78 p. | TS 33.102 | REL 3 → 19 | 3G security – Security architecture |
25 p. | TS 33.103 | REL 3 → 4 | 3G security – Integration Guidelines |
26 p. | TS 33.105 | REL 3 → 19 | 3G security – Cryptographic Algorithm Requirements |
| Lawful Interception – Legacy Systems, up to EPS | |||
27 p. | TS 33.106 | REL 3 → 19 | Requirements |
406 p. | TS 33.107 | REL 3 → 19 | Architecture and Functions |
294 p. | TS 33.108 | REL 5 → 19 | Handover interface |
29 p. | TS 33.110 | REL 7 → 19 | Key Establishment between a UICC and a Terminal |
17 p. | TS 33.116 | REL 14 → 19 | Security Assurance Specification (SCAS) for the MME Network Product Class |
109 p. | TS 33.117 | REL 14 → 19 | Catalogue of General Security Assurance Requirements |
11 p. | TS 33.120 | REL 3 → 4 | Security Objectives and Principles |
41 p. | TS 33.122 | REL 15 → 19 | Security Aspects of Common API Framework (CAPIF) for 3GPP Northbound APIs |
| Lawful Interception – 5GS/EPS | |||
20 p. | TS 33.126 | REL 15 → 19 | Requirements |
200 p. | TS 33.127 | REL 15 → 19 | Architecture and Functions |
476 p. | TS 33.128 | REL 15 → 19 | Handover Interface |
20 p. | TS 33.141 | REL 6 → 19 | Presence Service Security |
56 p. | TS 33.163 | REL 15 → 19 | Battery Efficient Security for Very Low Throughput MTC Devices |
94 p. | TS 33.179 | REL 13 | Security of Mission Critical Push To Talk (MCPTT) over LTE |
205 p. | TS 33.180 | REL 14 → 19 | Security of the Mission Critical Service |
13 p. | TS 33.185 | REL 14 → 19 | Security aspect for LTE Support of V2X services |
16 p. | TS 33.187 | REL 12 → 19 | Security aspects of MTC and other Mobile Data Applications Communications Enhancements |
24 p. | TS 33.200 | REL 4 → 6 | NDS – MAP Application Layer Security |
148 p. | TS 33.203 | REL 5 → 19 | Access Security for IP-based Services |
26 p. | TS 33.204 | REL 7 → 19 | NDS – TCAP User Security |
28 p. | TS 33.210 | REL 5 → 19 | NDS – IP Network Layer Security |
24 p. | TS 33.216 | REL 15 → 19 | Security Assurance Specification (SCAS) for eNB Network Product Class |
113 p. | TS 33.220 | REL 6 → 19 | GAA – GBA: Generic Bootstrapping Architecture |
27 p. | TS 33.221 | REL 6 → 19 | GAA – Support for Subscriber Certificates |
39 p. | TS 33.222 | REL 6 → 19 | GAA – Access to NAFs using HTTPS |
33 p. | TS 33.223 | REL 8 → 19 | GAA – GBA Push function |
22 p. | TS 33.224 | REL 9 → 19 | GAA – Generic Push layer |
28 p. | TS 33.226 | REL 17 → 19 | Security assurance for IP Multimedia Subsystem (IMS) |
12 p. | TS 33.234 | REL 6 → 19 | I-WLAN Security |
75 p. | TS 33.246 | REL 7 → 19 | MBMS Security |
17 p. | TS 33.250 | REL 14 → 19 | Security Assurance Specification for PGW Network Product Class |
29 p. | TS 33.256 | REL 17 → 19 | Security aspects of Uncrewed Aerial Systems (UAS) |
30 p. | TS 33.259 | REL 7 → 19 | Key Establishment between a UICC Hosting Device and a Remote Device |
94 p. | TS 33.303 | REL 12 → 19 | Proximity-based Services (ProSe) – Security aspects |
80 p. | TS 33.310 | REL 6 → 19 | NDS – Authentication Framework |
43 p. | TS 33.320 | REL 9 → 19 | Security of HNB / HeNB |
13 p. | TS 33.326 | REL 17 → 19 | SCAS for the NSSAAF network product class |
85 p. | TS 33.328 | REL 9 → 19 | IMS Media Plane Security |
22 p. | TS 33.369 | REL 19 | Security aspects of Ambient IoT services in 5G |
177 p. | TS 33.401 | REL 8 → 19 | SAE – Security Architecture |
75 p. | TS 33.402 | REL 8 → 19 | SAE – Security aspects of non-3GPP Accesses |
43 p. | TS 33.434 | REL 16 → 19 | Security aspects of Service Enabler Architecture Layer (SEAL) for verticals |
356 p. | TS 33.501 | REL 15 → 19 | Security Architecture and Procedures for 5G System |
77 p. | TS 33.503 | REL 17 → 19 | Security Aspects of ProSe in the 5G System |
