Contributions |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 631 ]
(Rev.1) |
Proposal for modifying the response architecture of X.bots
|
Hitachi, Ltd.
,
KDDI Corporation
|
Q7/17, Q4/17
|
2012-02-07 |
|
[ 630 ]
(Rev.1) |
Proposal for modifying the motivation of Q.G/17
|
Hitachi, Ltd.
,
KDDI Corporation
|
Q7/17
|
2012-02-07 |
|
[ 629 ]
(Rev.1) |
Proposal for modifying the question text of Q.H/17
|
Hitachi, Ltd.
|
Q8/17
|
2012-02-07 |
|
[ 628 ]
(Rev.1-2) |
Proposal on modification of X.sap-4
|
Hitachi, Ltd.
|
Q7/17, Q10/17
|
2012-02-07 |
|
[ 627 ]
|
Child Online Protection
|
Russian Federation
|
Q9/17, Q8/17, Q7/17, Q6/17
|
2012-02-07 |
|
[ 626 ]
|
Providing e-Government services security
|
Russian Federation
|
Q1/17
|
2012-02-07 |
|
[ 625 ]
|
Coordinating Activity in Cloud Computing Security
|
Russian Federation
|
Q2/17
|
2012-02-07 |
|
[ 624 ]
|
Providing security in the use of ICT within critical infrastructures
|
Russian Federation
|
Q1/17
|
2012-02-07 |
|
[ 623 ]
|
Strengthening the role and responsibilities of SG 17 to study cloud computing and smart grid security
|
Korea (Rep. of)
|
QALL/17
|
2012-02-07 |
|
[ 622 ]
|
Proposal for new work item of Security architecture and operations for web mashup services
|
Korea (Rep. of)
|
Q7/17
|
2012-02-07 |
|
[ 621 ]
|
Proposal for revised draft text of X.bhsm: Telebiomtric authentication framework using biometric hardware security module
|
Korea (Rep. of)
|
Q9/17
|
2012-02-07 |
|
[ 620 ]
|
Proposal for revised text on draft Recommendation ITU-T X.mob-id (for determination)
|
Korea (Rep. of)
|
Q10/17
|
2012-02-07 |
|
[ 619 ]
|
Proposal for new work item on security requirements and functional framework for social networking
|
Korea (Rep. of)
|
Q7/17
|
2012-02-07 |
|
[ 618 ]
|
X.iptvsec-8: Proposed summary and text of clause 6.1, 6.3, 7, 8.1
|
Korea (Rep. of)
|
Q6/17
|
2012-02-07 |
|
[ 617 ]
|
Proposed text for draft Recommendation ITU-T X.iptvsec-4: Algorithm selection schemes for SCP descrambling for consent
|
Korea (Rep. of)
|
Q6/17
|
2012-02-07 |
|
[ 616 ]
|
Proposal of the 2nd draft text for X.sap-6: Non-repudiation framework based on a one time password
|
Korea (Rep. of)
|
Q7/17
|
2012-02-07 |
|
[ 615 ]
|
Proposal for revised text on draft Recommendation X.usnsec-3: Security requirements for wireless sensor network routing
|
Korea (Rep. of)
|
Q6/17
|
2012-02-07 |
|
[ 614 ]
|
Proposal for new work item on guideline for secure applications on mobile phone
|
Korea (Rep. of)
|
Q6/17
|
2012-02-07 |
|
[ 613 ]
|
Proposal for new work item on security framework for smart grid
|
Korea (Rep. of)
|
Q6/17
|
2012-02-07 |
|
[ 612 ]
|
Comments on draft IPv6 Security Guideline for Telecommunications
|
KDDI Corporation
,
National Institute of Information and Communications Technology (NICT)
|
Q2/17
|
2012-02-07 |
|
[ 611 ]
|
The 7th revised text of Draft Recommendation ITU-T X.websec-4: Security framework for enhanced web based telecommunication service for consent
|
Korea (Rep. of)
|
Q7/17
|
2012-02-07 |
|
[ 610 ]
|
Withdrawn
|
N/A
|
|
2012-02-07 |
|
[ 609 ]
|
The final draft Recommendation ITU-T X.1086, Amendment 1 for Consent
|
Korea (Rep. of)
|
Q9/17
|
2012-02-07 |
|
[ 608 ]
|
A proposal for the 4th revised text of Draft Recommendation ITU-T X.iptvsec-7: Guidelines on criteria for selecting cryptographic algorithms for IPTV service and content protection for consent
|
Korea (Rep. of)
|
Q6/17
|
2012-02-07 |
|
[ 607 ]
|
A proposal for the 4th revised text for Recommendation ITU-T X.iptvsec-6: Framework for the downloadable service and content protection system in the mobile IPTV environment
|
Korea (Rep. of)
|
Q6/17
|
2012-02-07 |
|
[ 606 ]
|
