Contributions |
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 157 ]
|
Propose edits for final version of X.ccsec
|
China
|
Q8/17
|
2013-08-15 |
|
[ 156 ]
|
Comments on the new work item X.tfcmm
|
China Mobile Communications Corporation
|
Q5/17
|
2013-08-15 |
|
[ 155 ]
|
4th draft of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
China Mobile Communications Corporation
|
Q5/17
|
2013-08-15 |
|
[ 154 ]
|
Proposal for modifications of X.sgsec-1 : Security functional architecture for smart grid services using the telecommunication network
|
Korea Internet & Security Agency (KISA)
|
Q6/17
|
2013-08-15 |
|
[ 153 ]
|
Proposed revised text on draft Recommendation ITU-T X.msec-8: Secure application distribution framework for communication devices
|
Korea Internet & Security Agency (KISA)
|
Q6/17
|
2013-08-15 |
|
[ 152 ]
(Rev.1) |
Proposed changes to the Report of CG-giim, TD 0419
|
Yaana Technologies, LLC
|
Q10/17
|
2013-08-14 |
|
[ 151 ]
(Rev.1) |
Proposed changes to the Report of CG-Xccsec, TD 0417
|
Yaana Technologies, LLC
|
Q8/17
|
2013-08-14 |
|
[ 150 ]
(Rev.1) |
A proposal for clause 7 and 8 in X.sap-8:Efficient multi-factor authentication mechanisms using mobile devices
|
Korea (Rep. of)
|
Q7/17
|
2013-08-14 |
|
[ 149 ]
(Rev.1) |
A comment on X.cc-control | ISO/IEC 27017
|
Korea (Rep. of)
|
Q3/17
|
2013-08-14 |
|
[ 148 ]
(Rev.1) |
X.509V3 Private Extension HIEP Information Certification System
|
Ministry of Industry and Information Technology (MIIT)
|
Q10/17
|
2013-08-14 |
|
[ 147 ]
(Rev.1) |
Third draft of a guideline to technical and operational countermeasure for telebiometric applications using mobile devices
|
Korea (Rep. of)
|
Q9/17
|
2013-08-14 |
|
[ 146 ]
(Rev.1) |
Proposal for revised draft text of X.bhsm: Telebiomtric authentication framework using biometric hardware security module
|
Korea (Rep. of)
|
Q9/17
|
2013-08-14 |
|
[ 145 ]
(Rev.1) |
A proposal for the 4th revised text on draft Recommendation ITU-T X.sap-7: Technical capabilities of fraud detection and response for services with high assurance level requirements
|
Korea (Rep. of)
|
Q7/17
|
2013-08-14 |
|
[ 144 ]
(Rev.1) |
Proposal for supplement of ITU-T X.1251 on baseline capabilities and mechanisms of IdM for mobile applications and environment
|
Korea (Rep. of)
|
Q10/17
|
2013-08-14 |
|
[ 143 ]
(Rev.1) |
A proposal for X.sap-7's Annex I: Monitoring information for the detection of fraud activities
|
Korea (Rep. of)
|
Q7/17
|
2013-08-14 |
|
[ 142 ]
(Rev.1) |
Proposal of the 2nd draft text for Recommendation ITU-T X.sap-9: Delegated non-repudiation architecture based on X.813
|
Korea (Rep. of)
|
Q7/17
|
2013-08-14 |
|
[ 141 ]
(Rev.1) |
A proposal for revised structure of ITU-T Recommendation X.1051
|
Korea (Rep. of)
|
Q3/17
|
2013-08-14 |
|
[ 140 ]
(Rev.1) |
Proposal for a new work item - Malware description exchange format (MDEF) for information exchange
|
Korea (Rep. of)
|
Q4/17
|
2013-08-14 |
|
[ 139 ]
(Rev.1) |
A proposal for the 2nd revised text for Recommendation ITU-T X.sap-8: Efficient multi-factor authentication mechanisms using mobile devices
|
Korea (Rep. of)
|
Q7/17
|
2013-08-14 |
|
[ 138 ]
(Rev.1) |
A proposal for the 3rd revised text for Recommendation ITU-T X.gpim, Guideline for management of personally identifiable information for telecommunication organizations
|
Korea (Rep. of)
|
Q3/17
|
2013-08-14 |
|
[ 137 ]
(Rev.1) |
A proposal for the 8th revised text on draft Recommendation ITU-T X.trm (X.1210): Overview of traceback mechanisms
|
Korea (Rep. of)
|
Q4/17
|
2013-08-14 |
|
[ 136 ]
(Rev.1) |
A proposal for the 8th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
|
Korea (Rep. of)
|
Q4/17
|
2013-08-14 |
|
[ 135 ]
(Rev.1-2) |
A proposal for the revised Q.6/17 text
|
Korea (Rep. of)
|
Q6/17
|
2013-08-14 |
|
[ 134 ]
(Rev.1) |
A proposal for the revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index (for approval)
|
Korea (Rep. of)
|
Q4/17
|
2013-08-14 |
|
[ 133 ]
(Rev.1-2) |
A proposal of new work item: "Secure communication protocol using fractional cryptography for machine-to-machine communication"
|
Hitachi, Ltd.
|
Q6/17
|
2013-08-14 |
|
[ 132 ]
(Rev.1) |
Updated text of X.fsspvn
|
Huawei Technologies Co. Ltd.
|
Q8/17
|
2013-08-14 |
|
[ 131 ]
(Rev.1) |
Proposal for correction of X.1243
|
Huawei Technologies Co. Ltd.
