Contributions |
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 531 ]
(Rev.1) |
Propose cloud security framework for X.srfctse
|
China
,
ZTE Corporation
|
Q8/17
|
2011-08-11 |
|
[ 530 ]
(Rev.1) |
Propose the requirement of On-demand security provisioning for X.srfctse
|
China
,
ZTE Corporation
|
Q8/17
|
2011-08-11 |
|
[ 529 ]
|
Comment on the ITU-UNODC Memorandum of Understanding
|
Germany
|
QALL/17
|
2011-08-11 |
|
[ 528 ]
|
Updated text of X.oacms: Overall aspects of countering mobile messaging spam
|
China
|
Q5/17
|
2011-08-11 |
|
[ 527 ]
|
Proposal for revised text of Chapter 8 and 9 to X.giim
|
China
|
Q10/17
|
2011-08-11 |
|
[ 526 ]
|
Proposed text of Chapter 7 to X.giim
|
China
|
Q10/17
|
2011-08-11 |
|
[ 525 ]
|
Proposal on security evaluation and testing of mobile phones of X.msec-6
|
China
|
Q6/17
|
2011-08-11 |
|
[ 524 ]
|
Comments on X.oacms: Overall aspects of countering mobile messaging spam
|
China
|
Q5/17
|
2011-08-11 |
|
[ 523 ]
|
Updated text of X.msec-6: Security aspects of mobile phones
|
China
|
Q6/17
|
2011-08-11 |
|
[ 522 ]
|
Proposal to add an appendix to X.msec-6: Security aspects of mobile phones
|
China
|
Q6/17
|
2011-08-11 |
|
[ 521 ]
|
A proposal on a use case of resource personalization secure access control
|
ZTE Corporation
|
Q6/17
|
2011-08-11 |
|
[ 520 ]
|
A proposal on security enhancements based on context-aware for ubiquitous networking
|
ZTE Corporation
|
Q6/17
|
2011-08-11 |
|
[ 519 ]
|
Propose to modify the chapter of authorization for X.srfctse
|
ZTE Corporation
|
Q8/17
|
2011-08-11 |
|
[ 518 ]
|
Proposal of draft of X.atag for trust attribute provisioning
|
KDDI Corporation
|
Q10/17
|
2011-08-11 |
|
[ 517 ]
(Rev.1) |
Technical security guideline on deploying IPv6
|
KDDI Corporation
,
National Institute of Information and Communications Technology
|
Q3/17, Q2/17
|
2011-08-11 |
|
[ 516 ]
(Rev.1) |
Proposed baseline text of X.idmcc
|
China
,
China Telecommunications Corporation
|
Q10/17
|
2011-08-11 |
|
[ 515 ]
|
Authentication integration based on authentication gateway in X.authi
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2011-08-10 |
|
[ 514 ]
|
Authentication integration based on network authentication result transfer in X.authi
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2011-08-10 |
|
[ 513 ]
|
Proposal for a new work item: Security Management Guideline for Customer Information in Telecommunications Organization
|
China Mobile Communications Corporation
|
Q3/17
|
2011-08-10 |
|
[ 512 ]
|
Proposal for a new work item: Technologies Involved in Countering Voice Spam in Telecommunication Organizations
|
China Mobile Communications Corporation
|
Q5/17, Q4/17
|
2011-08-10 |
|
[ 511 ]
|
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks
|
China Mobile Communications Corporation
|
Q4/17
|
2011-08-10 |
|
[ 510 ]
|
Proposal for a new work item: Malicious and Harmful Source Traceback on Spam for Child Online Protection
|
China Mobile Communications Corporation
|
Q5/17
|
2011-08-10 |
|
[ 509 ]
|
Performance and Interface of the abnormal traffic detection and control system
|
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
|
Q4/17
|
2011-08-10 |
|
[ 508 ]
|
Proposed draft Recommendation for X.authi: Authentication integration in IDM
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2011-08-10 |
|
[ 507 ]
|
VoIP security mechanism of X.p2p-3
|
China
,
China Mobile Communications Corporation
,
ZTE Corporation
|
Q7/17
|
2011-08-10 |
|
[ 506 ]
|
Comment on the ITU-UNODC Memorandum of Understanding
|
United States
|
QALL/17
|
2011-08-09 |
|
[ 505 ]
|
Comments on TD1090 : Guidelines on criteria for selecting cryptographic algorithms for IPTV service and content protection.
|
Research in Motion
|
Q6/17
|
2011-08-09 |
|
[ 504 ]
|
Comments on X.1570
|
Canada
|
Q4/17
|
2011-08-09 |
|
[ 503 ]
|
Comments on TD 1979 draft Recommendation X.rid
|
Canada
|
Q4/17
|
2011-08-09 |
|
[ 502 ]
|
Suggestions to facilitate legitimization of RFCs for use in ITU-T implementations
|
Canada
|
QALL/17
|
2011-08-09 |
|
[ 501 ]
|
Comments on X.1246
|
Canada
|
Q5/17
|
2011-08-09 |
|
[ 500 ]
|
Comments on draft Recommendation X.1211
|
Canada
|
Q4/17
|
2011-08-09 |
|
[ 499 ]
(Rev.1) |
Proposal of revised text for Recommendation ITU-T X.sgsm, Information security management guidelines for small and medium-sized telecommunication organizations
|
KDDI Corporation
|
Q3/17
|
2011-08-09 |
|
[ 498 ]
(Rev.1) |
Proposed draft Supplement on information security management users' guide for X.1051
|
KDDI Corporation
|
Q3/17
|
2011-08-09 |
|
[ 497 ]
(Rev.1) |
The 1st draft of "Security handbook on information security incident management for developing countries"
|
Little eArth Corporation Co. Ltd (LAC)
|
Q3/17
|
2011-08-09 |
|
[ 496 ]
|
Proposal of new Question text on cybersecurity information exchange
|
Korea (Rep. of)
|
QALL/17
|
2011-08-08 |
|
[ 495 ]
|
Proposal to revise Q.6/17 text
|
Korea (Rep. of)
|
QALL/17
|
2011-08-08 |
|
[ 494 ]
|
Proposal to revise Q.4/17 text
|
Korea (Rep. of)
|
QALL/17
|
2011-08-08 |
|
[ 493 ]
|
Proposal to revise Q.9/17 text
|
Korea (Rep. of)
|
QALL/17
|
2011-08-08 |
|
[ 492 ]
|
Proposal of a new work item on a guideline to technical and operational countermeasures for mobile biometric data security based on the SmartPhone
|
Korea (Rep. of)
|
Q9/17
|
2011-08-08 |
|
[ 491 ]
|
Proposal for new work item on fraud detection and response framework for Internet banking service
|
Korea (Rep. of)
|
Q7/17
|
2011-08-08 |
|
[ 490 ]
|
Proposal to revise Q.10/17 text
|
Korea (Rep. of)
|
QALL/17
|
2011-08-08 |
|
[ 489 ]
|
Proposal for 3rd revised text on draft Recommendation ITU-T X.mob-id: Baseline capabilities and mechanisms of IdM for mobile applications and environment
|
Korea (Rep. of)
|
Q10/17
|
2011-08-08 |
|
[ 488 ]
|
Proposal for revised draft text for X.ics : Functions & interfaces for countering email spam using Botnet information " for determination"
|
Korea (Rep. of)
|
Q5/17
|
2011-08-08 |
|
[ 487 ]
|
Proposal for revised draft text for X.bot : Centralized Framework for Botnet detection and response
|
Korea (Rep. of)
|
Q4/17
|
2011-08-08 |
|
[ 486 ]
|
Proposal for 2nd revised text of X.iptvsec-8: Virtual machine-based security platform for renewable IPTV service and content protection (SCP)
|
Korea (Rep. of)
|
Q6/17
|
2011-08-08 |
|
[ 485 ]
|
Proposed new text for clause 8 and Annex A of draft Recommendation X.iptvsec-8
|
Korea (Rep. of)
|
Q6/17
|
2011-08-08 |
|
[ 484 ]
|
Proposal for 4th revised text of X.iptvsec-4: Algorithm selection schemes for SCP descrambling
|
Korea (Rep. of)
|
Q6/17
|
2011-08-08 |
|
[ 483 ]
|
Proposal for revised draft text of X.bhsm: Telebiomtric authentication framework using biometric hardware security module
|
Korea (Rep. of)
|
Q9/17
|
2011-08-08 |
|
[ 482 ]
(Rev.1) |
Proposal for change the title of draft Recommendation ITU-T X.usnsec-3
|
Korea (Rep. of)
|
Q6/17
|
2011-08-08 |
Resultats:756 documents Résultats :
Précédent -
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11 -
12 -
13 -
14 -
15 -
16
- Suivant
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):