Contribuciones |
|
Número
|
Título
|
Origen
|
AI/Cuestión
|
Fecha
|
|
[ 606 ]
|
The 5th revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index
|
Korea (Rep. of)
|
Q4/17
|
2012-02-07 |
|
[ 605 ]
|
The 5th revised text on draft Recommendation ITU-T X.trm: Overview of traceback mechanisms
|
Korea (Rep. of)
|
Q4/17
|
2012-02-07 |
|
[ 604 ]
|
The 5th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
|
Korea (Rep. of)
|
Q4/17
|
2012-02-07 |
|
[ 603 ]
|
Specific needs for PII management guidelines for telecommunication organizations
|
Korea (Rep. of)
|
Q3/17
|
2012-02-07 |
|
[ 602 ]
|
Comments on SG17 working structure for the next study period
|
KDDI Corporation
|
QALL/17
|
2012-02-07 |
|
[ 601 ]
|
Agreement from X.discovery CG Teleconference
|
United Kingdom
|
Q10/17
|
2012-02-07 |
|
[ 600 ]
|
UK Comments on COM 17 - R 41 - E Draft Recommendation ITU-T X.1037 (X.rev), Architectural systems for security controls for preventing fraudulent activities in public carrier networks
|
United Kingdom
|
Q2/17
|
2012-02-07 |
|
[ 599 ]
|
A proposal for the second draft Recommendation of ITU-T X.sap-5: Guideline on anonymous authentication for e-commerce service
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2012-02-07 |
|
[ 598 ]
|
Proposed content in X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
China
,
China Unicom
|
Q5/17
|
2012-02-07 |
|
[ 597 ]
|
Comments on X.ics: A practical reference model for countering email spam using botnet information
|
China
|
Q5/17
|
2012-02-07 |
|
[ 596 ]
|
Proposal to establish a tutorial mechanism for new technologies
|
China
|
QALL/17
|
2012-02-07 |
|
[ 595 ]
|
Updated text of X.msec-6: Security aspects of smartphones
|
China
|
Q6/17
|
2012-02-07 |
|
[ 594 ]
|
Proposal on security requirements of digital distribution platforms of X.msec-6
|
China
|
Q6/17
|
2012-02-07 |
|
[ 593 ]
|
Updated text of X.oacms: Overall aspects of countering mobile messaging spam
|
China
|
Q5/17
|
2012-02-07 |
|
[ 592 ]
|
Proposal on changing the title name of X.msec-6 back to smartphone
|
China
,
China Unicom
|
Q6/17
|
2012-02-07 |
|
[ 591 ]
|
Proposal of new security requirements for cloud based telecommunication service X.srfctse
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q8/17
|
2012-02-07 |
|
[ 590 ]
|
Proposal for new security requirements of social networking
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2012-02-07 |
|
[ 589 ]
|
Security Protection of Customer Information in Telecom Operators
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q3/17
|
2012-02-07 |
|
[ 588 ]
|
Authentication result transfer based on encrypted cookie for WLAN scenario
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2012-02-07 |
|
[ 587 ]
|
Interface of the abnormal traffic detection and control system
|
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
|
Q4/17
|
2012-02-07 |
|
[ 586 ]
|
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks
|
China Mobile Communications Corporation
|
Q6/17
|
2012-02-07 |
|
[ 585 ]
|
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"
|
China Mobile Communications Corporation
|
Q6/17
|
2012-02-07 |
|
[ 584 ]
|
A Draft of Technology Involved in Countering Voice Spam-X.ticvs
|
China Mobile Communications Corporation
|
Q5/17
|
2012-02-07 |
|
[ 583 ]
|
Authentication integration solution for WLAN scenario in X.authi.
