[{"name":"S3-193914","title":"[MCXSec] 33180 R16 Missing Abbreviations (Mirror)","source":"Airbus","contact":"Mika Laitinen","contact-id":84159,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":39160,"status":"agreed","reservation_date":"2019-11-07 07:54:10","uploaded":"2019-11-08 10:40:53","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.1.0","workitem":[{"winame":"MCSec"}],"crnumber":117.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-191209","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-193914.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193915","title":"[MCXSec] 33180 R16 Reference Addition (Mirror)","source":"Airbus","contact":"Mika Laitinen","contact-id":84159,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":39260,"status":"agreed","reservation_date":"2019-11-07 08:01:00","uploaded":"2019-11-08 10:40:53","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.1.0","workitem":[{"winame":"MCSec"}],"crnumber":118.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-191135","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-193915.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193916","title":"[MCXSec] 33180 R16 Correction concerning IdM client (Mirror)","source":"Airbus","contact":"Mika Laitinen","contact-id":84159,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":39300,"status":"agreed","reservation_date":"2019-11-07 08:06:44","uploaded":"2019-11-08 10:40:53","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.1.0","workitem":[{"winame":"MCSec"}],"crnumber":119.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-191135","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-193916.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193926","title":"LS on IANA assigned values for mission critical","source":"C1-195042","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":39140,"status":"replied to","reservation_date":"2019-11-07 10:00:40","uploaded":"2019-11-07 15:30:29","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"S3-194603, S3-194603","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-193926.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193930","title":"LS on how the IWF obtains key material for interworking group and private communications","source":"C1-196979","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":39150,"status":"noted","reservation_date":"2019-11-07 10:00:40","uploaded":"2019-11-07 15:30:28","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-193930.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193995","title":"[33.180] R16 Fix bad reference (mirror)","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Fix incorrect SRTCP session key derivation reference (mirror).","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":39950,"status":"agreed","reservation_date":"2019-11-08 22:27:02","uploaded":"2019-11-11 01:34:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.1.0","workitem":[{"winame":"MCSec"}],"crnumber":128.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-191209","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-193995.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193996","title":"[33.180] R16 - Consistent use of off-network","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Make language consistent with \u201coff-network\u201d.","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":39960,"status":"revised","reservation_date":"2019-11-08 22:31:54","uploaded":"2019-11-11 01:34:00","revisionof":"","revisedto":"S3-194499","release":"Rel-16","crspec":33.18,"crspecversion":"16.1.0","workitem":[{"winame":"MCXSec"}],"crnumber":129.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-193996.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193997","title":"[33.180] R16 KM client to KMS security","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Add clarification for establishment of the (optional) direct secure tunnel between the KMS client and the KMS.","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":39970,"status":"agreed","reservation_date":"2019-11-08 22:35:28","uploaded":"2019-11-11 01:34:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.1.0","workitem":[{"winame":"MCXSec"}],"crnumber":130.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-191136","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-193997.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193998","title":"[33.180] R16 - TrK ID and InK ID","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Add TrK-ID and InK-ID to the user KM authorization request.","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":39980,"status":"revised","reservation_date":"2019-11-08 22:39:11","uploaded":"2019-11-11 01:34:00","revisionof":"","revisedto":"S3-194500","release":"Rel-16","crspec":33.18,"crspecversion":"16.1.0","workitem":[{"winame":"MCXSec"}],"crnumber":131.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-193998.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-193999","title":"[33.180] R16 - InterSD KM record","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Add an interworking KM record which can be provisioned at user KM authorization.","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":39990,"status":"agreed","reservation_date":"2019-11-08 22:41:47","uploaded":"2019-11-11 01:34:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.1.0","workitem":[{"winame":"MCXSec"}],"crnumber":132.0,"crrevision":"","crcategory":"C","tsg_crp":"SP-191136","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-193999.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194000","title":"[33.180] R16 ETSI Plugtest clarifications","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"CR","for":"Agreement","abstract":"Add clarifications for HTTP Basic authentication.","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":40000,"status":"agreed","reservation_date":"2019-11-08 22:44:23","uploaded":"2019-11-11 01:34:00","revisionof":"","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.1.0","workitem":[{"winame":"MCXSec"}],"crnumber":133.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-191136","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194000.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194001","title":"LS to CT1 on 3rd ETSI MCX Remote Plugtest","source":"Motorola Solutions UK Ltd.","contact":"Tim Woodward","contact-id":61042,"tdoctype":"LS out","for":"Agreement","abstract":"Respond to ETSI Plugtest security issue","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":43620,"status":"revised","reservation_date":"2019-11-08 22:48:32","uploaded":"2019-11-11 01:34:00","revisionof":"","revisedto":"S3-194501","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"MCXSec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT1","Cc":"SA6","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194001.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194362","title":"Algorithm negotiation procedure for MC Service","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":40010,"status":"revised","reservation_date":"2019-11-11 12:44:56","uploaded":"2019-11-11 14:43:09","revisionof":"","revisedto":"S3-194652","release":"Rel-16","crspec":33.18,"crspecversion":"16.1.0","workitem":[{"winame":"eMCSec"}],"crnumber":134.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194362.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194433","title":"Reply LS on how the IWF obtains key material for interworking group and private communications","source":"S6-192194","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":443300,"status":"postponed","reservation_date":"2019-11-18 08:58:46","uploaded":"2019-11-18 08:58:46","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194433.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194499","title":"Consistent use of off-network","source":"Motorola Solutions UK Ltd.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":39961,"status":"agreed","reservation_date":"2019-11-20 11:51:32","uploaded":"2019-11-20 11:51:32","revisionof":"S3-193996","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.1.0","workitem":[{"winame":"MCXSec"}],"crnumber":129.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-191136","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194499.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194500","title":"[33.180] R16 - TrK ID and InK ID","source":"Motorola Solutions UK Ltd.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":39981,"status":"agreed","reservation_date":"2019-11-20 11:51:32","uploaded":"2019-11-20 11:51:32","revisionof":"S3-193998","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.1.0","workitem":[{"winame":"MCXSec"}],"crnumber":131.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-191136","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194500.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194501","title":"LS to CT1 on 3rd ETSI MCX Remote Plugtest","source":"Motorola Solutions UK Ltd.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":43621,"status":"revised","reservation_date":"2019-11-20 17:25:36","uploaded":"2019-11-20 17:25:36","revisionof":"S3-194001","revisedto":"S3-194611","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"MCXSec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT1","Cc":"SA6","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194501.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194502","title":"Minutes of the Mission Critical offline session","source":"Qualcomm","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"report","for":"Information","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":450200,"status":"noted","reservation_date":"2019-11-21 19:08:34","uploaded":"2019-11-21 19:08:34","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194502.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194603","title":"Reply to: LS on IANA assigned values for mission critical","source":"Motorola Solutions","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":39141,"status":"approved","reservation_date":"2019-11-22 12:07:29","uploaded":"2019-11-22 12:07:29","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-193926","lsto":"CT1","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194603.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194611","title":"LS to CT1 on 3rd ETSI MCX Remote Plugtest","source":"Motorola Solutions UK Ltd.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":43622,"status":"approved","reservation_date":"2019-11-22 09:12:12","uploaded":"2019-11-22 09:12:12","revisionof":"S3-194501","revisedto":"","release":"Rel-16","crspec":"","crspecversion":"","workitem":[{"winame":"MCXSec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT1","Cc":"SA6","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194611.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-194652","title":"Algorithm negotiation procedure for MC Service","source":"Samsung,Motorola Solutions","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":20,"ainumber":"7.3","ainame":"eMCSec R16 security (Rel-16)","tdoc_agenda_sort_order":40011,"status":"agreed","reservation_date":"2019-11-22 15:41:43","uploaded":"2019-11-22 15:41:43","revisionof":"S3-194362","revisedto":"","release":"Rel-16","crspec":33.18,"crspecversion":"16.1.0","workitem":[{"winame":"MCXSec"}],"crnumber":134.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-191136","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_97_Reno\/Docs\/S3-194652.zip","group":"S3","meeting":"S3-97","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]