Contributions |
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 256 ]
(Rev.1) |
Proposed mechanisms on inter-federation trust establishment for X.giim
|
ZTE Corporation
|
Q10/17
|
2010-03-26 |
|
[ 255 ]
(Rev.1) |
Proposed Application Scenarios to X.giim
|
MIIT, China
|
Q10/17
|
2010-03-26 |
|
[ 254 ]
|
Comparing analysis of abnormal traffic system deployment solutions in X.abnot
|
China Mobile, Huawei
|
Q4/17
|
2010-03-26 |
|
[ 253 ]
|
Clarify Some Issues on IdM in the Cloud Computing
|
MIIT, China
|
Q10/17
|
2010-03-26 |
|
[ 252 ]
|
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2010-03-26 |
|
[ 251 ]
|
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
ZTE, China Mobile
|
Q4/17
|
2010-03-26 |
|
[ 250 ]
|
Weighted Parameters Filtering
|
Huawei Technologies Co.,Ltd.
|
Q5/17
|
2010-03-26 |
|
[ 249 ]
|
Secure Interface between UAC and VSPS
|
Huawei Technologies Co.,Ltd.
|
Q5/17
|
2010-03-26 |
|
[ 248 ]
(Rev.1) |
Proposal for a new work item on Requirements and Framework of secure dynamic virtual network
|
Huawei Technologies Co.,Ltd.
,
China Telecom
|
Q6/17
|
2010-03-26 |
|
[ 247 ]
|
Propose to consider ICGS deployment in wireless network
|
Huawei Technologies Co., Ltd.
|
Q5/17
|
2010-03-26 |
|
[ 246 ]
|
Multiple VSPS Scenarios and functional extension to VSP-RBL and URS
|
Huawei Technologies Co.,Ltd.
|
Q5/17
|
2010-03-26 |
|
[ 245 ]
|
IRC botnet detection
|
Huawei Technologies Co.,Ltd.
|
Q4/17
|
2010-03-26 |
|
[ 244 ]
|
First packet detection for Botnet Detection
|
Huawei Technologies Co.,Ltd.
|
Q4/17
|
2010-03-26 |
|
[ 243 ]
|
Assets Management in X.ismf
|
China Mobile
|
Q3/17
|
2010-03-26 |
|
[ 242 ]
|
An analysis of X.authi: Authentication integration between the network and service layers
|
China Mobile, China MII, ZTE
|
Q10/17
|
2010-03-26 |
|
[ 241 ]
|
A solution to solve the repeated clean problem in the abnormal traffic control system deployment
|
China Mobile, Huawei
|
Q4/17
|
2010-03-26 |
|
[ 240 ]
|
A proposal of revision text for X.gep: A guideline for evaluating telebiometric template protection techniques
|
Japan
|
Q9/17
|
2010-03-26 |
|
[ 239 ]
|
Proposal of draft text of X.sap-4
|
Japan
|
Q7/17, Q10/17
|
2010-03-26 |
|
[ 238 ]
|
Proposed draft text for Best Practice against Botnets
|
Korea (Republic of) and Japan
|
Q4/17, Q1/17
|
2010-03-26 |
|
[ 237 ]
|
A draft proposed text for X.sgsm based on X.1051 | ISO/IEC 27002
|
Japan
|
Q3/17
|
2010-03-26 |
|
[ 236 ]
|
X.iptvsec-3: Comments on X.iptvsec-3, Document TD 0743
|
Federal Republic of Germany
|
Q6/17
|
2010-03-26 |
|
[ 235 ]
|
Revised draft text of X.tif: Integrated framework for telebiometric data protection in telehealth and worldwide telemedicines
|
Korea (Republic of)
|
Q9/17
|
2010-03-26 |
|
[ 234 ]
|
Proposed modification of the document TD 0553, the draft Recommendation X.iptvsec-5, SCP interoperability scheme
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 233 ]
(Rev.1) |
Proposal on overall editorial modifications of X.fcsip
|
Korea (Republic of)
|
Q5/17
|
2010-03-26 |
|
[ 232 ]
|
Proposal of a new work item on baseline capabilities and a framework for mobile identity management
|
Korea (Republic of)
|
Q10/17
|
2010-03-26 |
|
[ 231 ]
|
Proposal of 2nd revised text for X.idmsg: Security Guidelines for Identity Management Systems
|
Korea (Republic of)
|
Q10/17
|
2010-03-26 |
|
[ 230 ]
|
Draft Recommendation of x.mcsec-1: Security Requirements and Framework for multicast communication for Consent
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 229 ]
|
Revised draft Recommendation for X.usnsec-2 : USN middleware security guidelines
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 228 ]
|
Revised draft Recommendation on X.gopw: Guideline on preventing malicious code spreading in a data communication network
