TS 33.102 | REL 3 → 18 | 3G security – Security architecture |
TS 33.103 | REL 3 → 4 | 3G security – Integration Guidelines |
TS 33.105 | REL 3 → 18 | 3G security – Cryptographic Algorithm Requirements |
Lawful Interception – Legacy Systems, up to EPS | ||
TS 33.106 | REL 3 → 18 | Requirements |
TS 33.107 | REL 3 → 18 | Architecture and Functions |
TS 33.108 | REL 5 → 19 | Handover interface |
TS 33.110 | REL 7 → 18 | Key Establishment between a UICC and a Terminal |
TS 33.116 | REL 14 → 18 | Security Assurance Specification (SCAS) for the MME Network Product Class |
TS 33.117 | REL 14 → 19 | Catalogue of General Security Assurance Requirements |
TS 33.120 | REL 3 → 4 | Security Objectives and Principles |
TS 33.122 | REL 15 → 18 | Security Aspects of Common API Framework (CAPIF) for 3GPP Northbound APIs |
Lawful Interception – 5GS/EPS | ||
TS 33.126 | REL 15 → 19 | Requirements |
TS 33.127 | REL 15 → 19 | Architecture and Functions |
TS 33.128 | REL 15 → 19 | Handover Interface |
TS 33.141 | REL 6 → 18 | Presence Service Security |
TS 33.163 | REL 15 → 18 | Battery Efficient Security for Very Low Throughput MTC Devices |
TS 33.179 | REL 13 | Security of Mission Critical Push To Talk (MCPTT) over LTE |
TS 33.180 | REL 14 → 19 | Security of the Mission Critical Service |
TS 33.185 | REL 14 → 18 | Security aspect for LTE Support of V2X services |
TS 33.187 | REL 12 → 18 | Security aspects of MTC and other Mobile Data Applications Communications Enhancements |
TS 33.200 | REL 4 → 6 | NDS – MAP Application Layer Security |
TS 33.203 | REL 5 → 19 | Access Security for IP-based Services |
TS 33.204 | REL 7 → 18 | NDS – TCAP User Security |
TS 33.210 | REL 5 → 19 | NDS – IP Network Layer Security |
TS 33.216 | REL 15 → 18 | Security Assurance Specification (SCAS) for eNB Network Product Class |
TS 33.220 | REL 6 → 18 | GAA – GBA: Generic Bootstrapping Architecture |
TS 33.221 | REL 6 → 18 | GAA – Support for Subscriber Certificates |
TS 33.222 | REL 6 → 18 | GAA – Access to NAFs using HTTPS |
TS 33.223 | REL 8 → 18 | GAA – GBA Push function |
TS 33.224 | REL 9 → 18 | GAA – Generic Push layer |
TS 33.226 | REL 17 → 18 | Security assurance for IP Multimedia Subsystem (IMS) |
TS 33.234 | REL 6 → 18 | I-WLAN Security |
TS 33.246 | REL 7 → 19 | MBMS Security |
TS 33.250 | REL 14 → 18 | Security Assurance Specification for PGW Network Product Class |
TS 33.256 | REL 17 → 18 | Security aspects of Uncrewed Aerial Systems (UAS) |
TS 33.259 | REL 7 → 18 | Key Establishment between a UICC Hosting Device and a Remote Device |
TS 33.303 | REL 12 → 18 | Proximity-based Services (ProSe) – Security aspects |
TS 33.310 | REL 6 → 19 | NDS – Authentication Framework |
TS 33.320 | REL 9 → 18 | Security of HNB / HeNB |
TS 33.326 | REL 17 → 18 | SCAS for the NSSAAF network product class |
TS 33.328 | REL 9 → 18 | IMS Media Plane Security |
TS 33.401 | REL 8 → 18 | SAE – Security Architecture |
TS 33.402 | REL 8 → 18 | SAE – Security aspects of non-3GPP Accesses |
TS 33.434 | REL 16 → 18 | Security aspects of Service Enabler Architecture Layer (SEAL) for verticals |
TS 33.501 | REL 15 → 19 | Security Architecture and Procedures for 5G System |
TS 33.503 | REL 17 → 18 | Security Aspects of ProSe in the 5G System |
TS 33.511 | REL 16 → 19 | 5G SCAS for the Next Generation Node B (gNodeB) Network Product Class |