27 p. | TS 33.511 | REL 16 → 19 | 5G SCAS for the Next Generation Node B (gNodeB) Network Product Class |
28 p. | TS 33.512 | REL 16 → 19 | 5G SCAS for the Access and Mobility management Function (AMF) |
17 p. | TS 33.513 | REL 16 → 19 | 5G SCAS for the User Plane Function (UPF) |
17 p. | TS 33.514 | REL 16 → 19 | 5G SCAS for the Unified Data Management (UDM) Network Product Class |
12 p. | TS 33.515 | REL 16 → 19 | 5G SCAS for the Session Management Function (SMF) |
12 p. | TS 33.516 | REL 16 → 19 | 5G SCAS for the Authentication Server Function (AUSF) |
21 p. | TS 33.517 | REL 16 → 19 | 5G SCAS for the Security Edge Protection Proxy (SEPP) Network Product Class |
12 p. | TS 33.518 | REL 16 → 19 | 5G SCAS for the Network Repository Function (NRF) Network Product Class |
14 p. | TS 33.519 | REL 16 → 19 | 5G SCAS for the Network Exposure Function (NEF) Network Product Class |
11 p. | TS 33.520 | REL 18 → 19 | 5G SCAS for the Non-3GPP InterWorking Function (N3IWF) |
12 p. | TS 33.521 | REL 17 → 19 | 5G SCAS for the Network Data Analytics Function (NWDAF) |
13 p. | TS 33.522 | REL 17 → 19 | 5G SCAS for the Service Communication Proxy (SCP) |
25 p. | TS 33.523 | REL 18 → 19 | 5G SCAS for the Split gNB Product Classes |
17 p. | TS 33.526 | REL 18 → 19 | 5G SCAS for the Management Function (MnF) |
18 p. | TS 33.527 | REL 18 → 19 | 5G SCAS for the 3GPP Virtualized Network products |
10 p. | TS 33.528 | REL 18 → 19 | 5G SCAS for the Policy Control Function (PCF) |
17 p. | TS 33.529 | REL 19 | 5G SCAS for Short Message Service Function (SMSF) |
9 p. | TS 33.530 | REL 19 | 5G SCAS for the Unified Data Repository (UDR) |
28 p. | TS 33.533 | REL 18 → 19 | Security aspects of Ranging based Services and Sidelink Positioning |
42 p. | TS 33.535 | REL 16 → 19 | Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5GS |
27 p. | TS 33.536 | REL 16 → 19 | Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services |
12 p. | TS 33.537 | REL 18 → 19 | 5G SCAS for the Authentication and Key Management for Applications (AKMA) Anchor Function (AAnF) |
15 p. | TS 33.545 | REL 19 | Security aspects of NR Femto |
21 p. | TS 33.558 | REL 17 → 19 | Security aspects of enhancement of support for enabling edge applications |
98 p. | TR 33.700-22 | REL 19 | Study on Security aspects of Common API Framework (CAPIF) Phase 3 |
9 p. | TR 33.700-28 | REL 18 | Study on Security aspects of Satellite access |
116 p. | TR 33.700-29 | REL 19 | Study on Security aspects of 5G Satellite access in the 5G architecture Phase 3 |
69 p. | TR 33.700-32 | REL 19 | Study on Security aspects of User Identities and Authentication |
12 p. | TR 33.700-41 | REL 19 | Study on Cryptographic algorithm transition to 256 bits |
31 p. | TR 33.701 | REL 19 | Study on mitigations against bidding down Attacks |
65 p. | TR 33.702 | REL 19 | Security for Mobility over non-3GPP access to avoid full Primary Authentication |
00 p. | TR 33.713 | REL 19 | Study on security aspects of Ambient Internet of Things (AIoT) services in 5G |
33 p. | TR 33.721 | REL 19 | Study on Security aspects of 5G Mobile Metaverse services |
48 p. | TR 33.737 | REL 18 | Study on Authentication and Key Management for Applications (AKMA) – Phase 2 |
68 p. | TR 33.738 | REL 18 | Study on Security aspects of Enablers for Network Automation for the 5G System – Phase 3 |
66 p. | TR 33.739 | REL 18 | Study on Security enhancement of support for Edge Computing – Phase 2 |
117 p. | TR 33.740 | REL 18 | Study on Security aspects of Proximity Based Services (ProSe) in 5GS – Phase 2 |
38 p. | TR 33.741 | REL 18 | Study on Home Network triggered Primary Authentication |
50 p. | TR 33.743 | REL 19 | Study on Security aspects of enhancement for Proximity-based Services (ProSe) in the 5GS Phase 3 |
