Delayed Contributions�� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 120 ]
�
� |
First draft of the ITU-T Recommendation X.xxx (Division the security features between the network and the users)
�
� |
Russian Federation
� |
Q5/17
� |
2005-09-29 |
|
[ 119 ]
�
� |
Further proposal for draft Recommendation X.physiol
�
� |
AULM
� |
Q8/17
� |
2005-09-28 |
|
[ 118 ]
�
� |
Correlative reacting system in mobile data communication
�
� |
Huawei Technologies
� |
Q9/17
� |
2005-09-27 |
|
[ 117 ]
�
� |
Considerations for the guideline on the protection of personal information and privacy for RFID
�
� |
ETRI
� |
Q9/17
� |
2005-09-26 |
|
[ 116 ]
�
� |
Proposal for the study on a security framework for mobile RFID applications as a new work item on mobile security
�
� |
ETRI, Korea
� |
Q9/17
� |
2005-09-26 |
|
[ 115 ]
�
� |
Proposal for requirement of a telebiometric infrastructure (TBI) based on PMI and PKI
�
� |
Huawei Technologies Co., Ltd
� |
Q8/17
� |
2005-09-26 |
|
[ 114 ]
�
� |
Proposal on the discussion items related to the authentication architecture in study item X.msec-4
�
� |
Huawei Technologies Co., Ltd
� |
Q9/17
� |
2005-09-26 |
|
[ 113 ]
�
� |
Draft text for X.msec-4: Authentication architecture in mobile end-to-end data communication
�
� |
Huawei Technologies Co., Ltd
� |
Q9/17
� |
2005-09-26 |
|
[ 112 ]
�
� |
Proposal on discussion concerning Telebiometrics System Mechanism
�
� |
Huawei Technologies Co., Ltd
� |
Q8/17
� |
2005-09-26 |
|
[ 111 ]
�
� |
Proposal of a telebiometrics infrastructure (TBI) based on PMI and PKI
�
� |
Huawei Technologies Co, Ltd
� |
Q8/17
� |
2005-09-26 |
|
[ 110 ]
�
� |
Proposed modification of section 7 for X.msec-3
�
� |
ZTE Corp. and China Mobile Communications Corp.
� |
Q9/17
� |
2005-09-26 |
|
[ 109 ]
�
� |
Impact of ICANN Activity on IDN
�
� |
UK
� |
Q16/17
� |
2005-09-26 |
|
[ 108 ]
�
� |
Proposals for Question and Initial Activity on IDNs
�
� |
UK
� |
Q16/17
� |
2005-09-26 |
|
[ 107 ]
�
� |
NGN Directory Services
�
� |
UK
� |
Q2/17
� |
2005-09-26 |
|
[ 106 ]
�
� |
Proposed N-plex reliable data transfer scheme
�
� |
Korea, Rep. of
� |
Q1/17
� |
2005-09-26 |
|
[ 105 ]
�
� |
Basic Concept of Relayed MultiCast Protocol for mobile Environment
�
� |
Korea, Rep. of
� |
Q1/17
� |
2005-09-26 |
|
[ 104 ]
�
� |
Requirement of Relayed MultiCast Protocol for Mobile Environment
�
� |
Korea, Rep. of
� |
Q1/17
� |
2005-09-26 |
|
[ 103 ]
�
� |
Proposal of RMCP-3 messages and its controls
�
� |
Korea, Rep. of
� |
Q1/17
� |
2005-09-26 |
|
[ 102 ]
�
� |
Proposed modification of RMCP-2 text
�
� |
Korea, Rep. of
� |
Q1/17
� |
2005-09-26 |
|
[ 101 ]
�
� |
Proposal of tree management algorithm for Annex A of RMCP-2 text
�
� |
Korea, Rep. of
� |
Q1/17
� |
2005-09-26 |
|
[ 100 ]
�
� |
Proposal of considerations for coordinated policy-based network security control management
�
� |
Korea, Rep. of
� |
Q5/17
� |
2005-09-26 |
|
[ 99 ]
�
� |
Proposal of Guideline on Security Architecture for Message Security in Mobile Web Services
�
� |
Korea, Rep. of
� |
Q9/17
� |
2005-09-26 |
|
[ 98 ]
�
� |
Proposal of Security Considerations for Ubiquitous Networking Environment based on Web Services
�
� |
Korea, Rep. of
� |
Q9/17
� |
2005-09-26 |
|
[ 97 ]
�
� |
Security roadmap for the future mobile environment
�
� |
Korea, Rep. of
� |
Q9/17
� |
2005-09-26 |
|
[ 96 ]
�
� |
Proposal about method indicating available biometric for individual in multi-biometric system
