Contributions
[ Source: Lucent Technologies (USA) ] |
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 226 ]
|
Identification and authentication of bearer traffic (contribution to the draft Recommendation Y.NGN Authentication)
|
Lucent Technologies (USA)
|
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17, Q4/13, Q15/13
|
2007-09-12 |
|
[ 225 ]
|
Mechanism for authenticating flow of bearer traffic in NGN (contribution to the draft Recommendation Y.NGN Security Mechanisms)
|
Lucent Technologies (USA)
|
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17, Q4/13, Q15/13
|
2007-09-12 |
|
[ 198 ]
|
Comments on draft Recommendation X.805+, COM 17 - C 86 - E
|
Lucent Technologies (USA)
|
Q5/17
|
2007-09-10 |
|
[ 197 ]
|
Comments on draft ITU-T Recommendation X.1205, Overview of cybersecurity
|
Lucent Technologies (USA)
|
Q6/17
|
2007-09-10 |
|
[ 196 ]
|
Comments on "A vendor-neutral framework for automatic checking of the presence of vulnerabilities information update (X.vds)," TD2584rev 3
|
Lucent Technologies (USA)
|
Q6/17
|
2007-09-10 |
|
[ 195 ]
|
Comments on draft Recommendation X.spn: Framework for creation, storage, distribution, and enforcement of policies for network security
|
Lucent Technologies (USA)
|
Q5/17
|
2007-09-10 |
|
[ 194 ]
|
Guidelines for Implementing System & Network Security
|
Lucent Technologies (USA)
|
Q5/17
|
2007-09-10 |
|
[ 53 ]
|
Applying ITU-T X.805 to physical security
|
Lucent Technologies (USA)
|
Q5/17
|
2006-11-22 |
Resultats:8 documents
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):