[{"name":"S3-151727","title":"Reply to LS on C-IoT\/MTC data transmission targets for security-related procedures","source":"GP-150669","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"noted","reservation_date":"2015-08-11 09:58:09","uploaded":"2015-08-11 14:44:03","revisionof":"","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151727.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151789","title":"Solution on Signalling reduction for AS security context setup","source":"NEC","contact":"Naoaki Suzuki","contact-id":44630,"tdoctype":"pCR","for":"Decision","abstract":"Proposing a solution to reduce the AS SMC transaction, for the S1 based architecture.","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"postponed","reservation_date":"2015-08-15 09:46:56","uploaded":"2015-08-15 10:51:07","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.863,"crspecversion":"0.2.0","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151789.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151790","title":"LS on security aspects of considerations for clean slate CIoT for Rel-13","source":"NEC","contact":"Naoaki Suzuki","contact-id":44630,"tdoctype":"LS out","for":"Decision","abstract":"LS to draw SA2's attention that the SA3 has related activity for the security ascept, corresponding to the S1 based architecture.","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"postponed","reservation_date":"2015-08-15 09:53:14","uploaded":"2015-08-15 10:51:07","revisionof":"","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":[{"winame":"FS_AE_CIoT"},{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"SA2","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151790.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151798","title":"pCR to TR 33.863 (CIoT BEST) on end-to-middle security solution based on AKA","source":"Nokia Networks","contact":"Guenther Horn","contact-id":68335,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"revised","reservation_date":"2015-08-15 14:31:05","uploaded":"2015-08-17 13:24:37","revisionof":"","revisedto":"S3-152081","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151798.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151888","title":"Existing and evolving TLS optimizations","source":"Ericsson, Nokia Networks","contact":"Vesa Torvinen","contact-id":28179,"tdoctype":"pCR","for":"Decision","abstract":"In this paper, we discuss existing and evolving TLS optimizations that may be useful in BEST_MTC_sec context. We propose that SA3 should further study if it is possible to leave the DTLS session open for longer period of time, and omit full handshake, or resume DTLS session instead of making a full handshake. There is also a new 0-roundtrip TLS handshake procedure under development in IETF that could be of interest of BEST_MTC_sec study.","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"revised","reservation_date":"2015-08-17 11:12:15","uploaded":"2015-08-17 13:06:13","revisionof":"","revisedto":"S3-152076","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151888.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151914","title":"pCR to FS_BEST_MTC_Sec: Adding NEW Annex for AKA protocol description","source":"VODAFONE Group Plc","contact":"Aguibou Barry","contact-id":41255,"tdoctype":"pCR","for":"Decision","abstract":"In order to assess whether an AKA\/Key Management protocol is suitable for use in a situation wherein the battery capacity is limited and wherein the data rate is very low, it is necessary to provide measurable information to evaluate the potential impact on the MTC device\u2019s battery life and the quality of service","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"approved","reservation_date":"2015-08-17 12:08:05","uploaded":"2015-08-17 13:51:18","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151914.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151929","title":"pCR to FS_BEST_MTC_Sec: Adding UMTS AKA messages description","source":"VODAFONE Group Plc","contact":"Aguibou Barry","contact-id":41255,"tdoctype":"pCR","for":"Decision","abstract":"The following proposes the addition of a description of the UMTS AKA messages, in particular the Authentication and Ciphering request\/response","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"approved","reservation_date":"2015-08-17 12:42:41","uploaded":"2015-08-17 13:51:18","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151929.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151931","title":"pCR to FS_BEST_MTC_Sec: Adding DTLS Handshake and TLS Record messages measurement","source":"VODAFONE Group Plc","contact":"Aguibou Barry","contact-id":41255,"tdoctype":"pCR","for":"Decision","abstract":"The following provides a measurement of a successful DTLS handshake procedure which may take place between a UE and an application server in the internet. It also describes the overhead incurred when TLS record messages are sent to carry ciphered or integrity protected payload.","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"approved","reservation_date":"2015-08-17 12:44:57","uploaded":"2015-08-17 13:51:17","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151931.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151934","title":"pCR to FS_BEST_MTC_Sec: Adding TLS Handshake session resumption measurement","source":"VODAFONE Group Plc","contact":"Aguibou Barry","contact-id":41255,"tdoctype":"pCR","for":"Decision","abstract":"The following provides a measurement of a successful TLS handshake session resumption procedure which may take place between a UE and an application server in the internet","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"approved","reservation_date":"2015-08-17 12:47:13","uploaded":"2015-08-17 13:51:17","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151934.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151935","title":"pCR to FS_BEST_MTC_Sec: Adding GBA messages measurement description","source":"VODAFONE Group Plc","contact":"Aguibou Barry","contact-id":41255,"tdoctype":"pCR","for":"Decision","abstract":"The following provides a measurement of a successful GBA bootstrapping procedure which may take place between a UE and an application server in the internet. It is proposed to agree the following pCR","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"approved","reservation_date":"2015-08-17 12:49:22","uploaded":"2015-08-17 13:51:17","revisionof":"","revisedto":"","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151935.