TS 33.512 | REL 16 → 18 | 5G SCAS for the Access and Mobility management Function (AMF) |
TS 33.513 | REL 16 → 18 | 5G SCAS for the User Plane Function (UPF) |
TS 33.514 | REL 16 → 19 | 5G SCAS for the Unified Data Management (UDM) Network Product Class |
TS 33.515 | REL 16 → 18 | 5G SCAS for the Session Management Function (SMF) |
TS 33.516 | REL 16 → 18 | 5G SCAS for the Authentication Server Function (AUSF) |
TS 33.517 | REL 16 → 18 | 5G SCAS for the Security Edge Protection Proxy (SEPP) Network Product Class |
TS 33.518 | REL 16 → 18 | 5G SCAS for the Network Repository Function (NRF) Network Product Class |
TS 33.519 | REL 16 → 18 | 5G SCAS for the Network Exposure Function (NEF) Network Product Class |
TS 33.520 | REL 18 | 5G SCAS for the Non-3GPP InterWorking Function (N3IWF) |
TS 33.521 | REL 17 → 18 | 5G SCAS for the Network Data Analytics Function (NWDAF) |
TS 33.522 | REL 17 → 18 | 5G SCAS for the Service Communication Proxy (SCP) |
TS 33.523 | REL 18 → 19 | 5G SCAS for the Split gNB Product Classes |
TS 33.526 | REL 18 | 5G SCAS for the Management Function (MnF) |
TS 33.527 | REL 18 | 5G SCAS for the 3GPP Virtualized Network products |
TS 33.528 | REL 18 | 5G SCAS for the Policy Control Function (PCF) |
TS 33.529 | REL 19 | 5G SCAS for Short Message Service Function (SMSF) |
TS 33.530 | REL 19 | 5G SCAS for the Unified Data Repository (UDR) |
TS 33.533 | REL 18 | Security aspects of Ranging based Services and Sidelink Positioning |
TS 33.535 | REL 16 → 18 | Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5GS |
TS 33.536 | REL 16 → 18 | Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services |
TS 33.537 | REL 18 | 5G SCAS for the Authentication and Key Management for Applications (AKMA) Anchor Function (AAnF) |
TS 33.558 | REL 17 → 18 | Security aspects of enhancement of support for enabling edge applications |
TR 33.700-28 | REL 18 | Study on Security aspects of Satellite access |
TR 33.700-32 | REL 19 | Mr. Ferdi, Samir |
TR 33.700-41 | REL 19 | Study on Cryptographic algorithm transition to 256 bits |
TR 33.701 | REL 19 | Study on mitigations against bidding down Attacks |
TR 33.702 | REL 19 | Security for Mobility over non-3GPP access to avoid full Primary Authentication |
TR 33.737 | REL 18 | Study on Authentication and Key Management for Applications (AKMA) – Phase 2 |
TR 33.738 | REL 18 | Study on Security aspects of Enablers for Network Automation for the 5G System – Phase 3 |
TR 33.739 | REL 18 | Study on Security enhancement of support for Edge Computing – Phase 2 |
TR 33.740 | REL 18 | Study on Security aspects of Proximity Based Services (ProSe) in 5GS – Phase 2 |
TR 33.741 | REL 18 | Study on Home Network triggered Primary Authentication |
TR 33.745 | REL 19 | Study on Security aspects of 5G Next Radio (NR) Femto |
TR 33.754 | REL 19 | Study on Security aspects for Multi-Access for DualSteer devices and ATSSS Phase 4 |
TR 33.759 | REL 19 | Study on Security enhancements of Uncrewed Aerial Systems (UAS) Phase 3 |
TR 33.776 | REL 19 | Study of Automatic Certificate Management Environment (ACME) for the Service Based Architecture (SBA) |
TR 33.784 | REL 19 | Study on Security aspects of Core Network enhanced support for Artificial Intelligence/Machine Learning (AI/ML) |
TR 33.794 | REL 19 | Study on Enablers for Zero Trust Security |
