[{"name":"S3-161363","title":"Key hierarchy and the related procedure","source":"Huawei, HiSilicon, KPN","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"-","agenda_item_sort_order":3,"ainumber":"4.1","ainame":"Security architecture","tdoc_agenda_sort_order":13630,"status":"revised","reservation_date":"2016-09-20 07:46:23","uploaded":"2016-09-20 08:12:19","revisionof":"","revisedto":"S3-161490","release":"","crspec":33.899,"crspecversion":"0.4.1","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_84b_San_Diego\/Docs\/S3-161363.zip","group":"S3","meeting":"S3-ah-18460","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]