id
stringlengths 4
12
| title
stringlengths 8
250
| type
stringclasses 2
values | version
stringclasses 612
values | working_group
stringclasses 30
values | url
stringlengths 65
81
| scope
stringlengths 0
65.7k
|
---|---|---|---|---|---|---|
32.602 | Telecommunication management; Configuration Management (CM); Basic CM Integration Reference Point (IRP); Information Service (IS) | TS | 16.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.602/32602-g00.zip | |
32.606 | Telecommunication management; Configuration Management (CM); Basic CM Integration Reference Point (IRP); Solution Set (SS) definitions | TS | 16.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.606/32606-g00.zip | |
32.611 | Telecommunication management; Configuration Management (CM); Bulk CM Integration Reference Point (IRP): Requirements | TS | 16.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.611/32611-g00.zip | |
32.612 | Telecommunication management; Configuration Management (CM); Bulk CM Integration Reference Point (IRP): Information Service (IS) | TS | 16.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.612/32612-g00.zip | |
32.616 | Telecommunication management; Configuration Management (CM); Bulk CM Integration Reference Point (IRP); Solution Set (SS) definitions | TS | 16.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.616/32616-g00.zip | |
32.661 | Telecommunication management; Configuration Management (CM); Kernel CM Requirements | TS | 16.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.661/32661-g00.zip | |
32.662 | Telecommunication management; Configuration Management (CM); Kernel CM Information Service (IS) | TS | 16.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.662/32662-g00.zip | |
32.666 | Telecommunication management; Configuration Management (CM); Kernel CM Integration Reference Point (IRP); Solution Set (SS) definitions | TS | 16.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.666/32666-g00.zip | |
32.690 | Telecommunication management; Inventory Management (IM); Requirements | TS | 16.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.690/32690-g00.zip | |
32.845 | Charging management; Study on charging aspects of network slicing | TR | 16.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.845/32845-g00.zip | The present document studies the charging aspects of network slicing based on TS 23.501 [201], TS 23.502 [202], TS 28.541 [221], TS 28.530 [203] and TS 28.531 [204] Release15 specifications:
- Charging scenarios and potential requirements for different business and service model (e.g. B2B Services, NSaaS) using network slice.
- The possible charging aspects for network slice management, including the impact on charging architecture charging function and charging procedures.
The stage 1 requirements from TS 22.261 [102] Release 15 and the open issues on network slicing topic that are for further study in TR 32.899 [60] also are considered in this study. |
32.901 | Telecommunication management; Study on User Data Convergence (UDC) information model handling and provisioning: Example use cases | TR | 16.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.901/32901-g00.zip | |
32.972 | Telecommunication management;Study on system and functional aspects of energy efficiency in 5G networks | TR | 16.1.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.972/32972-g10.zip | |
33.102 | 3G security; Security architecture | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.102/33102-g00.zip | |
33.105 | 3G Security; Cryptographic algorithm requirements | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.105/33105-g00.zip | |
33.106 | 3G security; Lawful interception requirements | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.106/33106-g00.zip | |
33.107 | 3G security; Lawful interception architecture and functions | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.107/33107-g00.zip | |
33.108 | 3G security; Handover interface for Lawful Interception (LI) | TS | 16.5.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.108/33108-g50.zip | |
33.110 | Key establishment between a Universal Integrated Circuit Card (UICC) and a terminal | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.110/33110-g00.zip | |
33.116 | Security Assurance Specification (SCAS) for the MME network product class | TS | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.116/33116-g10.zip | |
33.117 | Catalogue of general security assurance requirements | TS | 16.10.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.117/33117-ga0.zip | |
33.122 | Security aspects of Common API Framework (CAPIF) for 3GPP northbound APIs | TS | 16.4.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.122/33122-g40.zip | |
33.126 | Lawful Interception requirements | TS | 16.5.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.126/33126-g50.zip | |
33.127 | Lawful Interception (LI) architecture and functions | TS | 16.14.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.127/33127-ge0.zip | |
33.128 | Security; Protocol and procedures for Lawful Interception (LI); Stage 3 | TS | 16.20.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.128/33128-gk0.zip | |
33.141 | Presence service; Security | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.141/33141-g00.zip | |
33.163 | Battery Efficient Security for very low throughput Machine Type Communication (MTC) devices (BEST) | TS | 16.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.163/33163-g20.zip | |
33.180 | Security of the Mission Critical (MC) service | TS | 16.12.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.180/33180-gc0.zip | |
