Delayed Contributions  |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 120 ]
|
First draft of the ITU-T Recommendation X.xxx (Division the security features between the network and the users)
|
Russian Federation
|
Q5/17
|
2005-09-29 |
|
[ 119 ]
|
Further proposal for draft Recommendation X.physiol
|
AULM
|
Q8/17
|
2005-09-28 |
|
[ 118 ]
|
Correlative reacting system in mobile data communication
|
Huawei Technologies
|
Q9/17
|
2005-09-27 |
|
[ 117 ]
|
Considerations for the guideline on the protection of personal information and privacy for RFID
|
ETRI
|
Q9/17
|
2005-09-26 |
|
[ 116 ]
|
Proposal for the study on a security framework for mobile RFID applications as a new work item on mobile security
|
ETRI, Korea
|
Q9/17
|
2005-09-26 |
|
[ 115 ]
|
Proposal for requirement of a telebiometric infrastructure (TBI) based on PMI and PKI
|
Huawei Technologies Co., Ltd
|
Q8/17
|
2005-09-26 |
|
[ 114 ]
|
Proposal on the discussion items related to the authentication architecture in study item X.msec-4
|
Huawei Technologies Co., Ltd
|
Q9/17
|
2005-09-26 |
|
[ 113 ]
|
Draft text for X.msec-4: Authentication architecture in mobile end-to-end data communication
|
Huawei Technologies Co., Ltd
|
Q9/17
|
2005-09-26 |
|
[ 112 ]
|
Proposal on discussion concerning Telebiometrics System Mechanism
|
Huawei Technologies Co., Ltd
|
Q8/17
|
2005-09-26 |
|
[ 111 ]
|
Proposal of a telebiometrics infrastructure (TBI) based on PMI and PKI
|
Huawei Technologies Co, Ltd
|
Q8/17
|
2005-09-26 |
|
[ 110 ]
|
Proposed modification of section 7 for X.msec-3
|
ZTE Corp. and China Mobile Communications Corp.
|
Q9/17
|
2005-09-26 |
|
[ 109 ]
|
Impact of ICANN Activity on IDN
|
UK
|
Q16/17
|
2005-09-26 |
|
[ 108 ]
|
Proposals for Question and Initial Activity on IDNs
|
UK
|
Q16/17
|
2005-09-26 |
|
[ 107 ]
|
NGN Directory Services
|
UK
|
Q2/17
|
2005-09-26 |
|
[ 106 ]
|
Proposed N-plex reliable data transfer scheme
|
Korea, Rep. of
|
Q1/17
|
2005-09-26 |
|
[ 105 ]
|
Basic Concept of Relayed MultiCast Protocol for mobile Environment
|
Korea, Rep. of
|
Q1/17
|
2005-09-26 |
|
[ 104 ]
|
Requirement of Relayed MultiCast Protocol for Mobile Environment
|
Korea, Rep. of
|
Q1/17
|
2005-09-26 |
|
[ 103 ]
|
Proposal of RMCP-3 messages and its controls
|
Korea, Rep. of
|
Q1/17
|
2005-09-26 |
|
[ 102 ]
|
Proposed modification of RMCP-2 text
|
Korea, Rep. of
|
Q1/17
|
2005-09-26 |
|
[ 101 ]
|
Proposal of tree management algorithm for Annex A of RMCP-2 text
|
Korea, Rep. of
|
Q1/17
|
2005-09-26 |
|
[ 100 ]
|
Proposal of considerations for coordinated policy-based network security control management
|
Korea, Rep. of
|
Q5/17
|
2005-09-26 |
|
[ 99 ]
|
Proposal of Guideline on Security Architecture for Message Security in Mobile Web Services
|
Korea, Rep. of
|
Q9/17
|
2005-09-26 |
|
[ 98 ]
|
Proposal of Security Considerations for Ubiquitous Networking Environment based on Web Services
|
Korea, Rep. of
|
Q9/17
|
2005-09-26 |
|
[ 97 ]
|
Security roadmap for the future mobile environment
|
Korea, Rep. of
|
Q9/17
|
2005-09-26 |
|
[ 96 ]
|
