Committed to connecting the world

  •  
wtisd

SG17 - List of Editors (Study Period 2017-2020)

Export:   
ITEM and TITLE EDITOR
TP.sec-arch

Technical Paper: Implications and further considerations of security architecture patterns


Arnaud Taddei
Editor

Email: arnaud.taddei[at]broadcom.com
TR.cs-ML

Technical Report: ITU-T Countering spam based on machine learning


Elizabeth Essel
Editor

Email: elizabeth.essel[at]nca.org.gh
Wei Liu
Editor

Email: liuweiyfyw[at]chinamobile.com
Weidong Wang
Editor

Email: wangweidong[at]chinawllc.com
Lei Xu
Editor

Email: xulei56[at]chinaunicom.cn
Yanbin Zhang
Editor

Email: zhangyanbin[at]catr.cn
TR.cta

Technical Report: Use cases of contact tracing applications to prevent spread of infectious diseases


Mee Yeon Kim
Editor

Email: 17kmy[at]sch.ac.kr
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
TR.fssvs

Technical Report: Framework for Security Standardization for Virtualized Services


Mark McFadden
Editor

Email: mark[at]internetpolicyadvisors.com
TR.qs-dlt

Technical Report: Guidelines for quantum-safe DLT system


Fuwen Liu
Editor

Email: liufuwen[at]chinamobile.com
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
Bo Yang
Editor

Email: yangbo[at]chinamobile.com
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
TR.sec-compendium-rev

Security compendium


Sandor Mazgon
Editor

Email: sandor.mazgon[at]ties.itu.int
TR.sec-manual-rev

Security in telecommunications and information technology (8th edition)


Kyeong Hee Oh
Editor

Email: khoh[at]tcaservices.kr
TR.sec-roadmap-rev

ICT security standards roadmap


Yiwen Wang
Editor

Email: wangyiwen[at]caict.ac.cn
TR.sec-sr-rev

SG17 activities and achievements in support of the most recent Resolutions of the ITU PP, WTDC and WTSA


Juhee Ki
Editor

Email: eye[at]iitp.kr
TR.sgfdcml

Technical Report: FHE-based data collaboration in machine learning


Jihoon Cho
Editor

Email: jihoon1.cho[at]samsung.com
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Donggeon Yhee
Editor

Email: dgyhee[at]gmail.com
TR.Suss-rev

Successful use of security standards (3nd edition)


Abbie Barbir
Editor

Email: barbira[at]aetna.com
X.5Gsec-ecs

Security framework for 5G edge computing services


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
Bo Yu
Editor

Email: yubo49[at]chinaunicom.cn
Xiaojun ZHUANG
Editor

Email: zhuangxiaojun[at]chinamobile.com
X.5Gsec-guide

Security guideline for 5G communication system


Mee Yeon Kim
Editor

Email: 17kmy[at]sch.ac.kr
Keundug Park
Editor

Email: jacepark926[at]gmail.com
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.5Gsec-netec

Security capabilities of network layer for 5G edge computing


Chen Zhang
Editor

Email: zhangchen[at]cmdi.chinamobile.com
Feng Zhang
Editor

Email: zhangfeng[at]chinamobile.com
X.5Gsec-ssl

Guidelines for classifying security capabilities in 5G network slice


Zhiyuan HU
Editor

Email: zhiyuan.1.hu[at]nokia-sbell.com
Li Su
Editor

Email: suli[at]chinamobile.com
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
Bo Yang
Editor

Email: yangbo[at]chinamobile.com
X.5Gsec-t

Security framework based on trust relationship in 5G ecosystem


Jin Peng
Editor

Email: pengjin[at]chinamobile.com
Minpeng Qi
Editor

Email: qiminpeng[at]chinamobile.com
Junzhi YAN
Editor

Email: yanjunzhi[at]chinamobile.com
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.5Gsec-vs

Security requirements for vertical services supporting ultra reliable and low latency communication (URLLC) in the 5G non-public networks


Jae eon Oh
Editor

Email: jeoh[at]coxpat.com
Seongki Shin
Editor

Email: skshin[at]magdata.net
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.510Amd.1

Information Technology - Open systems Interconnection - The Directory - Protocol specifications for secure operations


Erik Andersen
Editor

Email: era[at]x500.eu
X.672rev

Information technology - Open systems interconnection - Object identifier resolution system


Han Hongqiang
Editor

Email: ninehalf[at]163.com
Linjian Song
Editor

Email: linjian.slj[at]alibaba-inc.com
X.1051rev2

Code of practice for Information security controls based on ISO/IEC 27002 for telecommunication organizations


Hang Dong
Editor

Email: donghang[at]chinamobile.com
Jinghua Min
Editor

Email: minjinghua[at]cecgw.cn
Thaib Mustafa
Editor

Email: thaibmus[at]tab.com.my
X.1054rev

Information security, cybersecurity and privacy protection - Governance of information security


Jinghua Min
Editor

Email: minjinghua[at]cecgw.cn
Thaib Mustafa
Editor

Email: thaibmus[at]tab.com.my
Anfana Traore
Editor

Email: anfana.traore[at]gmail.com
X.1246rev

Technologies involved in countering voice spam in telecommunication organizations


Dmitry Cherkesov
Editor

Email: dcherkesov[at]gmail.com
Yanbin Zhang
Editor

Email: zhangyanbin[at]catr.cn
X.1247rev

Technical framework for countering mobile messaging spam


Dmitry Cherkesov
Editor

Email: dcherkesov[at]gmail.com
Yanbin Zhang
Editor

Email: zhangyanbin[at]catr.cn
X.1250rev

Baseline capabilities for enhanced global identity management and interoperability


Abbie Barbir
Editor

Email: barbira[at]aetna.com
X.1252rev

Baseline identity management terms and definitions


Abbie Barbir
Editor

Email: barbira[at]aetna.com
X.1373rev

Secure software update capability for intelligent transportation system communication devices


Aram Cho
Editor

Email: aram[at]hyundai.com
Sang-Woo Lee
Editor

Email: ttomlee[at]etri.re.kr
Koji Nakao
Editor

Email: ko-nakao[at]nict.go.jp
Seungwook Park
Editor

Email: seungwook.park[at]hyundai.com
X.1712

Security requirements for quantum key distribution networks - key management


Kaoru Kenyoshi
Editor

Email: kaoru.kenyoshi[at]nict.go.jp
Jiajun Ma
Editor

Email: jiajun.ma[at]quantum-info.com
Hao Qin
Editor

Email: qinhao[at]casquantumnet.com
Dong-Hi Sim
Editor

Email: donghee.shim[at]sk.com
X.1811

Security guidelines for applying quantum-safe algorithms in 5G systems


Zhiyuan HU
Editor

Email: zhiyuan.1.hu[at]nokia-sbell.com
Zhaoji Lin
Editor

Email: lin.zhaoji[at]zte.com.cn
Fuwen Liu
Editor

Email: liufuwen[at]chinamobile.com
Junzhi Yan
Editor

Email: yanjunzhi[at]chinamobile.com
X.arc-ev

Security architecture for evaluation of technical vulnerabilities


Wei Li
Editor

Email: liweiw[at]chinamobile.com
Shan Xue
Editor

Email: xueshan[at]cmdi.chinamobile.com
Chen Zhang
Editor

Email: zhangchen[at]cmdi.chinamobile.com
X.arch-design

Design principles and best practices for security architectures


Arnaud Taddei
Editor

Email: arnaud.taddei[at]broadcom.com
X.b2m

Biology to machine protocol


Erik Andersen
Editor

Email: era[at]x500.eu
John George Caras
Editor

Email: john.caras[at]telebiometrics.com
Myung Geun Chun
Editor

Email: mgchun[at]chungbuk.ac.kr
X.BaaS-sec

Guideline on DLT as a service (BaaS) security


Nan Meng
Editor

Email: mengnan[at]caict.ac.cn
Kyeong Hee Oh
Editor

Email: khoh[at]tcaservices.kr
X.ciag

Guidelines to acquire cyber insurance


Thaib Mustafa
Editor

Email: thaibmus[at]tab.com.my
Ong Yew Seng
Editor

Email: ys.ong[at]provintell.com
X.das-mgt

Security threats and requirements for data access and sharing management system based on distributed ledger technology


Zhiyuan HU
Editor

Email: zhiyuan.1.hu[at]nokia-sbell.com
Mee Yeon Kim
Editor

Email: 17kmy[at]sch.ac.kr
Keundug Park
Editor

Email: jacepark926[at]gmail.com
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.edrsec

Security guidelines for cloud-based event data recorders in automotive environment


