[{"name":"S3-161608","title":"Solution for independent RAN keys","source":"ZTE Corporation","contact":"Xie ZhenHua","contact-id":38520,"tdoctype":"pCR","for":"Approval","abstract":"Propose a solution for independent RAN keys.","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":16730,"status":"noted","reservation_date":"2016-10-26 14:49:00","uploaded":"2016-10-30 00:53:16","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161608.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161668","title":"Introduce D-H algorithm negotiation method in Solution #3.1","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This pCR introduces D-H algorithm negotiation method in Solution #3.1","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":18340,"status":"approved","reservation_date":"2016-10-31 06:18:46","uploaded":"2016-10-31 09:03:57","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161668.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161672","title":"introduce algorithms negotiation call flow","source":"HUAWEI TECHNOLOGIES Co. Ltd.","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This contribution propose a basic call flow to perform algorithms negotiation","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":16990,"status":"revised","reservation_date":"2016-10-31 06:28:19","uploaded":"2016-10-31 09:03:57","revisionof":"","revisedto":"S3-162036","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161672.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161673","title":"A solution for key negotiation in dual connectivity scenario","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This contribution add a new solution to address the key negotiation in the dual connectivity to deal with the leakage of secret key","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":17190,"status":"revised","reservation_date":"2016-10-31 06:29:59","uploaded":"2016-10-31 09:03:57","revisionof":"","revisedto":"S3-162037","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161673.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161699","title":"Security Key Refresh Triggered by UE","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This contribution presents a key refresh solution triggered by UE based on a security policy defined by the UE home network","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":17230,"status":"revised","reservation_date":"2016-10-31 08:26:09","uploaded":"2016-10-31 09:11:26","revisionof":"","revisedto":"S3-162038","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161699.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161719","title":"Authentication and Key Agreement for non-3GPP access","source":"Intel Corporation (UK) Ltd","contact":"Farid Adrangi","contact-id":31273,"tdoctype":"pCR","for":"","abstract":"This contribution describes a proposal for Authentication and Key Agreement procedure between the UE and the NextGen core network via for non-3GPP access.","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":17310,"status":"revised","reservation_date":"2016-10-31 09:08:43","uploaded":"2016-10-31 09:29:14","revisionof":"","revisedto":"S3-162080","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161719.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161723","title":"Update Solution for Security Context Management for UE with Multiple Access Technologies","source":"Huawei, HiSilicon, CATR","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":18940,"status":"approved","reservation_date":"2016-10-31 09:24:16","uploaded":"2016-10-31 09:42:49","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161723.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161731","title":"pCR solution to Key Issue # 3.1 Interception of radio interface keys sent between operator entities","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":17340,"status":"revised","reservation_date":"2016-10-31 09:37:06","uploaded":"2016-10-31 14:42:31","revisionof":"S3-161437","revisedto":"S3-162039","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161731.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161734","title":"pCR solution to Key Issue # 3.2 on refreshing keys","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":17570,"status":"merged","reservation_date":"2016-10-31 09:37:06","uploaded":"2016-10-31 14:42:31","revisionof":"S3-161434","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161734.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161736","title":"Enhancements to solution 3.4","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":19590,"status":"revised","reservation_date":"2016-10-31 09:37:06","uploaded":"2016-10-31 14:42:31","revisionof":"","revisedto":"S3-162040","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161736.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161757","title":"pCR to TR 33.899, UE requests key refresh, refinement and evaluation","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":16720,"status":"revised","reservation_date":"2016-10-31 10:14:29","uploaded":"2016-10-31 14:40:06","revisionof":"","revisedto":"S3-162035","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161757.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161833","title":"Key issue on security key and context identification","source":"Nokia","contact":"Anja Jerichow","contact-id":44885,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":16080,"status":"revised","reservation_date":"2016-10-31 12:15:41","uploaded":"2016-10-31 14:55:42","revisionof":"","revisedto":"S3-162033","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161833.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161834","title":"Solution on security key and context identification","source":"Nokia","contact":"Anja Jerichow","contact-id":44885,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":16680,"status":"revised","reservation_date":"2016-10-31 12:15:41","uploaded":"2016-10-31 14:55:42","revisionof":"","revisedto":"S3-162034","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161834.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161894","title":"Evaluating solution #2.6 against key issue 3.1","source":"Nokia","contact":"Guenther Horn","contact-id":13803,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":18330,"status":"approved","reservation_date":"2016-10-31 13:49:10","uploaded":"2016-10-31 14:34:00","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161894.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161959","title":"Comments on S3-161731 \"pCR solution to Key Issue # 3.1 Interception of radio interface keys sent between operator entities\" by Qualcomm Incorporated","source":"Nokia","contact":"Guenther Horn","contact-id":13803,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":17360,"status":"merged","reservation_date":"2016-11-02 14:10:40","uploaded":"2016-11-02 14:12:51","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161959.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162033","title":"Key issue on security key and context identification","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":16081,"status":"approved","reservation_date":"2016-11-08 19:58:44","uploaded":"2016-11-08 19:58:44","revisionof":"S3-161833","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162033.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162034","title":"Solution on security key and context identification","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":16681,"status":"approved","reservation_date":"2016-11-08 19:58:44","uploaded":"2016-11-08 19:58:44","revisionof":"S3-161834","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162034.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162035","title":"pCR to TR 33.899, UE requests key refresh, refinement and evaluation","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":16721,"status":"approved","reservation_date":"2016-11-11 12:48:28","uploaded":"2016-11-11 12:48:28","revisionof":"S3-161757","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162035.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162036","title":"introduce algorithms negotiation call flow","source":"HUAWEI TECHNOLOGIES Co. Ltd.","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":16991,"status":"approved","reservation_date":"2016-11-11 12:36:15","uploaded":"2016-11-11 12:36:15","revisionof":"S3-161672","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162036.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162037","title":"A solution for key negotiation in dual connectivity scenario","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":17191,"status":"approved","reservation_date":"2016-11-11 12:36:15","uploaded":"2016-11-11 12:36:15","revisionof":"S3-161673","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162037.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162038","title":"Security Key Refresh Triggered by UE","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":17231,"status":"approved","reservation_date":"2016-11-10 09:53:48","uploaded":"2016-11-10 09:53:48","revisionof":"S3-161699","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162038.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162039","title":"pCR solution to Key Issue # 3.1 Interception of radio interface keys sent between operator entities","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":17341,"status":"approved","reservation_date":"2016-11-11 14:26:37","uploaded":"2016-11-11 14:26:37","revisionof":"S3-161731","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162039.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162040","title":"Enhancements to solution 3.4","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":19591,"status":"approved","reservation_date":"2016-11-11 14:26:37","uploaded":"2016-11-11 14:26:37","revisionof":"S3-161736","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162040.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162080","title":"Authentication and Key Agreement for non-3GPP access","source":"Intel Corporation (UK) Ltd","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":51,"ainumber":"8.6.3","ainame":"Security context and key management","tdoc_agenda_sort_order":17311,"status":"approved","reservation_date":"2016-11-11 15:29:58","uploaded":"2016-11-11 15:29:58","revisionof":"S3-161719","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162080.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]