International Telecommunication Union   ITU
Français  Español
 
Site map Contact Us Print version
  Home : ITU-T : SG 17 : Contributions  Recently posted -  Search Meeting Documents
   
ITU-T SG 17  C 

ITU-T SG 17

Security

Study Period 2009

Results:756 total items.
Result page:  Previous -  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15 - 16 - 17 - 18 - 19 - 20 - 21 - 22 - 23 - 24 - 25 - 26 - 27 - 28 - 29 - 30 - 31  - Next Next
Contributions  Documents / Contributions
 
Number 
Received Source Title Questions
[ 606 ]  
 
2012-02-07 Korea (Rep. of)   The 5th revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index     Q4/17  
[ 605 ]  
 
2012-02-07 Korea (Rep. of)   The 5th revised text on draft Recommendation ITU-T X.trm: Overview of traceback mechanisms     Q4/17  
[ 604 ]  
 
2012-02-07 Korea (Rep. of)   The 5th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks     Q4/17  
[ 603 ]  
 
2012-02-07 Korea (Rep. of)   Specific needs for PII management guidelines for telecommunication organizations     Q3/17  
[ 602 ]  
 
2012-02-07 KDDI Corporation   Comments on SG17 working structure for the next study period     QALL/17  
[ 601 ]  
 
2012-02-07 United Kingdom   Agreement from X.discovery CG Teleconference     Q10/17  
[ 600 ]  
 
2012-02-07 United Kingdom   UK Comments on COM 17 - R 41 - E Draft Recommendation ITU-T X.1037 (X.rev), Architectural systems for security controls for preventing fraudulent activities in public carrier networks     Q2/17  
[ 599 ]  
 
2012-02-07 Electronics and Telecommunications Research Institute (ETRI)   A proposal for the second draft Recommendation of ITU-T X.sap-5: Guideline on anonymous authentication for e-commerce service     Q7/17  
[ 598 ]  
 
2012-02-07 China , China Unicom   Proposed content in X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     Q5/17  
[ 597 ]  
 
2012-02-07 China   Comments on X.ics: A practical reference model for countering email spam using botnet information     Q5/17  
[ 596 ]  
 
2012-02-07 China   Proposal to establish a tutorial mechanism for new technologies     QALL/17  
[ 595 ]  
 
2012-02-07 China   Updated text of X.msec-6: Security aspects of smartphones     Q6/17  
[ 594 ]  
 
2012-02-07 China   Proposal on security requirements of digital distribution platforms of X.msec-6     Q6/17  
[ 593 ]  
 
2012-02-07 China   Updated text of X.oacms: Overall aspects of countering mobile messaging spam     Q5/17  
[ 592 ]  
 
2012-02-07 China , China Unicom   Proposal on changing the title name of X.msec-6 back to smartphone     Q6/17  
[ 591 ]  
 
2012-02-07 Electronics and Telecommunications Research Institute (ETRI)   Proposal of new security requirements for cloud based telecommunication service X.srfctse     Q8/17  
[ 590 ]  
 
2012-02-07 Electronics and Telecommunications Research Institute (ETRI)   Proposal for new security requirements of social networking     Q7/17  
[ 589 ]  
 
2012-02-07 China Mobile Communications Corporation , ZTE Corporation   Security Protection of Customer Information in Telecom Operators     Q3/17  
[ 588 ]  
 
2012-02-07 China Mobile Communications Corporation , ZTE Corporation   Authentication result transfer based on encrypted cookie for WLAN scenario     Q10/17  
[ 587 ]  
 
2012-02-07 China Mobile Communications Corporation , Huawei Technologies Co. Ltd.   Interface of the abnormal traffic detection and control system     Q4/17  
[ 586 ]  
 
2012-02-07 China Mobile Communications Corporation   Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks     Q6/17  
[ 585 ]  
 
2012-02-07 China Mobile Communications Corporation   Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"     Q6/17  
[ 584 ]  
 
2012-02-07 China Mobile Communications Corporation   A Draft of Technology Involved in Countering Voice Spam-X.ticvs     Q5/17  
[ 583 ]  
 
2012-02-07 China Mobile Communications Corporation , ZTE Corporation   Authentication integration solution for WLAN scenario in X.authi.     Q10/17  
[ 582 ]  
 
2012-02-07 Microsoft Corporation   Candidate Use Cases for Cloud Computing Security     Q8/17  
Results:756 total items.
Result page:  Previous -  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15 - 16 - 17 - 18 - 19 - 20 - 21 - 22 - 23 - 24 - 25 - 26 - 27 - 28 - 29 - 30 - 31  - Next Next
 
Multiple Document Download: Check the boxes of the selected documents, then click "Zip and download"
   
 
User preferences: 
Multiple Document Download: Formats and Languages to be included (when available):
HTML Navigation Pages  
Formats  + Other formats
Languages (maximum 2)  + Multilingual 
(E: English - F: French - S: Spanish - A: Arabic - C: Chinese - R: Russian)

 

Top -  Feedback -  Contact Us -  Copyright © ITU 2008 All Rights Reserved
Contact for this page :  TSB EDH
Updated : 2012-09-06