| ITU-T X.805 – Supplement on security guidelines for mobile virtual network operators   | 
                                  | 
                             
                            
                                Supplement 30 to ITU-T X.805 to the ITU-T X-series of Recommendations provides security guidelines for mobile virtual network operators (MVNOs). Security is very important to MVNOs and most MVNOs have a lot of security similarities. This Supplement analyses the main features of MVNOs and the typical security threats that they face. Based on the structure of MVNOs, this Supplement provides a security framework for MVNOs, including security objectives and security requirements.  | 
                             
                         
                     | 
                 
                
                    | 
                        
                     | 
                 
             
        
    
 
    
    
    
 
                     | 
		
		
			
                        
				
					
						
                                    
    
    
        
            | Title | 
            Approved on | 
            Download | 
         
        
                
                    | 
                        Guidelines for identity-based cryptosystems used for cross-domain secure communications
                     | 
                    
                        2023
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Overview of hybrid approaches for key exchange with quantum key distribution
                     | 
                    
                        2022
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Guidelines for security management of using artificial intelligence technology
                     | 
                    
                        2022
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Successful use of security standards (2nd edition)
                     | 
                    
                        2020
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Description of the incubation mechanism and ways to improve it
                     | 
                    
                        2020
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Strategic approaches to the transformation of security studies
                     | 
                    
                        2020
                     | 
                    
                        here
                     | 
                 
            
     
    
 
    
    
 
                                
					 
				 
			 
                     |