Contributions
[ Source: Lucent Technologies (USA) ] |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 226 ]
|
Identification and authentication of bearer traffic (contribution to the draft Recommendation Y.NGN Authentication)
|
Lucent Technologies (USA)
|
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17, Q4/13, Q15/13
|
2007-09-12 |
|
[ 225 ]
|
Mechanism for authenticating flow of bearer traffic in NGN (contribution to the draft Recommendation Y.NGN Security Mechanisms)
|
Lucent Technologies (USA)
|
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17, Q4/13, Q15/13
|
2007-09-12 |
|
[ 198 ]
|
Comments on draft Recommendation X.805+, COM 17 - C 86 - E
|
Lucent Technologies (USA)
|
Q5/17
|
2007-09-10 |
|
[ 197 ]
|
Comments on draft ITU-T Recommendation X.1205, Overview of cybersecurity
|
Lucent Technologies (USA)
|
Q6/17
|
2007-09-10 |
|
[ 196 ]
|
Comments on "A vendor-neutral framework for automatic checking of the presence of vulnerabilities information update (X.vds)," TD2584rev 3
|
Lucent Technologies (USA)
|
Q6/17
|
2007-09-10 |
|
[ 195 ]
|
Comments on draft Recommendation X.spn: Framework for creation, storage, distribution, and enforcement of policies for network security
|
Lucent Technologies (USA)
|
Q5/17
|
2007-09-10 |
|
[ 194 ]
|
Guidelines for Implementing System & Network Security
|
Lucent Technologies (USA)
|
Q5/17
|
2007-09-10 |
Results:7 total items.
|
Multiple Document Download: Formats and Languages to be included (when available):