,
China Unicom
|
Q5/17
|
2013-08-14 |
|
[ 130 ]
|
Comments on current draft text of X.msec-8: Secure application distribution framework for communication devices
|
KDDI Corporation
|
Q6/17
|
2013-08-14 |
|
[ 129 ]
|
Proposed initial draft text for X.1051-rev
|
KDDI Corporation
|
Q3/17
|
2013-08-13 |
|
[ 128 ]
|
Proposal comments for ISO/IEC 27017 (5th WD) | X.cc-control
|
KDDI Corporation
|
Q8/17
|
2013-08-13 |
|
[ 127 ]
(Rev.1) |
MBNA initial text contribution of x.iamt - Identity and Access Management Taxonomy
|
MBNA Canada
|
Q10/17
|
2013-08-13 |
|
[ 126 ]
(Rev.1) |
MBNA Initial text input towards progression of x.scim-use, "Application of system for cross identity management (SCIM) in telecommunication environments"
|
MBNA Canada
|
Q10/17
|
2013-08-13 |
|
[ 125 ]
(Rev.1) |
Concerns and comments regarding draft Recommendation X.1208
|
Canada
|
Q4/17
|
2013-08-13 |
|
[ 124 ]
|
Withdrawn
|
N/A
|
|
2013-08-13 |
|
[ 123 ]
|
Comments on draft X.ccsec (TD 439 and 500); and Comments on TD 435
|
United States
|
Q8/17
|
2013-08-13 |
|
[ 122 ]
(Rev.1) |
Proposal for revised text of X.giim
|
Ministry of Industry and Information Technology (MIIT)
|
Q10/17
|
2013-08-13 |
|
[ 121 ]
|
Guidelines on Creating Children-Secure Websites and Methods for Assuring Their Security
|
Russian Federation
|
Q4/17
|
2013-08-13 |
|
[ 120 ]
|
The position of the administration of communications of Russian Federation on the draft contribution X.discovery (X.1255), «Framework for discovery of identity management information»
|
Russian Federation
|
QALL/17
|
2013-08-13 |
|
[ 119 ]
|
Proposal of the administration of communications of the Russian Federation to continue work on terms and definitions
|
Russian Federation
|
Q4/17
|
2013-08-13 |
|
[ 118 ]
|
NWI on Framework for the interoperable exchange of trusted services
|
Russian Federation
|
Q10/17
|
2013-08-13 |
|
[ 117 ]
|
Proposals on X.csi (Guidelines for cybersecurity index)
|
Russian Federation
|
Q4/17
|
2013-08-13 |
|
[ 116 ]
|
Draft of the new Recommendation - Interaction of the IP-based National security center of the public telecommunications network with the security management systems of national operators for developing countries
|
Russian Federation
|
Q4/17
|
2013-08-13 |
|
[ 115 ]
(Rev.1) |
Comments on X.cc-control
|
LAC CO. Ltd
|
Q8/17, Q3/17
|
2013-08-13 |
|
[ 114 ]
(Rev.1-2) |
A proposal for of X.xacml3's Appendix V: Enhancements and new features in XACML 3.0
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17, Q10/17
|
2013-08-13 |
|
[ 113 ]
(Rev.1-3) |
New work item proposal template for the attribute binding based enhanced user authentication
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2013-08-13 |
|
[ 112 ]
(Rev.1-2) |
The 3rd revised text of draft Recommendation ITU-T X.websec-5: Security architecture and operation for web mashup service
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2013-08-13 |
|
[ 111 ]
|
A new specific scenario for X.orf
|
ZTE Corporation
|
Q11/17
|
2013-08-12 |
|
[ 110 ]
|
Proposal to define security requirements for Vehicle system
|
KDDI Corporation
,
Mitsubishi Electric Corporation
|
Q6/17
|
2013-08-12 |
|
[ 109 ]
(Rev.1) |
Comments on X.ticvs
|
Ministry of Industry and Information Technology (MIIT)
|
Q5/17
|
2013-08-12 |
|
[ 108 ]
(Rev.1-2) |
Understanding content-related aspects in countering spam
|
Ministry of Industry and Information Technology (MIIT)
|
Q5/17
|
2013-08-12 |
Resultats:63 documents Résultats :
1 -
2
- Suivant
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):