�
� |
Korea, Rep. of
� |
Q8/17
� |
2005-09-26 |
|
[ 95 ]
�
� |
Proposal on user authentication mechanisms for home network service
�
� |
Korea, Rep. of
� |
Q9/17
� |
2005-09-26 |
|
[ 94 ]
�
� |
A Proposal for Standard Issue of Relayed Multicast Security Framework
�
� |
Korea, Rep. of
� |
Q1/17
� |
2005-09-26 |
|
[ 93 ]
�
� |
Device certificate profile for the home network
�
� |
Korea, Rep. of
� |
Q9/17
� |
2005-09-26 |
|
[ 92 ]
�
� |
Guideline on strong password authentication protocols
�
� |
Korea, Rep. of
� |
Q9/17
� |
2005-09-26 |
|
[ 91 ]
�
� |
Updated framework of security technologies for home network
�
� |
Korea, Rep. of
� |
Q9/17
� |
2005-09-26 |
|
[ 90 ]
�
� |
Access Control Methods for UDDI in Web Services using XACML
�
� |
Korea, Rep. of
� |
Q9/17
� |
2005-09-26 |
|
[ 89 ]
�
� |
Proposal on the guideline for the Architecture supporting Single Sign-On in Mobile Web Environments
�
� |
Korea, Rep. of
� |
Q9/17
� |
2005-09-26 |
|
[ 88 ]
�
� |
The cryptographic Authentication based on Biometric Information
�
� |
Korea, Rep. of
� |
Q8/17
� |
2005-09-26 |
|
[ 87 ]
�
� |
Necessity of Separate Recommendations on IP Multimedia Application Spam
�
� |
Korea, Rep. of
� |
Q17/17
� |
2005-09-26 |
|
[ 86 ]
�
� |
Proposed Contents of Guideline Document on Countering SPAM
�
� |
Korea, Rep. of
� |
Q17/17
� |
2005-09-26 |
|
[ 85 ]
�
� |
Direction of Standardization on Spam Issues
�
� |
Korea, Rep. of
� |
Q17/17
� |
2005-09-26 |
|
[ 84 ]
�
� |
Contribution on the guideline for the protection of personal information and privacy on web
�
� |
Korea, Rep. of
� |
Q9/17
� |
2005-09-26 |
|
[ 83 ]
�
� |
Business Continuity Management
�
� |
Korea, Rep. of
� |
Q7/17
� |
2005-09-26 |
|
[ 82 ]
�
� |
Information Security Incident Management
�
� |
Korea, Rep. of
� |
Q7/17
� |
2005-09-26 |
|
[ 81 ]
�
� |
A Guideline of Technical and Managerial Countermeasures for Biometric Data Security
�
� |
Korea, Rep. of
� |
Q8/17
� |
2005-09-26 |
|
[ 80 ]
�
� |
Proposed modification of section 6 for X.gcs
�
� |
MII, P.R. China
� |
Q17/17
� |
2005-09-23 |
|
[ 79 ]
�
� |
Proposed modification of X.fcs-Technical Framework for countering SPAM
�
� |
MII, P.R. China
� |
Q17/17
� |
2005-09-26 |
|
[ 78 ]
�
� |
Proposal for studying P2P network security
�
� |
Korea
� |
Q9/17
� |
2005-09-23 |
|
[ 77 ]
�
� |
Proposal about classification of authentication and key establishment model
�
� |
ETRI
� |
Q9/17
� |
2005-09-23 |
|
[ 76 ]
�
� |
First draft Recommendation of Telebiometrics System Mechanism (X.tsm) - General biometric authentication system mechanism on telecommunication systems
�
� |
Japan
� |
Q8/17
� |
2005-09-22 |
|
[ 75 ]
�
� |
Proposal on the new study item about secure communication using TTP services
�
� |
Japan
� |
Q9/17
� |
2005-09-22 |
|
[ 74 ]
�
� |
Proposal for studying anonymous authentication architecture in community communication
�
� |
Japan
� |
Q9/17
� |
2005-09-22 |
|
[ 73 ]
�
� |
A Study item for Standardization of Vulnerability data format
�
� |
Japan
� |
Q6/17
� |
2005-09-22 |
|
[ 72 ]
�
(Rev.1)� |
IDN ICANN repository amendment
�
� |
NASK
� |
Q16/17
� |
2005-09-22 |
|
[ 71 ]
�
� |
Overview of Cybersecurity (Table of Contents)
�
� |
Nortel Networks
� |
Q6/17
� |
2005-09-22 |
Results:65 total items. Result page:�
1 -
2
�-�Next
� |
Multiple Document Download:�Formats and Languages to be included (when available):