| | |
TR 33.803
|
REL 7
|
Coexistence between TISPAN
and 3GPP Authentication Schemes
|
TR 33.804
|
REL 11 → 12
|
Single Sign On (SSO) Application Security
for Common IMS based on SIP Digest
|
TR 33.805
|
REL 12
|
Study on Security Assurance Methodology
for 3GPP Network Products
|
TR 33.807
|
REL 16
|
Study on the Security
of the Wireless and Wireline Convergence
for the 5G System Architecture
|
TR 33.809
|
REL 18
|
Study on 5G Security enhancements against False Base Stations (FBS)
|
TR 33.810
|
REL 6
|
Feasibility Study to support NDS/IP Evolution
|
TR 33.811
|
REL 15
|
Study on Security aspects
of 5G Network Slicing Management
|
TR 33.812
|
REL 9
|
Feasibility Study on Remote Management
of USIM Application on M2M Equipment
|
TR 33.813
|
REL 16
|
Study on Security aspects of Network Slicing enhancement
|
TR 33.814
|
REL 16
|
Study on the Security of the enhancement
to the 5GC Location Services (LCS)
|
TR 33.815
|
REL 16
|
Study on Security aspects
of Provision of Access to Restricted Local Operator Services by Unauthenticated UEs (PARLOS)
|
TR 33.816
|
REL 10
|
Feasibility Study on LTE Relay Node Security
|
TR 33.817
|
REL 6
|
Feasibility Study on (U)SIM Security Reuse
by Peripheral Devices on Local Interfaces
|
TR 33.818
|
REL 17
|
Security Assurance Methodology (SECAM) and Security Assurance Specification (SCAS)
for 3GPP Virtualized Network Products
|
TR 33.819
|
REL 16
|
Study on Security enhancements of 5GS
for Vertical and Local Area Network (LAN) Services
|
TR 33.820
|
REL 8
|
Security of H(e)NB
|
TR 33.821
|
REL 8 → 9
|
Rationale and Track of Security Decisions
in LTE RAN / 3GPP SAE
|
TR 33.822
|
REL 8
|
Security aspects for inter-Access Mobility
between non 3GPP and 3GPP Access Network
|
TR 33.823
|
REL 12
|
Security for Usage of GBA with a UE Browser
|
TR 33.824
|
REL 17
|
Study on Security for Next Radio (NR) Integrated Access and Backhaul (IAB)
|
TR 33.825
|
REL 16
|
Study on the Security
of Ultra-Reliable Low-Latency Communication (URLLC) for 5GS
|
TR 33.827
|
REL 14
|
Study on providing for Lawful Interception (LI)
in the S8 Home Routeing (S8HR) Architecture
for Voice over LTE (VoLTE)
|
TR 33.828
|
REL 9 → 11
|
IMS Media Plane Security
|
TR 33.829
|
REL 12
|
IMS Media Plane Security Services
|
TR 33.831
|
REL 12
|
Study on Security on Spoofed Call Detection and Prevention
|
TR 33.833
|
REL 13
|
Study on Security issues to support Proximity Services (ProSe)
|
TR 33.834
|
REL 16
|
Study on Long Term Key Update Procedures (LTKUP)
|
TR 33.835
|
REL 16
|
Study on Authentication and Key Management
for Applications based on 3GPP Credential in 5G
|
TR 33.836
|
REL 16
|
Study on Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X)
|
TR 33.838
|
REL 11
|
Study on Protection against Unsolicited Communication for IMS (PUCI)
|
TR 33.839
|
REL 17
|
Study on Security aspects of enhancement of support for Edge Computing in 5G Core (5GC)
|
TR 33.841
|
REL 16
|
Study on the support of 256-bit Algorithms for 5G
|
TR 33.843
|
REL 15
|
Study on Security aspect of Architecture enhancements
to ProSe UE-to-Network Relay
|
TR 33.844
|
REL 11
|
Security Study on IMS Based Peer-to-Peer Content Distribution Services
|
TR 33.845
|
REL 17
|
Study on Storage and Transport of 5G Core (5GC) Security parameters
for Authentication Credential Repository Processing Function (ARPF) authentication
|
TR 33.846
|
REL 17
|
Study on Authentication enhancements in the 5G System (5GS)
|
TR 33.847
|
REL 17
|
Study on Security aspects of enhancement for Proximity based services in the 5G System (5GS)
|
TR 33.848
|
REL 18
|
Study on Security impacts of Virtualisation
|
TR 33.849
|
REL 14
|
Study on Subscriber Privacy impact in 3GPP
|
TR 33.850
|
REL 17
|
Study on Security aspects of enhancements for 5G Multicast-Broadcast Services (MBS)
|
TR 33.851
|
REL 17
|
Study on Security for enhanced support of Industrial Internet of Things (IIoT)
|
TR 33.853
|
REL 17
|
Study on key issues and potential solutions
for integrity protection of the User Plane (UP)
|
TR 33.854
|
REL 17
|
Study on Security aspects of Uncrewed Aerial Systems (UAS)
|
TR 33.855
|
REL 16
|
Study on Security aspects of the 5G Service Based Architecture (SBA)
|
TR 33.856
|
REL 16
|
Study on Security aspects
of Single Radio Voice Continuity from 5G to UTRAN
|
TR 33.857
|
REL 17
|
Study on enhanced Security support for Non-Public Networks (NPN)
|
TR 33.858
|
REL 18
|
Study on Security aspects of enhanced support of Non-Public Networks (NPN) –
Phase 2
|
TR 33.859
|
REL 11
|
Study on the Introduction of Key Hierarchy in UTRAN
|
TR 33.860
|
REL 13
|
Study on enhanced General Packet Radio Service (EGPRS) Access Security enhancements
with relation to Cellular Internet of Things (IoT)
|
TR 33.861
|
REL 16
|
Study on evolution of Cellular Internet of Things (CIoT) Security for the 5G System
|
TR 33.862
|
REL 17
|
Study on security aspects of the Message Service for MIoT over the 5G System (MSGin5G)
|
TR 33.863
|
REL 14
|
Study on Battery efficient Security
for Very Low Throughput Machine Type Communication (MTC) Devices
|
TR 33.864
|
REL 17
|
Study on the Security of Access and Mobility Management Function (AMF) re-allocation
|
TR 33.866
|
REL 17
|
Study on Security aspects of enablers for Network Automation (eNA) for the 5G system (5GS) Phase 2
|
TR 33.867
|
REL 17
|
Study on user consent for 3GPP services
|
TR 33.868
|
REL 12
|
Study on Security aspects of MTC
and other Mobile Data Applications Communications enhancements
|
TR 33.871
|
REL 12
|
Study on Security for WebRTC IMS Client Access to IMS
|
TR 33.872
|
REL 13
|
Study on Security enhancements
to Web Real Time Communication (WebRTC) Access to IMS
|
TR 33.873
|
REL 17
|
Study on the Security of the System Enablers
for devices having Multiple Universal Subscriber Identity Modules (MUSIM)
|
TR 33.874
|
REL 18
|
Study on enhanced Security for Network Slicing Phase 2
|
TR 33.875
|
REL 18
|
Study on enhanced Security aspects of the 5G Service Based Architecture (SBA)
|
TR 33.876
|
REL 18
|
Study on Automated Certificate Management in Service-Based Architecture (SBA)
|
TR 33.877
|
REL 18
|
Study on the Security aspects of Artificial Intelligence (AI)/Machine Learning (ML)
for the Next Generation Radio Access Network (NG-RAN)
|
TR 33.879
|
REL 13
|
Study on Security enhancements
for Mission Critical Push To Talk (MCPTT) over LTE
|
TR 33.880
|
REL 15
|
Study on Mission Critical Security enhancements
|
TR 33.881
|
REL 17
|
Study on Non-Seamless WLAN Offload (NSWO) in 5G System (5GS) using 3GPP credentials
|
TR 33.882
|
REL 18
|
Study on Personal IoT Networks Security aspects
|
TR 33.883
|
REL 18
|
Study on Security enhancements for 5G Multicast-Broadcast services
Phase 2
|
TR 33.884
|
REL 18
|
Study on Security of Application enablement aspects for
Subscriber-aware Northbound API access
|
TR 33.885
|
REL 14
|
Study on Security aspects
for LTE support of V2X Services
|
TR 33.886
|
REL 18
|
Study on enhanced Security for Network Slicing –
Phase 3
|
TR 33.887
|
REL 18
|
Study on Security aspects for support for
5G Wireless and Wireline Convergence (5WWC) –
Phase 2
|
TR 33.888
|
REL 12
|
Study on Security issues
to support Group Communication System Enablers (GCSE) for LTE
|
TR 33.889
|
REL 13
|
Study on Security aspects
of Machine-Type Communications (MTC) Architecture and Feature enhancements
|
TR 33.890
|
REL 18
|
Study on Security support for Next Generation Real Time Communication services
|
TR 33.891
|
REL 18
|
Study on Security of Phase 2 for
Uncrewed Aerial System (UAS), Uncrewed Aerial Vehicle (UAV) and Urban Air Mobility (UAM)
|
TR 33.892
|
REL 18
|
Study on UE Route Selection Policy (URSP) rules to securely identify applications
|
TR 33.893
|
REL 18
|
Study on Security aspects of Ranging-based services and Sidelink Positioning
|
TR 33.894
|
REL 18
|
Study on applicability of the zero trust security principles in mobile networks
|
TR 33.896
|
REL 18
|
Study of Security aspects on User Consent for 3GPP Services –
Phase 2
|
TR 33.897
|
REL 13
|
Study on Isolated E-UTRAN operation
for Public Safety – Security aspects
|
TR 33.898
|
REL 18
|
Study on Security and Privacy of
Artificial Intelligence/Machine Learning (AI/ML)-based services and applications in 5G
|