security |
Security TG Opening Note |
Yoshihiro Ohba (Toshiba) |
10-May-2010 12:27:05 ET |
Download |
10-May-2010 ET |
2010 |
86 |
1 |
Security |
TGa May Meeting Agenda |
Yoshihiro Ohba (Toshiba) |
10-May-2010 06:54:02 ET |
Download |
07-May-2010 ET |
2010 |
86 |
0 |
Security |
TGa May Meeting Agenda |
Yoshihiro Ohba (Toshiba) |
07-May-2010 21:13:42 ET |
Download |
05-May-2010 ET |
2010 |
85 |
0 |
Security |
TGa March Meeting Minutes |
Yoshihiro Ohba (Toshiba) |
05-May-2010 21:08:51 ET |
Download |
05-May-2010 ET |
2010 |
84 |
0 |
Security |
Option I for Work Item 2 |
Lily Chen (NIST) |
05-May-2010 17:15:17 ET |
Download |
04-May-2010 ET |
2010 |
83 |
0 |
Security |
May 4 Telecon Minutes |
Lily Chen (NIST) |
04-May-2010 13:57:19 ET |
Download |
04-May-2010 ET |
2010 |
82 |
0 |
Security |
Proactive Authentication Through EAP (MSA is the authenticator) |
Dapeng Liu(China Mobile) |
04-May-2010 09:04:57 ET |
Download |
16-Apr-2010 ET |
2010 |
81 |
0 |
Security |
April 15 Telecon Minutes |
Lily Chen (NIST) |
16-Apr-2010 08:44:24 ET |
Download |
15-Apr-2010 ET |
2010 |
80 |
1 |
Security |
21-10-0000-00-0-sec-tga-proactive-authentication-option-A |
Dapeng(China Mobile) |
15-Apr-2010 21:21:13 ET |
Download |
15-Apr-2010 ET |
2010 |
80 |
0 |
Security |
21-10-0000-00-0-sec-tga-proactive-authentication-option-A |
Dapeng |
15-Apr-2010 21:15:26 ET |
Download |
15-Apr-2010 ET |
2010 |
79 |
0 |
Security |
Option II: use (D)TLS to protect MIH. |
Subir Das (Telcordia) |
15-Apr-2010 18:10:56 ET |
Download |
15-Apr-2010 ET |
2010 |
78 |
0 |
Security |
Option III: EAP over MIH service authentication |
Fernando Bernal (UMU), Rafa Marin-Lopez(UMU) |
15-Apr-2010 08:05:58 ET |
Download |
18-Mar-2010 ET |
2010 |
70 |
1 |
Security |
Security TG closing report |
Yoshihiro Ohba (Toshiba) |
18-Mar-2010 16:11:47 ET |
Download |
18-Mar-2010 ET |
2010 |
70 |
0 |
Security |
Security TG closing report |
Yoshihiro Ohba (Toshiba) |
18-Mar-2010 15:22:52 ET |
Download |
18-Mar-2010 ET |
2010 |
50 |
3 |
Security |
TGa March Meeting Agenda |
Yoshihiro Ohba (Toshiba) |
18-Mar-2010 13:32:58 ET |
Download |
18-Mar-2010 ET |
2010 |
67 |
2 |
Security |
Security TG Revised Timeline |
Yoshihiro Ohba (Toshiba) |
18-Mar-2010 11:02:11 ET |
Download |
18-Mar-2010 ET |
2010 |
67 |
1 |
Security |
Security TG Revised Timeline |
Yoshihiro Ohba (Toshiba) |
18-Mar-2010 11:00:14 ET |
Download |
18-Mar-2010 ET |
2010 |
49 |
3 |
Security |
Proposal Summary |
Lily Chen (NIST) |
18-Mar-2010 10:59:22 ET |
Download |
18-Mar-2010 ET |
2010 |
50 |
2 |
Security |
TGa March Meeting Agenda |
Yoshihiro Ohba (Toshiba) |
18-Mar-2010 10:06:26 ET |
Download |
18-Mar-2010 ET |
2010 |
67 |
0 |
Security |
