Contributions |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 583 ]
|
Authentication integration solution for WLAN scenario in X.authi.
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2012-02-07 |
|
[ 582 ]
|
Candidate Use Cases for Cloud Computing Security
|
Microsoft Corporation
|
Q8/17
|
2012-02-07 |
|
[ 581 ]
(Rev.1) |
Proposed modifications to draft Supplement: Users' guide for ITU-T X.1051
|
KDDI Corporation
|
Q3/17
|
2012-02-07 |
|
[ 580 ]
(Rev.1) |
Proposed text of Clause7.4 to draft Recommendation of X.giim
|
Ministry of Industry and Information Technology (MIIT)
|
Q10/17
|
2012-02-07 |
|
[ 579 ]
(Rev.1) |
Proposal for refined text to draft Recommendation X.giim: Generic IdM interoperability mechanisms
|
Ministry of Industry and Information Technology (MIIT)
|
Q10/17
|
2012-02-07 |
|
[ 578 ]
(Rev.1) |
Proposal on security requirements of ubiquitous networking in NGN
|
ZTE Corporation
|
Q6/17
|
2012-02-07 |
|
[ 577 ]
(Rev.1) |
Revised text for chapter 14 in draft X.srfctse
|
ZTE Corporation
|
Q8/17
|
2012-02-07 |
|
[ 576 ]
|
Propose a chapter on cloud security for X.srfctse
|
ZTE Corporation
|
Q8/17
|
2012-02-07 |
|
[ 575 ]
(Rev.1) |
Proposal for a new work item on Framework of Detection, Tracking and Response of Mobile Botnets
|
China Unicom
|
Q7/17
|
2012-02-07 |
|
[ 574 ]
|
Improving Intrusion Detection Systems with Hierarchical Architecture Using an Inter layer Messaging System
|
Ministry of Information and Communication Technology (MICT)
|
Q4/17
|
2012-02-07 |
|
[ 573 ]
|
Key Pre-distribution Using Nonlinear Codes on Z4 for Mobile Ad Hoc Networks
|
Ministry of Information and Communication Technology (MICT)
|
Q1/17
|
2012-02-07 |
|
[ 572 ]
|
Withdrawn
|
N/A
|
Q4/17
|
2012-02-07 |
|
[ 571 ]
|
A New Architecture for Redirecting Intruders to Honeypots
|
Ministry of Information and Communication Technology (MICT)
|
Q4/17
|
2012-02-07 |
|
[ 570 ]
(Rev.1) |
Open identity trust framework - proposed changes
|
Microsoft Corporation
|
Q10/17
|
2012-02-07 |
|
[ 569 ]
(Rev.1) |
Proposal of draft for X.atag
|
KDDI Corporation
|
Q10/17
|
2012-02-07 |
|
[ 568 ]
|
Propose the requirement of cloud storage security for X.srfctse
|
ZTE Corporation
|
Q8/17
|
2012-02-07 |
|
[ 567 ]
(Rev.1) |
Report of the Correspondence Group on COP17 (Child Online Protection/ITU-T SG17), September 2011-January 2012
|
Yaana Technologies, LLC
|
QALL/17
|
2012-02-06 |
|
[ 566 ]
|
Proposed text for security guidelines chapter of X.ccsec
|
China Telecommunications Corporation
|
Q8/17
|
2012-02-06 |
|
[ 565 ]
|
Proposed text for security challenges chapter of X.ccsec
|
China Telecommunications Corporation
|
Q8/17
|
2012-02-06 |
|
[ 564 ]
|
Proposed new work item on Requirements and framework of operational security for Cloud Computing
|
China
,
China Telecommunications Corporation
,
ZTE Corporation
|
Q8/17
|
2012-02-06 |
|
[ 563 ]
(Rev.1) |
Update proposal of X.p2p-4: Use of service providers' user authentication infrastructure to implement PKI for peer-to-peer networks
|
KDDI Corporation
|
Q7/17
|
2012-02-06 |
|
[ 562 ]
(Rev.1) |
Proposal of a new work item "Secure application management framework for communication devices"
|
KDDI Corporation
,
Sony Corporation
|
Q6/17
|
2012-02-06 |
|
[ 561 ]
(Rev.1) |
Comments on X.ticvs (Technologies involved in countering voice spam in telecommunications organizations)
|
KDDI Corporation
|
Q5/17
|
2012-02-06 |
|
[ 560 ]
(Rev.1-2) |
Proposal on new appendix for X.msec-6
|
China
,
China Unicom
|
Q6/17
|
2012-02-06 |
|
[ 559 ]
(Rev.1) |
The security threats of disclosure and congestion for ubiquitous networking
|
China Unicom
|
Q6/17
|
2012-02-06 |
|
[ 558 ]
(Rev.1) |
The security threats of eavesdropping and tamper for ubiquitous networking
|
China Unicom
|
Q6/17
|
2012-02-06 |
|
[ 557 ]
(Rev.1) |
The security threats of Denial of Service and abuse for ubiquitous networking
|
China Unicom
|
Q6/17
|
2012-02-06 |
|
[ 556 ]
(Rev.1) |
UK Comments on COM 17 - R 44 - E Draft Recommendation ITU-T X.1541 (X.iodef), Incident object description exchange format
|
United Kingdom
|
Q4/17
|
2012-02-04 |
|
[ 555 ]
(Rev.1) |
UK Comments on COM 17 - R 43 - E - Draft Recommendation ITU-T X.1524, X.cwe, Common weakness enumeration (CWE)
|
United Kingdom
|
Q4/17
|
2012-02-04 |
|
[ 554 ]
(Rev.1-2) |
Proposed Action on Child Online Protection
|
Department for Culture, Media and Sport (DCMS)
,
Norway
,
United Kingdom
|
QALL/17
|
2012-02-02 |
|
[ 553 ]
|
Proposed a chapter on SaaS levels for X.sfcse
|
China Telecommunications Corporation
|
Q8/17
|
2012-02-02 |
|
[ 552 ]
(Rev.1-2) |
Proposed revised baseline text for X.sfcse
|
China Telecommunications Corporation
|
Q8/17
|
2012-02-02 |
|
[ 551 ]
|
Improving Intrusion Detection Systems with Hierarchical Architecture Using an Interlayer Messaging System
|
Iran (Islamic Republic of)
|
Q4/17
|
2012-01-31 |
|
[ 550 ]
|
Proposal of the creation of a new work item "Enterprise Security Registry"
|
MBNA Canada
|
Q10/17
|
2012-01-31 |
|
[ 549 ]
(Rev.1-3) |
Guidelines on the safety of mobile phone banking (M-Banking)
|
Autorité de Régulation de la Poste et des Télécommunications du
|
Q4/17
|
2012-01-11 |
|
[ 548 ]
(Rev.1) |
Revised Proposed draft text for the main body of x.oitf - Open identity trust framework
|
Microsoft Corporation
|
Q10/17
|
2011-11-07 |
Results:111 total items. Result page:
Previous -
1 -
2 -
3
-
|
Multiple Document Download: Formats and Languages to be included (when available):