Contributions |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 192 ]
(Rev.1) |
Proposal for update Section 10 of X.tfcmm
|
China Unicom
|
Q5/17
|
2013-12-31 |
|
[ 191 ]
(Rev.1) |
Proposal for update Section 9 of X.tfcmm
|
China Unicom
|
Q5/17
|
2013-12-31 |
|
[ 190 ]
(Rev.1) |
Proposal for X.unsec-1: draft for consent
|
China Unicom
,
ZTE Corporation
|
Q6/17
|
2013-12-31 |
|
[ 189 ]
(Rev.1) |
Proposal for a new work item on "The security requirement framework for smartphones-based botnet"
|
China Unicom
|
Q4/17
|
2013-12-31 |
|
[ 188 ]
(Rev.1) |
Proposed text for configuration management of X.goscc
|
China Telecommunications Corporation
,
China
|
Q8/17
|
2013-12-31 |
|
[ 187 ]
(Rev.1) |
Proposed text for security monitoring of X.goscc
|
China Telecommunications Corporation
,
China
|
Q8/17
|
2013-12-31 |
|
[ 186 ]
(Rev.1) |
Proposed revised text for the scope of X.goscc
|
China Telecommunications Corporation
|
Q8/17
|
2013-12-31 |
|
[ 185 ]
(Rev.1) |
Proposed new work item on Technical Requirements for Countering Instant Messaging Spam
|
China Telecommunications Corporation
,
China
,
ZTE Corporation
|
Q5/17
|
2013-12-31 |
|
[ 184 ]
(Rev.1) |
Proposed security requirements for X.sfcse
|
China Telecommunications Corporation
|
Q8/17
|
2013-12-31 |
|
[ 183 ]
(Rev.1) |
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks
|
China Mobile Communications Corporation
|
Q6/17
|
2013-12-31 |
|
[ 182 ]
(Rev.1) |
ITU-T x.orf: A proposal for modification of scenarios in Clause 9
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q11/17
|
2013-12-31 |
|
[ 181 ]
(Rev.1) |
ITU-T x.orf: A proposal for modification of requirements in Clause 8
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q11/17
|
2013-12-31 |
|
[ 180 ]
(Rev.1) |
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
China Mobile Communications Corporation
|
Q5/17
|
2013-12-31 |
|
[ 179 ]
(Rev.1) |
X.authi: Guideline to implement the authentication integration of the network layer and the service layer
|
China Mobile Communications Corporation
,
China
,
ZTE Corporation
|
Q10/17
|
2013-12-31 |
|
[ 178 ]
(Rev.1) |
Proposed edits to X.gpim "Guideline for management of personally identifiable information for telecommunication organizations"
|
China Mobile Communications Corporation
|
Q3/17
|
2013-12-31 |
|
[ 177 ]
(Rev.1-3) |
A proposal of new work item : reference monitor for online analytics applications
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2013-12-31 |
|
[ 176 ]
(Rev.1) |
Effectiveness of ITU's Electronic Collaboration
|
United States
|
QALL/17
|
2013-12-30 |
|
[ 175 ]
(Rev.1) |
Suggestions on WTSA Resolution 52 survey questionnaire on countering spam
|
United States
|
QALL/17, Q5/17
|
2013-12-30 |
|
[ 174 ]
(Rev.1) |
Response to Circular 52, approving several draft new and revised Recommendations
|
United States
|
QALL/17
|
2013-12-30 |
|
[ 173 ]
(Rev.1) |
Response of the United States of America to Circular 57, approving draft new Recommendation ITU-T X.1208
|
United States
|
QALL/17
|
2013-12-30 |
|
[ 172 ]
|
Proposed revisions to draft ITU-T Recommendation X.msec-8: Secure application distribution framework for communication devices
|
KDDI Corporation
|
Q6/17
|
2013-12-30 |
|
[ 171 ]
|
A proposal of new work item: Supplement on cryptographic protocols and its verification
|
KDDI Corporation
|
Q7/17, Q1/17
|
2013-12-30 |
|
[ 170 ]
|
Withdrawn
|
N/A
|
|
2014-01-13 |
|
[ 169 ]
(Rev.1) |
Proposed modification contribution to draft Recommendation X.IAMT- Identity and Access Management Taxonomy
|
MBNA Canada
|
Q10/17