Security TG Revised Timeline |
Yoshihiro Ohba (Toshiba) |
18-Mar-2010 10:10:15 ET |
Download |
17-Mar-2010 ET |
2010 |
49 |
2 |
Security |
Proposal Summary |
Lily Chen (NIST) |
17-Mar-2010 09:24:56 ET |
Download |
15-Mar-2010 ET |
2010 |
56 |
0 |
Security |
TGa Selection Procedure |
Yoshihiro Ohba (Toshiba) |
15-Mar-2010 19:38:29 ET |
Download |
15-Mar-2010 ET |
2010 |
55 |
0 |
Security |
Security TG Opening Note |
Yoshihiro Ohba (Toshiba) |
15-Mar-2010 19:04:57 ET |
Download |
15-Mar-2010 ET |
2010 |
50 |
1 |
Security |
TGa March Meeting Agenda |
Yoshihiro Ohba (Toshiba) |
15-Mar-2010 13:47:29 ET |
Download |
13-Mar-2010 ET |
2010 |
50 |
0 |
Security |
TGa March Meeting Agenda |
Yoshihiro Ohba (Toshiba) |
13-Mar-2010 08:29:36 ET |
Download |
12-Mar-2010 ET |
2010 |
49 |
1 |
Security |
Proposal Summary |
Lily Chen (NIST) |
12-Mar-2010 17:14:39 ET |
Download |
12-Mar-2010 ET |
2010 |
49 |
0 |
Security |
Proposal Summary |
Lily Chen (NIST) |
12-Mar-2010 13:31:44 ET |
Download |
08-Mar-2010 ET |
2010 |
45 |
0 |
Security |
Telecon notes |
Subir Das (Telcordia) |
08-Mar-2010 19:52:55 ET |
Download |
08-Mar-2010 ET |
2010 |
44 |
0 |
Security |
January Interim Meeting Minutes |
Subir Das (Telcordia) |
08-Mar-2010 19:51:49 ET |
Download |
21-Feb-2010 ET |
2010 |
42 |
0 |
Security |
Teleconference Minutes |
Subir Das (Telcordia) |
21-Feb-2010 11:11:42 ET |
Download |
16-Feb-2010 ET |
2010 |
41 |
1 |
Security |
Proactive Auth. & MIH Security |
Rafa Marin-Lopez (UMU), S. Das(Telcordia), F. Bernal (UMU), K. Randall (Randall Consulting) |
16-Feb-2010 08:28:54 ET |
Download |
16-Feb-2010 ET |
2010 |
41 |
0 |
Security |
Proactive Auth. & MIH Security |
Rafa Marin-Lopez (UMU), S. Das(Telcordia), F. Bernal (UMU), Lily Chen (NIST), K. Randall (Randall Consulting) |
16-Feb-2010 07:33:55 ET |
Download |
02-Feb-2010 ET |
2010 |
37 |
0 |
Security |
Key Hierarchy Issues |
Lily Chen (NIST) |
02-Feb-2010 08:51:33 ET |
Download |
14-Jan-2010 ET |
2010 |
31 |
0 |
Security |
Security TG january meeting closing note |
Yoshihiro Ohba (Toshiba) |
14-Jan-2010 12:25:19 ET |
Download |
14-Jan-2010 ET |
2010 |
30 |
0 |
Security |
Secure Access and Delivery |
Vivek Gupta (Intel Corporation) |
14-Jan-2010 11:59:34 ET |
Download |
14-Jan-2010 ET |
2010 |
29 |
0 |
Security |
Use of TLS Question |
Subir Das (Telcordia) |
14-Jan-2010 11:21:47 ET |
Download |
14-Jan-2010 ET |
2010 |
7 |
5 |
Security |
Security TG meeting Agenda |
Yoshihiro Ohba (Toshiba) |
14-Jan-2010 09:40:26 ET |
Download |
13-Jan-2010 ET |
2010 |
28 |
0 |
Security |
work item1 conclusions |
Yoshihiro Ohba (Toshiba) |
13-Jan-2010 20:17:35 ET |
Download |
13-Jan-2010 ET |
2010 |
7 |
4 |
Security |