35 p. | TR 33.745 | REL 19 | Study on Security aspects of 5G Next Radio (NR) Femto |
28 p. | TR 33.749 | REL 19 | Study on Security aspects of enhancement of support for Edge Computing in the 5GC Phase 3 |
29 p. | TR 33.754 | REL 19 | Study on Security aspects for Multi-Access for DualSteer devices and ATSSS Phase 4 |
68 p. | TR 33.757 | REL 19 | Study on Security for a PLMN hosting a Non-Public Network (NPN) |
18 p. | TR 33.759 | REL 19 | Study on Security enhancements of Uncrewed Aerial Systems (UAS) Phase 3 |
13 p. | TR 33.766 | REL 19 | Study on Security aspects of Energy savings in 5G |
36 p. | TR 33.776 | REL 19 | Study of ACME for the SBA |
48 p. | TR 33.784 | REL 19 | Study on Security aspects of Core Network enhanced support for AI/ML |
61 p. | TR 33.790 | REL 19 | Study on the Security support for the next generation Real Time Communication services Phase 2 |
55 p. | TR 33.794 | REL 19 | Study on Enablers for Zero Trust Security |
10 p. | TR 33.803 | REL 7 | Coexistence between TISPAN and 3GPP Authentication Schemes |
47 p. | TR 33.804 | REL 11 → 12 | Single Sign On (SSO) Application Security for Common IMS based on SIP Digest |
106 p. | TR 33.805 | REL 12 | Study on Security Assurance Methodology for 3GPP Network Products |
33 p. | TR 33.807 | REL 16 | Study on the Security of the Wireless and Wireline Convergence for the 5G System Architecture |
131 p. | TR 33.809 | REL 18 | Study on 5G Security enhancements against False Base Stations (FBS) |
27 p. | TR 33.810 | REL 6 | Feasibility Study to support NDS/IP Evolution |
19 p. | TR 33.811 | REL 15 | Study on Security aspects of 5G Network Slicing Management |
87 p. | TR 33.812 | REL 9 | Feasibility Study on Remote Management of USIM Application on M2M Equipment |
36 p. | TR 33.813 | REL 16 | Study on Security aspects of Network Slicing enhancement |
19 p. | TR 33.814 | REL 16 | Study on the Security of the enhancement to the 5GC Location Services (LCS) |
17 p. | TR 33.815 | REL 16 | Study on Security aspects of PARLOS by Unauthenticated UEs |
94 p. | TR 33.816 | REL 10 | Feasibility Study on LTE Relay Node Security |
39 p. | TR 33.817 | REL 6 | Feasibility Study on (U)SIM Security Reuse by Peripheral Devices on Local Interfaces |
59 p. | TR 33.818 | REL 17 | SECAM and SCAS for 3GPP Virtualized Network Products |
46 p. | TR 33.819 | REL 16 | Study on Security enhancements of 5GS for Vertical and Local Area Network (LAN) Services |
99 p. | TR 33.820 | REL 8 | Security of H(e)NB |
141 p. | TR 33.821 | REL 8 → 9 | Rationale and Track of Security Decisions in LTE RAN / 3GPP SAE |
30 p. | TR 33.822 | REL 8 | Security aspects for inter-Access Mobility between non 3GPP and 3GPP Access Network |
18 p. | TR 33.823 | REL 12 | Security for Usage of GBA with a UE Browser |
22 p. | TR 33.824 | REL 17 | Study on Security for Next Radio (NR) Integrated Access and Backhaul (IAB) |
29 p. | TR 33.825 | REL 16 | Study on the Security of Ultra-Reliable Low-Latency Communication (URLLC) for 5GS |
53 p. | TR 33.827 | REL 14 | Study on providing for Lawful Interception (LI) in the S8 Home Routeing (S8HR) Architecture for VoLTE |
81 p. | TR 33.828 | REL 9 → 11 | IMS Media Plane Security |
58 p. | TR 33.829 | REL 12 | IMS Media Plane Security Services |
25 p. | TR 33.831 | REL 12 | Study on Security on Spoofed Call Detection and Prevention |
227 p. | TR 33.833 | REL 13 | Study on Security issues to support Proximity Services (ProSe) |
35 p. | TR 33.834 | REL 16 | Study on Long Term Key Update Procedures (LTKUP) |
83 p. | TR 33.835 | REL 16 | Study on Authentication and Key Management for Applications based on 3GPP Credential in 5G |