TR 33.803 | REL 7 | Coexistence between TISPAN and 3GPP Authentication Schemes |
TR 33.804 | REL 11 → 12 | Single Sign On (SSO) Application Security for Common IMS based on SIP Digest |
TR 33.805 | REL 12 | Study on Security Assurance Methodology for 3GPP Network Products |
TR 33.807 | REL 16 | Study on the Security of the Wireless and Wireline Convergence for the 5G System Architecture |
TR 33.809 | REL 18 | Study on 5G Security enhancements against False Base Stations (FBS) |
TR 33.810 | REL 6 | Feasibility Study to support NDS/IP Evolution |
TR 33.811 | REL 15 | Study on Security aspects of 5G Network Slicing Management |
TR 33.812 | REL 9 | Feasibility Study on Remote Management of USIM Application on M2M Equipment |
TR 33.813 | REL 16 | Study on Security aspects of Network Slicing enhancement |
TR 33.814 | REL 16 | Study on the Security of the enhancement to the 5GC Location Services (LCS) |
TR 33.815 | REL 16 | Study on Security aspects of Provision of Access to Restricted Local Operator Services by Unauthenticated UEs (PARLOS) |
TR 33.816 | REL 10 | Feasibility Study on LTE Relay Node Security |
TR 33.817 | REL 6 | Feasibility Study on (U)SIM Security Reuse by Peripheral Devices on Local Interfaces |
TR 33.818 | REL 17 | Security Assurance Methodology (SECAM) and Security Assurance Specification (SCAS) for 3GPP Virtualized Network Products |
TR 33.819 | REL 16 | Study on Security enhancements of 5GS for Vertical and Local Area Network (LAN) Services |
TR 33.820 | REL 8 | Security of H(e)NB |
TR 33.821 | REL 8 → 9 | Rationale and Track of Security Decisions in LTE RAN / 3GPP SAE |
TR 33.822 | REL 8 | Security aspects for inter-Access Mobility between non 3GPP and 3GPP Access Network |
TR 33.823 | REL 12 | Security for Usage of GBA with a UE Browser |
TR 33.824 | REL 17 | Study on Security for Next Radio (NR) Integrated Access and Backhaul (IAB) |
TR 33.825 | REL 16 | Study on the Security of Ultra-Reliable Low-Latency Communication (URLLC) for 5GS |
TR 33.827 | REL 14 | Study on providing for Lawful Interception (LI) in the S8 Home Routeing (S8HR) Architecture for Voice over LTE (VoLTE) |
TR 33.828 | REL 9 → 11 | IMS Media Plane Security |
TR 33.829 | REL 12 | IMS Media Plane Security Services |
TR 33.831 | REL 12 | Study on Security on Spoofed Call Detection and Prevention |
TR 33.833 | REL 13 | Study on Security issues to support Proximity Services (ProSe) |
TR 33.834 | REL 16 | Study on Long Term Key Update Procedures (LTKUP) |
TR 33.835 | REL 16 | Study on Authentication and Key Management for Applications based on 3GPP Credential in 5G |
TR 33.836 | REL 16 | Study on Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) |
TR 33.838 | REL 11 | Study on Protection against Unsolicited Communication for IMS (PUCI) |
TR 33.839 | REL 17 | Study on Security aspects of enhancement of support for Edge Computing in 5G Core (5GC) |
TR 33.841 | REL 16 | Study on the support of 256-bit Algorithms for 5G |
TR 33.843 | REL 15 | Study on Security aspect of Architecture enhancements to ProSe UE-to-Network Relay |
TR 33.844 | REL 11 | Security Study on IMS Based Peer-to-Peer Content Distribution Services |
TR 33.845 | REL 17 | Study on Storage and Transport of 5G Core (5GC) Security parameters for Authentication Credential Repository Processing Function (ARPF) authentication |
TR 33.846 | REL 17 | Study on Authentication enhancements in the 5G System (5GS) |
TR 33.847 | REL 17 | Study on Security aspects of enhancement for Proximity based services in the 5G System (5GS) |
TR 33.848 | REL 18 | Study on Security impacts of Virtualisation |
TR 33.849 | REL 14 | Study on Subscriber Privacy impact in 3GPP |
TR 33.850 | REL 17 | Study on Security aspects of enhancements for 5G Multicast-Broadcast Services (MBS) |
TR 33.851 | REL 17 | Study on Security for enhanced support of Industrial Internet of Things (IIoT) |
TR 33.853 | REL 17 | Study on key issues and potential solutions for integrity protection of the User Plane (UP) |
TR 33.854 | REL 17 | Study on Security aspects of Uncrewed Aerial Systems (UAS) |
TR 33.855 | REL 16 | Study on Security aspects of the 5G Service Based Architecture (SBA) |
TR 33.856 | REL 16 | Study on Security aspects of Single Radio Voice Continuity from 5G to UTRAN |
TR 33.857 | REL 17 | Study on enhanced Security support for Non-Public Networks (NPN) |
TR 33.858 | REL 18 | Study on Security aspects of enhanced support of Non-Public Networks (NPN) – Phase 2 |
TR 33.859 | REL 11 | Study on the Introduction of Key Hierarchy in UTRAN |
TR 33.860 | REL 13 | Study on enhanced General Packet Radio Service (EGPRS) Access Security enhancements with relation to Cellular Internet of Things (IoT) |
TR 33.861 | REL 16 | Study on evolution of Cellular Internet of Things (CIoT) Security for the 5G System |
TR 33.862 | REL 17 | Study on security aspects of the Message Service for MIoT over the 5G System (MSGin5G) |
TR 33.863 | REL 14 | Study on Battery efficient Security for Very Low Throughput Machine Type Communication (MTC) Devices |
TR 33.864 | REL 17 | Study on the Security of Access and Mobility Management Function (AMF) re-allocation |
TR 33.866 | REL 17 | Study on Security aspects of enablers for Network Automation (eNA) for the 5G system (5GS) Phase 2 |
TR 33.867 | REL 17 | Study on user consent for 3GPP services |
TR 33.868 | REL 12 | Study on Security aspects of MTC and other Mobile Data Applications Communications enhancements |
TR 33.871 | REL 12 | Study on Security for WebRTC IMS Client Access to IMS |
TR 33.872 | REL 13 | Study on Security enhancements to Web Real Time Communication (WebRTC) Access to IMS |
TR 33.873 | REL 17 | Study on the Security of the System Enablers for devices having Multiple Universal Subscriber Identity Modules (MUSIM) |
TR 33.874 | REL 18 | Study on enhanced Security for Network Slicing Phase 2 |
TR 33.875 | REL 18 | Study on enhanced Security aspects of the 5G Service Based Architecture (SBA) |
TR 33.876 | REL 18 | Study on Automated Certificate Management in Service-Based Architecture (SBA) |
TR 33.877 | REL 18 | Study on the Security aspects of Artificial Intelligence (AI)/Machine Learning (ML) for the Next Generation Radio Access Network (NG-RAN) |
TR 33.879 | REL 13 | Study on Security enhancements for Mission Critical Push To Talk (MCPTT) over LTE |
TR 33.880 | REL 15 | Study on Mission Critical Security enhancements |
TR 33.881 | REL 17 | Study on Non-Seamless WLAN Offload (NSWO) in 5G System (5GS) using 3GPP credentials |
TR 33.882 | REL 18 | Study on Personal IoT Networks Security aspects |
