[{"name":"S3-152214","title":"LS on LCID and the protection of one-to-one traffic","source":"R2-154933","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22140,"status":"replied to","reservation_date":"2015-10-23 14:15:54","uploaded":"2015-10-23 14:59:22","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"S3-152477","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152214.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152216","title":"LS on ProSe UE Relaying Support","source":"R3-152366","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22160,"status":"noted","reservation_date":"2015-10-23 14:15:54","uploaded":"2015-10-23 14:59:23","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152216.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152260","title":"Security for Proximity-based services (ProSe) Direct Discovery for Public Safety Use","source":"Intel Corporation (UK) Ltd","contact":"Farid Adrangi","contact-id":31273,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes Discovery Key Agreement solution for Proximity-based services (ProSe) direct discovery for Public Safety use","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22960,"status":"endorsed","reservation_date":"2015-11-02 02:47:42","uploaded":"2015-11-02 04:26:05","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.833,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152260.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152261","title":"Updates and Solution Evaluation for UE-2-UE and Remote UE to UE-Network Relay Secure Communication for Public Safety in TR 33.833","source":"Intel Corporation (UK) Ltd","contact":"Farid Adrangi","contact-id":31273,"tdoctype":"pCR","for":"Approval","abstract":"This contribution provides updates and solution evaluation for two proposed solutions in TR 33.833","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23660,"status":"approved","reservation_date":"2015-11-02 02:51:03","uploaded":"2015-11-02 04:26:32","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.833,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152261.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152275","title":"Security for Relay Service Code","source":"ZTE Corporation, China Unicom","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"To add the solution of Security for Relay Service Code to the TS.\nTo add the definition of \u2018Relay Service Code\u2019.","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22950,"status":"merged","reservation_date":"2015-11-02 08:23:20","uploaded":"2015-11-02 08:55:41","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":90.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152275.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152276","title":"Adding and Modification of Scope","source":"ZTE Corporation, China Unicom","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"To modify the scope to match the content of the specification.","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":24310,"status":"postponed","reservation_date":"2015-11-02 08:26:10","uploaded":"2015-11-02 08:55:42","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":91.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152276.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152278","title":"Modification on Model A security flows","source":"ZTE Corporation, China Unicom","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"To delete the arrow between step 11 and 12 in Figure 6.1.3.4.2.1-1.","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23320,"status":"agreed","reservation_date":"2015-11-02 08:28:32","uploaded":"2015-11-02 08:55:42","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":92.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-150725","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152278.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152279","title":"Modification on Model B security flows","source":"ZTE Corporation, China Unicom","contact":"Jin PENG","contact-id":49548,"tdoctype":"CR","for":"Agreement","abstract":"To delete the arrows between step 12 and 13, and beteween step 13 and 14 in Figure 6.1.3.4.2.2-1.\nTo modify the Step 13 of the figure to show that it only involves the Discoveree UE (A-UE).\nTo clarify that the the indication in the Discovery Filter Securi","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23410,"status":"revised","reservation_date":"2015-11-02 08:30:27","uploaded":"2015-11-02 08:55:42","revisionof":"","revisedto":"S3-152484","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":93.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152279.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152294","title":"Solution for Establishing UE to UE-NW relay Security","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes a solution to establish UE to UE-Network Relay security using a PSK-based solution","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23830,"status":"noted","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:11","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.833,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152294.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152295","title":"UE to UE-NW Relay Security Solution","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"CR","for":"Approval","abstract":"Adding UE to UE-NW Relay Security Solution in R13","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":24150,"status":"postponed","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:11","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":94.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152295.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152296","title":"Detail the description of Relay ID in clause 8.1.1.1","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"this contribution detaisl the description of Relay ID in clause 8.1.1.1","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23780,"status":"approved","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:11","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.833,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152296.