Sang-Woo Lee
Editor

Email: ttomlee[at]etri.re.kr
Whapyeong Lim
Editor

Email: hplim2[at]hyundai.com
Seungwook Park
Editor

Email: seungwook.park[at]hyundai.com
X.eivnsec

Security guidelines for the Ethernet-based in-vehicle networks


Sang-Woo Lee
Editor

Email: ttomlee[at]etri.re.kr
You-Sik Lee
Editor

Email: yousik.lee[at]escrypt.com
X.evtol-sec

Security guidelines for electric vertical take-off and landing (eVTOL) vehicle in an urban air mobility environment


Aram Cho
Editor

Email: aram[at]hyundai.com
Sang-Woo Lee
Editor

Email: ttomlee[at]etri.re.kr
Whapyeong Lim
Editor

Email: hplim2[at]hyundai.com
Seungwook Park
Editor

Email: seungwook.park[at]hyundai.com
X.fram-cdc

Framework for the creation and operation of a cyber defence center


Shinji ABE
Editor

Email: shinji.abe[at]global.ntt
Arnaud Taddei
Editor

Email: arnaud.taddei[at]broadcom.com
Shigenori TAKEI
Editor

Email: takei.shigenori[at]ntt-tx.co.jp
X.fstiscv

Framework of security threat information sharing for connected vehicles


Min SHU
Editor

Email: shumin[at]cert.org.cn
Wenlei WANG
Editor

Email: wwl[at]cert.org.cn
Xiaochun Yun
Editor

Email: yunxiaochun[at]cert.org.cn
Yunwei Zhao
Editor

Email: zhaoyunweimail[at]163.com
X.gcims

Guidelines for countering spam over instant messaging


Huamin JIN
Editor

Email: jhm[at]gsta.com;
ChangOh Kim
Editor

Email: ispiadviser[at]gmail.com
Laifu Wang
Editor

Email: wanglf[at]gsta.com
Shuai Wang
Editor

Email: wangs[at]gsta.com
Yanbin Zhang
Editor

Email: zhangyanbin[at]catr.cn
X.gcmms

Guideline for countering Multimedia Messaging Service spam


Jinfeng KOU
Editor

Email: koujf5[at]chinaunicom.cn
Zhaoji Lin
Editor

Email: lin.zhaoji[at]zte.com.cn
Wei Liu
Editor

Email: liuweiyfyw[at]chinamobile.com
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
X.gpwd

Threat Analysis and guidelines for securing password and password-less authentication solutions


Abbie Barbir
Editor

Email: barbira[at]aetna.com
X.icd-schemas

Security data schemas for integrated cyber defence solutions


Arnaud Taddei
Editor

Email: arnaud.taddei[at]broadcom.com
X.iotsec-4

Security requirements for IoT devices and gateway


Jiho BANG
Editor

Email: hallel73[at]naver.com
Wonsuk Chung
Editor

Email: wschunga[at]ktc.re.kr
Sanggeol LEE
Editor

Email: leesg[at]kisa.or.kr
Hosoek Ryu
Editor

Email: hsryu[at]kisa.or.kr
X.ipscv

Methodologies for intrusion prevention systems for connected vehicles


Seonghoon Jeong
Editor

Email: seonghoon[at]korea.ac.kr
HuyKang Kim
Editor

Email: cenda[at]korea.ac.kr
Sang-Woo Lee
Editor

Email: ttomlee[at]etri.re.kr
Whapyeong Lim
Editor

Email: hplim2[at]hyundai.com
Seungwook Park
Editor

Email: seungwook.park[at]hyundai.com
Junghei Ryu
Editor

Email: junhei.ryu[at]hyundai.com
X.itssec-5

Security guidelines for vehicular edge computing


Sang-Woo Lee
Editor

Email: ttomlee[at]etri.re.kr
X.nsom-sec

Security requirements and architecture for network slice management and orchestration


Zhiyuan HU
Editor

Email: zhiyuan.1.hu[at]nokia-sbell.com
Huamin JIN
Editor

Email: jhm[at]gsta.com;
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Junzhi YAN
Editor

Email: yanjunzhi[at]chinamobile.com
X.nssa-cc

Requirements of network security situational awareness platform for cloud computing


Huamin JIN
Editor

Email: jhm[at]gsta.com;
Zhaoji Lin
Editor

Email: lin.zhaoji[at]zte.com.cn
Laifu Wang
Editor

Email: wanglf[at]gsta.com
Yi Zhang
Editor

Email: zhangyi1-s[at]360.cn
X.pet_auth

Entity authentication service for pet animals using telebiometrics


Jae-Sung (Jason) Kim
Editor

Email: kimjs[at]kisa.or.kr
Taeheon Kim
Editor

Email: thkim[at]pireco.org
X.pki-em

Public-key infrastructure: Establishment and maintenance


Erik Andersen
Editor

Email: era[at]x500.eu
X.rdda

Requirements for data de-identification assurance


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Yewon Lee
Editor

Email: angela_lee[at]kisa.or.kr
Hyungjin Lim
Editor

Email: hjlim[at]fsec.or.kr
X.rf-csap

Guidlines for continuous protection of service access process


Chao HUANG
Editor

Email: mileshuang[at]tencent.com
Min SHU
Editor

Email: shumin[at]cert.org.cn
Wenlei WANG
Editor

Email: wwl[at]cert.org.cn
Chen Zhang
Editor

Email: zhangchen[at]cmdi.chinamobile.com
X.rsu-sec

Security requirements for road-side units in intelligent transportation systems


Qiguang Fan
Editor

Email: fanqiguang[at]chinamobile.com
Jin Peng
Editor

Email: pengjin[at]chinamobile.com
Ye Tian
Editor

Email: tianye[at]chinamobile.com
Junzhi YAN
Editor

Email: yanjunzhi[at]chinamobile.com
X.sa-dsm

Security architecture of data sharing management based on the distributed ledger technology


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Zhiyuan HU
Editor

Email: zhiyuan.1.hu[at]nokia-sbell.com
Min SHU
Editor

Email: shumin[at]cert.org.cn
Yunwei Zhao
Editor

Email: zhaoyunweimail[at]163.com
X.sc-dlt

Security controls for distributed ledger technology


Kadio Kassy
Editor

Email: kadio.kassy[at]artci.ci
Kyeong Hee Oh
Editor

Email: khoh[at]tcaservices.kr
Keundug Park
Editor

Email: jacepark926[at]gmail.com
Preetika Singh
Editor

Email: preetika.singh87[at]gov.in
X.sc-iot

Security controls for Internet of Things (IoT) systems


Lijun Liu
Editor

Email: liulijun[at]cmiot.chinamobile.com
Koji Nakao
Editor

Email: ko-nakao[at]nict.go.jp
X.scpa

Security measures for countering password related online attacks


Hang Dong
Editor

Email: donghang[at]chinamobile.com
Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Jung Yeon Hwang
Editor

Email: videmot[at]etri.re.kr
Lijun Liu
Editor

Email: liulijun[at]cmiot.chinamobile.com
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Qin Qiu
Editor

Email: qiuqin[at]chinamobile.com
X.sec_QKDN_intrq

Security requirements for integration of QKDN and secure network infrastructures


Kaoru Kenyoshi
Editor

Email: kaoru.kenyoshi[at]nict.go.jp
X.sec-grp-mov

Security guideline for group movement service platform


SangHoon Jeon
Editor

Email: hoon.jeon[at]kakaomobility.com
ChangOh Kim
Editor

Email: ispiadviser[at]gmail.com
JooSun Yoon
Editor

Email: josh.ologist0[at]kakaomobility.com
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.sec-QKDN-tn

Security requirements and designs for quantum key distribution networks - trusted node


Jiajun Ma
Editor

Email: jiajun.ma[at]quantum-info.com
Hao Qin
Editor

Email: qinhao[at]casquantumnet.com
X.sgBDIP

Security guidelines for big data infrastructure and platform


Arnaud Taddei
Editor

Email: arnaud.taddei[at]broadcom.com
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Laifu Wang
Editor

Email: wanglf[at]gsta.com
X.sgcc

Security guidelines for container in cloud computing environment


Lanfang Ren
Editor

Email: renlanfang[at]chinamobile.com
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Laifu Wang
Editor

Email: wanglf[at]gsta.com
Lei Xu
Editor

Email: xulei56[at]chinaunicom.cn
X.sgdc

Security guidelines for distributed cloud


Mark McFadden
Editor

Email: mark[at]internetpolicyadvisors.com
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Laifu Wang
Editor

Email: wanglf[at]gsta.com
Lei Xu
Editor

Email: xulei56[at]chinaunicom.cn
X.sgmc

Security guidelines for multi-cloud


Wei Liu
Editor

Email: liuweiyfyw[at]chinamobile.com
Nan Meng
Editor

Email: mengnan[at]caict.ac.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Lei Xu
Editor

Email: xulei56[at]chinaunicom.cn
Yi Zhang
Editor

Email: zhangyi1-s[at]360.cn
X.sgos

Security guidelines of web-based online customer service


Hang Dong
Editor

Email: donghang[at]chinamobile.com
Lijun Liu
Editor

Email: liulijun[at]cmiot.chinamobile.com
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Wenxin Wang
Editor

