Tech-invite  3GPPspecsRELsGlossariesSIP

3GPP 33-series — Security aspects

33.1   33.2   33.3   33.4   33.5   33.8   33.9
.80…   .81…   .82…   .83…   .84…   .85…   .86…   .87…   .88…   .89…
Technical Reports in this range are 3GPP internal working documents (of a given Release) for holding the interim results of feasibility studies about Security.

TR 33.803SA3Rel‑7
Coexistence between TISPAN
and 3GPP Authentication Schemes

TR 33.804SA3Rel‑11 → 12
Single Sign On (SSO) Application Security
for Common IMS based on SIP Digest

TR 33.805SA3Rel‑12
Study on Security Assurance Methodology
for 3GPP Network Products

TR 33.807SA3Rel‑16
Study on the Security
of the Wireless and Wireline Convergence
for the 5G System Architecture

TR 33.810SA3Rel‑6
Feasibility Study to support NDS/IP Evolution

TR 33.811SA3Rel‑15
Study on Security aspects
of 5G Network Slicing Management

TR 33.812SA3Rel‑9
Feasibility Study on Remote Management
of USIM Application on M2M Equipment

TR 33.814SA3Rel‑16
Study on the Security of the enhancement
to the 5GC Location Services (LCS)

TR 33.815SA3Rel‑16
Study on Security aspects
of Provision of Access to Restricted Local Operator Services by Unauthenticated UEs (PARLOS)

TR 33.816SA3Rel‑10
Feasibility Study on LTE Relay Node Security

TR 33.817SA3Rel‑6
Feasibility Study on (U)SIM Security Reuse
by Peripheral Devices on Local Interfaces

TR 33.819SA3Rel‑16
Study on Security enhancements of 5GS
for Vertical and Local Area Network (LAN) Services

TR 33.820SA3Rel‑8
Security of H(e)NB

TR 33.821SA3Rel‑8 → 9
Rationale and Track of Security Decisions

TR 33.822SA3Rel‑8
Security aspects for inter-Access Mobility
between non 3GPP and 3GPP Access Network

TR 33.823SA3Rel‑12
Security for Usage of GBA with a UE Browser

TR 33.825SA3Rel‑16
Study on the Security
of Ultra-Reliable Low-Latency Communication (URLLC) for 5GS

TR 33.827SA3Rel‑14
Study on providing for Lawful Interception (LI)
in the S8 Home Routeing (S8HR) Architecture
for Voice over LTE (VoLTE)

TR 33.828SA3Rel‑9 → 11
IMS Media Plane Security

TR 33.829SA3Rel‑12
IMS Media Plane Security Services

TR 33.831SA3Rel‑12
Study on Security on Spoofed Call Detection and Prevention

TR 33.833SA3Rel‑13
Study on Security issues to support Proximity Services (ProSe)

TR 33.834SA3Rel‑16
Study on Long Term Key Update Procedures (LTKUP)

TR 33.835SA3Rel‑16
Study on Authentication and Key Management
for Applications based on 3GPP Credential in 5G

TR 33.838SA3Rel‑11
Study on Protection against Unsolicited Communication for IMS (PUCI)

TR 33.841SA3Rel‑16
Study on the support of 256-bit Algorithms for 5G

TR 33.843SA3Rel‑15
Study on Security aspect of Architecture enhancements
to ProSe UE-to-Network Relay

TR 33.844SA3Rel‑11
Security Study on IMS Based Peer-to-Peer Content Distribution Services

TR 33.849SA3Rel‑14
Study on Subscriber Privacy impact in 3GPP

TR 33.856SA3Rel‑16
Study on Security aspects
of Single Radio Voice Continuity from 5G to UTRAN

TR 33.859SA3Rel‑11
Study on the Introduction of Key Hierarchy in UTRAN

TR 33.860SA3Rel‑13
Study on enhanced General Packet Radio Service (EGPRS) Access Security enhancements
with relation to Cellular Internet of Things (IoT)

TR 33.863SA3Rel‑14
Study on Battery efficient Security
for Very Low Throughput Machine Type Communication (MTC) Devices

TR 33.868SA3Rel‑12
Study on Security aspects of MTC
and other Mobile Data Applications Communications enhancements

TR 33.871SA3Rel‑12
Study on Security for WebRTC IMS Client Access to IMS

TR 33.872SA3Rel‑13
Study on Security enhancements
to Web Real Time Communication (WebRTC) Access to IMS

TR 33.879SA3Rel‑13
Study on Security enhancements
for Mission Critical Push To Talk (MCPTT) over LTE

TR 33.880SA3Rel‑15
Study on Mission Critical Security enhancements

TR 33.885SA3Rel‑14
Study on Security aspects
for LTE support of V2X Services

TR 33.888SA3Rel‑12
Study on Security issues
to support Group Communication System Enablers (GCSE) for LTE

TR 33.889SA3Rel‑13
Study on Security aspects
of Machine-Type Communications (MTC) Architecture and Feature enhancements

TR 33.897SA3Rel‑13
Study on Isolated E-UTRAN operation
for Public Safety – Security aspects