33.185 | Security aspect for LTE support of Vehicle-to-Everything (V2X) services | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.185/33185-g00.zip | |
33.187 | Security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.187/33187-g00.zip | |
33.203 | 3G security; Access security for IP-based services | TS | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.203/33203-g10.zip | |
33.220 | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) | TS | 16.4.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.220/33220-g40.zip | |
33.204 | 3G Security; Network Domain Security (NDS); Transaction Capabilities Application Part (TCAP) user security | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.204/33204-g00.zip | |
33.216 | Security Assurance Specification (SCAS) for the evolved Node B (eNB) network product class | TS | 16.7.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.216/33216-g70.zip | |
33.210 | Network Domain Security (NDS); IP network layer security | TS | 16.4.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.210/33210-g40.zip | |
33.221 | Generic Authentication Architecture (GAA); Support for subscriber certificates | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.221/33221-g00.zip | |
33.222 | Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS) | TS | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.222/33222-g10.zip | |
33.223 | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.223/33223-g00.zip | |
33.224 | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) push layer | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.224/33224-g00.zip | |
33.234 | 3G security; Wireless Local Area Network (WLAN) interworking security | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.234/33234-g00.zip | |
33.246 | 3G Security; Security of Multimedia Broadcast/Multicast Service (MBMS) | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.246/33246-g00.zip | |
33.250 | Security assurance specification for the PGW network product class | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.250/33250-g00.zip | |
33.259 | Key establishment between a UICC hosting device and a remote device | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.259/33259-g00.zip | |
33.303 | Proximity-based Services (ProSe); Security aspects | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.303/33303-g00.zip | |
33.310 | Network Domain Security (NDS); Authentication Framework (AF) | TS | 16.16.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.310/33310-gg0.zip | |
33.320 | Security of Home Node B (HNB) / Home evolved Node B (HeNB) | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.320/33320-g00.zip | |
33.328 | IP Multimedia Subsystem (IMS) media plane security | TS | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.328/33328-g10.zip | |
33.401 | 3GPP System Architecture Evolution (SAE); Security architecture | TS | 16.4.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.401/33401-g40.zip | |
33.402 | 3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.402/33402-g00.zip | |
33.434 | Security aspects of Service Enabler Architecture Layer (SEAL) for verticals | TS | 16.3.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.434/33434-g31.zip | |
33.501 | Security architecture and procedures for 5G System | TS | 16.18.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/33501-gi0.zip | |
33.511 | Security Assurance Specification (SCAS) for the next generation Node B (gNodeB) network product class | TS | 16.12.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.511/33511-gc0.zip | |
33.512 | 5G Security Assurance Specification (SCAS); Access and Mobility management Function (AMF) | TS | 16.6.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.512/33512-g60.zip | |
33.513 | 5G Security Assurance Specification (SCAS); User Plane Function (UPF) | TS | 16.3.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.513/33513-g30.zip | |
33.514 | 5G Security Assurance Specification (SCAS) for the Unified Data Management (UDM) network product class | TS | 16.5.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.514/33514-g50.zip | |
33.515 | 5G Security Assurance Specification (SCAS) for the Session Management Function (SMF) network product class | TS | 16.4.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.515/33515-g40.zip | |
33.516 | 5G Security Assurance Specification (SCAS) for the Authentication Server Function (AUSF) network product class | TS | 16.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.516/33516-g20.zip | |
33.517 | 5G Security Assurance Specification (SCAS) for the Security Edge Protection Proxy (SEPP) network product class | TS | 16.3.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.517/33517-g30.zip | |
33.518 | 5G Security Assurance Specification (SCAS) for the Network Repository Function (NRF) network product class | TS | 16.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.518/33518-g20.zip | |
33.519 | 5G Security Assurance Specification (SCAS) for the Network Exposure Function (NEF) network product class | TS | 16.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.519/33519-g20.zip | |
33.536 | Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services | TS | 16.5.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.536/33536-g50.zip | |
33.807 | Study on the security of the wireless and wireline convergence for the 5G system architecture | TR | 16.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.807/33807-g01.zip | The scope of the present document is:
- Study for security between a 5G-RG and 5GC.
