id stringlengths 5 12 | title stringlengths 8 250 | type stringclasses 2
values | version stringclasses 560
values | working_group stringclasses 30
values | url stringlengths 67 81 | scope stringlengths 0 65.7k |
|---|---|---|---|---|---|---|
32.661 | Telecommunication management; Configuration Management (CM); Kernel CM Requirements | TS | 15.1.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.661/32661-f10.zip | |
32.616 | Telecommunication management; Configuration Management (CM); Bulk CM Integration Reference Point (IRP); Solution Set (SS) definitions | TS | 15.1.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.616/32616-f10.zip | |
32.666 | Telecommunication management; Configuration Management (CM); Kernel CM Integration Reference Point (IRP); Solution Set (SS) definitions | TS | 15.1.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.666/32666-f10.zip | |
32.690 | Telecommunication management; Inventory Management (IM); Requirements | TS | 15.1.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.690/32690-f10.zip | |
32.848 | Study on Volume based charging aspects for Voice Over LTE (VoLTE) | TR | 15.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.848/32848-f00.zip | The present document studies requirements, architecture, and possible functional enhancements of volume based charging for VoLTE.
The study investigates how to associate the identifiers of caller and callee with volume based charging for VoLTE.
The study investigates how to support the volume based charging for differe... |
32.662 | Telecommunication management; Configuration Management (CM); Kernel CM Information Service (IS) | TS | 15.1.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.662/32662-f10.zip | |
32.857 | Study on management aspects of selected Internet of Things (IoT)-related features | TR | 15.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.857/32857-f00.zip | This document investigates management aspects of LTE IoT related functionalities such as eMTC and NB-IoT RAN Features, to identify functionalities that should be added to the existing 3GPP OAM specifications. The document outlines basic use cases, sets potential requirements and suggests potential solutions. |
32.864 | Telecommunication management;Study on management aspects of virtualized network functions that are part of the New Radio (NR) | TR | 15.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.864/32864-f00.zip | The present document studies on the management of virtualized network functions that are part of the NR that includes the following aspects:
- The management use cases and requirements for the virtualized network functions that are part of the NR, and their relations with non-virtualized part of the RAN and the core ne... |
32.865 | Study on Operations, Administration and Maintenance (OAM) aspects of Self-Organizing Network (SON) for Active Antenna System (AAS) based deployments | TR | 15.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.865/32865-f00.zip | The present document studies the OAM aspects of SON (Self-Organizing Network) for AAS (Active Antenna Systems) based deployments in LTE.
The study includes use cases, potential requirements and possible solutions of OAM aspects of SON for AAS-based deployments in LTE, for both OAM centralized architecture and eNB distr... |
32.866 | Telecommunication management;Study on a REST(REpresentational State Transfer)-ful HTTP-based Solution Set (SS) | TR | 15.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.866/32866-f00.zip | The present document evaluates REST, HTTP and JSON for their applicability to design and implement management interfaces. It provides also best practices and guidelines for designing management interfaces with REST, HTTP and JSON. |
32.867 | Telecommunication management;Study on management enhancement of Control and User Plane Split (CUPS) of Evolved Packet Core (EPC) nodes | TR | 15.1.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.867/32867-f10.zip | |
32.856 | Study on Operations, Administration and Maintenance (OAM) support for assessment of energy efficiency in mobile access networks | TR | 15.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.856/32856-f00.zip | The present document reports how 3GPP OAM specifications can provide support for the assessment of energy efficiency in radio access networks as defined by ETSI ES 203 228 [2], thanks to measuring both network performance and energy consumption. It provides a gap analysis between ETSI ES 203 228 [2] and 3GPP OAM Techni... |
32.869 | Telecommunication management; Charging management; Study on Overload Control for Diameter Charging Applications | TR | 15.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.869/32869-f00.zip | The present document studies the overload control mechanisms for Rc, Re, Rf and Ro interfaces based on the conclusion of TR 29.809 [212].
For 3GPP Diameter Charging interfaces, the Diameter overload control mechanism are based on the IETF Draft "Diameter Overload Indication Conveyance" that defines the AVPs for the tra... |
32.868 | Telecommunication management;Study on Operations, Administration and Maintenance (OAM) aspects of Long Term Evolution (LTE) and Wireless LAN (WLAN) integration | TR | 15.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.868/32868-f00.zip | The present document studies the following OAM aspects of LWA (for both co-located and non-co-located deployment scenarios) and LWIP, based on the solutions defined by 3GPP RAN WGs:
- the WLAN related information needs to be configured to the eNB to support LWA and LWIP.