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 227 ]
|
Proposed Draft of X.isgf (Information Security Governance Framework)
|
Korea (Republic of)
|
Q3/17
|
2010-03-26 |
|
[ 226 ]
|
Proposal for additional text of X.websec-4: Security Framework for Enhanced Web based Telecommunication Service
|
Korea (Republic of)
|
Q8/17, Q7/17
|
2010-03-26 |
|
[ 225 ]
|
The draft text on ITU-T draft Recommendation X.iptvsec-2: Functional requirements and mechanisms for secure transcodable scheme of IPTV
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 224 ]
|
Proposed Recommendation ITU-T X.1086 Amendment 1
|
Korea (Republic of)
|
Q9/17
|
2010-03-26 |
|
[ 223 ]
|
A proposal for the 1st revised text on draft Recommendation ITU-T X.trm: Traceback mechanisms
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 222 ]
|
A proposal for the 1st revised text on ITU-T draft Recommendation X.eipwa: Exchange of Information for preventing web-based attacks
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 221 ]
|
A proposal for revised text on draft Recommendation ITU-T X.tb-ucc: Traceback use cases and capabilities
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 220 ]
|
A proposal for the 3rd draft text of revised Recommendation ITU-T X.1034: Guideline on extensible authentication protocol based authentication and key management in a data communication network
|
Korea (Republic of)
|
Q2/17
|
2010-03-26 |
|
[ 219 ]
|
Proposal for 5th revised text on ITU-T X.usnsec-1 | I SO/IEC CD 29180: Security framework for ubiquitous sensor network
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 218 ]
|
A proposal for establishing a new work item on guidelines for Cybersecurity Index (CSI)
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 217 ]
|
A proposal for the 6th revised text on draft Recommendation X.iptvsec-3: Key management framework for secure IPTV services
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 216 ]
|
Necessity for studying the Framework for the Downloadable SCP system in the mobile IPTV environment
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 215 ]
|
A proposal for a new work item on cryptographic algorithm suites for the IPTV SCP
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 214 ]
|
Support for establishing JCA on Security in SG 17
|
Korea (Republic of)
|
QALL/17
|
2010-03-26 |
|
[ 213 ]
|
A Proposal of draft text for draft Recommendation X.sips: A framework for countering cyber attacks in SIP-based services
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 212 ]
|
Proposal of the 2nd draft text for X.amg : Asset Management Guidelines in Telecommunication Organizations
|
Korea (Republic of)
|
Q3/17
|
2010-03-26 |
|
[ 211 ]
|
Proposal of the 3rd draft text for X.sap-3: The management framework of one time password-based authentication service
|
Korea (Republic of)
|
Q7/17
|
2010-03-26 |
|
[ 210 ]
|
A Proposal of 2nd Draft text of Information Security Management Guidelines for Small and Medium Telecommunication Organizations (X.sgsm)
|
Korea (Republic of)
|
Q3/17
|
2010-03-26 |
|
[ 209 ]
|
Proposal for the 3rd revised text on the draft Recommendation X.usnsec-3: Secure routing mechanisms for Wireless Sensor Network
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 208 ]
|
A Proposal for the 3rd revised text on ITU-T draft Recommendation X.tcs-2: Technical means for countering VoIP spam
|
Korea (Republic of)
|
Q5/17
|
2010-03-26 |
|
[ 207 ]
|
Addition of Appendix II to ITU-T draft Recommendation X.fcsip: Framework for countering spam in IP-based multimedia applications
|
Korea (Republic of)
|
Q5/17
|
2010-03-26 |
Resultats:756 documents Résultats :
Précédent -
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11 -
12 -
13 -
14 -
15 -
16
- Suivant
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):