51 p. | TR 33.836 | REL 16 | Study on Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) |
21 p. | TR 33.838 | REL 11 | Study on Protection against Unsolicited Communication for IMS (PUCI) |
78 p. | TR 33.839 | REL 17 | Study on Security aspects of enhancement of support for Edge Computing in 5GC |
25 p. | TR 33.841 | REL 16 | Study on the support of 256-bit Algorithms for 5G |
35 p. | TR 33.843 | REL 15 | Study on Security aspect of Architecture enhancements to ProSe UE-to-Network Relay |
16 p. | TR 33.844 | REL 11 | Security Study on IMS Based Peer-to-Peer Content Distribution Services |
33 p. | TR 33.845 | REL 17 | Study on Storage and Transport of 5GC Security parameters for ARPF authentication |
64 p. | TR 33.846 | REL 17 | Study on Authentication enhancements in the 5G System (5GS) |
166 p. | TR 33.847 | REL 17 | Study on Security aspects of enhancement for Proximity based services in the 5G System (5GS) |
55 p. | TR 33.848 | REL 18 | Study on Security impacts of Virtualisation |
31 p. | TR 33.849 | REL 14 | Study on Subscriber Privacy impact in 3GPP |
51 p. | TR 33.850 | REL 17 | Study on Security aspects of enhancements for 5G Multicast-Broadcast Services (MBS) |
19 p. | TR 33.851 | REL 17 | Study on Security for enhanced support of Industrial Internet of Things (IIoT) |
66 p. | TR 33.853 | REL 17 | Study on key issues and potential solutions for integrity protection of the User Plane (UP) |
62 p. | TR 33.854 | REL 17 | Study on Security aspects of Uncrewed Aerial Systems (UAS) |
103 p. | TR 33.855 | REL 16 | Study on Security aspects of the 5G Service Based Architecture (SBA) |
16 p. | TR 33.856 | REL 16 | Study on Security aspects of Single Radio Voice Continuity from 5G to UTRAN |
85 p. | TR 33.857 | REL 17 | Study on enhanced Security support for Non-Public Networks (NPN) |
35 p. | TR 33.858 | REL 18 | Study on Security aspects of enhanced support of Non-Public Networks (NPN) – Phase 2 |
67 p. | TR 33.859 | REL 11 | Study on the Introduction of Key Hierarchy in UTRAN |
46 p. | TR 33.860 | REL 13 | Study on eGPRS Access Security enhancements with relation to CIoT |
73 p. | TR 33.861 | REL 16 | Study on evolution of CIoT Security for the 5G System |
26 p. | TR 33.862 | REL 17 | Study on security aspects of the Message Service for MIoT over the 5G System (MSGin5G) |
109 p. | TR 33.863 | REL 14 | Study on Battery efficient Security for Very Low Throughput MTC Devices |
64 p. | TR 33.864 | REL 17 | Study on the Security of Access and Mobility Management Function (AMF) re-allocation |
51 p. | TR 33.866 | REL 17 | Study on Security aspects of enablers for Network Automation (eNA) for 5GS) Phase 2 |
32 p. | TR 33.867 | REL 17 | Study on user consent for 3GPP services |
116 p. | TR 33.868 | REL 12 | Study on Security aspects of MTC and other Mobile Data Applications Communications enhancements |
52 p. | TR 33.871 | REL 12 | Study on Security for WebRTC IMS Client Access to IMS |
018 p. | TR 33.872 | REL 13 | Study on Security enhancements to Web Real Time Communication (WebRTC) Access to IMS |
11 p. | TR 33.873 | REL 17 | Study on the Security of the System Enablers for devices having MUSIMs |
12 p. | TR 33.874 | REL 18 | Study on enhanced Security for Network Slicing Phase 2 |
84 p. | TR 33.875 | REL 18 | Study on enhanced Security aspects of the 5G Service Based Architecture (SBA) |
65 p. | TR 33.876 | REL 18 | Study on Automated Certificate Management in Service-Based Architecture (SBA) |
11 p. | TR 33.877 | REL 18 | Study on the Security aspects of AI/ML for the Next Generation Radio Access Network (NG-RAN) |
88 p. | TR 33.879 | REL 13 | Study on Security enhancements for Mission Critical Push To Talk (MCPTT) over LTE |
125 p. | TR 33.880 | REL 15 | Study on Mission Critical Security enhancements |