The 5th revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index
|
Korea (Rep. of)
|
Q4/17
|
2012-02-07 |
|
[ 605 ]
|
The 5th revised text on draft Recommendation ITU-T X.trm: Overview of traceback mechanisms
|
Korea (Rep. of)
|
Q4/17
|
2012-02-07 |
|
[ 604 ]
|
The 5th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
|
Korea (Rep. of)
|
Q4/17
|
2012-02-07 |
|
[ 603 ]
|
Specific needs for PII management guidelines for telecommunication organizations
|
Korea (Rep. of)
|
Q3/17
|
2012-02-07 |
|
[ 602 ]
|
Comments on SG17 working structure for the next study period
|
KDDI Corporation
|
QALL/17
|
2012-02-07 |
|
[ 601 ]
|
Agreement from X.discovery CG Teleconference
|
United Kingdom
|
Q10/17
|
2012-02-07 |
|
[ 600 ]
|
UK Comments on COM 17 - R 41 - E Draft Recommendation ITU-T X.1037 (X.rev), Architectural systems for security controls for preventing fraudulent activities in public carrier networks
|
United Kingdom
|
Q2/17
|
2012-02-07 |
|
[ 599 ]
|
A proposal for the second draft Recommendation of ITU-T X.sap-5: Guideline on anonymous authentication for e-commerce service
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2012-02-07 |
|
[ 598 ]
|
Proposed content in X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
China
,
China Unicom
|
Q5/17
|
2012-02-07 |
|
[ 597 ]
|
Comments on X.ics: A practical reference model for countering email spam using botnet information
|
China
|
Q5/17
|
2012-02-07 |
|
[ 596 ]
|
Proposal to establish a tutorial mechanism for new technologies
|
China
|
QALL/17
|
2012-02-07 |
|
[ 595 ]
|
Updated text of X.msec-6: Security aspects of smartphones
|
China
|
Q6/17
|
2012-02-07 |
|
[ 594 ]
|
Proposal on security requirements of digital distribution platforms of X.msec-6
|
China
|
Q6/17
|
2012-02-07 |
|
[ 593 ]
|
Updated text of X.oacms: Overall aspects of countering mobile messaging spam
|
China
|
Q5/17
|
2012-02-07 |
|
[ 592 ]
|
Proposal on changing the title name of X.msec-6 back to smartphone
|
China
,
China Unicom
|
Q6/17
|
2012-02-07 |
|
[ 591 ]
|
Proposal of new security requirements for cloud based telecommunication service X.srfctse
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q8/17
|
2012-02-07 |
|
[ 590 ]
|
Proposal for new security requirements of social networking
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2012-02-07 |
|
[ 589 ]
|
Security Protection of Customer Information in Telecom Operators
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q3/17
|
2012-02-07 |
|
[ 588 ]
|
Authentication result transfer based on encrypted cookie for WLAN scenario
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2012-02-07 |
|
[ 587 ]
|
Interface of the abnormal traffic detection and control system
|
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
|
Q4/17
|
2012-02-07 |
|
[ 586 ]
|
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks
|
China Mobile Communications Corporation
|
Q6/17
|
2012-02-07 |
|
[ 585 ]
|
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"
|
China Mobile Communications Corporation
|
Q6/17
|
2012-02-07 |
|
[ 584 ]
|
A Draft of Technology Involved in Countering Voice Spam-X.ticvs
|
China Mobile Communications Corporation
|
Q5/17
|
2012-02-07 |
|
[ 583 ]
|
Authentication integration solution for WLAN scenario in X.authi.
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2012-02-07 |
|
[ 582 ]
|
Candidate Use Cases for Cloud Computing Security
|
Microsoft Corporation
|
Q8/17
|
2012-02-07 |
Results:756 total items. Result page:
Previous -
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11 -
12 -
13 -
14 -
15 -
16
- Next
|
Multiple Document Download: Formats and Languages to be included (when available):