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2012-02-07 |
|
[ 582 ]
|
Candidate Use Cases for Cloud Computing Security
|
Microsoft Corporation
|
Q8/17
|
2012-02-07 |
|
[ 581 ]
(Rev.1) |
Proposed modifications to draft Supplement: Users' guide for ITU-T X.1051
|
KDDI Corporation
|
Q3/17
|
2012-02-07 |
|
[ 580 ]
(Rev.1) |
Proposed text of Clause7.4 to draft Recommendation of X.giim
|
Ministry of Industry and Information Technology (MIIT)
|
Q10/17
|
2012-02-07 |
|
[ 579 ]
(Rev.1) |
Proposal for refined text to draft Recommendation X.giim: Generic IdM interoperability mechanisms
|
Ministry of Industry and Information Technology (MIIT)
|
Q10/17
|
2012-02-07 |
|
[ 578 ]
(Rev.1) |
Proposal on security requirements of ubiquitous networking in NGN
|
ZTE Corporation
|
Q6/17
|
2012-02-07 |
|
[ 577 ]
(Rev.1) |
Revised text for chapter 14 in draft X.srfctse
|
ZTE Corporation
|
Q8/17
|
2012-02-07 |
|
[ 576 ]
|
Propose a chapter on cloud security for X.srfctse
|
ZTE Corporation
|
Q8/17
|
2012-02-07 |
|
[ 575 ]
(Rev.1) |
Proposal for a new work item on Framework of Detection, Tracking and Response of Mobile Botnets
|
China Unicom
|
Q7/17
|
2012-02-07 |
|
[ 574 ]
|
Improving Intrusion Detection Systems with Hierarchical Architecture Using an Inter layer Messaging System
|
Ministry of Information and Communication Technology (MICT)
|
Q4/17
|
2012-02-07 |
|
[ 573 ]
|
Key Pre-distribution Using Nonlinear Codes on Z4 for Mobile Ad Hoc Networks
|
Ministry of Information and Communication Technology (MICT)
|
Q1/17
|
2012-02-07 |
|
[ 572 ]
|
Withdrawn
|
N/A (no se aplica)
|
Q4/17
|
2012-02-07 |
|
[ 571 ]
|
A New Architecture for Redirecting Intruders to Honeypots
|
Ministry of Information and Communication Technology (MICT)
|
Q4/17
|
2012-02-07 |
|
[ 570 ]
(Rev.1) |
Open identity trust framework - proposed changes
|
Microsoft Corporation
|
Q10/17
|
2012-02-07 |
|
[ 569 ]
(Rev.1) |
Proposal of draft for X.atag
|
KDDI Corporation
|
Q10/17
|
2012-02-07 |
|
[ 568 ]
|
Propose the requirement of cloud storage security for X.srfctse
|
ZTE Corporation
|
Q8/17
|
2012-02-07 |
|
[ 567 ]
(Rev.1) |
Report of the Correspondence Group on COP17 (Child Online Protection/ITU-T SG17), September 2011-January 2012
|
Yaana Technologies, LLC
|
QALL/17
|
2012-02-06 |
|
[ 566 ]
|
Proposed text for security guidelines chapter of X.ccsec
|
China Telecommunications Corporation
|
Q8/17
|
2012-02-06 |
|
[ 565 ]
|
Proposed text for security challenges chapter of X.ccsec
|
China Telecommunications Corporation
|
Q8/17
|
2012-02-06 |
|
[ 564 ]
|
Proposed new work item on Requirements and framework of operational security for Cloud Computing
|
China
,
China Telecommunications Corporation
,
ZTE Corporation
|
Q8/17
|
2012-02-06 |
|
[ 563 ]
(Rev.1) |
Update proposal of X.p2p-4: Use of service providers' user authentication infrastructure to implement PKI for peer-to-peer networks
|
KDDI Corporation
|
Q7/17
|
2012-02-06 |
|
[ 562 ]
(Rev.1) |
Proposal of a new work item "Secure application management framework for communication devices"
|
KDDI Corporation
,
Sony Corporation
|
Q6/17
|
2012-02-06 |
|
[ 561 ]
(Rev.1) |
Comments on X.ticvs (Technologies involved in countering voice spam in telecommunications organizations)
|
KDDI Corporation
|
Q5/17
|
2012-02-06 |
|
[ 560 ]
(Rev.1-2) |
Proposal on new appendix for X.msec-6
|
China
,
China Unicom
|
Q6/17
|
2012-02-06 |
|
[ 559 ]
(Rev.1) |
The security threats of disclosure and congestion for ubiquitous networking
|
China Unicom
|
Q6/17
|
2012-02-06 |
|
[ 558 ]
(Rev.1) |
The security threats of eavesdropping and tamper for ubiquitous networking
|
China Unicom
|
Q6/17
|
2012-02-06 |
|
[ 557 ]
(Rev.1) |
The security threats of Denial of Service and abuse for ubiquitous networking
|
China Unicom
|
Q6/17
|
2012-02-06 |
Resultados :756 documentos Resultados :
Anterior -
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11 -
12 -
13 -
14 -
15 -
16
- Siguiente
|
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):