[{"name":"S3-161330","title":"Introduce D-H algorithm negotiation method in Solution #3.1","source":"Huawei, Hisilicon","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":5,"ainumber":"4.3","ainame":"Security context and key management","tdoc_agenda_sort_order":13300,"status":"available","reservation_date":"2016-09-19 09:59:05","uploaded":"2016-09-19 10:18:05","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161330.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]