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152297","title":"Mandate returning the discovery response in model B group member discovery in clause 8.2.2.1.2","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"this contribution clarifies the necessity of mandate returning the discovery response in model B group member discovery in clause 8.2.2.1.2.","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22940,"status":"revised","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:11","revisionof":"","revisedto":"S3-152573","release":"Rel-13","crspec":33.833,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152297.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152298","title":"Replay protection of token","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"this contribution aims to solve the replay attack of token in clause 8.1.1.2","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23800,"status":"approved","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:11","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.833,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152298.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152299","title":"Solution comparison of UE-to-NW relay","source":"Huawei, Hisilicon","contact":"Jiangwei Ying","contact-id":58160,"tdoctype":"pCR","for":"Approval","abstract":"this contribution aims to compare the solutions of UE-to-NW relay and get a conclusion","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":24290,"status":"noted","reservation_date":"2015-11-02 09:35:06","uploaded":"2015-11-02 10:13:12","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.833,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152299.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152332","title":"pCR to TR 33.833 on ProSe Relays","source":"Gemalto N.V.","contact":"Mireille Pauliac","contact-id":23516,"tdoctype":"pCR","for":"Approval","abstract":"pseudo CR to TR 33.833 on ProSe Relays","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23820,"status":"revised","reservation_date":"2015-11-02 10:40:59","uploaded":"2015-11-02 13:22:10","revisionof":"","revisedto":"S3-152495","release":"Rel-13","crspec":33.833,"crspecversion":"1.5.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152332.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152341","title":"New solution for DoS persistent scrambling: Masked UTC counter","source":"Ericsson LM","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Decision","abstract":"This contribution adds a new partial solution to ProSe TR.","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23460,"status":"revised","reservation_date":"2015-11-02 12:05:00","uploaded":"2015-11-02 14:12:34","revisionof":"","revisedto":"S3-152485","release":"Rel-13","crspec":33.833,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152341.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152346","title":"Update of solution in section 8.3.14: Hint of scrambling key","source":"Ericsson LM","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Decision","abstract":"This contribution updates the key hint solution in section 8.3.14.","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23510,"status":"revised","reservation_date":"2015-11-02 12:16:52","uploaded":"2015-11-02 14:12:34","revisionof":"","revisedto":"S3-152486","release":"Rel-13","crspec":33.833,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152346.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152351","title":"Hint of DUSK, and masked UTC counter","source":"Ericsson LM","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"CR","for":"Approval","abstract":"Added the method of how the verification of confidentiality protected messages are more efficiently verified in the receiving UEs over the PC5 interface.","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23530,"status":"postponed","reservation_date":"2015-11-02 12:29:52","uploaded":"2015-11-02 14:12:34","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":95.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152351.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152353","title":"Annex A update of MIC computation for discovery messages","source":"QUALCOMM Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22600,"status":"revised","reservation_date":"2015-11-02 12:32:35","uploaded":"2015-11-02 14:46:01","revisionof":"","revisedto":"S3-152479","release":"Rel-12","crspec":33.303,"crspecversion":"12.5.0","workitem":[{"winame":"ProSe"}],"crnumber":96.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152353.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152356","title":"Annex A update of MIC computation for discovery messages","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22610,"status":"revised","reservation_date":"2015-11-02 12:36:24","uploaded":"2015-11-02 14:46:02","revisionof":"","revisedto":"S3-152480","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"ProSe"}],"crnumber":97.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152356.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152358","title":"Reducing computational load for processing PC5 Restricted Discovery messages","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23560,"status":"noted","reservation_date":"2015-11-02 12:39:26","uploaded":"2015-11-02 14:46:02","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152358.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152360","title":"Corrections to ProSe one-to-one communication","source":"Ericsson LM","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"CR","for":"Approval","abstract":"A number of corrections and clarifications are proposed.","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23680,"status":"revised","reservation_date":"2015-11-02 12:40:28","uploaded":"2015-11-02 14:12:34","revisionof":"","revisedto":"S3-152492","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":98.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152360.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152362","title":"Protection for restricted discovery to reduce processing at the monitoring UE-side","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23580,"status":"postponed","reservation_date":"2015-11-02 12:41:58","uploaded":"2015-11-02 14:46:02","revisionof":"","revisedto":"S3-160184","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":99.0,"crrevision":"","crcategory":"C","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152362.