[{"name":"S3-152227","title":"pCR to TR 33.860: Sol 2, Data Efficient Rekeying - elaboration and analysis","source":"Vodafone Group Services Ltd","contact":"Steve Babbage","contact-id":6267,"tdoctype":"pCR","for":"Approval","abstract":"Substantially elaborates on Solution 2 \"Data Efficient Rekeying\" - both details of the proposal, and analysis of its benefits - mostly in a new Annex.","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23340,"status":"approved","reservation_date":"2015-10-28 14:09:57","uploaded":"2015-11-01 17:19:53","revisionof":"","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152227.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152284","title":"Preventing unauthorized modification of user data in cellular IOT","source":"China Mobile Com. Corporation","contact":"Jin Peng","contact-id":52692,"tdoctype":"pCR","for":"Approval","abstract":"Whether the integrity of user data should be protected or not remains an open issue.","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23400,"status":"withdrawn","reservation_date":"2015-11-02 08:41:11","uploaded":null,"revisionof":"","revisedto":"S3-152329","release":"Rel-13","crspec":33.86,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152286","title":"Preventing unauthorized modification of signalling data","source":"China Mobile Com. Corporation","contact":"Jin Peng","contact-id":52692,"tdoctype":"pCR","for":"Approval","abstract":"The pCR justifies that integrity protection shall be applied to signaling data in cellular IOT in order to prevent unauthorized modification.","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":24530,"status":"withdrawn","reservation_date":"2015-11-02 08:43:13","uploaded":null,"revisionof":"","revisedto":"S3-152330","release":"Rel-13","crspec":33.86,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152317","title":"Correction on authentication and ciphering procedure","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes to correct description about authentication and ciphering procedure","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":22840,"status":"approved","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:16","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152317.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152318","title":"Integrity protection algorithms in solution 1","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes that integrity protection algorithms in solution 1 refer to solution 3 (Algorithms for ciphering and integrity protection)","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23290,"status":"approved","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:16","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152318.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152319","title":"Definition of GEA0","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes to clarify the definition of GEA0.","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23190,"status":"revised","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:16","revisionof":"","revisedto":"S3-152531","release":"Rel-13","crspec":33.86,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152319.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152329","title":"Preventing unauthorized modification of user data in cellular IOT","source":"China Mobile Com. Corporation","contact":"Ivy Guo","contact-id":61044,"tdoctype":"pCR","for":"Approval","abstract":"Whether the integrity of user data should be protected or not remains an open issue.","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23170,"status":"revised","reservation_date":"2015-11-02 10:29:43","uploaded":"2015-11-02 11:28:47","revisionof":"S3-152284","revisedto":"S3-152565","release":"Rel-13","crspec":33.86,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152329.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152330","title":"Preventing unauthorized modification of signalling data","source":"China Mobile Com. Corporation","contact":"Ivy Guo","contact-id":61044,"tdoctype":"pCR","for":"Approval","abstract":"The pCR justifies that integrity protection shall be applied to signaling data in cellular IOT in order to prevent unauthorized modification.","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":22860,"status":"revised","reservation_date":"2015-11-02 10:31:03","uploaded":"2015-11-02 11:28:47","revisionof":"S3-152286","revisedto":"S3-152564","release":"Rel-13","crspec":33.86,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152330.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152334","title":"Enhancements of solution #1: Integrity protection of signalling and algorithm negotiation","source":"Ericsson LM","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Approval","abstract":"This contribution suggests some enhancements to solution #1 in TR 33.860.","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23300,"status":"approved","reservation_date":"2015-11-02 11:33:37","uploaded":"2015-11-02 14:12:35","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152334.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152335","title":"A new key issue on null-encryption and unauthorized transmission of user plane data","source":"Ericsson LM","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a new key issue on null-encryption and unauthorized transmission of user plane data.","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23180,"status":"revised","reservation_date":"2015-11-02 11:39:37","uploaded":"2015-11-02 14:12:35","revisionof":"","revisedto":"S3-152566","release":"Rel-13","crspec":33.86,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152335.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152336","title":"[DRAFT] LS on enhanced GPRS in relation to Cellular IoT","source":"Ericsson LM","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"LS out","for":"Discussion","abstract":"This is a draft LS proposal to CT1 and GERAN in relation to EASE stage 3.","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23370,"status":"revised","reservation_date":"2015-11-02 11:46:44","uploaded":"2015-11-02 14:12:35","revisionof":"","revisedto":"S3-152567","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT1","Cc":"GERAN","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152336.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152337","title":"Documentation plan for EASE_EC_GSM","source":"Ericsson LM","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a documentation plan for EASE_EC_GSM.","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23360,"status":"approved","reservation_date":"2015-11-02 11:51:57","uploaded":"2015-11-02 14:12:34","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"0.3.0","workitem":[{"winame":"EASE_EC_GSM"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152337.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152340","title":"Analysis the protection of Layer 3 signalling messages in Cellular IoT","source":"Ericsson, Nokia Networks","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Approval","abstract":"This contribution analyses the protection of Layer 3 signalling messages in Cellular IoT. This document includes therefore a table comparing LTE, IoT and GPRS L3 protection.","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23350,"status":"approved","reservation_date":"2015-11-02 12:00:22","uploaded":"2015-11-02 14:12:34","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152340.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152453","title":"New GPRS algorithms for CIoT","source":"ETSI SAGE","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"Action","abstract":"","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":22270,"status":"noted","reservation_date":"2015-11-05 10:57:35","uploaded":"2015-11-06 14:45:01","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152453.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152531","title":"Definition of GEA0","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23191,"status":"approved","reservation_date":"2015-11-23 14:05:19","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152319","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152531.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152564","title":"Preventing unauthorized modification of signalling data","source":"China Mobile Com. Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":22861,"status":"approved","reservation_date":"2015-11-23 14:05:20","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152330","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152564.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152565","title":"Preventing unauthorized modification of user data in cellular IOT","source":"China Mobile Com. Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23171,"status":"approved","reservation_date":"2015-11-23 14:05:20","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152329","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152565.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152566","title":"A new key issue on null-encryption and unauthorized transmission of user plane data","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23181,"status":"approved","reservation_date":"2015-11-23 14:05:21","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152335","revisedto":"","release":"Rel-13","crspec":33.86,"crspecversion":"0.3.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152566.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152567","title":"LS on enhanced GPRS in relation to Cellular IoT","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23371,"status":"revised","reservation_date":"2015-11-23 14:06:40","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152336","revisedto":"S3-152602","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT1","Cc":"GERAN","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152567.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152568","title":"TR 33.860","source":"Rapporteur","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":256800,"status":"approved","reservation_date":"2015-11-23 14:05:21","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152568.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152576","title":"TR 33.860 cover sheet","source":"Rapporteur","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"TS or TR cover","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":257600,"status":"approved","reservation_date":"2015-11-23 14:05:21","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152576.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152602","title":"LS on enhanced GPRS in relation to Cellular IoT","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":41,"ainumber":"7.13","ainame":"Enhanced Access Security for Extended Coverage GSM in relation to Cellular IoT","tdoc_agenda_sort_order":23372,"status":"approved","reservation_date":"2015-11-23 14:05:22","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152567","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT1","Cc":"GERAN","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152602.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]