TR 33.883 | REL 18 | Study on Security enhancements for 5G Multicast-Broadcast services Phase 2 |
TR 33.884 | REL 18 | Study on Security of Application enablement aspects for Subscriber-aware Northbound API access |
TR 33.885 | REL 14 | Study on Security aspects for LTE support of V2X Services |
TR 33.886 | REL 18 | Study on enhanced Security for Network Slicing – Phase 3 |
TR 33.887 | REL 18 | Study on Security aspects for support for 5G Wireless and Wireline Convergence (5WWC) – Phase 2 |
TR 33.888 | REL 12 | Study on Security issues to support Group Communication System Enablers (GCSE) for LTE |
TR 33.889 | REL 13 | Study on Security aspects of Machine-Type Communications (MTC) Architecture and Feature enhancements |
TR 33.890 | REL 18 | Study on Security support for Next Generation Real Time Communication services |
TR 33.891 | REL 18 | Study on Security of Phase 2 for Uncrewed Aerial System (UAS), Uncrewed Aerial Vehicle (UAV) and Urban Air Mobility (UAM) |
TR 33.892 | REL 18 | Study on UE Route Selection Policy (URSP) rules to securely identify applications |
TR 33.893 | REL 18 | Study on Security aspects of Ranging-based services and Sidelink Positioning |
TR 33.894 | REL 18 | Study on applicability of the zero trust security principles in mobile networks |
TR 33.896 | REL 18 | Study of Security aspects on User Consent for 3GPP Services – Phase 2 |
TR 33.897 | REL 13 | Study on Isolated E-UTRAN operation for Public Safety – Security aspects |
TR 33.898 | REL 18 | Study on Security and Privacy of Artificial Intelligence/Machine Learning (AI/ML)-based services and applications in 5G |
TR 33.901 | REL 3 → 4 | Criteria for cryptographic Algorithm design process |
TR 33.902 | REL 3 → 4 | Formal Analysis of the 3G Authentication Protocol |
TR 33.905 | REL 7 → 18 | Recommendations for Trusted Open Platforms |
TR 33.908 | REL 3 → 4 | Report on design, specification and evaluation of 3GPP confidentiality and integrity algorithms |
TR 33.909 | REL 4 | Report on the design and evaluation of the MILENAGE algorithm set |
TR 33.916 | REL 14 → 18 | Security Assurance Methodology for 3GPP network products |
TR 33.918 | REL 7 | GAA – Early implementation of HTTPS connection between a UICC and a NAF |
TR 33.919 | REL 6 → 18 | GAA – System description |
TR 33.920 | REL 7 | SIM Card based GBA – Early implementation feature |
TR 33.924 | REL 9 → 18 | Identity management and GAA interworking |
TR 33.926 | REL 13 → 19 | Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes |
TR 33.927 | REL 18 | Security Assurance Specification (SCAS) – Threats and Critical Assets in 3GPP Virtualized Network Product classes |
TR 33.928 | REL 18 | ADMF Logic for provisioning Lawful Interception (LI) |
TR 33.935 | REL 16 → 18 | Study on detailed Long Term Key Update Process (LTKUP) detailed solutions |
TR 33.936 | REL 18 | Security Assurance Methodology (SECAM) for 3GPP Virtualized Network Products |
TR 33.937 | REL 9 → 18 | Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI) |
TR 33.969 | REL 12 → 18 | Study on security aspects of Public Warning System (PWS) |
TR 33.978 | REL 6 → 7 | Security aspects of early IMS |
TR 33.980 | REL 7 → 18 | Liberty Alliance ID-FF, ID-WSF and GAA |
TR 33.995 | REL 13 → 18 | Study on Security aspects of integration of Single Sign-On (SSO) frameworks with 3GPP operator-controlled resources and mechanisms |