Email: wangwenxin[at]chinamobile.com
X.sg-rat

Security guidelines for use of remote access tools in Internet-connected control system


Gunhee Lee
Editor

Email: icezzoco[at]nsr.re.kr
X.sles

Security measures for location enabled smart office services


Hang Dong
Editor

Email: donghang[at]chinamobile.com
Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
X.smdtsc

Security measure for digital twin system of smart cities


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
Feng Zhang
Editor

Email: zhangfeng[at]chinamobile.com
Longjun Zhao
Editor

Email: szcskjyxgs[at]126.com
X.smsrc

Security measure for smart residential community


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
Feng Zhang
Editor

Email: zhangfeng[at]chinamobile.com
Longjun Zhao
Editor

Email: szcskjyxgs[at]126.com
X.srcd

Security requirements for categorized data in V2X communication


Takamasa ISOHARA
Editor

Email: ta-isohara[at]kddi.com
Nan Meng
Editor

Email: mengnan[at]caict.ac.cn
Yaping Sun
Editor

Email: sunyaping[at]caict.ac.cn
Huirong Tian
Editor

Email: tianhuirong[at]caict.ac.cn
X.sr-cphr

Security requirements of cloud-based platform under low latency and high reliability application scenarios


Jie Ma
Editor

Email: majieyjy[at]chinamobile.com
Nan Meng
Editor

Email: mengnan[at]caict.ac.cn
Yaping Sun
Editor

Email: sunyaping[at]caict.ac.cn
Huirong Tian
Editor

Email: tianhuirong[at]caict.ac.cn
X.srcsm-dlt

Security Requirements for Smart Contract Management based on the distributed ledger technology


Tietao Guo
Editor

Email: davidttguo[at]tencent.com
Li Li
Editor

Email: powellli[at]tencent.com
Kyeong Hee Oh
Editor

Email: khoh[at]tcaservices.kr
Min SHU
Editor

Email: shumin[at]cert.org.cn
Yang Wu
Editor

Email: youngywu[at]tencent.com
X.srip-dlt

Security requirements for intellectual property management based on distributed ledger technology


Jung Yeon Hwang
Editor

Email: videmot[at]etri.re.kr
Juhee Ki
Editor

Email: eye[at]iitp.kr
Min SHU
Editor

Email: shumin[at]cert.org.cn
Wenlei WANG
Editor

Email: wwl[at]cert.org.cn
Yang Wu
Editor

Email: youngywu[at]tencent.com
Yunwei Zhao
Editor

Email: zhaoyunweimail[at]163.com
X.ss-dlt

Security services based on distributed ledger technology


Yue Chen
Editor

Email: chenyue[at]cert.org.cn
Zhaoji Lin
Editor

Email: lin.zhaoji[at]zte.com.cn
Min SHU
Editor

Email: shumin[at]cert.org.cn
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
Kai Wei
Editor

Email: weikai[at]caict.ac.cn
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
Junzhi Yan
Editor

Email: yanjunzhi[at]chinamobile.com
X.ssp-iot

Security requirements and framework for IoT service platform


Hang Dong
Editor

Email: donghang[at]chinamobile.com
Yanfei Guo
Editor

Email: guoyanfei[at]chinamobile.com
Lijun Liu
Editor

Email: liulijun[at]cmiot.chinamobile.com
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Wenxin Wang
Editor

Email: wangwenxin[at]chinamobile.com
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
X.stov

Security threats to online voting using distributed ledger technology


Byoung-Moon Chin
Editor

Email: bmchin[at]tta.or.kr
ChangOh Kim
Editor

Email: ispiadviser[at]gmail.com
Keundug Park
Editor

Email: jacepark926[at]gmail.com
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.str-dlt

Security threats and requirements for digital payment services based on distributed ledger technology


ChangOh Kim
Editor

Email: ispiadviser[at]gmail.com
Kyeong Hee Oh
Editor

Email: khoh[at]tcaservices.kr
Preetika Singh
Editor

Email: preetika.singh87[at]gov.in
X.strvms

Security threats and requirements for video management system


Jong Wook Han
Editor

Email: hanjw[at]etri.re.kr
Geon Woo Kim
Editor

Email: kimgw[at]etri.re.kr
Kyungsoo Lim
Editor

Email: lukelim[at]etri.re.kr
X.sup-csc

ITU-T X.1051 - Supplement on critical security controls for telecommunication organizations


