Contributions  |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 321 ]
|
Comments on X.ics : Functions and interfaces for countering email spam sent by botnet
|
MIIT, China
|
Q5/17
|
2010-11-25 |
|
[ 320 ]
|
Updated text of X.msec-6: Security aspects of mobile phones
|
MIIT, China
|
Q6/17
|
2010-11-25 |
|
[ 319 ]
|
Proposal for a new work item on Content-based Classification in Messaging Services
|
MIIT China, China Unicom
|
Q5/17
|
2010-11-25 |
|
[ 318 ]
|
Proposal for mobile spam reporting to X.oacms
|
Huawei Technologies Co., Ltd
|
Q5/17
|
2010-11-25 |
|
[ 317 ]
|
Proposal for update to X.oacms
|
Huawei, China Unicom
|
Q5/17
|
2010-11-25 |
|
[ 316 ]
|
Proposal for updated text to X.oacms
|
Huawei Technologies Co.,Ltd.; China Unicom
|
Q5/17
|
2010-11-25 |
|
[ 315 ]
|
Proposal for a new work item on Requirements and Framework of Secure Service Platform in Complex NAT Environments
|
Huawei Technologies Co., Ltd.; China Telecom; MIIT
|
Q8/17
|
2010-11-25 |
|
[ 314 ]
|
Proposal for revised draft text for X.bots : Frameworks for botnet detection and response
|
China Unicom
|
Q4/17
|
2010-11-25 |
|
[ 313 ]
|
Proposed modification to X.interfaces
|
China Unicom
|
Q2/17
|
2010-11-25 |
|
[ 312 ]
|
Proposed text of chapter 6 in X.msec-6
|
China Unicom
|
Q6/17
|
2010-11-25 |
|
[ 311 ]
|
Proposed infrastructure as services for X.ccsec
|
China Telecom, China
|
Q8/17
|
2010-11-25 |
|
[ 310 ]
|
Proposal for 2nd revised text of X.iptvsec-4: Algorithm selection scheme for SCP descrambling
|
ETRI
|
Q6/17
|
2010-11-25 |
|
[ 309 ]
|
Proposal of new Annex I, Algorithm selection schemes for virtual machine based SCP system for X.iptvsec-4
|
ETRI
|
Q6/17
|
2010-11-25 |
|
[ 308 ]
|
Comments on X.sap-3
|
Hitachi, Ltd
|
Q7/17
|
2010-11-25 |
|
[ 307 ]
|
Improving working methods for ITU-T/JTC1 Collaborative Projects
|
Canada
|
QALL/17
|
2010-11-25 |
|
[ 306 ]
+Add.1 |
Draft revisions to Recommendation Z.150 (02/03) User Requirements Notation (URN) - Language requirements and framework
|
Canada
|
Q14/17, Q13/17, Q12/17
|
2010-11-25 |
|
[ 305 ]
|
UK Comments on X.673
|
UK
|
Q12/17
|
2010-11-26 |
|
[ 304 ]
|
Editorial changes on draft Rec. ITU-T X.673 (COM 17-R22) under TAP
|
France Telecom Orange
|
Q12/17
|
2010-11-25 |
|
[ 303 ]
|
Proposal for revised text of clauses 6, 6.3, 7.3.3, and 8.3 in X.iptvsec-3: Key management framework for secure IPTV services
|
Deutsche Telekom AG
|
Q6/17
|
2010-11-25 |
|
[ 302 ]
|
Trust management evaluation criteria of X.p2p-3
|
China Mobile
|
Q7/17
|
2010-11-25 |
|
[ 301 ]
|
Trust management assumption of X.p2p-3
|
China Mobile
|
Q7/17
|
2010-11-25 |
|
[ 300 ]
|
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile
|
Q7/17
|
2010-11-25 |
|
[ 299 ]
|
Proposal of a baseline model for clause 11 of X.sap-4
|
Hitachi, Ltd
|
Q7/17, Q10/17
|
2010-11-25 |
|
[ 298 ]
|
Germany's comments on the draft new Recommendation X.tcs-2
|
Germany
|
Q5/17
|
2010-11-25 |
|
[ 297 ]
|
Proposal for modification on ITU-T Recommendation ITU-T X.1500 [X.cybex], Cybersecurity information exchange framework
|
Germany
|
Q4/17
|
2010-11-25 |
|
[ 296 ]
|
Proposal of a new work item for the general framework of device authentication in peer-to-peer communications
|
KDDI Corporation
|
Q7/17
|
2010-11-25 |
|
[ 295 ]
|
Comments for draft Recommendation X.msec-6: Security aspects of mobile phones
|
KDDI Corporation
|
Q6/17
|
2010-11-25 |
|
[ 294 ]
|
Survey of Standardizing in ISO/TC 215 for X.tif
|
Japan
|
Q9/17
|
2010-11-25 |
|
[ 293 ]
|
Technical contributions for ITU-T draft Recommendation X.gep: A guideline for evaluating telebiometric template protection techniques
|
Japan
|
Q9/17
|
2010-11-25 |
|
[ 292 ]
|
A draft proposed text for Recommendation ITU-T X.sgsm, Information security management guidelines for small and medium telecommunication organizations
|
Japan
|
Q3/17
|
2010-11-25 |
|
[ 291 ]
|
Comments on the draft Recommendation X.tcs-2: Real-time blocking list (RBL)-based framework for countering VoIP spam
|
NICT
|
Q5/17
|
2010-11-25 |
|
[ 290 ]
|
Challenges to open networks: what strategies? Development of a "defense in depth" regulatory framework
|
Information and Communication Technologies
,
Authority of Mauritius
|
Q4/17
|
2010-11-22 |
|
[ 289 ]
(Rev.1) |
Comments on draft Rec. ITU-T X.1275 (COM 17-R21) under TAP
|
France Telecom Orange
|
Q10/17
|
2010-11-11 |
|
[ 288 ]
|
Enhancing Cybersecurity for Future Networks: automated security use case
|
Yaana Technologies, LLC
|
Q4/17
|
2010-11-09 |
|
[ 287 ]
(Rev.1) |
Revised version of Rec. ITU-T X.660
|
France Telecom Orange
|
Q12/17, Q11/17
|
2010-11-08 |
|
[ 286 ]
|
Proposed draft Recommendation ITU-T X.ssaf, Security standards availability framework
|
Yaana Technologies, LLC
|
Q4/17
|
2010-11-05 |
|
[ 285 ]
|
Comments on draft Rec. ITU-T X.1032 (COM 17-R15) under TAP
|
France Telecom Orange
|
Q2/17
|
2010-10-11 |
|
[ 284 ]
|
Amendments to draft ITU-T Recommendation X.673
|
UK
|
Q12/17
|
2010-09-09 |
|
[ 283 ]
|
ITU-T & ISO Collaboration
|
Canada
|
Q10/17
|
2010-10-07 |
Results:89 total items. Result page:
Previous -
1 -
2
|
Multiple Document Download: Formats and Languages to be included (when available):