PDF-3GPP TSG SA WG3 Security

Author : lois-ondreau | Published Date : 2015-10-05

151 09 13 February 2004 Edinburgh Scotland UK Draft Reply to N4031152 S3030672 on use of authentication re attempt IEWork Items Attachments SA3 thanks CN4 for

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "3GPP TSG SA WG3 Security " is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

3GPP TSG SA WG3 Security : Transcript


151 09 13 February 2004 Edinburgh Scotland UK Draft Reply to N4031152 S3030672 on use of authentication re attempt IEWork Items Attachments SA3 thanks CN4 for their analysis of the use of. Draft Reply to S3-030672 on use of authentication re-attempt IEWork Items: UTRAN network access security 3GPP SA3 3GPP CN4 Cc: Contact Person:Name: Colin BlanchardTel. Number: +44 1473 6 3GPP TSG CN WG4 Meeting #21 N4-031152 Bangkok, Thailand, 27 3GPP CN1 455ge/09/TR/00/021 Issue 1 British Telecommunications plc (2000) Page 1 of 2 Source: BT Subject: SOME NOTES ON 3GPP TSG CN1 SIP #1 MEETING 17OCTOBER 2000, SOPHIA ANTIPOLIS, FRANCE Pur 3GPP TSG CN Plenary Meeting #19 NP 12 - 14th March 2003. Birmingham, U.K. Source: 3GPP TSG CN2 Title: WID, Enhancement of dialled service for CAMEL in Release 6 Agenda item: 9.11 Document for: APP Agenda item: 6.9.2 GBA User identity transformSource: HuaweiDiscussion and Decision With the requirements and principles for bootstrapping in TS 33.220, the existing protocol and infrastructure shou It is proposed in this contribution that IMS AKA shall be one option for the operators to authenticate the IM the operators policy states that IMS AKA should be used TS33.203 shall provide with the a Source: BT Group Contact: Colin Blanchard colin.blanchard@bt.com Title: Use of the same algorithms for encryption of VGCS-calls as for normal GSM-speech Document for: Discussion and decision Agen Both EAP-SIM and EAP-AKA authentication mechanisms include an identity privacy support feature based on the utilisation of pseudonyms: During an authentication procedure, the Authenticator node (the A Title: Reply to N4-031152 (S3-030672) on use of authentication re-attempt IEWork Items: UTRAN network access security SA3 thanks CN4 for their analysis of the use of the 'Re-attempt' parameter in . Adrian Scrase. Head of 3GPP MCC, . ETSI CTO. What is 3GPP?. . Organizational Partners. 6 Regional standards organizations. (Asia, Europe & North America). . Market Representative Partners. 13 Market partners representing the broader industry. 1 TABLE OF CONTENTS ................................ ................................ ................................ .............................. 1 1. INTRODUCTION ................................ 3GPP SA3 - 5G SECURITY THIS TALK Short introduction about me and some words on 3GPP SA3. Major changes since 4G, what do we really get? Unified authentication framework for both 3GPP and non - 3GPP a 21- 24 May2001-05-23Phoenix USA 3GPP TSG-T2 12Beverley Hills CaliforniaFebruary 12th 16th 2001Agenda Item Security Analysis Activity96 MExE SecurityT WG23GPP TSG-SA WG3 Revised MExE Security Analysis SA3 Chairman, Ericsson. Mirko Cano Soveri, . SA3 Secretary, MCC. Alex Leadbeater, . SA3-LI Chairman, BT. Carmine Rizzo,. SA3-LI Secretary, MCC. Highlights!. SA3 meeting schedule. Q3 meeting schedule impacted by the June plenary shift.

Download Document

Here is the link to download the presentation.
"3GPP TSG SA WG3 Security "The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents