[{"name":"S3-172257","title":"pCR to TS 33.501 KDF negotiation","source":"Huawei; Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"4.2.6","ainame":"Security context management","tdoc_agenda_sort_order":24620,"status":"not treated","reservation_date":"2017-09-30 02:24:54","uploaded":"2017-09-30 08:52:33","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.3.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88Bis_Singapore\/Docs\/S3-172257.zip","group":"S3","meeting":"S3-ah-19131","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-172272","title":"Adding the definition of NEA0 and NIA0(5.6.1)","source":"Huawei; Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"4.2.6","ainame":"Security context management","tdoc_agenda_sort_order":22720,"status":"not treated","reservation_date":"2017-09-30 02:24:55","uploaded":"2017-09-30 08:57:44","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.3.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88Bis_Singapore\/Docs\/S3-172272.zip","group":"S3","meeting":"S3-ah-19131","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-172273","title":"Adding the content on security contexts(6.3)","source":"Huawei; Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"4.2.6","ainame":"Security context management","tdoc_agenda_sort_order":24080,"status":"not treated","reservation_date":"2017-09-30 02:24:55","uploaded":"2017-09-30 08:57:44","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.3.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88Bis_Singapore\/Docs\/S3-172273.zip","group":"S3","meeting":"S3-ah-19131","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-172370","title":"Providing details of the key derivation for the security algorithm keys","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"4.2.6","ainame":"Security context management","tdoc_agenda_sort_order":22730,"status":"not treated","reservation_date":"2017-10-02 11:35:20","uploaded":"2017-10-02 13:58:36","revisionof":"","revisedto":"S3-173289","release":"Rel-15","crspec":33.501,"crspecversion":"0.3.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88Bis_Singapore\/Docs\/S3-172370.zip","group":"S3","meeting":"S3-ah-19131","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-172408","title":"Handling security contexts within the serving network","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"4.2.6","ainame":"Security context management","tdoc_agenda_sort_order":24100,"status":"not treated","reservation_date":"2017-10-02 12:29:38","uploaded":"2017-10-02 13:36:18","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.3.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88Bis_Singapore\/Docs\/S3-172408.zip","group":"S3","meeting":"S3-ah-19131","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-172410","title":"Distribution of security contexts","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"4.2.6","ainame":"Security context management","tdoc_agenda_sort_order":24120,"status":"not treated","reservation_date":"2017-10-02 12:31:20","uploaded":"2017-10-02 13:36:55","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.3.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88Bis_Singapore\/Docs\/S3-172410.zip","group":"S3","meeting":"S3-ah-19131","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-172411","title":"Clause 6.3.2 (Handling security contexts within the serving network)","source":"Ericsson","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"4.2.6","ainame":"Security context management","tdoc_agenda_sort_order":24110,"status":"not treated","reservation_date":"2017-10-02 12:31:36","uploaded":"2017-10-02 13:51:28","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.3.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88Bis_Singapore\/Docs\/S3-172411.zip","group":"S3","meeting":"S3-ah-19131","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-172412","title":"Security handling in state transitions","source":"Nokia","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"4.2.6","ainame":"Security context management","tdoc_agenda_sort_order":24130,"status":"not treated","reservation_date":"2017-10-02 12:33:05","uploaded":"2017-10-02 13:37:41","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.3.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88Bis_Singapore\/Docs\/S3-172412.zip","group":"S3","meeting":"S3-ah-19131","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-172413","title":"New UE requirement to store two 5G security contexts in TS 33.501","source":"Ericsson","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"4.2.6","ainame":"Security context management","tdoc_agenda_sort_order":22570,"status":"not treated","reservation_date":"2017-10-02 12:34:27","uploaded":"2017-10-02 13:51:28","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.3.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88Bis_Singapore\/Docs\/S3-172413.zip","group":"S3","meeting":"S3-ah-19131","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-172462","title":"Discussion on 5G UE Security Capabilities with KDF identifiers","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Discussion","abstract":"Discussion on 5G UE Security Capabilities with KDF identifiers.","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"4.2.6","ainame":"Security context management","tdoc_agenda_sort_order":24660,"status":"not treated","reservation_date":"2017-10-02 13:10:28","uploaded":"2017-10-02 13:47:43","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.3.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88Bis_Singapore\/Docs\/S3-172462.zip","group":"S3","meeting":"S3-ah-19131","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-172466","title":"5G UE Security Capabilities with KDF identifiers","source":"NEC EUROPE LTD","contact":"Sivabalan Arumugam","contact-id":47719,"tdoctype":"pCR","for":"Approval","abstract":"5G UE Security Capabilities with KDF identifiers.","secretary_remarks":"","agenda_item_sort_order":9,"ainumber":"4.2.6","ainame":"Security context management","tdoc_agenda_sort_order":24840,"status":"not treated","reservation_date":"2017-10-02 13:12:25","uploaded":"2017-10-02 13:47:43","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"0.3.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_88Bis_Singapore\/Docs\/S3-172466.zip","group":"S3","meeting":"S3-ah-19131","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]