<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
<channel>
        <title>ITU-T Study Group 17 Work Programme</title>
        <link>http://www.itu.int/Itu-t/workprog/wp_search.aspx?sg=17</link>
        <description>Latest modified work items from ITU-T Study Group 17 Work Programme</description>
        <image>
            <url>http://www.itu.int/Itu-t/workprog/images/itulogo_new.gif</url>
            <link>http://www.itu.int/Itu-t/workprog/wp_search.aspx?sg=17</link>
            <title>ITU-T Study Group 17 Work Programme</title>
        </image>
        <copyright>ITU</copyright>
        <managingEditor>tsbedh@itu.int</managingEditor>
        <webMaster>tsbedh@itu.int</webMaster>
        <item>
            <author>Editor(s): Erik ANDERSEN &lt;era@x500.eu&gt;; Yousef ERTAHI &lt;yusuf.ertahi@gmail.com&gt;</author>
            <title>X.migrate (to be X.506)</title>
            <pubDate>Mon, 18 May 2026 14:09:04 GMT</pubDate>
            <link>http://www.itu.int/Itu-t/workprog/wp_item.aspx?isn=23760</link>
            <description>Information Technology - Open systems Interconnection - The Directory - Generic methods for migration of cryptographic algorithms</description>
        </item>
        <item>
            <author>Editor(s): Michael ROSA &lt;mjrosa@cyber.nsa.gov&gt;; Duncan SPARRELL &lt;duncan@sfractal.com&gt;</author>
            <title>X.taeii</title>
            <pubDate>Fri, 08 May 2026 15:34:21 GMT</pubDate>
            <link>http://www.itu.int/Itu-t/workprog/wp_item.aspx?isn=21708</link>
            <description>Trusted Automated Exchange of Intelligence Information (TAEII)</description>
        </item>
        <item>
            <author>Editor(s): Michael ROSA &lt;mjrosa@cyber.nsa.gov&gt;; Duncan SPARRELL &lt;duncan@sfractal.com&gt;</author>
            <title>X.stie</title>
            <pubDate>Fri, 08 May 2026 15:34:06 GMT</pubDate>
            <link>http://www.itu.int/Itu-t/workprog/wp_item.aspx?isn=21707</link>
            <description>Structured Threat Information Expression (STIE)</description>
        </item>
        <item>
            <author>Editor(s): Hang DONG &lt;donghang@chinamobile.com&gt;; Qiuli MEI &lt;meiqiuli2010@163.com&gt;; Gaoshan ZHANG &lt;zhanggaoshan@cmdi.chinamobile.com&gt;</author>
            <title>X.1419 (ex X.dlt-share) (ex X.dlt-share)</title>
            <pubDate>Wed, 06 May 2026 20:16:24 GMT</pubDate>
            <link>http://www.itu.int/Itu-t/workprog/wp_item.aspx?isn=21796</link>
            <description>Security requirements for data application software based on DLT to achieve statistics</description>
        </item>
        <item>
            <author>Editor(s): Fuwen LIU &lt;liufuwen@chinamobile.com&gt;; Li SU &lt;suli@chinamobile.com&gt;; Ke WANG &lt;wangkeyj@chinamobile.com&gt;; Weidong WANG &lt;wangweidong@chinawllc.com&gt;; Heung Youl YOUM &lt;hyyoum@sch.ac.kr&gt;</author>
            <title>X.qsdlt-ca</title>
            <pubDate>Wed, 06 May 2026 20:07:08 GMT</pubDate>
            <link>http://www.itu.int/Itu-t/workprog/wp_item.aspx?isn=21798</link>
            <description>Guidelines for building crypto-agility and migration for quantum-safe DLT systems</description>
        </item>
        <item>
            <author>Editor(s): Huamin JIN &lt;jhm@gsta.com;&gt;; Laifu WANG &lt;wanglaifu@chinatelecom.cn&gt;; Tianying XIE &lt;312982458@qq.com&gt;; Minrui YAN &lt;yanminrui1@huawei.com&gt;; Yi ZHANG &lt;enidzhang2019@163.com&gt;</author>
            <title>X.idse</title>
            <pubDate>Wed, 06 May 2026 18:20:36 GMT</pubDate>
            <link>http://www.itu.int/Itu-t/workprog/wp_item.aspx?isn=21787</link>
            <description>Evaluation methodology for in-vehicle intrusion detection systems</description>
        </item>
        <item>
            <author>Editor(s): Sang-Woo LEE &lt;ttomlee@etri.re.kr&gt;; Yousik LEE &lt;yousik.lee@sch.ac.kr&gt;; Jae Hoon NAH &lt;jhnah@etri.re.kr&gt;</author>
            <title>X.af-sec</title>
            <pubDate>Wed, 06 May 2026 18:20:25 GMT</pubDate>
            <link>http://www.itu.int/Itu-t/workprog/wp_item.aspx?isn=21790</link>
            <description>Evaluation methodologies for anonymization techniques using face images in autonomous vehicles</description>
        </item>
        <item>
            <author>Editor(s): Jiyong HAN &lt;jiyong.han@hyundai.com&gt;; Changhun JUNG &lt;changhun@hyundai.com&gt;; Seungwook PARK &lt;seungwook.park@hyundai.com&gt;</author>
            <title>X.fod-sec</title>
            <pubDate>Wed, 06 May 2026 18:20:17 GMT</pubDate>
            <link>http://www.itu.int/Itu-t/workprog/wp_item.aspx?isn=21791</link>
            <description>Security requirements and guidelines for a feature on demand (FoD) service in a connected vehicle environment</description>
        </item>
        <item>
            <author>Editor(s): Byoung-Moon CHIN &lt;bmchin@tta.or.kr&gt;; Zoe Sungchae PARK &lt;zoesc.park@sch.ac.kr&gt;; Kiho YEO &lt;beware523@paran.com&gt;; Heung Youl YOUM &lt;hyyoum@sch.ac.kr&gt;</author>
            <title>X.evpnc-sec</title>
            <pubDate>Wed, 06 May 2026 18:20:02 GMT</pubDate>
            <link>http://www.itu.int/Itu-t/workprog/wp_item.aspx?isn=21788</link>
            <description>Security guidelines for electric vehicle plug and charge (PnC) services using vehicle identity (VID)</description>
        </item>
        <item>
            <author>Editor(s): Shiqi LI &lt;lishiqi.li@alibaba-inc.com&gt;; Weiwei SUN &lt;sunweiwei.sww@alibaba-inc.com&gt;; Yong SUN &lt;sy359975@alibaba-inc.com&gt;</author>
            <title>X.2210 (ex X.ig-dw)</title>
            <pubDate>Wed, 06 May 2026 18:06:47 GMT</pubDate>
            <link>http://www.itu.int/Itu-t/workprog/wp_item.aspx?isn=21686</link>
            <description>Implementation guidelines for digital watermarking</description>
        </item>
    </channel></rss>
