Union Internationale des Télécommunications   UIT
English  Español
 
Plan du site Contactez-nous Copie Imprimable
  Page d'accueil : UIT-T : SG 17 : Contributions  Ajoutés récemment -  Recherche de documents de réunion
   
UIT-T SG 17  C 

UIT-T SG 17

Sécurité

Période d'études 2009

Resultats:756 documents
Résultats :  Précédent -  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15 - 16 - 17 - 18 - 19 - 20 - 21 - 22 - 23 - 24 - 25 - 26 - 27 - 28 - 29 - 30 - 31  - Suivant Next
Contributions  Documents / Contributions
 
Numéro 
Date Source Titre Questions
[ 606 ]  
 
2012-02-07 Korea (Rep. of)   The 5th revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index     Q4/17  
[ 605 ]  
 
2012-02-07 Korea (Rep. of)   The 5th revised text on draft Recommendation ITU-T X.trm: Overview of traceback mechanisms     Q4/17  
[ 604 ]  
 
2012-02-07 Korea (Rep. of)   The 5th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks     Q4/17  
[ 603 ]  
 
2012-02-07 Korea (Rep. of)   Specific needs for PII management guidelines for telecommunication organizations     Q3/17  
[ 602 ]  
 
2012-02-07 KDDI Corporation   Comments on SG17 working structure for the next study period     QALL/17  
[ 601 ]  
 
2012-02-07 United Kingdom   Agreement from X.discovery CG Teleconference     Q10/17  
[ 600 ]  
 
2012-02-07 United Kingdom   UK Comments on COM 17 - R 41 - E Draft Recommendation ITU-T X.1037 (X.rev), Architectural systems for security controls for preventing fraudulent activities in public carrier networks     Q2/17  
[ 599 ]  
 
2012-02-07 Electronics and Telecommunications Research Institute (ETRI)   A proposal for the second draft Recommendation of ITU-T X.sap-5: Guideline on anonymous authentication for e-commerce service     Q7/17  
[ 598 ]  
 
2012-02-07 China , China Unicom   Proposed content in X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     Q5/17  
[ 597 ]  
 
2012-02-07 China   Comments on X.ics: A practical reference model for countering email spam using botnet information     Q5/17  
[ 596 ]  
 
2012-02-07 China   Proposal to establish a tutorial mechanism for new technologies     QALL/17  
[ 595 ]  
 
2012-02-07 China   Updated text of X.msec-6: Security aspects of smartphones     Q6/17  
[ 594 ]  
 
2012-02-07 China   Proposal on security requirements of digital distribution platforms of X.msec-6     Q6/17  
[ 593 ]  
 
2012-02-07 China   Updated text of X.oacms: Overall aspects of countering mobile messaging spam     Q5/17  
[ 592 ]  
 
2012-02-07 China , China Unicom   Proposal on changing the title name of X.msec-6 back to smartphone     Q6/17  
[ 591 ]  
 
2012-02-07 Electronics and Telecommunications Research Institute (ETRI)   Proposal of new security requirements for cloud based telecommunication service X.srfctse     Q8/17  
[ 590 ]  
 
2012-02-07 Electronics and Telecommunications Research Institute (ETRI)   Proposal for new security requirements of social networking     Q7/17  
[ 589 ]  
 
2012-02-07 China Mobile Communications Corporation , ZTE Corporation   Security Protection of Customer Information in Telecom Operators     Q3/17  
[ 588 ]  
 
2012-02-07 China Mobile Communications Corporation , ZTE Corporation   Authentication result transfer based on encrypted cookie for WLAN scenario     Q10/17  
[ 587 ]  
 
2012-02-07 China Mobile Communications Corporation , Huawei Technologies Co. Ltd.   Interface of the abnormal traffic detection and control system     Q4/17  
[ 586 ]  
 
2012-02-07 China Mobile Communications Corporation   Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks     Q6/17  
[ 585 ]  
 
2012-02-07 China Mobile Communications Corporation   Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"     Q6/17  
[ 584 ]  
 
2012-02-07 China Mobile Communications Corporation   A Draft of Technology Involved in Countering Voice Spam-X.ticvs     Q5/17  
[ 583 ]  
 
2012-02-07 China Mobile Communications Corporation , ZTE Corporation   Authentication integration solution for WLAN scenario in X.authi.     Q10/17  
[ 582 ]  
 
2012-02-07 Microsoft Corporation   Candidate Use Cases for Cloud Computing Security     Q8/17  
Resultats:756 documents
Résultats :  Précédent -  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15 - 16 - 17 - 18 - 19 - 20 - 21 - 22 - 23 - 24 - 25 - 26 - 27 - 28 - 29 - 30 - 31  - Suivant Next
 
Téléchargement de multiples documents: Cocher les cases correspondant aux documents sélectionnés, puis appuyer sur "Télécharger"
   
 
Préférences utilisateur: 
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):
Pages de navigation HTML  
Formats  + Autres formats
Langues (maximum 2)  + Multilingue 
(E: Anglais - F: Français - S: Espagnol - A: Arabe - C: Chinois - R: Russe)

 

Début de page -  Commentaires -  Contactez-nous -  Droits d'auteur © UIT 2008 Tous droits réservés
Contact pour cette page :  TSB EDH
Mis à jour le : 2012-09-06