Tech-invite   3GPPspecs   Glossaries   IETFRFCs   Groups   SIP   ABNFs   Ti+   Search in Tech-invite

3GPP 33-series — index of 33.8… Technical Reports

Top   Up   Prev   Next

33.1   33.2   33.3   33.4   33.5   33.7   33.8   33.9

.80…   .81…   .82…   .83…   .84…   .85…   .86…   .87…   .88…   .89…
Technical Reports in this range are 3GPP internal working documents (of a given Release) for holding the interim results of feasibility studies about Security.

TR 33.803SA3Rel‑7
Coexistence between TISPAN and 3GPP authentication schemes

TR 33.804SA3Rel‑11 → 12
Single Sign On (SSO) application security for Common IMS based on SIP Digest

TR 33.805SA3Rel‑12
Study on security assurance methodology for 3GPP network products

TR 33.807draftSA3
Study on the security of the wireless and wireline convergence for the 5G system architecture

TR 33.808draftSA3
KDF negotiation for 5GS security — phase2

TR 33.809draftSA3
Study on 5G security enhancements against false base stations
Top

TR 33.810SA3Rel‑6
Feasibility Study to support NDS/IP evolution

TR 33.811SA3Rel‑15
Study on security aspects of 5G network slicing management

TR 33.812SA3Rel‑9
Feasibility Study on remote management of USIM application on M2M equipment

TR 33.813draftSA3
Study on security aspects of network slicing enhancement

TR 33.814draftSA3
Study on the security of the enhancement to the 5GC Location Services (LCS)

TR 33.815draftSA3
Study on security aspects of Provision of Access to Restricted Local Operator Services by Unauthenticated UEs (PARLOS)

TR 33.816SA3Rel‑10
Feasibility study on LTE relay node security

TR 33.817SA3Rel‑6
Feasibility study on (U)SIM security reuse by peripheral devices on local interfaces

TR 33.818draftSA3
Security Assurance Methodology (SECAM) and Security Assurance Specification (SCAS) for 3GPP virtualized network products

TR 33.819draftSA3
Study on security enhancements of 5GS for vertical and Local Area Network (LAN) services
Top

TR 33.820SA3Rel‑8
Security of H(e)NB

TR 33.821SA3Rel‑8 → 9
Rationale and track of security decisions in LTE RAN / 3GPP SAE

TR 33.822SA3Rel‑8
Security aspects for inter-access mobility between non 3GPP and 3GPP access network

TR 33.823SA3Rel‑12
Security for usage of GBA with a UE browser

TR 33.825draftSA3
Study on the security of Ultra-Reliable Low-Latency Communication (URLLC) for 5GS

TR 33.826draftSA3
Study on Lawful Interception Service Evolution

TR 33.827SA3Rel‑14
Study on providing for Lawful Interception (LI) in the S8 Home Routeing (S8HR) architecture for Voice over LTE (VoLTE)

TR 33.828SA3Rel‑9 → 11
IMS media plane security

TR 33.829SA3Rel‑12
IMS media plane security services
Top

TR 33.830draftSA3
Feasibility study on IMS firewall traversal

TR 33.831SA3Rel‑12
Study on security on spoofed call detection and prevention

TR 33.832draftSA3
Study on IMS Enhanced Spoofed Call Prevention and Detection

TR 33.833SA3Rel‑13
Study on security issues to support Proximity Services (ProSe)

TR 33.834SA3Rel‑16
Study on Long Term Key Update Procedures (LTKUP)

TR 33.835draftSA3
Study on authentication and key management for applications based on 3GPP credential in 5G

TR 33.838SA3Rel‑11
Study on protection against unsolicited communication for IMS (PUCI)
Top

TR 33.841SA3Rel‑16
Study on the support of 256-bit algorithms for 5G

TR 33.842draftSA3
Study on Lawful Interception (LI) service in 5G

TR 33.843SA3Rel‑15
Study on security aspect of architecture enhancements to ProSe UE-to-network relay

TR 33.844SA3Rel‑11
Security Study on IMS Based Peer-to-Peer Content Distribution Services

TR 33.846draftSA3
Study on authentication enhancements in the 5G System (5GS)

TR 33.848draftSA3
Study on security impacts of virtualisation

TR 33.849SA3Rel‑14
Study on subscriber privacy impact in 3GPP
Top

TR 33.855draftSA3
Study on security aspects of the 5G Service Based Architecture (SBA)

TR 33.856SA3Rel‑16
Study on security aspects of single radio voice continuity from 5G to UTRAN

TR 33.859SA3Rel‑11
Study on the Introduction of Key Hierarchy in UTRAN
Top

TR 33.860SA3Rel‑13
Study on Enhanced General Packet Radio Service (EGPRS) access security enhancements with relation to cellular Internet of Things (IoT)

TR 33.861draftSA3
Study on evolution of cellular IoT security for the 5G System

TR 33.863SA3Rel‑14
Study on battery efficient security for very low throughput Machine Type Communication (MTC) devices

TR 33.865draftSA3
Security Aspects of WLAN Network Selection for 3GPP Terminals

TR 33.868SA3Rel‑12
Study on security aspects of MTC and other mobile data applications communications enhancements
Top

TR 33.871SA3Rel‑12
Study on Security for WebRTC IMS Client access to IMS

TR 33.872SA3Rel‑13
Study on security enhancements to Web Real Time Communication (WebRTC) access to IMS

TR 33.879SA3Rel‑13
Study on security enhancements for Mission Critical Push To Talk (MCPTT) over LTE
Top

TR 33.880SA3Rel‑15
Study on Mission Critical Security Enhancements

TR 33.885SA3Rel‑14
Study on security aspects for LTE support of V2X services

TR 33.888SA3Rel‑12
Study on security issues to support Group Communication System Enablers (GCSE) for LTE

TR 33.889SA3Rel‑13
Study on security aspects of Machine-Type Communications (MTC) architecture and feature enhancements
Top

TR 33.897SA3Rel‑13
Study on isolated E-UTRAN operation for public safety – Security aspects
Top

Next