Security TG meeting Agenda |
Yoshihiro Ohba (Toshiba) |
13-Jan-2010 20:15:54 ET |
Download |
13-Jan-2010 ET |
2010 |
7 |
3 |
Security |
Security TG meeting Agenda |
Yoshihiro Ohba (Toshiba) |
13-Jan-2010 16:00:52 ET |
Download |
13-Jan-2010 ET |
2010 |
27 |
0 |
Security |
Summary of Comparison Alternatives MIA/MSA |
R. Marin-Lopez(UMU), Yoshihiro Ohba (Toshiba) |
13-Jan-2010 15:42:55 ET |
Download |
13-Jan-2010 ET |
2010 |
26 |
0 |
Security |
Comparison of architecture alternatives-key hierarchy |
R. Marin-Lopez(UMU) |
13-Jan-2010 15:39:40 ET |
Download |
13-Jan-2010 ET |
2010 |
7 |
2 |
Security |
Security TG meeting Agenda |
Yoshihiro Ohba (Toshiba) |
13-Jan-2010 11:33:07 ET |
Download |
12-Jan-2010 ET |
2009 |
164 |
7 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
12-Jan-2010 18:02:43 ET |
Download |
12-Jan-2010 ET |
2010 |
7 |
1 |
Security |
Security TG meeting Agenda |
Yoshihiro Ohba (Toshiba) |
12-Jan-2010 17:55:06 ET |
Download |
12-Jan-2010 ET |
2010 |
10 |
1 |
Security |
Teleconference Minutes |
Subir Das(Telcordia) |
12-Jan-2010 11:48:26 ET |
Download |
12-Jan-2010 ET |
2010 |
16 |
0 |
Security |
Security TG Opening Note |
Yoshihiro Ohba (Toshiba) |
12-Jan-2010 16:31:21 ET |
Download |
11-Jan-2010 ET |
2010 |
10 |
0 |
Security |
Teleconference Minutes |
Subir Das(Telcordia) |
11-Jan-2010 16:29:58 ET |
Download |
11-Jan-2010 ET |
2010 |
7 |
0 |
Security |
Security TG meeting Agenda |
Yoshihiro Ohba (Toshiba) |
11-Jan-2010 16:32:16 ET |
Download |
06-Jan-2010 ET |
2010 |
2 |
0 |
Security |
Key Hierarchy Discussion |
Lily Chen (NIST) |
06-Jan-2010 16:49:14 ET |
Download |
05-Jan-2010 ET |
2009 |
199 |
3 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
05-Jan-2010 13:09:41 ET |
Download |
05-Jan-2010 ET |
2009 |
164 |
6 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
05-Jan-2010 09:50:36 ET |
Download |
05-Jan-2010 ET |
2009 |
199 |
2 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
05-Jan-2010 09:38:44 ET |
Download |
05-Jan-2010 ET |
2009 |
164 |
5 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
05-Jan-2010 09:15:16 ET |
Download |
04-Jan-2010 ET |
2009 |
199 |
1 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
04-Jan-2010 14:26:52 ET |
Download |
31-Dec-2009 ET |
2009 |
164 |
4 |
Security |
Detailed analysis on MIA/MSA architecture |
F. Bernal (UMU), R. Marin-Lopez(UMU) |
31-Dec-2009 04:54:54 ET |
Download |
30-Dec-2009 ET |
2009 |
199 |
0 |
Security |
The Role of a Media Independent Authenticator |
Lily Chen (NIST) |
30-Dec-2009 16:16:40 ET |
Download |
15-Dec-2009 ET |
2009 |
197 |
0 |
Security |
Security TG Nov 2009 minutes |
H Anthony Chan (Huawei Technologies) |
15-Dec-2009 12:34:27 ET |
Download |