Proposal about method indicating available biometric for individual in multi-biometric system
|
Korea, Rep. of
|
Q8/17
|
2005-09-26 |
|
[ 95 ]
|
Proposal on user authentication mechanisms for home network service
|
Korea, Rep. of
|
Q9/17
|
2005-09-26 |
|
[ 94 ]
|
A Proposal for Standard Issue of Relayed Multicast Security Framework
|
Korea, Rep. of
|
Q1/17
|
2005-09-26 |
|
[ 93 ]
|
Device certificate profile for the home network
|
Korea, Rep. of
|
Q9/17
|
2005-09-26 |
|
[ 92 ]
|
Guideline on strong password authentication protocols
|
Korea, Rep. of
|
Q9/17
|
2005-09-26 |
|
[ 91 ]
|
Updated framework of security technologies for home network
|
Korea, Rep. of
|
Q9/17
|
2005-09-26 |
|
[ 90 ]
|
Access Control Methods for UDDI in Web Services using XACML
|
Korea, Rep. of
|
Q9/17
|
2005-09-26 |
|
[ 89 ]
|
Proposal on the guideline for the Architecture supporting Single Sign-On in Mobile Web Environments
|
Korea, Rep. of
|
Q9/17
|
2005-09-26 |
|
[ 88 ]
|
The cryptographic Authentication based on Biometric Information
|
Korea, Rep. of
|
Q8/17
|
2005-09-26 |
|
[ 87 ]
|
Necessity of Separate Recommendations on IP Multimedia Application Spam
|
Korea, Rep. of
|
Q17/17
|
2005-09-26 |
|
[ 86 ]
|
Proposed Contents of Guideline Document on Countering SPAM
|
Korea, Rep. of
|
Q17/17
|
2005-09-26 |
|
[ 85 ]
|
Direction of Standardization on Spam Issues
|
Korea, Rep. of
|
Q17/17
|
2005-09-26 |
|
[ 84 ]
|
Contribution on the guideline for the protection of personal information and privacy on web
|
Korea, Rep. of
|
Q9/17
|
2005-09-26 |
|
[ 83 ]
|
Business Continuity Management
|
Korea, Rep. of
|
Q7/17
|
2005-09-26 |
|
[ 82 ]
|
Information Security Incident Management
|
Korea, Rep. of
|
Q7/17
|
2005-09-26 |
|
[ 81 ]
|
A Guideline of Technical and Managerial Countermeasures for Biometric Data Security
|
Korea, Rep. of
|
Q8/17
|
2005-09-26 |
|
[ 80 ]
|
Proposed modification of section 6 for X.gcs
|
MII, P.R. China
|
Q17/17
|
2005-09-23 |
|
[ 79 ]
|
Proposed modification of X.fcs-Technical Framework for countering SPAM
|
MII, P.R. China
|
Q17/17
|
2005-09-26 |
|
[ 78 ]
|
Proposal for studying P2P network security
|
Korea
|
Q9/17
|
2005-09-23 |
|
[ 77 ]
|
Proposal about classification of authentication and key establishment model
|
ETRI
|
Q9/17
|
2005-09-23 |
|
[ 76 ]
|
First draft Recommendation of Telebiometrics System Mechanism (X.tsm) - General biometric authentication system mechanism on telecommunication systems
|
Japan
|
Q8/17
|
2005-09-22 |
|
[ 75 ]
|
Proposal on the new study item about secure communication using TTP services
|
Japan
|
Q9/17
|
2005-09-22 |
|
[ 74 ]
|
Proposal for studying anonymous authentication architecture in community communication
|
Japan
|
Q9/17
|
2005-09-22 |
|
[ 73 ]
|
A Study item for Standardization of Vulnerability data format
|
Japan
|
Q6/17
|
2005-09-22 |
|
[ 72 ]
(Rev.1) |
IDN ICANN repository amendment
|
NASK
|
Q16/17
|
2005-09-22 |
|
[ 71 ]
|
Overview of Cybersecurity (Table of Contents)
|
Nortel Networks
|
Q6/17
|
2005-09-22 |
Results:65 total items. Result page:
1 -
2
- Next

|
Multiple Document Download: Formats and Languages to be included (when available):