Tech-invite   3GPPspecs   Glossaries   IETFRFCs   Groups   SIP   ABNFs   Ti+   Search in Tech-invite

3GPP 33-series — index of 33.8… Technical Reports

Top   Up   Prev   Next

33.1   33.2   33.3   33.4   33.5   33.7   33.8   33.9

.80…   .81…   .82…   .83…   .84…   .85…   .86…   .87…   .88…   .89…
Technical Reports in this range are 3GPP internal working documents (of a given Release) for holding the interim results of feasibility studies about Security.

TR 33.803SA3Rel‑7
Coexistence between TISPAN
and 3GPP Authentication Schemes

TR 33.804SA3Rel‑11 → 12
Single Sign On (SSO) Application Security
for Common IMS based on SIP Digest

TR 33.805SA3Rel‑12
Study on Security Assurance Methodology
for 3GPP Network Products

TR 33.807☆ (draft)SA3
Study on the Security
of the Wireless and Wireline Convergence
for the 5G System Architecture

TR 33.808☆ (draft)SA3
KDF Negotiation for 5GS Security – Phase 2

TR 33.809☆ (draft)SA3
Study on 5G Security enhancements
against False Base Stations
Top

TR 33.810SA3Rel‑6
Feasibility Study to support NDS/IP Evolution

TR 33.811SA3Rel‑15
Study on Security aspects
of 5G Network Slicing Management

TR 33.812SA3Rel‑9
Feasibility Study on Remote Management
of USIM Application on M2M Equipment

TR 33.813☆ (draft)SA3
Study on Security aspects
of Network Slicing enhancement

TR 33.814☆ (draft)SA3
Study on the Security of the enhancement
to the 5GC Location Services (LCS)

TR 33.815☆ (draft)SA3
Study on Security aspects
of Provision of Access to Restricted Local Operator Services by Unauthenticated UEs (PARLOS)

TR 33.816SA3Rel‑10
Feasibility Study on LTE Relay Node Security

TR 33.817SA3Rel‑6
Feasibility Study on (U)SIM Security Reuse
by Peripheral Devices on Local Interfaces

TR 33.818☆ (draft)SA3
Security Assurance Methodology (SECAM)
and Security Assurance Specification (SCAS)
for 3GPP Virtualized Network Products

TR 33.819☆ (draft)SA3
Study on Security enhancements of 5GS
for Vertical and Local Area Network (LAN) Services
Top

TR 33.820SA3Rel‑8
Security of H(e)NB

TR 33.821SA3Rel‑8 → 9
Rationale and Track of Security Decisions
in LTE RAN / 3GPP SAE

TR 33.822SA3Rel‑8
Security aspects for inter-Access Mobility
between non 3GPP and 3GPP Access Network

TR 33.823SA3Rel‑12
Security for Usage of GBA with a UE Browser

TR 33.824☆ (draft)SA3
Study on Security aspects
of Integrated Access and Backhaul (IAB)
for Next Radio (NR)

TR 33.825☆ (draft)SA3
Study on the Security
of Ultra-Reliable Low-Latency Communication (URLLC) for 5GS

TR 33.826☆ (draft)SA3
Study on Lawful Interception Service Evolution

TR 33.827SA3Rel‑14
Study on providing for Lawful Interception (LI)
in the S8 Home Routeing (S8HR) Architecture
for Voice over LTE (VoLTE)

TR 33.828SA3Rel‑9 → 11
IMS Media Plane Security

TR 33.829SA3Rel‑12
IMS Media Plane Security Services
Top

TR 33.830☆ (draft)SA3
Feasibility Study on IMS Firewall Traversal

TR 33.831SA3Rel‑12
Study on Security on Spoofed Call Detection and Prevention

TR 33.832☆ (draft)SA3
Study on IMS enhanced Spoofed Call Prevention and Detection

TR 33.833SA3Rel‑13
Study on Security issues to support Proximity Services (ProSe)

TR 33.834SA3Rel‑16
Study on Long Term Key Update Procedures (LTKUP)

TR 33.835☆ (draft)SA3
Study on Authentication and Key Management
for Applications based on 3GPP Credential in 5G

TR 33.836☆ (draft)SA3
Study on Security aspects
of 3GPP support
for Advanced V2X Services

TR 33.838SA3Rel‑11
Study on Protection against Unsolicited Communication for IMS (PUCI)
Top

TR 33.841SA3Rel‑16
Study on the support of 256-bit Algorithms for 5G

TR 33.842☆ (draft)SA3
Study on Lawful Interception (LI) Service in 5G

TR 33.843SA3Rel‑15
Study on Security aspect of Architecture enhancements
to ProSe UE-to-Network Relay

TR 33.844SA3Rel‑11
Security Study on IMS Based Peer-to-Peer Content Distribution Services

TR 33.846☆ (draft)SA3
Study on Authentication enhancements in the 5G System (5GS)

TR 33.848☆ (draft)SA3
Study on Security impacts of Virtualisation

TR 33.849SA3Rel‑14
Study on Subscriber Privacy impact in 3GPP
Top

TR 33.853☆ (draft)SA3
Key Issues and Potential Solutions
for Integrity Protection of the User Plane (UP)

TR 33.855☆ (draft)SA3
Study on Security aspects
of the 5G Service Based Architecture (SBA)

TR 33.856SA3Rel‑16
Study on Security aspects
of Single Radio Voice Continuity from 5G to UTRAN

TR 33.859SA3Rel‑11
Study on the Introduction of Key Hierarchy in UTRAN
Top

TR 33.860SA3Rel‑13
Study on enhanced General Packet Radio Service (EGPRS) Access Security enhancements
with relation to Cellular Internet of Things (IoT)

TR 33.861☆ (draft)SA3
Study on evolution of Cellular IoT Security for the 5G System

TR 33.863SA3Rel‑14
Study on Battery efficient Security
for Very Low Throughput Machine Type Communication (MTC) Devices

TR 33.865☆ (draft)SA3
Security aspects of WLAN Network Selection for 3GPP Terminals

TR 33.868SA3Rel‑12
Study on Security aspects of MTC
and other Mobile Data Applications Communications enhancements
Top

TR 33.871SA3Rel‑12
Study on Security for WebRTC IMS Client Access to IMS

TR 33.872SA3Rel‑13
Study on Security enhancements
to Web Real Time Communication (WebRTC) Access to IMS

TR 33.879SA3Rel‑13
Study on Security enhancements
for Mission Critical Push To Talk (MCPTT) over LTE
Top

TR 33.880SA3Rel‑15
Study on Mission Critical Security enhancements

TR 33.885SA3Rel‑14
Study on Security aspects
for LTE support of V2X Services

TR 33.888SA3Rel‑12
Study on Security issues
to support Group Communication System Enablers (GCSE) for LTE

TR 33.889SA3Rel‑13
Study on Security aspects
of Machine-Type Communications (MTC) Architecture and Feature enhancements
Top

TR 33.897SA3Rel‑13
Study on Isolated E-UTRAN operation
for Public Safety – Security aspects
Top

Next