[{"name":"S3-183230","title":"Adding references for the TLS Protocol Profiles clause","source":"Juniper Networks, Ericsson","contact":"Steve Kohalmi","contact-id":37299,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"7.1.12","ainame":"NDS","tdoc_agenda_sort_order":32300,"status":"withdrawn","reservation_date":"2018-10-15 16:29:40","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-15","crspec":33.21,"crspecversion":"15.1.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":53.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-93","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-183231","title":"Update NDS\/IP scope with application layer crypto profiles","source":"Juniper Networks, Ericsson","contact":"Steve Kohalmi","contact-id":37299,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"7.1.12","ainame":"NDS","tdoc_agenda_sort_order":32310,"status":"withdrawn","reservation_date":"2018-10-15 16:34:31","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.21,"crspecversion":"15.1.0","workitem":[{"winame":"TEI16"}],"crnumber":54.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-93","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-183232","title":"Move TLS crypto profiles to TS 33.210","source":"Juniper Networks, Ericsson","contact":"Steve Kohalmi","contact-id":37299,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"7.1.12","ainame":"NDS","tdoc_agenda_sort_order":32320,"status":"withdrawn","reservation_date":"2018-10-15 16:38:57","uploaded":null,"revisionof":"","revisedto":"","release":"Rel-16","crspec":33.31,"crspecversion":"16.0.0","workitem":[{"winame":"TEI16"}],"crnumber":97.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-93","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-183381","title":"Corrections to 9. Security procedures for non-service based interfaces","source":"LG Electronics","contact":"Joonwoong Kim","contact-id":66512,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":30,"ainumber":"7.1.12","ainame":"NDS","tdoc_agenda_sort_order":33810,"status":"agreed","reservation_date":"2018-11-05 05:14:24","uploaded":"2018-11-05 08:54:36","revisionof":"","revisedto":"","release":"Rel-15","crspec":33.501,"crspecversion":"15.2.0","workitem":[{"winame":"5GS_Ph1-SEC"}],"crnumber":439.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-181024","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_93_Spokane\/Docs\/S3-183381.zip","group":"S3","meeting":"S3-93","year":2018,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]