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151938","title":"pCR to 33.863: Key issue \u2013 Efficient user data protection challenges","source":"VODAFONE Group Plc","contact":"Aguibou Barry","contact-id":41255,"tdoctype":"pCR","for":"Decision","abstract":"It is proposed to agree the following key issue for inclusion in the draft TR","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"revised","reservation_date":"2015-08-17 12:53:52","uploaded":"2015-08-17 13:51:17","revisionof":"","revisedto":"S3-152077","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151938.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151945","title":"pCR to 33.863: Key issue \u2013 N-PDU Data Tampering and Eavesdropping","source":"VODAFONE Group Plc","contact":"Aguibou Barry","contact-id":41255,"tdoctype":"pCR","for":"Decision","abstract":"It is proposed to agree the following key issue for inclusion in the draft TR","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"revised","reservation_date":"2015-08-17 13:01:38","uploaded":"2015-08-17 13:51:17","revisionof":"","revisedto":"S3-152078","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151945.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151948","title":"Update of \u201cUE to HPLMN\u201d security solution with HLR push procedure","source":"VODAFONE Group Plc","contact":"Aguibou Barry","contact-id":41255,"tdoctype":"pCR","for":"Decision","abstract":"The following provides a set of improvements to the HLR push procedure in clause 6.1.2. It is proposed to agree the following changes for inclusion in the draft TR","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"revised","reservation_date":"2015-08-17 13:13:18","uploaded":"2015-08-17 13:51:17","revisionof":"","revisedto":"S3-152080","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151948.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-151949","title":"pCR to FS_BEST_MTC_Sec: Adding \u201cUE to HPLMN\u201d security solution with HSE pull procedure","source":"VODAFONE Group Plc","contact":"Aguibou Barry","contact-id":41255,"tdoctype":"pCR","for":"Decision","abstract":"For certain deployment, a pull model would be more suitable for the HPLMN. The following propose an alternative to the \u201cUE to HPLMN\u201d security solution with HLR push.","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":0,"status":"revised","reservation_date":"2015-08-17 13:15:06","uploaded":"2015-08-17 13:51:18","revisionof":"","revisedto":"S3-152082","release":"Rel-13","crspec":"","crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-151949.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152076","title":"Existing and evolving TLS optimizations","source":"Ericsson, Nokia Networks","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":17981,"status":"approved","reservation_date":"2015-09-11 15:36:46","uploaded":"2015-09-11 15:36:23","revisionof":"S3-151888","revisedto":"","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-152076.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152077","title":"pCR to 33.863: Key issue \u2013 Efficient user data protection challenges","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":19351,"status":"approved","reservation_date":"2015-09-11 15:36:46","uploaded":"2015-09-11 15:36:23","revisionof":"S3-151938","revisedto":"","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-152077.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152078","title":"pCR to 33.863: Key issue \u2013 N-PDU Data Tampering and Eavesdropping","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":19381,"status":"approved","reservation_date":"2015-09-11 15:36:46","uploaded":"2015-09-11 15:36:23","revisionof":"S3-151945","revisedto":"","release":"","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-152078.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152080","title":"Update of \u201cUE to HPLMN\u201d security solution with HLR push procedure","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":19451,"status":"approved","reservation_date":"2015-09-11 15:36:47","uploaded":"2015-09-11 15:36:23","revisionof":"S3-151948","revisedto":"","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-152080.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152081","title":"pCR to TR 33.863 (CIoT BEST) on end-to-middle security solution based on AKA","source":"Nokia Networks","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":19481,"status":"approved","reservation_date":"2015-09-11 15:36:47","uploaded":"2015-09-11 15:36:23","revisionof":"S3-151798","revisedto":"","release":"Rel-13","crspec":33.863,"crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-152081.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152082","title":"pCR to FS_BEST_MTC_Sec: Adding \u201cUE to HPLMN\u201d security solution with HSE pull procedure","source":"VODAFONE Group Plc","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":19491,"status":"approved","reservation_date":"2015-09-11 15:36:47","uploaded":"2015-09-11 15:36:23","revisionof":"S3-151949","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-152082.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-152083","title":"TR 33.863 (status after SA3 #80)","source":"Vodafone","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":57,"ainumber":"8.7.2","ainame":"Battery Efficient Security for very low Throughput Machine Type Communication Devices","tdoc_agenda_sort_order":208300,"status":"agreed","reservation_date":"2015-09-11 15:36:47","uploaded":"2015-09-11 15:36:23","revisionof":"","revisedto":"","release":"Rel-13","crspec":"","crspecversion":"0.3.0","workitem":[{"winame":"FS_BEST_MTC_Sec"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_80_Tallinn\/Docs\/S3-152083.zip","group":"S3","meeting":"S3-80","year":2015,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]