- Study for security for a 3GPP UE and non 3GPP UE behind a 5G-RG or a FN RG.
- Study for security for supporting legacy RG. The scope is limited based on the conclusion of the study in TR 23.716 [2].
- Study for security for trusted non-3GPP access.
- The privacy issues in the convergence architecture, if any. |
33.808 | KDF negotiation for 5GS security – phase2 | TR | 0.3.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.808/33808-030.zip | The scope of this document is the following:
• Study security for allowing KDF negotiation between UE and 5GS network entities
◦ Study the need for KDF negotiation between UE and 5GS network functions, e.g., UE and 5G RAN, UE and SEAF, etc.
◦ Security for potential KDF negotiation procedures between UE and 5GS network functions, e.g., 5G RAN, AMF, SEAF, AUSF, and UDM. |
33.813 | Study on security aspects of network slicing enhancement | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.813/33813-g00.zip | |
33.814 | Study on the security of the enhancement to the 5G Core (5GC) location services | TR | 16.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.814/33814-g01.zip | The scope of the present document is to analyse the security aspects of location service in 5G system and ensure the security solutions are aligned with the work in SA1 (i.e. in TS 22.261 [2] and TR 22.872 [3]) and SA2 (i.e. in TR 23.731 [4]). The work is comprised of the following parts:
- Study the security key issues, threats and requirements of location service in 5G system.
- Elaborate on the potential security solutions to cover these requirements.
Both non-roaming and roaming scenarios will be considered. |
33.815 | Study on security aspects of Provision of Access to Restricted Local Operator Services by Unauthenticated UEs (PARLOS) | TR | 16.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.815/33815-g01.zip | The present document will examine potential security and privacy threat scenarios enabled by PARLOS, evaluate whether solutions need to be found for these and, if required, identify security solutions and approaches which can mitigate the identified security and privacy threat scenarios while meeting the US regulatory obligations spelled out in the referenced regulations. The present document will make recommendations on the solutions considered.
The present document will consider user notification regarding security and privacy risks when using PARLOS.
The present document will consider the applicability of external security and privacy standards (e.g. Payment Card Industry Data Security Standard) to PARLOS. |
33.819 | Study on security enhancements of 5G System (5GS) for vertical and Local Area Network (LAN) services | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.819/33819-g10.zip | The present document studies security enhancements to 5GS that are required to fulfil Stage-1 service requirements in vertical domains defined in TS 22.261 [1] and TS 22.104 [2] and addresses the solutions described by TR 23.734 [3] and TR 23.725 [4] studies.
Potential security requirements are provided and possible security architecture enhancements to 5GS in vertical domains are proposed that support these security requirements. |
33.825 | Study on the security of Ultra-Reliable Low-Latency Communication (URLLC) for the 5G System (5GS) | TR | 16.0.1 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.825/33825-g01.zip | The present document:
- Investigates and identifies the security key issues for meeting the low latency requirement.
- Investigates and identifies the security key issues for meeting the ultra-high reliability requirement.
- Provides potential security requirements to address the identified security issues.
- Provides the potential security solutions to support URLLC services. |
33.834 | Study on Long Term Key Update Procedures (LTKUP) | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.834/33834-g10.zip | The present document is a study on the remote update of 3GPP long term secret keys held in a SIM / USIM.
It:
- Identifies which Long Term Keys should be updatable within this proposed feature.
- Identifies the 3GPP/non 3GPP elements that would be affected by the update of these keys.
- Identifies the Key Issues relating to the updating of long term keys.
- Identifies potential requirements for the updating of long term keys.
- Identifies the applicability of Long Term Key Updating to GSM, UMTS, LTE and 5G and how the requirements may change across these technologies.
- Identifies solutions for the updating of long term keys.
- Evaluates solutions for the updating of long term keys.
- Concludes on the best solutions(s) for the updating of long term keys.
- Makes recommendations for further work.
This study will consider existing and new solutions that can be used for the update of 3GPP Long Term Keys.
The management of subscriptions is out of scope for the present document. |
33.835 | Study on authentication and key management for applications based on 3GPP credential in 5G | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.835/33835-g10.zip | The present document specifies key issues, derived requirements and potential solutions to support authentication and key management aspects for applications and 3GPP services based on 3GPP credentials in 5G, including the IoT use case. It analyses issues and requirements for:
- providing authentication and key management procedures to applications and 3GPP services in 5G scenarios which allow the UE to securely exchange data with an application server;
- decoupling these procedures from the transport protocol, in order to allow for the adaption to different application layer protocols.
The present document takes into account new solutions as well as potential adaptations to existing ones such as GBA described in TS 33.220 and BEST described in TS 33.163, in order to support the above mentioned requirements with procedures and protocols defined in SBA. |
33.836 | Study on security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.836/33836-g10.zip | The scope of the present document is to provide security and privacy analysis of eV2X system architecture, derive potential security and privacy requirements, and evaluate security and privacy solutions for protection of it. The security aspects to be considered are as follows:
- Security and privacy for new interfaces in 5G eV2X system architecture, compared to TS 23.285 [2]
- Security and privacy for eV2X unicast over PC5
- Security and privacy for eV2X group communication over PC5
- Other security and privacy issues related to eV2X services, if there is any |
33.841 | Study on the support of 256-bit algorithms for 5G | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.841/33841-g10.zip | The present document details the following:
- An assessment of threats and potential countermeasures posed due to quantum computing and a resulting assessment of relevant countermeasures in the 5G system.
- An assessment of the timelines for the introduction of any countermeasures, in particular the increase of key lengths to 256 bits. This includes an alignment with the timeline for strengthening asymmetric cryptographic algorithms used in 5G systems.
- An assessment of which parts of the 5G system will be affected and in which way.
- A Study of full entropy 256 bit keys in the 5G key hierarchy, beginning with the permanent pre-shared key. Including a study into modifying the derivation algorithms in order to derive child keys from the 256-bit master key instead of the 128-bit key.
- A study to determine whether a longer MAC is appropriate for 5G.
- A study of the coexistence of different size keys. In 3GPP networks, 256-bit keys in 5G will need to coexist with 128-bit keys in legacy networks or earlier 5G phases. This includes storage of keys and separate key derivation algorithms both on the UE and in the core network.
- A study into the desired number of 256-bit algorithms, e.g. if two 256-bit AKA key generation algorithm sets are needed.
- A study of the desired performance aspects for the new 256-bit algorithms taking into account software and hardware aspects.
- A study of key size negotiation.
- A study into whether the current methods for distribution and refresh of security keys are equally applicable to larger key sizes and can remain the same.
- A study into the Encryption and integrity algorithms that could be needed. This includes 256-bit session/intermediate keys in 5G, may, in some cases, simply entail using larger-key versions of current algorithms, while in other cases new algorithms may need to be chosen altogether.
- Recommendations for suitable requirements for the needed algorithms for use with 256-bit keys and ask ETSI SAGE to provide those algorithms. |
33.845 | Study on storage and transport of 5G Core (5GC) security parameters for Authentication Credential Repository Processing Function (ARPF) authentication | TR | 0.7.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.845/33845-070.zip | |
33.848 | Study on security impacts of virtualisation | TR | 0.15.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.848/33848-0f0.zip | |
33.853 | Study on key issues and potential solutions for integrity protection of the User Plane (UP) | TR | 1.6.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.853/33853-160.zip | |
33.855 | Study on security aspects of the 5G Service Based Architecture (SBA) | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.855/33855-g10.zip | 3GPP TS 23.501 [2] defines 5G services with a new service based architecture (SBA) approach.
The present document reviews the interactions in this new architecture, determines key issues relating to the security of SBA elements and interfaces, details potential solutions and recommends normative work . |
33.856 | Study on security aspects of single radio voice continuity from 5G to UTRAN | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.856/33856-g10.zip | The present document studies the security aspects of single radio voice continuity from 5G to UTRAN CS. In particular, the goal of the present document is to study the impacts on 3GPP security architecture which may result from 5GS to UTRAN CS voice continuity, e.g. security context mapping from 5G and UTRAN, security procedure for the emergency call, etc. |
33.861 | Study on evolution of Cellular Internet of Things (CIoT) security for the 5G System | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.861/33861-g10.zip | The present document studies the following:
- Capture massive MTC related 5G requirements in other 3GPP documents and further analyse them from security point of view.
- Study security for supporting EPS CIoT/MTC functionalities in 5GS, e.g.:
- security for infrequent and frequent small data transmission
- security for inter-RAT mobility to/from NB-IoT or modifications in the EPC-5GC interworking security specific to CIoT.
- Study security enhancements based on the architectural study in TR 23.724 [2], e.g.:
- security for transport of user plane over 5G NAS; or
- termination of user plane security in 5GC.
- Study the security aspects of the architectural enhancements addressing the 5G service requirements in TS 22.261 [3] and TR 38.913 [4].
- Study the need for additional mechanisms to improve protection of the network from maliciously behaving IoT devices |
33.905 | Recommendations for Trusted Open Platforms | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.905/33905-g00.zip | |
33.916 | Security Assurance Methodology (SECAM) for 3GPP network products | TR | 16.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.916/33916-g10.zip | |
33.919 | 3G Security; Generic Authentication Architecture (GAA); System description | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.919/33919-g00.zip | |
33.924 | Identity management and 3GPP security interworking; Identity management and Generic Authentication Architecture (GAA) interworking | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.924/33924-g00.zip | |
33.926 | Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes | TR | 16.8.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.926/33926-g80.zip | |
33.935 | Study on detailed Long Term Key Update Process (LTKUP) detailed solutions | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.935/33935-g00.zip | |
33.937 | Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI) | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.937/33937-g00.zip | |
33.969 | Study on security aspects of Public Warning System (PWS) | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.969/33969-g00.zip | |
33.980 | Liberty Alliance and 3GPP security interworking; Interworking of Liberty Alliance Identity Federation Framework (ID-FF), Identity Web Services Framework (ID-WSF) and Generic Authentication Architecture (GAA) | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.980/33980-g00.zip | |
33.995 | Study on security aspects of integration of Single Sign-On (SSO) frameworks with 3GPP operator-controlled resources and mechanisms | TR | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.995/33995-g00.zip | |
34.109 | Terminal logical test interface; Special conformance testing functions | TS | 16.0.0 | R2 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.109/34109-g00.zip | |
34.121-1 | User Equipment (UE) conformance specification; Radio transmission and reception (FDD); Part 1: Conformance specification | TS | 16.2.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.121-1/34121-1-g20.zip | The present document specifies the UTRA measurement procedures for the conformance test of the user equipment (UE) that contain transmitting characteristics, receiving characteristics and performance requirements in addition to requirements for support of RRM (Radio Resource Management) in FDD mode. In addition it specifies conformance testing of RRM requirements for support of E-UTRA when the UE operates in UTRA mode.
NOTE: Conformance testing of RRM requirements for support of UTRA when the UE operates in E-UTRA mode are specified in TS 36.521-3 [38].
The requirements are listed in different clauses only if the corresponding parameters deviate. More generally, tests are only applicable to those mobiles that are intended to support the appropriate functionality. To indicate the circumstances in which tests apply, this is noted in the "definition and applicability" part of the test.
For example only Release 5 and later UE declared to support HSDPA shall be tested for this functionality. In the event that for some tests different conditions apply for different releases, this is indicated within the text of the test itself. |
34.123-3 | User Equipment (UE) conformance specification; Part 3: Abstract test suite (ATS) | TS | 16.3.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.123-3/34123-3-g30.zip | |
34.124 | Electromagnetic compatibility (EMC) requirements for mobile terminals and ancillary equipment | TS | 16.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.124/34124-g00.zip | |
34.131 | Test Specification for C-language binding to (Universal) Subscriber Interface Module ((U)SIM) Application Programming Interface (API) | TS | 16.0.0 | C6 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.131/34131-g00.zip | |
34.229-1 | Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 1: Protocol conformance specification | TS | 16.8.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-1/34229-1-g80.zip | |
34.229-2 | Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 2: Implementation Conformance Statement (ICS) specification | TS | 16.11.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-2/34229-2-gb0.zip | |
34.229-3 | Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 3: Abstract test suite (ATS) | TS | 16.9.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-3/34229-3-g90.zip | |
34.229-5 | Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 5: Protocol conformance specification using 5G System (5GS) | TS | 16.11.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-5/34229-5-gb0.zip | |
34.926 | Electromagnetic compatibility (EMC); Table of international requirements for mobile terminals and ancillary equipment | TR | 16.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.926/34926-g00.zip | |
35.201 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.201/35201-g00.zip | |
35.202 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.202/35202-g00.zip | |
35.203 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data | TS | 16.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.203/35203-g00.zip |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.