|
2013-12-23 |
|
[ 168 ]
|
Cybercrime: fight
|
Société Congolaise des Postes et Télécommunications (SCPT)
|
Q4/17
|
2013-12-23 |
|
[ 167 ]
|
Concerns and comments regarding draft Recommendation X.1208
|
Canada
|
Q4/17
|
2013-12-23 |
|
[ 166 ]
|
Cybercrime: creation of a global fund and raising more consumer awareness
|
African ICT Consumers Network (AICN)
|
Q4/17
|
2013-12-09 |
|
[ 165 ]
|
Cybersecurity in developing countries
|
Dem. Rep. of the Congo
|
Q5/17, Q4/17
|
2013-11-30 |
|
[ 164 ]
|
Cybersecurity in developing countries
|
Dem. Rep. of the Congo
|
Q6/17, Q4/17, Q10/17
|
2013-11-30 |
|
[ 163 ]
|
Withdrawn
|
N/A
|
|
1753-01-01 |
|
[ 162 ]
|
Withdrawn
|
N/A
|
|
1753-01-01 |
|
[ 161 ]
|
Withdrawn
|
N/A
|
|
1753-01-01 |
|
[ 160 ]
|
Security - Contribution on Question 4/17 (Cybersecurity) Volume 3
|
Dem. Rep. of the Congo
|
Q4/17
|
2013-11-16 |
|
[ 159 ]
|
Withdrawn
|
N/A
|
|
2013-11-08 |
|
[ 158 ]
|
Withdrawn
|
N/A
|
|
1753-01-01 |
|
[ 157 ]
|
Propose edits for final version of X.ccsec
|
China
|
Q8/17
|
2013-08-15 |
|
[ 156 ]
|
Comments on the new work item X.tfcmm
|
China Mobile Communications Corporation
|
Q5/17
|
2013-08-15 |
|
[ 155 ]
|
4th draft of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
China Mobile Communications Corporation
|
Q5/17
|
2013-08-15 |
|
[ 154 ]
|
Proposal for modifications of X.sgsec-1 : Security functional architecture for smart grid services using the telecommunication network
|
Korea Internet & Security Agency (KISA)
|
Q6/17
|
2013-08-15 |
|
[ 153 ]
|
Proposed revised text on draft Recommendation ITU-T X.msec-8: Secure application distribution framework for communication devices
|
Korea Internet & Security Agency (KISA)
|
Q6/17
|
2013-08-15 |
|
[ 152 ]
(Rev.1) |
Proposed changes to the Report of CG-giim, TD 0419
|
Yaana Technologies, LLC
|
Q10/17
|
2013-08-14 |
|
[ 151 ]
(Rev.1) |
Proposed changes to the Report of CG-Xccsec, TD 0417
|
Yaana Technologies, LLC
|
Q8/17
|
2013-08-14 |
|
[ 150 ]
(Rev.1) |
A proposal for clause 7 and 8 in X.sap-8:Efficient multi-factor authentication mechanisms using mobile devices
|
Korea (Rep. of)
|
Q7/17
|
2013-08-14 |
|
[ 149 ]
(Rev.1) |
A comment on X.cc-control | ISO/IEC 27017
|
Korea (Rep. of)
|
Q3/17
|
2013-08-14 |
|
[ 148 ]
(Rev.1) |
X.509V3 Private Extension HIEP Information Certification System
|
Ministry of Industry and Information Technology (MIIT)
|
Q10/17
|
2013-08-14 |
|
[ 147 ]
(Rev.1) |
Third draft of a guideline to technical and operational countermeasure for telebiometric applications using mobile devices
|
Korea (Rep. of)
|
Q9/17
|
2013-08-14 |
|
[ 146 ]
(Rev.1) |
Proposal for revised draft text of X.bhsm: Telebiomtric authentication framework using biometric hardware security module
|
Korea (Rep. of)
|
Q9/17
|
2013-08-14 |
|
[ 145 ]
(Rev.1) |
A proposal for the 4th revised text on draft Recommendation ITU-T X.sap-7: Technical capabilities of fraud detection and response for services with high assurance level requirements
|
Korea (Rep. of)
|
Q7/17
|
2013-08-14 |
|
[ 144 ]
(Rev.1) |
Proposal for supplement of ITU-T X.1251 on baseline capabilities and mechanisms of IdM for mobile applications and environment
|
Korea (Rep. of)
|
Q10/17
|
2013-08-14 |
|
[ 143 ]
(Rev.1) |
A proposal for X.sap-7's Annex I: Monitoring information for the detection of fraud activities
|
Korea (Rep. of)
|
Q7/17
|
2013-08-14 |
Results:617 total items. Result page:
Previous -
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11 -
12 -
13
- Next
|
Multiple Document Download: Formats and Languages to be included (when available):