- how the 3GPP management system manages the WT ... |
32.871 | Study on policy management for mobile networks based on Network Function Virtualization (NFV) scenarios | TR | 15.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.871/32871-f00.zip | From mobile service and network function management perspective, the present document studies the end-to-end network policy management for mobile network based on NFV scenarios:
- Study the concepts and classification of the policy management for mobile networks based on the NFV scenarios, analyse and classify the pote... |
32.870 | Telecommunication management;Charging management;Study on forward compatibility for 3GPP Diameter charging applications | TR | 15.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.870/32870-f00.zip | The present document studies forward compatibility for 3GPP Charging Applications over Rf and Ro Reference Points, specified by using IETF Diameter protocol.
In particular, it is investigated how to conform with TR 29.819 [413] conclusion on Diameter extensibility rules, per following clause 5.3.1.4 statement:
"For 3GP... |
32.899 | Telecommunication management; Charging management;Study on charging aspects of 5G system architecture phase 1 | TR | 15.1.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.899/32899-f10.zip | The present document studies the charging architecture, principles and functionalities for a 5G System Phase 1 specified in TS 23.501 [201] and TS 23.502 [202], based on the TR 23.799 [200] conclusions.
The stage 1 requirements from TS 22.115 [101] and TS 22.261 [102] are also input for this study.
The charging archite... |
32.880 | Telecommunication management;Study on implementation for the partitioning of Itf-N | TR | 15.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.880/32880-f00.zip | The present document examines the IRP Information Service (IS) of Itf-N from existing TS 32-series specifications and identifies one subset of IRP functionality according to the IRP requirements in TR 32.861[2], also studies diverse solution sets and compares them between each other on efficiency and complexity. Finall... |
32.972 | Telecommunication management;Study on system and functional aspects of energy efficiency in 5G networks | TR | 0.6.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.972/32972-060.zip | |
33.102 | 3G security; Security architecture | TS | 15.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.102/33102-f10.zip | This specification defines the security architecture, i.e., the security features and the security mechanisms, for the third generation mobile telecommunication system.
A security feature is a service capability that meets one or several security requirements. The complete set of security features address the security ... |
32.611 | Telecommunication management; Configuration Management (CM); Bulk CM Integration Reference Point (IRP): Requirements | TS | 15.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.611/32611-f00.zip | |
33.106 | 3G security; Lawful interception requirements | TS | 15.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.106/33106-f10.zip | |
33.105 | 3G Security; Cryptographic algorithm requirements | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.105/33105-f00.zip | |
33.108 | 3G security; Handover interface for Lawful Interception (LI) | TS | 15.8.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.108/33108-f80.zip | The present document specifies the handover interfaces for Lawful Interception (LI) of Packet-Data Services, Circuit Switched Services, Multimedia Services within the UMTS network and Evolved Packet System (EPS). The handover interface in this context includes the delivery of Intercept Related Information (IRI) through... |
33.107 | 3G security; Lawful interception architecture and functions | TS | 15.6.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.107/33107-f60.zip | |
33.116 | Security Assurance Specification (SCAS) for the MME network product class | TS | 15.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.116/33116-f10.zip | The present document contains objectives, requirements and test cases that are specific to the MME network product class. It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test ca... |
33.110 | Key establishment between a Universal Integrated Circuit Card (UICC) and a terminal | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.110/33110-f00.zip | |
33.122 | Security aspects of Common API Framework (CAPIF) for 3GPP northbound APIs | TS | 15.4.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.122/33122-f40.zip | |
33.117 | Catalogue of general security assurance requirements | TS | 15.5.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.117/33117-f50.zip | The present document contains objectives, requirements and test cases that are deemed applicable, possibly after adaptation, to several network product classes.