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152366","title":"Miscellaneous editorials in 33.303","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":24300,"status":"revised","reservation_date":"2015-11-02 12:47:23","uploaded":"2015-11-02 14:48:54","revisionof":"","revisedto":"S3-152497","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":100.0,"crrevision":"","crcategory":"D","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152366.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152368","title":"Details of the scrambling and message specific confidentiality calculations for restricted discovery","source":"Qualcomm","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23600,"status":"revised","reservation_date":"2015-11-02 12:53:24","uploaded":"2015-11-02 14:48:54","revisionof":"","revisedto":"S3-152487","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":101.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152368.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152370","title":"Details of the security provided for restricted discovery and public safety discovery","source":"Qualcomm Incoporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23620,"status":"revised","reservation_date":"2015-11-02 12:56:48","uploaded":"2015-11-02 14:48:54","revisionof":"","revisedto":"S3-152488","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":102.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152370.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152378","title":"Align LCID allocation with RAN specification","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23700,"status":"revised","reservation_date":"2015-11-02 13:11:28","uploaded":"2015-11-02 14:48:54","revisionof":"","revisedto":"S3-152478","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":103.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152378.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152380","title":"Discussion on Public Safety Discovery","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"discussion","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22970,"status":"noted","reservation_date":"2015-11-02 13:14:25","uploaded":"2015-11-02 14:50:57","revisionof":"","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152380.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152382","title":"Protecting Public Safety Discovery messages","source":"Qualcomm Incorporated,Intel","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22980,"status":"revised","reservation_date":"2015-11-02 13:16:59","uploaded":"2015-11-02 14:50:57","revisionof":"","revisedto":"S3-152579","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":104.0,"crrevision":"","crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152382.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152383","title":"Usage of AEAD_AES_128_GCM_12 in ProSe","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":24450,"status":"revised","reservation_date":"2015-11-02 13:20:28","uploaded":"2015-11-02 14:50:42","revisionof":"","revisedto":"S3-152445","release":"Rel-12","crspec":33.303,"crspecversion":"12.5.0","workitem":"","crnumber":105.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152383.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152384","title":"Usage of AEAD_AES_128_GCM_12 in ProSe","source":"Ericsson LM","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":24460,"status":"revised","reservation_date":"2015-11-02 13:23:09","uploaded":"2015-11-02 14:50:43","revisionof":"","revisedto":"S3-152446","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":"","crnumber":106.0,"crrevision":"","crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152384.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152415","title":"Alignment with 23.303 - Rel12","source":"Nokia Networks","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"Figure 6.3.1.2-1 is updated to align with 23.303","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22780,"status":"agreed","reservation_date":"2015-11-02 14:05:18","uploaded":"2015-11-02 14:33:14","revisionof":"","revisedto":"","release":"Rel-12","crspec":33.303,"crspecversion":"12.5.0","workitem":[{"winame":"ProSe"}],"crnumber":107.0,"crrevision":"","crcategory":"F","tsg_crp":"SP-150726","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152415.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152416","title":"Alignment with 23.303 - Rel13","source":"Nokia Networks","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"Figure 6.3.1.2-1 is updated to align with 23.303","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22790,"status":"agreed","reservation_date":"2015-11-02 14:05:19","uploaded":"2015-11-02 14:33:14","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"ProSe"}],"crnumber":108.0,"crrevision":"","crcategory":"A","tsg_crp":"SP-150726","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152416.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152417","title":"Correction to 8.3.2.2 of 33.833","source":"Nokia Networks","contact":"Anja Jerichow","contact-id":68341,"tdoctype":"CR","for":"Agreement","abstract":"Correction to text","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22990,"status":"not pursued","reservation_date":"2015-11-02 14:05:19","uploaded":"2015-11-02 14:33:15","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.833,"crspecversion":"1.5.0","workitem":[{"winame":"ProSe"}],"crnumber":1.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152417.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152428","title":"Updates to GBA-based relay security solution","source":"Ericsson","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23840,"status":"revised","reservation_date":"2015-11-02 14:28:04","uploaded":"2015-11-02 14:57:37","revisionof":"","revisedto":"S3-152496","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152428.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152429","title":"Introduction of UE-to-network relay security procedures","source":"Ericsson LM","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":24160,"status":"merged","reservation_date":"2015-11-02 14:30:45","uploaded":"2015-11-02 14:57:37","revisionof":"S3-151847","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":70.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152429.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152430","title":"Discussion on update of S3-151956 on ProSe UE-to-network relays security","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"discussion","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":24170,"status":"noted","reservation_date":"2015-11-02 14:37:59","uploaded":"2015-11-02 14:56:16","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152430.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152431","title":"Security for UE-to-network relay communications","source":"QUALCOMM Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"CR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":24280,"status":"revised","reservation_date":"2015-11-02 14:39:06","uploaded":"2015-11-02 14:56:16","revisionof":"S3-151956","revisedto":"S3-152578","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":89.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152431.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152445","title":"Usage of AEAD_AES_128_GCM_12 in ProSe","source":"Ericsson, CESG","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22750,"status":"revised","reservation_date":"2015-11-04 12:46:20","uploaded":"2015-11-04 12:58:13","revisionof":"S3-152383","revisedto":"S3-152481","release":"Rel-12","crspec":33.303,"crspecversion":"12.5.0","workitem":[{"winame":"ProSe"}],"crnumber":105.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152445.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152446","title":"Usage of AEAD_AES_128_GCM_12 in ProSe","source":"Ericsson, CESG","contact":"Vesa Lehtovirta","contact-id":32764,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22760,"status":"revised","reservation_date":"2015-11-04 12:49:29","uploaded":"2015-11-04 12:58:13","revisionof":"S3-152384","revisedto":"S3-152482","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"ProSe"}],"crnumber":106.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152446.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152477","title":"Reply to: LS on LCID and the protection of one-to-one traffic","source":"Qualcomm","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22141,"status":"approved","reservation_date":"2015-11-23 14:05:18","uploaded":"2016-10-27 10:32:55","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-152214","lsto":"RAN2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152477.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152478","title":"Align LCID allocation with RAN specification","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23701,"status":"agreed","reservation_date":"2015-11-23 14:05:04","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152378","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":103.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-150725","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152478.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152479","title":"Annex A update of MIC computation for discovery messages","source":"QUALCOMM Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22601,"status":"agreed","reservation_date":"2015-11-23 14:05:04","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152353","revisedto":"","release":"Rel-12","crspec":33.303,"crspecversion":"12.5.0","workitem":[{"winame":"ProSe"}],"crnumber":96.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-150726","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152479.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152480","title":"Annex A update of MIC computation for discovery messages","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22611,"status":"agreed","reservation_date":"2015-11-23 14:05:04","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152356","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"ProSe"}],"crnumber":97.0,"crrevision":1.0,"crcategory":"A","tsg_crp":"SP-150726","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152480.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152481","title":"Usage of AEAD_AES_128_GCM_12 in ProSe","source":"Ericsson, CESG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22751,"status":"agreed","reservation_date":"2015-11-23 14:05:04","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152445","revisedto":"","release":"Rel-12","crspec":33.303,"crspecversion":"12.5.0","workitem":[{"winame":"ProSe"}],"crnumber":105.0,"crrevision":2.0,"crcategory":"F","tsg_crp":"SP-150726","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152481.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152482","title":"Usage of AEAD_AES_128_GCM_12 in ProSe","source":"Ericsson, CESG","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22761,"status":"agreed","reservation_date":"2015-11-23 14:05:04","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152446","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"ProSe"}],"crnumber":106.0,"crrevision":2.0,"crcategory":"A","tsg_crp":"SP-150726","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152482.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152483","title":"Correction to 8.3.2.2 of 33.833","source":"Nokia Networks","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":248300,"status":"approved","reservation_date":"2015-11-23 14:05:18","uploaded":"2016-10-27 10:32:55","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152483.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152484","title":"Modification on Model B security flows","source":"ZTE Corporation, China Unicom","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23411,"status":"agreed","reservation_date":"2015-11-23 14:05:04","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152279","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":93.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-150725","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152484.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152485","title":"New solution for DoS persistent scrambling: Masked UTC counter","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23461,"status":"approved","reservation_date":"2015-11-23 14:05:18","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152341","revisedto":"","release":"Rel-13","crspec":33.833,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152485.