Contributions
[ Source: China Mobile ]  |
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 266 ]
|
User authentication mechanism of X.p2p-3
|
China Mobile, China MII, ZTE
|
Q7/17
|
2010-03-26 |
|
[ 264 ]
|
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile, China MII, ZTE
|
Q7/17
|
2010-03-26 |
|
[ 261 ]
|
Proposed draft Recommendation for X.authi: Authentication Integration in IDM
|
China Mobile, China MII, ZTE
|
Q10/17
|
2010-03-26 |
|
[ 260 ]
|
Proposed draft Rec. X.ismf, Information security management framework
|
China Mobile
|
Q3/17
|
2010-03-26 |
|
[ 257 ]
|
Organization and Personnel part in X.ismf
|
China Mobile
|
Q3/17
|
2010-03-26 |
|
[ 254 ]
|
Comparing analysis of abnormal traffic system deployment solutions in X.abnot
|
China Mobile, Huawei
|
Q4/17
|
2010-03-26 |
|
[ 252 ]
|
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2010-03-26 |
|
[ 251 ]
|
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
ZTE, China Mobile
|
Q4/17
|
2010-03-26 |
|
[ 243 ]
|
Assets Management in X.ismf
|
China Mobile
|
Q3/17
|
2010-03-26 |
|
[ 242 ]
|
An analysis of X.authi: Authentication integration between the network and service layers
|
China Mobile, China MII, ZTE
|
Q10/17
|
2010-03-26 |
|
[ 241 ]
|
A solution to solve the repeated clean problem in the abnormal traffic control system deployment
|
China Mobile, Huawei
|
Q4/17
|
2010-03-26 |
Resultats:11 documents
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):