Several network product classes share very similar if not identical security requirements for some aspects. Therefore, these are collected in this "catalogue" ... |
33.127 | Lawful Interception (LI) architecture and functions | TS | 15.5.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.127/33127-f50.zip | |
33.128 | Security; Protocol and procedures for Lawful Interception (LI); Stage 3 | TS | 15.13.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.128/33128-fd0.zip | |
32.901 | Telecommunication management; Study on User Data Convergence (UDC) information model handling and provisioning: Example use cases | TR | 15.0.0 | S5 | https://www.3gpp.org/ftp/Specs/archive/32_series/32.901/32901-f00.zip | |
33.163 | Battery Efficient Security for very low throughput Machine Type Communication (MTC) devices (BEST) | TS | 15.6.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.163/33163-f60.zip | |
33.141 | Presence service; Security | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.141/33141-f00.zip | |
33.185 | Security aspect for LTE support of Vehicle-to-Everything (V2X) services | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.185/33185-f00.zip | |
33.180 | Security of the Mission Critical (MC) service | TS | 15.14.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.180/33180-fe0.zip | |
33.203 | 3G security; Access security for IP-based services | TS | 15.3.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.203/33203-f30.zip | The scope for this technical specification is to specify the security features and mechanisms for secure access to the IM subsystem (IMS) for the 3G mobile telecommunication system.
Since the scope also encompasses the use of these security features and mechanisms for secure access to IMS in the context of fixed broadb... |
33.187 | Security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements | TS | 15.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.187/33187-f10.zip | |
33.210 | Network Domain Security (NDS); IP network layer security | TS | 15.2.2 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.210/33210-f22.zip | |
33.204 | 3G Security; Network Domain Security (NDS); Transaction Capabilities Application Part (TCAP) user security | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.204/33204-f00.zip | |
33.126 | Lawful Interception requirements | TS | 15.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.126/33126-f20.zip | The present document specifies Stage 1 Lawful Interception requirements for 3GPP networks and services.
Regional interception requirements can be satisfied by meeting the correct subset of requirements from the present document. Which CSP services are subject to Lawful Interception is defined by national regulations.
T... |
33.216 | Security Assurance Specification (SCAS) for the evolved Node B (eNB) network product class | TS | 15.3.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.216/33216-f30.zip | The present document contains objectives, requirements and test cases that are specific to the eNB network product class. It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test ca... |
33.222 | Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS) | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.222/33222-f00.zip | |
33.223 | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.223/33223-f00.zip | |
33.224 | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) push layer | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.224/33224-f00.zip | |
33.221 | Generic Authentication Architecture (GAA); Support for subscriber certificates | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.221/33221-f00.zip | |
33.220 | Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) | TS | 15.4.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.220/33220-f40.zip | |
33.234 | 3G security; Wireless Local Area Network (WLAN) interworking security | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.234/33234-f00.zip | |
33.246 | 3G Security; Security of Multimedia Broadcast/Multicast Service (MBMS) | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.246/33246-f00.zip | The Technical Specification covers the security procedures of the Multimedia Broadcast/Multicast Service (MBMS) for 3GPP systems (UTRAN, GERAN and E-UTRAN). MBMS is a 3GPP system network bearer service over which many different applications could be carried. The actual method of protection may vary depending on the typ... |
33.250 | Security assurance specification for the PGW network product class | TS | 15.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.250/33250-f10.zip | The present document contains requirements and test cases that are specific to the PGW network product class. It refers to the Catalogue of General Security Assurance Requirements and formulates specific adaptions of the requirements and test cases given there, as well as specifying requirements and test cases unique t... |
33.310 | Network Domain Security (NDS); Authentication Framework (AF) | TS | 15.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.310/33310-f20.zip | |
33.303 | Proximity-based Services (ProSe); Security aspects | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.303/33303-f00.zip | |
33.259 | Key establishment between a UICC hosting device and a remote device | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.259/33259-f00.zip | |
33.401 | 3GPP System Architecture Evolution (SAE); Security architecture | TS | 15.12.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.401/33401-fc0.zip | |
33.328 | IP Multimedia Subsystem (IMS) media plane security | TS | 15.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.328/33328-f10.zip | |
33.320 | Security of Home Node B (HNB) / Home evolved Node B (HeNB) | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.320/33320-f00.zip | |
33.402 | 3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses | TS | 15.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.402/33402-f10.zip | |
33.501 | Security architecture and procedures for 5G System | TS | 15.18.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.501/33501-fi0.zip | |
33.841 | Study on the support of 256-bit algorithms for 5G | TR | 0.7.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.841/33841-070.zip | The present document details the following:
- An assessment of threats and potential countermeasures posed due to quantum computing and a resulting assessment of relevant countermeasures in the 5G system.