21 p. | TR 33.881 | REL 17 | Study on Non-Seamless WLAN Offload (NSWO) in 5G System (5GS) using 3GPP credentials |
26 p. | TR 33.882 | REL 18 | Study on Personal IoT Networks Security aspects |
16 p. | TR 33.883 | REL 18 | Study on Security enhancements for 5G Multicast-Broadcast services Phase 2 |
49 p. | TR 33.884 | REL 18 | Study on Security of Application enablement aspects for Subscriber-aware Northbound API access |
74 p. | TR 33.885 | REL 14 | Study on Security aspects for LTE support of V2X Services |
16 p. | TR 33.886 | REL 18 | Study on enhanced Security for Network Slicing – Phase 3 |
40 p. | TR 33.887 | REL 18 | Study on Security aspects for support for 5WWC – Phase 2 |
44 p. | TR 33.888 | REL 12 | Study on Security issues to support Group Communication System Enablers (GCSE) for LTE |
25 p. | TR 33.889 | REL 13 | Study on Security aspects of MTC Architecture and Feature enhancements |
23 p. | TR 33.890 | REL 18 | Study on Security support for Next Generation Real Time Communication services |
22 p. | TR 33.891 | REL 18 | Study on Security of Phase 2 for UAS, UAV and UAM |
13 p. | TR 33.892 | REL 18 | Study on UE Route Selection Policy (URSP) rules to securely identify applications |
97 p. | TR 33.893 | REL 18 | Study on Security aspects of Ranging-based services and Sidelink Positioning |
17 p. | TR 33.894 | REL 18 | Study on applicability of the zero trust security principles in mobile networks |
18 p. | TR 33.896 | REL 18 | Study of Security aspects on User Consent for 3GPP Services – Phase 2 |
24 p. | TR 33.897 | REL 13 | Study on Isolated E-UTRAN operation for Public Safety – Security aspects |
17 p. | TR 33.898 | REL 18 | Study on Security and Privacy of AI/ML-based services and applications in 5G |
18 p. | TR 33.901 | REL 3 → 4 | Criteria for cryptographic Algorithm design process |
10 p. | TR 33.902 | REL 3 → 4 | Formal Analysis of the 3G Authentication Protocol |
17 p. | TR 33.905 | REL 7 → 19 | Recommendations for Trusted Open Platforms |
26 p. | TR 33.908 | REL 3 → 4 | Report on design, specification and evaluation of 3GPP confidentiality and integrity algorithms |
30 p. | TR 33.909 | REL 4 | Report on the design and evaluation of the MILENAGE algorithm set |
42 p. | TR 33.916 | REL 14 → 19 | Security Assurance Methodology for 3GPP network products |
13 p. | TR 33.918 | REL 7 | GAA – Early implementation of HTTPS connection between a UICC and a NAF |
18 p. | TR 33.919 | REL 6 → 19 | GAA – System description |
9 p. | TR 33.920 | REL 7 | SIM Card based GBA – Early implementation feature |
42 p. | TR 33.924 | REL 9 → 19 | Identity management and GAA interworking |
111 p. | TR 33.926 | REL 13 → 19 | SCAS Threats and Critical Assets in 3GPP Network Product Classes |
20 p. | TR 33.927 | REL 18 → 19 | SCAS Threats and Critical Assets in 3GPP Virtualized Network Product Classes |
68 p. | TR 33.928 | REL 18 → 19 | ADMF Logic for provisioning Lawful Interception (LI) |
16 p. | TR 33.935 | REL 16 → 19 | Study on detailed Long Term Key Update Process (LTKUP) detailed solutions |
21 p. | TR 33.936 | REL 18 → 19 | Security Assurance Methodology (SECAM) for 3GPP Virtualized Network Products |
98 p. | TR 33.937 | REL 9 → 19 | Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI) |
19 p. | TR 33.938 | REL 19 | 3GPP Cryptographic Inventory |
118 p. | TR 33.969 | REL 12 → 19 | Study on security aspects of Public Warning System (PWS) |
29 p. | TR 33.978 | REL 6 → 7 | Security aspects of early IMS |
42 p. | TR 33.980 | REL 7 → 19 | Liberty Alliance ID-FF, ID-WSF and GAA |
39 p. | TR 33.995 | REL 13 → 19 | Study on Security aspects of integration of SSO frameworks with 3GPP operator-controlled resources and mechanisms |