Thaib Mustafa
Editor

Email: thaibmus[at]tab.com.my
Patrice Payen
Editor

Email: patrice_payen[at]symantec.com
Arnaud Taddei
Editor

Email: arnaud.taddei[at]broadcom.com
X.tas

Telebiometric authentication using speaker recognition


Fatoumata SAMAKE
Editor

Email: f.samake[at]sotelma.ml
Salif Thiaw
Editor

Email: zthiaw[at]hotmail.com
X.tec-idms

Management and protection techniques for user data protection in distributed identity systems


Abbie Barbir
Editor

Email: barbira[at]aetna.com
X.tecwes

Technologies to countering website spoofing for telecommunication organization


Ruzhen Hu
Editor

Email: huruzhen[at]chinamobile.com
Nan Meng
Editor

Email: mengnan[at]caict.ac.cn
Chen Zhang
Editor

Email: zhangchen[at]cmdi.chinamobile.com
X.tf-mpc

Technical guidelines for secure multi-party computation


Xiaoyuan Bai
Editor

Email: xiaoyuan.bxy[at]alibaba-inc.com
Cheng Hong
Editor

Email: vince.hc[at]alibaba-inc.com
Jung Yeon Hwang
Editor

Email: videmot[at]etri.re.kr
Zhaoji Lin
Editor

Email: lin.zhaoji[at]zte.com.cn
Hongru Zhu
Editor

Email: hongru.zhr[at]alibaba-inc.com
X.tf-spd-dlt

Technical framework for secure software programme distribution mechanism based on distributed ledger technology


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
Bo Yu
Editor

Email: yubo49[at]chinaunicom.cn
X.tsfpp

Technical security framework for protection of users' personal information while countering mobile messaging spam


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
Bo Yu
Editor

Email: yubo49[at]chinaunicom.cn
Chen Zhang
Editor

Email: zhangchen[at]cmdi.chinamobile.com
Yanbin Zhang
Editor

Email: zhangyanbin[at]catr.cn
X.upu

Postal identity management framework


Gustavo Damy
Editor

Email: gustavo.DAMY[at]upu.int
Hiroshi Takechi
Editor

Email: hiro[at]takechi.org
X.websec-7

Reference monitor for online analytics services


Hyung-jin Lim
Editor

Email: hjlim[at]fsec.or.kr
Jongyoul Park
Editor

Email: jongyoul[at]etri.re.kr
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
X.ztd-iot

Security methodology for zero-touch massive IoT deployment


Xin Kang
Editor

Email: kang.xin[at]huawei.com
Haiguang Wang
Editor

Email: wang.haiguang1[at]huawei.com
Weidong Wang
Editor

Email: wangweidong[at]chinawllc.com
Z.161.1

Testing and Test Control Notation version 3: TTCN-3 language extensions: Support of interfaces with continuous signals


Dieter Hogrefe
Editor

Email: hogrefe[at]cs.uni-goettingen.de
Z.161.5

Testing and Test Control Notation version 3: TTCN-3 language extensions: Performance and real time testing


Dieter Hogrefe
Editor

Email: hogrefe[at]cs.uni-goettingen.de
Z.162

Testing and Test Control Notation version 3: TTCN-3 tabular presentation format (TFT)


Dieter Hogrefe
Editor

Email: hogrefe[at]cs.uni-goettingen.de
Z.163

Testing and Test Control Notation version 3: TTCN-3 graphical presentation format (GFT)


Dieter Hogrefe
Editor

Email: hogrefe[at]cs.uni-goettingen.de
Z.164

Testing and Test Control Notation version 3: TTCN-3 operational semantics


Dieter Hogrefe
Editor

Email: hogrefe[at]cs.uni-goettingen.de
Z.165

Testing and Test Control Notation version 3: TTCN-3 runtime interface (TRI)


Dieter Hogrefe
Editor

Email: hogrefe[at]cs.uni-goettingen.de
Z.168

Testing and Test Control Notation version 3: The IDL to TTCN-3 mapping


Dieter Hogrefe
Editor

Email: hogrefe[at]cs.uni-goettingen.de
Z.170

Testing and Test Control Notation version 3: TTCN-3 documentation comment specification


Dieter Hogrefe
Editor

Email: hogrefe[at]cs.uni-goettingen.de
Z.171

Testing and Test Control Notation version 3: Using JSON with TTCN-3


Dieter Hogrefe
Editor

Email: hogrefe[at]cs.uni-goettingen.de
Export: