TS 33.102
★
REL 3 → 16
3G security – Security architecture
TS 33.103
★
REL 3 → 4
3G security – Integration Guidelines
TS 33.105
★
REL 3 → 16
3G security – Cryptographic Algorithm Requirements
Lawful Interception – Legacy Systems, up to EPS
TS 33.110
★
REL 7 → 16
Key Establishment
between a UICC and a Terminal
TS 33.116
★
REL 14 → 16
Security Assurance Specification (SCAS)
for the MME Network Product Class
TS 33.117
★
REL 14 → 16
Catalogue of General Security Assurance Requirements
TS 33.120
★
REL 3 → 4
Security Objectives and Principles
TS 33.122
★
REL 15 → 16
Security Aspects of
Common API Framework (CAPIF)
for 3GPP Northbound APIs
Lawful Interception – 5GS/EPS
TS 33.141
★
REL 6 → 16
Presence Service Security
TS 33.163
★
REL 15 → 16
Battery Efficient Security
for Very Low Throughput MTC Devices
TS 33.179
★
SA3
REL 13
Security of Mission Critical Push To Talk (MCPTT) over LTE
TS 33.180
★
REL 14 → 17
Security of the Mission Critical Service
TS 33.185
★
REL 14 → 16
Security aspect for LTE Support of V2X services
TS 33.187
★
REL 12 → 16
Security aspects of MTC
and other Mobile Data Applications Communications Enhancements
TS 33.200
★
REL 4 → 6
NDS — MAP Application Layer Security
TS 33.203
★
REL 5 → 16
Access Security for IP-based Services
TS 33.204
★
REL 7 → 16
NDS — TCAP User Security
TS 33.210
★
REL 5 → 16
NDS — IP Network Layer Security
TS 33.216
★
REL 15 → 16
Security Assurance Specification (SCAS)
for eNB Network Product Class
TS 33.220
★
REL 6 → 17
GAA — GBA: Generic Bootstrapping Architecture
TS 33.221
★
REL 6 → 16
GAA — Support for Subscriber Certificates
TS 33.222
★
REL 6 → 16
GAA — Access to NAFs using HTTPS
TS 33.223
★
REL 8 → 16
GAA — GBA Push function
TS 33.224
★
REL 9 → 16
GAA — Generic Push layer
TS 33.234
★
REL 6 → 16
I-WLAN Security
TS 33.246
★
REL 7 → 16
MBMS Security
TS 33.250
★
REL 14 → 16
Security Assurance Specification
for PGW Network Product Class
TS 33.259
★
REL 7 → 16
Key Establishment
between a UICC Hosting Device
and a Remote Device
TS 33.303
★
REL 12 → 16
Proximity-based Services (ProSe) –
Security aspects
TS 33.310
★
REL 6 → 16
NDS — Authentication Framework
TS 33.320
★
REL 9 → 16
Security of HNB / HeNB
TS 33.328
★
REL 9 → 16
IMS Media Plane Security
TS 33.401
★
REL 8 → 16
SAE — Security Architecture
TS 33.402
★
REL 8 → 16
SAE — Security aspects of non-3GPP Accesses
TS 33.434
★
REL 16
Security aspects of Service Enabler Architecture Layer (SEAL) for verticals
TS 33.501
★
REL 15 → 17
Security Architecture and Procedures for 5G System
TS 33.511
★
REL 16
Security Assurance Specification (SCAS)
for the Next Generation Node B (gNodeB) Network Product Class
TS 33.512
★
REL 16
5G Security Assurance Specification (SCAS) –
Access and Mobility management Function (AMF)
TS 33.513
★
REL 16
5G Security Assurance Specification (SCAS) –
User Plane Function (UPF)
TS 33.514
★
REL 16
5G Security Assurance Specification (SCAS)
for the Unified Data Management (UDM) Network Product Class
TS 33.515
★
REL 16
5G Security Assurance Specification (SCAS) –
Session Management Function (SMF)
TS 33.516
★
REL 16
5G Security Assurance Specification (SCAS) –
Authentication Server Function (AUSF)
TS 33.517
★
REL 16
5G Security Assurance Specification (SCAS)
for the Security Edge Protection Proxy (SEPP) Network Product Class
TS 33.518
★
REL 16
5G Security Assurance Specification (SCAS)
for the Network Repository Function (NRF) Network Product Class
TS 33.519
★
REL 16
5G Security Assurance Specification (SCAS)
for the Network Exposure Function (NEF) Network Product Class
TS 33.535
★
REL 16 → 17
Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS)
TS 33.536
★
REL 16
Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services
TR 33.803
★
REL 7
Coexistence between TISPAN
and 3GPP Authentication Schemes
TR 33.804
★
REL 11 → 12
Single Sign On (SSO) Application Security
for Common IMS based on SIP Digest
TR 33.805
★
REL 12
Study on Security Assurance Methodology
for 3GPP Network Products
TR 33.807
★
REL 16
Study on the Security
of the Wireless and Wireline Convergence
for the 5G System Architecture
TR 33.810
★
REL 6
Feasibility Study to support NDS/IP Evolution
TR 33.811
★
REL 15
Study on Security aspects
of 5G Network Slicing Management
TR 33.812
★
REL 9
Feasibility Study on Remote Management
of USIM Application on M2M Equipment
TR 33.813
★
REL 16
Study on Security aspects of Network Slicing enhancement
TR 33.814
★
REL 16
Study on the Security of the enhancement
to the 5GC Location Services (LCS)
TR 33.815
★
REL 16
Study on Security aspects
of Provision of Access to Restricted Local Operator Services by Unauthenticated UEs (PARLOS)
TR 33.816
★
REL 10
Feasibility Study on LTE Relay Node Security
TR 33.817
★
REL 6
Feasibility Study on (U)SIM Security Reuse
by Peripheral Devices on Local Interfaces
TR 33.819
★
REL 16
Study on Security enhancements of 5GS
for Vertical and Local Area Network (LAN) Services
TR 33.820
★
REL 8
Security of H(e)NB
TR 33.821
★
REL 8 → 9
Rationale and Track of Security Decisions
in LTE RAN / 3GPP SAE
TR 33.822
★
REL 8
Security aspects for inter-Access Mobility
between non 3GPP and 3GPP Access Network
TR 33.823
★
REL 12
Security for Usage of GBA with a UE Browser
TR 33.825
★
REL 16
Study on the Security
of Ultra-Reliable Low-Latency Communication (URLLC) for 5GS
TR 33.827
★
REL 14
Study on providing for Lawful Interception (LI)
in the S8 Home Routeing (S8HR) Architecture
for Voice over LTE (VoLTE)
TR 33.828
★
REL 9 → 11
IMS Media Plane Security
TR 33.829
★
REL 12
IMS Media Plane Security Services
TR 33.831
★
REL 12
Study on Security on Spoofed Call Detection and Prevention
TR 33.833
★
REL 13
Study on Security issues to support Proximity Services (ProSe)
TR 33.834
★
REL 16
Study on Long Term Key Update Procedures (LTKUP)
TR 33.835
★
REL 16
Study on Authentication and Key Management
for Applications based on 3GPP Credential in 5G
TR 33.836
★
REL 16
Study on Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X)
TR 33.838
★
REL 11
Study on Protection against Unsolicited Communication for IMS (PUCI)
TR 33.841
★
REL 16
Study on the support of 256-bit Algorithms for 5G
TR 33.843
★
REL 15
Study on Security aspect of Architecture enhancements
to ProSe UE-to-Network Relay
TR 33.844
★
REL 11
Security Study on IMS Based Peer-to-Peer Content Distribution Services
TR 33.849
★
REL 14
Study on Subscriber Privacy impact in 3GPP
TR 33.855
★
REL 16
Study on Security aspects of the 5G Service Based Architecture (SBA)
TR 33.856
★
REL 16
Study on Security aspects
of Single Radio Voice Continuity from 5G to UTRAN
TR 33.859
★
REL 11
Study on the Introduction of Key Hierarchy in UTRAN
TR 33.860
★
REL 13
Study on enhanced General Packet Radio Service (EGPRS) Access Security enhancements
with relation to Cellular Internet of Things (IoT)
TR 33.861
★
REL 16
Study on evolution of Cellular Internet of Things (CIoT) Security for the 5G System
TR 33.863
★
REL 14
Study on Battery efficient Security
for Very Low Throughput Machine Type Communication (MTC) Devices
TR 33.868
★
REL 12
Study on Security aspects of MTC
and other Mobile Data Applications Communications enhancements
TR 33.871
★
REL 12
Study on Security for WebRTC IMS Client Access to IMS
TR 33.872
★
REL 13
Study on Security enhancements
to Web Real Time Communication (WebRTC) Access to IMS
TR 33.879
★
REL 13
Study on Security enhancements
for Mission Critical Push To Talk (MCPTT) over LTE
TR 33.880
★
REL 15
Study on Mission Critical Security enhancements
TR 33.885
★
REL 14
Study on Security aspects
for LTE support of V2X Services
TR 33.888
★
REL 12
Study on Security issues
to support Group Communication System Enablers (GCSE) for LTE
TR 33.889
★
REL 13
Study on Security aspects
of Machine-Type Communications (MTC) Architecture and Feature enhancements
TR 33.897
★
REL 13
Study on Isolated E-UTRAN operation
for Public Safety – Security aspects
TR 33.901
★
REL 3 → 4
Criteria for cryptographic Algorithm design process
TR 33.902
★
REL 3 → 4
Formal Analysis of the 3G Authentication Protocol
TR 33.905
★
REL 7 → 16
Recommendations for Trusted Open Platforms
TR 33.908
★
REL 3 → 4
Report on design, specification and evaluation of 3GPP confidentiality and integrity algorithms
TR 33.909
★
REL 4
Report on the design and evaluation of the MILENAGE algorithm set
TR 33.916
★
REL 14 → 16
Security Assurance Methodology for 3GPP network products
TR 33.918
★
REL 7
GAA — Early implementation of HTTPS connection between a UICC and a NAF
TR 33.919
★
REL 6 → 16
GAA — System description
TR 33.920
★
REL 7
SIM Card based GBA — Early implementation feature
TR 33.924
★
REL 9 → 16
Identity management and GAA interworking
TR 33.926
★
REL 13 → 17
Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes
TR 33.935
★
REL 16
Study on detailed Long Term Key Update Process (LTKUP) detailed solutions
TR 33.937
★
REL 9 → 16
Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI)
TR 33.969
★
REL 12 → 16
Study on security aspects of Public Warning System (PWS)
TR 33.978
★
REL 6 → 7
Security aspects of early IMS
TR 33.980
★
REL 7 → 16
Liberty Alliance ID-FF, ID-WSF and GAA
TR 33.995
★
REL 13 → 16
Study on Security aspects of integration of Single Sign-On (SSO) frameworks with 3GPP operator-controlled resources and mechanisms