- An assessment of the timelines for the introduction of any countermeasures, in particular the increase of key len... |
33.842 | Study on Lawful Interception (LI) service in 5G | TR | 0.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.842/33842-000.zip | The present document is a study based on the output (both studies and normative specifications) from other 3GPP groups such as those for 5G Phase 1 as well as issues which arise out of regulatory LI requirements as well LI service specific issues such as those arising from national regulations. Potential solutions will... |
33.843 | Study on security architecture enhancements to Proximity Services (ProSe) User Equipment (UE)-to-network relay | TR | 15.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.843/33843-f10.zip | The present document contains a study of the security aspects of enhancements to ProSe UE-to-Network Relay. Its objective is to identify threats when an Evolved ProSe Remote UE with UICC connects to the network via an Evolved ProSe UE-to-Network Relay. The potential requirements are identified based on threat and the p... |
33.834 | Study on Long Term Key Update Procedures (LTKUP) | TR | 0.9.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.834/33834-090.zip | The present document is a study on the remote update of 3GPP long term secret keys held in a SIM / USIM.
It:
- Identifies which Long Term Keys should be updatable within this proposed feature.
- Identifies the 3GPP/non 3GPP elements that would be affected by the update of these keys.
- Identifies the Key Issues relatin... |
33.856 | Study on security aspects of single radio voice continuity from 5G to UTRAN | TR | 0.3.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.856/33856-030.zip | The present document studies the security aspects of single radio voice continuity from 5G to UTRAN CS. In particular, the goal of the present document is to study the impacts on 3GPP security architecture which may result from 5GS to UTRAN CS voice continuity, e.g. security context mapping from 5G and UTRAN, security ... |
33.855 | Study on security aspects of the 5G Service Based Architecture (SBA) | TR | 1.9.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.855/33855-190.zip | 3GPP TS 23.501 [2] defines 5G services with a new service based architecture (SBA) approach.
The present document reviews the interactions in this new architecture, determines key issues relating to the security of SBA elements and interfaces, details potential solutions and recommends normative work . |
33.905 | Recommendations for Trusted Open Platforms | TR | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.905/33905-f00.zip | |
33.880 | Study on mission critical security enhancements | TR | 15.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.880/33880-f10.zip | This document contains a study of the security aspects of the Mission-Critical service. It enhances the security solutions defined for MCPTT in TS 33.179 [3] to support the common functional architecture (MC_ARCH), enhancements to MCPTT (eMCPTT), data services (MCData), video services (MCVideo) and migration and interc... |
33.919 | 3G Security; Generic Authentication Architecture (GAA); System description | TR | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.919/33919-f00.zip | |
33.916 | Security Assurance Methodology (SECAM) for 3GPP network products | TR | 15.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.916/33916-f20.zip | |
33.811 | Study on security aspects of 5G network slicing management | TR | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.811/33811-f00.zip | The present document is a study on the threats, potential security requirements and solutions for the features of 5G network slicing management as described in TS 28.530 [2] and TS 28.531[3]. |
33.924 | Identity management and 3GPP security interworking; Identity management and Generic Authentication Architecture (GAA) interworking | TR | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.924/33924-f00.zip | |
33.969 | Study on security aspects of Public Warning System (PWS) | TR | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.969/33969-f00.zip | |
33.937 | Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI) | TR | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.937/33937-f00.zip | |
33.995 | Study on security aspects of integration of Single Sign-On (SSO) frameworks with 3GPP operator-controlled resources and mechanisms | TR | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.995/33995-f00.zip | |
34.108 | Common test environments for User Equipment (UE); Conformance testing | TS | 15.2.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.108/34108-f20.zip | The present document contains definitions of reference conditions and test signals, default parameters, reference radio bearer configurations used in radio bearer interoperability testing, common radio bearer configurations for other test purposes, common requirements for test equipment and generic set-up procedures fo... |
34.109 | Terminal logical test interface; Special conformance testing functions | TS | 15.0.0 | R2 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.109/34109-f00.zip | |
33.980 | Liberty Alliance and 3GPP security interworking; Interworking of Liberty Alliance Identity Federation Framework (ID-FF), Identity Web Services Framework (ID-WSF) and Generic Authentication Architecture (GAA) | TR | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.980/33980-f00.zip | |
33.926 | Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes | TR | 15.2.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/33_series/33.926/33926-f20.zip | The present document captures the network product class descriptions, threats and critical assets that have been identified in the course of the work on 3GPP security assurance specifications. The main body of the present document contains generic aspects that are believed to apply to more than one network product clas... |
34.121-1 | User Equipment (UE) conformance specification; Radio transmission and reception (FDD); Part 1: Conformance specification | TS | 15.4.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.121-1/34121-1-f40.zip | The present document specifies the UTRA measurement procedures for the conformance test of the user equipment (UE) that contain transmitting characteristics, receiving characteristics and performance requirements in addition to requirements for support of RRM (Radio Resource Management) in FDD mode. In addition it spec... |
34.123-1 | User Equipment (UE) conformance specification; Part 1: Protocol conformance specification | TS | 15.8.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.123-1/34123-1-f80.zip | The present document specifies the protocol conformance testing for the 3rd Generation User Equipment (UE).
