Union Internationale des Télécommunications   UIT
English  Español
 
Plan du site Contactez-nous Copie Imprimable
  Page d'accueil : UIT-T : SG 17 : Contributions  Ajoutés récemment -  Recherche de documents de réunion
   
UIT-T SG 17  C 

UIT-T SG 17

Sécurité

Période d'études 2009

Resultats:23 documents
Contributions  [ Source: China Mobile Communications Corporation ]   Documents / Contributions
 
Numéro 
Titre Source AI/Question
Date
[ 691 ]  
 
Proposed Edits to clause 9&10 in X.ccsec     China , China Mobile Communications Corporation   Q8/17   2012-08-15
[ 690 ]  
 
X.abnot: Abnormal traffic detection and control guideline for telecommunication network     China Mobile Communications Corporation , Huawei Technologies Co. Ltd. , ZTE Corporation   Q4/17   2012-08-15
[ 689 ]  
 
1st Draft: Guidelines on the management of infected terminals in mobile networks     China Mobile Communications Corporation   Q6/17   2012-08-15
[ 688 ]  
 
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     China Mobile Communications Corporation   Q5/17   2012-08-15
[ 687 ]  
 
Authentication integration solution for IMS scenario in X.authi - part 2.     China Mobile Communications Corporation   Q10/17   2012-08-15
[ 686 ]  
 
Authentication integration solution for IMS scenario in X.authi - part 1.     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-08-15
[ 685 ]  
 
Analysis of the mobile telecom network specific PII(personally identifiable information) security protection     China Mobile Communications Corporation , ZTE Corporation   Q3/17   2012-08-15
[ 589 ]  
 
Security Protection of Customer Information in Telecom Operators     China Mobile Communications Corporation , ZTE Corporation   Q3/17   2012-02-07
[ 588 ]  
 
Authentication result transfer based on encrypted cookie for WLAN scenario     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-02-07
[ 587 ]  
 
Interface of the abnormal traffic detection and control system     China Mobile Communications Corporation , Huawei Technologies Co. Ltd.   Q4/17   2012-02-07
[ 586 ]  
 
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks     China Mobile Communications Corporation   Q6/17   2012-02-07
[ 585 ]  
 
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"     China Mobile Communications Corporation   Q6/17   2012-02-07
[ 584 ]  
 
A Draft of Technology Involved in Countering Voice Spam-X.ticvs     China Mobile Communications Corporation   Q5/17   2012-02-07
[ 583 ]  
 
Authentication integration solution for WLAN scenario in X.authi.     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-02-07
[ 515 ]  
 
Authentication integration based on authentication gateway in X.authi     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2011-08-10
[ 514 ]  
 
Authentication integration based on network authentication result transfer in X.authi     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2011-08-10
[ 513 ]  
 
Proposal for a new work item: Security Management Guideline for Customer Information in Telecommunications Organization     China Mobile Communications Corporation   Q3/17   2011-08-10
[ 512 ]  
 
Proposal for a new work item: Technologies Involved in Countering Voice Spam in Telecommunication Organizations     China Mobile Communications Corporation   Q5/17, Q4/17   2011-08-10
[ 511 ]  
 
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks     China Mobile Communications Corporation   Q4/17   2011-08-10
[ 510 ]  
 
Proposal for a new work item: Malicious and Harmful Source Traceback on Spam for Child Online Protection     China Mobile Communications Corporation   Q5/17   2011-08-10
[ 509 ]  
 
Performance and Interface of the abnormal traffic detection and control system     China Mobile Communications Corporation , Huawei Technologies Co. Ltd.   Q4/17   2011-08-10
[ 508 ]  
 
Proposed draft Recommendation for X.authi: Authentication integration in IDM     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2011-08-10
[ 507 ]  
 
VoIP security mechanism of X.p2p-3     China , China Mobile Communications Corporation , ZTE Corporation   Q7/17   2011-08-10
Resultats:23 documents
 
Téléchargement de multiples documents: Cocher les cases correspondant aux documents sélectionnés, puis appuyer sur "Télécharger"
   
 
Préférences utilisateur: 
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):
Pages de navigation HTML  
Formats  + Autres formats
Langues (maximum 2)  + Multilingue 
(E: Anglais - F: Français - S: Espagnol - A: Arabe - C: Chinois - R: Russe)

Testez ITU Translate pour la traduction automatique de documents
Début de page -  Commentaires -  Contactez-nous -  Droits d'auteur © UIT 2008 Tous droits réservés
Contact pour cette page :  TSB EDH
Mis à jour le : 2024-10-15