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152486","title":"Update of solution in section 8.3.14: Hint of scrambling key","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23511,"status":"approved","reservation_date":"2015-11-23 14:05:18","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152346","revisedto":"","release":"Rel-13","crspec":33.833,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152486.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152487","title":"Details of the scrambling and message specific confidentiality calculations for restricted discovery","source":"Qualcomm","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23601,"status":"agreed","reservation_date":"2015-11-23 14:05:04","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152368","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":101.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-150725","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152487.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152488","title":"Details of the security provided for restricted discovery and public safety discovery","source":"Qualcomm Incoporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23621,"status":"agreed","reservation_date":"2015-11-23 14:05:04","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152370","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":102.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-150725","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152488.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152492","title":"Corrections to ProSe one-to-one communication","source":"Ericsson LM","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23681,"status":"agreed","reservation_date":"2015-11-23 14:05:04","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152360","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":98.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-150725","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152492.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152495","title":"pCR to TR 33.833 on ProSe Relays","source":"Gemalto N.V.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23821,"status":"approved","reservation_date":"2015-11-23 14:05:18","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152332","revisedto":"","release":"Rel-13","crspec":33.833,"crspecversion":"1.5.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152495.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152496","title":"Updates to GBA-based relay security solution","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":23841,"status":"approved","reservation_date":"2015-11-23 14:05:18","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152428","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152496.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152497","title":"Miscellaneous editorials in 33.303","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":24301,"status":"agreed","reservation_date":"2015-11-23 14:05:05","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152366","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":100.0,"crrevision":1.0,"crcategory":"D","tsg_crp":"SP-150725","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152497.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152573","title":"Mandate returning the discovery response in model B group member discovery in clause 8.2.2.1.2","source":"Huawei, Hisilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22941,"status":"approved","reservation_date":"2015-11-23 14:05:21","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152297","revisedto":"","release":"Rel-13","crspec":33.833,"crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152573.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152578","title":"Security for UE-to-network relay communications","source":"QUALCOMM Incorporated,Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":24281,"status":"postponed","reservation_date":"2015-11-23 14:05:49","uploaded":"2016-10-27 10:32:56","revisionof":"S3-152431","revisedto":"S3-160177","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":89.0,"crrevision":2.0,"crcategory":"B","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152578.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152579","title":"Protecting Public Safety Discovery messages","source":"Qualcomm Incorporated,Intel","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"CR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":22981,"status":"agreed","reservation_date":"2015-11-23 14:05:07","uploaded":"2016-10-27 10:32:55","revisionof":"S3-152382","revisedto":"","release":"Rel-13","crspec":33.303,"crspecversion":"13.1.0","workitem":[{"winame":"eProSe-Ext-SA3"}],"crnumber":104.0,"crrevision":1.0,"crcategory":"B","tsg_crp":"SP-150725","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152579.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152596","title":"LS security requirements for Public Safey Discovery messages","source":"Qualcomm","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":259600,"status":"approved","reservation_date":"2015-11-23 14:05:21","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT1,SA2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152596.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152597","title":"TR 33.833","source":"Rapporteur","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":259700,"status":"approved","reservation_date":"2015-11-23 14:05:23","uploaded":"2016-10-27 10:32:56","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152597.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152598","title":"Exception sheet ProSe","source":"Qualcomm","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"WI exception request","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":37,"ainumber":"7.9","ainame":"Security Aspects of Proximity-based Services","tdoc_agenda_sort_order":259800,"status":"agreed","reservation_date":"2015-11-23 14:05:07","uploaded":"2016-10-27 10:32:55","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_81_Anaheim\/Docs\/S3-152598.zip","group":"S3","meeting":"S3-81","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]