This is the first part of a multi-part test specification. The following information can be found in this part:
- the overall test structure;
- the test configurations;
- the conformance requirement and reference... |
34.123-2 | User Equipment (UE) conformance specification; Part 2: Implementation conformance statement (ICS) proforma specification | TS | 15.7.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.123-2/34123-2-f70.zip | The present document provides the Implementation Conformance Statement (ICS) proforma for 3rd Generation User Equipment (UE), in compliance with the relevant requirements, and in accordance with the relevant guidance given in ISO/IEC 9646-7 [2] and ETS 300 406 [3].
The present document also specifies a recommended appl... |
34.121-2 | User Equipment (UE) conformance specification; Radio transmission and reception (FDD); Part 2: Implementation Conformance Statement (ICS) | TS | 15.1.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.121-2/34121-2-f10.zip | The present document provides the Implementation Conformance Statement (ICS) proforma for 3rd Generation User Equipment (UE), in compliance with the relevant requirements, and in accordance with the relevant guidance given in ISO/IEC 9646-7 [2] and ETS 300 406 [3].
The present document also specifies a recommended appl... |
34.124 | Electromagnetic compatibility (EMC) requirements for mobile terminals and ancillary equipment | TS | 15.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.124/34124-f00.zip | |
34.229-2 | Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 2: Implementation Conformance Statement (ICS) specification | TS | 15.9.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-2/34229-2-f90.zip | |
34.131 | Test Specification for C-language binding to (Universal) Subscriber Interface Module ((U)SIM) Application Programming Interface (API) | TS | 15.0.0 | C6 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.131/34131-f00.zip | |
34.926 | Electromagnetic compatibility (EMC); Table of international requirements for mobile terminals and ancillary equipment | TR | 15.0.0 | R4 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.926/34926-f00.zip | |
34.229-3 | Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); User Equipment (UE) conformance specification; Part 3: Abstract test suite (ATS) | TS | 15.8.0 | R5 | https://www.3gpp.org/ftp/Specs/archive/34_series/34.229-3/34229-3-f80.zip | |
35.202 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.202/35202-f00.zip | |
35.201 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.201/35201-f00.zip | |
35.203 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.203/35203-f00.zip | |
35.205 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.205/35205-f00.zip | This report is a description of the work undertaken by an ETSI SAGE Task Force on the design of the Milenage Algorithm Set: an example set of 3GPP Authentication and Key Generation Functions.
The 3GPP Authentication and Key Generation Functions are not standardized. An example set of these algorithms has been produced ... |
35.206 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.206/35206-f00.zip | |
35.208 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.208/35208-f00.zip | |
35.207 | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors' test data | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.207/35207-f00.zip | |
35.204 | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.204/35204-f00.zip | |
35.215 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.215/35215-f00.zip | |
35.218 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 4: Design conformance test data | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.218/35218-f00.zip | |
35.217 | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 3: Implementors' test data | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.217/35217-f00.zip | |
35.222 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 2: ZUC specification | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.222/35222-f00.zip | |
35.223 | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 3: Implementors' test data | TS | 15.0.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.223/35223-f00.zip | |
35.231 | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification | TS | 15.1.0 | S3 | https://www.3gpp.org/ftp/Specs/archive/35_series/35.231/35231-f10.zip | The present document and the other Technical Specifications in the series, TS 35.232 [15] and 35.233 [16] contain an example set of algorithms which could be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* for 3GPP systems. All seven functions are operator-specifiable rather than... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.