[{"name":"S3-161658","title":"Discussion paper on broadcast messages with digital signature","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"discussion","for":"Discussion","abstract":"Analyses key issue 4.1 AS security during RRC idle mode and solution Solution #4.2: Verification of authenticity of the cell during RRC idle mode. The current solution is susceptible to replay attacks. Two alternative solutions are given, which when combi","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":17440,"status":"noted","reservation_date":"2016-10-30 22:03:33","uploaded":"2016-10-31 12:16:39","revisionof":"","revisedto":"","release":"Rel-14","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161658.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161659","title":"Verification of gNB using UL monitoring and System Query","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"For the verification of authenticity of the cell during RRC idle mode, two solutions are given, when combined can verify the gNB.","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":17770,"status":"revised","reservation_date":"2016-10-30 22:09:51","uploaded":"2016-10-31 12:16:39","revisionof":"","revisedto":"S3-162083","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161659.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161660","title":"Evaluation of digital signature solution 5.4.4.1","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"This contribution proposes an evaluation to the solution in 5.4.4.1 to sign selected broadcast and signaling messages.","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":18050,"status":"approved","reservation_date":"2016-10-30 22:15:41","uploaded":"2016-10-31 12:16:39","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161660.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161661","title":"Evaluation of digital signature solution 5.4.4.2","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"The current solution is susceptible to replay attacks. This contribution proposes an evaluation to the solution in 5.4.4.2.","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":18630,"status":"revised","reservation_date":"2016-10-30 22:20:18","uploaded":"2016-10-31 12:16:39","revisionof":"","revisedto":"S3-162130","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161661.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161662","title":"Additions to Security aspects of dual connectivity","source":"Nokia","contact":"Suresh Nair","contact-id":70166,"tdoctype":"pCR","for":"Approval","abstract":"Additions to Security aspects of dual connectivity (re submission of S3-161345 from San Diego).","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":16590,"status":"approved","reservation_date":"2016-10-30 22:26:31","uploaded":"2016-10-31 12:16:39","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161662.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161697","title":"Potential security requirements on gNB","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"This contribution proposes some security requirements on gNB in order to protect the integrity of setting and software and the confidentiality of sensitive data.","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":16580,"status":"revised","reservation_date":"2016-10-31 08:20:46","uploaded":"2016-10-31 09:11:26","revisionof":"","revisedto":"S3-162041","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161697.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161733","title":"pCR solution to Key Issue # 4.6 User plane DoS attacks","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":18640,"status":"revised","reservation_date":"2016-10-31 09:37:06","uploaded":"2016-10-31 14:42:31","revisionof":"S3-161435","revisedto":"S3-162045","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161733.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161744","title":"Requirement of preventing the RRC connection resource exhausted from DOS attacks","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":16620,"status":"noted","reservation_date":"2016-10-31 10:01:01","uploaded":"2016-10-31 10:05:27","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161744.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161777","title":"Prevent UP DoS Attack over Air Interface","source":"Huawei, HiSilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":18970,"status":"revised","reservation_date":"2016-10-31 10:42:35","uploaded":"2016-10-31 11:07:28","revisionof":"","revisedto":"S3-162079","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161777.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161778","title":"pCR adding key issue of key handling in RRC inactive connected state to RRC connected state transition","source":"China Mobile Com. Corporation","contact":"Minpeng Qi","contact-id":42434,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":17300,"status":"revised","reservation_date":"2016-10-31 10:42:56","uploaded":"2016-10-31 11:31:59","revisionof":"","revisedto":"S3-162032","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161778.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161805","title":"Resolving Editor\u2019s Note on UE behaviour in reading the SIB","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":16970,"status":"revised","reservation_date":"2016-10-31 11:12:00","uploaded":"2016-10-31 11:55:40","revisionof":"","revisedto":"S3-162043","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161805.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161863","title":"Details on Key issue #4.5: Security aspects of WLAN aggregation","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":16610,"status":"revised","reservation_date":"2016-10-31 13:01:07","uploaded":"2016-10-31 13:06:53","revisionof":"S3-161418","revisedto":"S3-162042","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161863.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161864","title":"Details on Key issue #4.4: Security aspects of intra-NR mobility","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":16600,"status":"approved","reservation_date":"2016-10-31 13:10:21","uploaded":"2016-10-31 13:14:00","revisionof":"S3-161415","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161864.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161897","title":"Resolving Editor\u2019s Note on provisioning of public keys to the UE","source":"Samsung","contact":"Rajavelsamy Rajadurai","contact-id":33521,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":17330,"status":"revised","reservation_date":"2016-10-31 13:56:37","uploaded":"2016-10-31 13:59:53","revisionof":"","revisedto":"S3-162044","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161897.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162032","title":"pCR adding key issue of key handling in RRC inactive connected state to RRC connected state transition","source":"China Mobile Com. Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":17301,"status":"approved","reservation_date":"2016-11-11 13:22:07","uploaded":"2016-11-11 13:22:07","revisionof":"S3-161778","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162032.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162041","title":"Potential security requirements on gNB","source":"Huawei, HiSilicon,Interdigital","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":16581,"status":"approved","reservation_date":"2016-11-11 10:17:58","uploaded":"2016-11-11 10:17:58","revisionof":"S3-161697","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162041.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162042","title":"Details on Key issue #4.5: Security aspects of WLAN aggregation","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":16611,"status":"approved","reservation_date":"2016-11-09 19:54:16","uploaded":"2016-11-09 19:54:16","revisionof":"S3-161863","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162042.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162043","title":"Resolving Editor\u2019s Note on UE behaviour in reading the SIB","source":"Samsung","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":16971,"status":"approved","reservation_date":"2016-11-11 14:26:37","uploaded":"2016-11-11 14:26:37","revisionof":"S3-161805","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162043.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162044","title":"Resolving Editor\u2019s Note on provisioning of public keys to the UE","source":"Samsung","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":17331,"status":"approved","reservation_date":"2016-11-11 14:26:37","uploaded":"2016-11-11 14:26:37","revisionof":"S3-161897","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162044.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162045","title":"pCR solution to Key Issue # 4.6 User plane DoS attacks","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":18641,"status":"noted","reservation_date":"2016-11-11 14:26:37","uploaded":"2016-11-11 14:26:37","revisionof":"S3-161733","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162045.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162079","title":"Prevent UP DoS Attack over Air Interface","source":"Huawei, HiSilicon","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":18971,"status":"approved","reservation_date":"2016-11-11 14:26:37","uploaded":"2016-11-11 14:26:37","revisionof":"S3-161777","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162079.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162083","title":"Verification of gNB using UL monitoring and System Query","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":17771,"status":"approved","reservation_date":"2016-11-11 13:22:07","uploaded":"2016-11-11 13:22:07","revisionof":"S3-161659","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162083.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162130","title":"Evaluation of digital signature solution 5.4.4.2","source":"Nokia","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":52,"ainumber":"8.6.4","ainame":"RAN security","tdoc_agenda_sort_order":18631,"status":"approved","reservation_date":"2016-11-11 13:22:07","uploaded":"2016-11-11 13:22:07","revisionof":"S3-161661","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162130.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]