Unión Internacional de Telecomunicaciones   UIT
English  Français
 
Mapa Contáctenos Copia Imprimible
  Página principal : UIT-T : SG 17 : Contribuciones  Nuevo -  Busque los documentos de la reunión
   
UIT-T SG 17  C 

UIT-T SG 17

Seguridad

Periodo de estudios 2009

Resultados :756 documentos
Resultados :  Anterior -  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15 - 16 - 17 - 18 - 19 - 20 - 21 - 22 - 23 - 24 - 25 - 26 - 27 - 28 - 29 - 30 - 31  - Siguiente Next
Contribuciones  Documents / Contributions
 
Número 
Fecha Origen Título Cuestiones
[ 606 ]  
 
2012-02-07 Korea (Rep. of)   The 5th revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index     Q4/17  
[ 605 ]  
 
2012-02-07 Korea (Rep. of)   The 5th revised text on draft Recommendation ITU-T X.trm: Overview of traceback mechanisms     Q4/17  
[ 604 ]  
 
2012-02-07 Korea (Rep. of)   The 5th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks     Q4/17  
[ 603 ]  
 
2012-02-07 Korea (Rep. of)   Specific needs for PII management guidelines for telecommunication organizations     Q3/17  
[ 602 ]  
 
2012-02-07 KDDI Corporation   Comments on SG17 working structure for the next study period     QALL/17  
[ 601 ]  
 
2012-02-07 United Kingdom   Agreement from X.discovery CG Teleconference     Q10/17  
[ 600 ]  
 
2012-02-07 United Kingdom   UK Comments on COM 17 - R 41 - E Draft Recommendation ITU-T X.1037 (X.rev), Architectural systems for security controls for preventing fraudulent activities in public carrier networks     Q2/17  
[ 599 ]  
 
2012-02-07 Electronics and Telecommunications Research Institute (ETRI)   A proposal for the second draft Recommendation of ITU-T X.sap-5: Guideline on anonymous authentication for e-commerce service     Q7/17  
[ 598 ]  
 
2012-02-07 China , China Unicom   Proposed content in X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     Q5/17  
[ 597 ]  
 
2012-02-07 China   Comments on X.ics: A practical reference model for countering email spam using botnet information     Q5/17  
[ 596 ]  
 
2012-02-07 China   Proposal to establish a tutorial mechanism for new technologies     QALL/17  
[ 595 ]  
 
2012-02-07 China   Updated text of X.msec-6: Security aspects of smartphones     Q6/17  
[ 594 ]  
 
2012-02-07 China   Proposal on security requirements of digital distribution platforms of X.msec-6     Q6/17  
[ 593 ]  
 
2012-02-07 China   Updated text of X.oacms: Overall aspects of countering mobile messaging spam     Q5/17  
[ 592 ]  
 
2012-02-07 China , China Unicom   Proposal on changing the title name of X.msec-6 back to smartphone     Q6/17  
[ 591 ]  
 
2012-02-07 Electronics and Telecommunications Research Institute (ETRI)   Proposal of new security requirements for cloud based telecommunication service X.srfctse     Q8/17  
[ 590 ]  
 
2012-02-07 Electronics and Telecommunications Research Institute (ETRI)   Proposal for new security requirements of social networking     Q7/17  
[ 589 ]  
 
2012-02-07 China Mobile Communications Corporation , ZTE Corporation   Security Protection of Customer Information in Telecom Operators     Q3/17  
[ 588 ]  
 
2012-02-07 China Mobile Communications Corporation , ZTE Corporation   Authentication result transfer based on encrypted cookie for WLAN scenario     Q10/17  
[ 587 ]  
 
2012-02-07 China Mobile Communications Corporation , Huawei Technologies Co. Ltd.   Interface of the abnormal traffic detection and control system     Q4/17  
[ 586 ]  
 
2012-02-07 China Mobile Communications Corporation   Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks     Q6/17  
[ 585 ]  
 
2012-02-07 China Mobile Communications Corporation   Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"     Q6/17  
[ 584 ]  
 
2012-02-07 China Mobile Communications Corporation   A Draft of Technology Involved in Countering Voice Spam-X.ticvs     Q5/17  
[ 583 ]  
 
2012-02-07 China Mobile Communications Corporation , ZTE Corporation   Authentication integration solution for WLAN scenario in X.authi.     Q10/17  
[ 582 ]  
 
2012-02-07 Microsoft Corporation   Candidate Use Cases for Cloud Computing Security     Q8/17  
Resultados :756 documentos
Resultados :  Anterior -  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15 - 16 - 17 - 18 - 19 - 20 - 21 - 22 - 23 - 24 - 25 - 26 - 27 - 28 - 29 - 30 - 31  - Siguiente Next
 
Telecarga de múltiples documentos: Marcar las casillas correspondientes a los documentos seleccionados, a continuación pulsar "Telecargar"
   
 
Preferencias del usuario: 
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):
Páginas de navegación HTML  
Formatos  + Otros formatos
Idiomas (máximo 2)  + Multilingüe  
(E: inglés - F: francés - S: español - A: árabe - C: chino - R: ruso)

 

Comienzo de la página -  Comentarios -  Contáctenos -  Copyright © UIT 2008 Reservados todos los derechos
Contacto público :  TSB EDH
Actualizado el : 2012-09-06