Contributions
[ Source: China Mobile, China MII, ZTE ] |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 266 ]
|
User authentication mechanism of X.p2p-3
|
China Mobile, China MII, ZTE
|
Q7/17
|
2010-03-26 |
|
[ 264 ]
|
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile, China MII, ZTE
|
Q7/17
|
2010-03-26 |
|
[ 261 ]
|
Proposed draft Recommendation for X.authi: Authentication Integration in IDM
|
China Mobile, China MII, ZTE
|
Q10/17
|
2010-03-26 |
|
[ 242 ]
|
An analysis of X.authi: Authentication integration between the network and service layers
|
China Mobile, China MII, ZTE
|
Q10/17
|
2010-03-26 |
|
[ 105 ]
|
Basic concept for authentication mechanism of P2P-based telecommunication network
|
China Mobile, China MII, ZTE
|
Q7/17
|
2009-09-03 |
|
[ 103 ]
|
Draft Recommendation X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile, China MII, ZTE
|
Q7/17
|
2009-09-03 |
|
[ 101 ]
|
Proposal of new work item - Integration of the network layer authentication and the service layer authentication
|
China Mobile, China MII, ZTE
|
Q10/17
|
2009-09-03 |
Results:7 total items.
|
Multiple Document Download: Formats and Languages to be included (when available):