Contributions�� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 608 ]
�
� |
A proposal for the 4th revised text of Draft Recommendation ITU-T X.iptvsec-7: Guidelines on criteria for selecting cryptographic algorithms for IPTV service and content protection for consent
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2012-02-07 |
|
[ 607 ]
�
� |
A proposal for the 4th revised text for Recommendation ITU-T X.iptvsec-6: Framework for the downloadable service and content protection system in the mobile IPTV environment
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2012-02-07 |
|
[ 606 ]
�
� |
The 5th revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index
�
� |
Korea (Rep. of)
� |
Q4/17
� |
2012-02-07 |
|
[ 605 ]
�
� |
The 5th revised text on draft Recommendation ITU-T X.trm: Overview of traceback mechanisms
�
� |
Korea (Rep. of)
� |
Q4/17
� |
2012-02-07 |
|
[ 604 ]
�
� |
The 5th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
�
� |
Korea (Rep. of)
� |
Q4/17
� |
2012-02-07 |
|
[ 603 ]
�
� |
Specific needs for PII management guidelines for telecommunication organizations
�
� |
Korea (Rep. of)
� |
Q3/17
� |
2012-02-07 |
|
[ 602 ]
�
� |
Comments on SG17 working structure for the next study period
�
� |
KDDI Corporation
� |
QALL/17
� |
2012-02-07 |
|
[ 601 ]
�
� |
Agreement from X.discovery CG Teleconference
�
� |
United Kingdom
� |
Q10/17
� |
2012-02-07 |
|
[ 600 ]
�
� |
UK Comments on COM 17 - R 41 - E Draft Recommendation ITU-T X.1037 (X.rev), Architectural systems for security controls for preventing fraudulent activities in public carrier networks
�
� |
United Kingdom
� |
Q2/17
� |
2012-02-07 |
|
[ 599 ]
�
� |
A proposal for the second draft Recommendation of ITU-T X.sap-5: Guideline on anonymous authentication for e-commerce service
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2012-02-07 |
|
[ 598 ]
�
� |
Proposed content in X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
�
� |
China
,
China Unicom
� |
Q5/17
� |
2012-02-07 |
|
[ 597 ]
�
� |
Comments on X.ics: A practical reference model for countering email spam using botnet information
�
� |
China
� |
Q5/17
� |
2012-02-07 |
|
[ 596 ]
�
� |
Proposal to establish a tutorial mechanism for new technologies
�
� |
China
� |
QALL/17
� |
2012-02-07 |
|
[ 595 ]
�
� |
Updated text of X.msec-6: Security aspects of smartphones
�
� |
China
� |
Q6/17
� |
2012-02-07 |
|
[ 594 ]
�
� |
Proposal on security requirements of digital distribution platforms of X.msec-6
�
� |
China
� |
Q6/17
� |
2012-02-07 |
|
[ 593 ]
�
� |
Updated text of X.oacms: Overall aspects of countering mobile messaging spam
�
� |
China
� |
Q5/17
� |
2012-02-07 |
|
[ 592 ]
�
� |
Proposal on changing the title name of X.msec-6 back to smartphone
�
� |
China
,
China Unicom
� |
Q6/17
� |
2012-02-07 |
|
[ 591 ]
�
� |
Proposal of new security requirements for cloud based telecommunication service X.srfctse
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q8/17
� |
2012-02-07 |
|
[ 590 ]
�
� |
Proposal for new security requirements of social networking
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2012-02-07 |
|
[ 589 ]
�
� |
Security Protection of Customer Information in Telecom Operators
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q3/17
� |
2012-02-07 |
|
[ 588 ]
�
� |
Authentication result transfer based on encrypted cookie for WLAN scenario
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q10/17
� |
2012-02-07 |
|
[ 587 ]
�
� |
Interface of the abnormal traffic detection and control system
�
� |
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
� |
Q4/17
� |
2012-02-07 |
|
[ 586 ]
�
� |
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2012-02-07 |
|
[ 585 ]
�
� |
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2012-02-07 |
|
[ 584 ]
�
� |
A Draft of Technology Involved in Countering Voice Spam-X.ticvs
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2012-02-07 |
|
[ 583 ]
�
� |
Authentication integration solution for WLAN scenario in X.authi.
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q10/17
� |
2012-02-07 |
|
[ 582 ]
�
� |
Candidate Use Cases for Cloud Computing Security
�
� |
Microsoft Corporation
� |
Q8/17
� |
2012-02-07 |
|
[ 581 ]
�
(Rev.1)� |
Proposed modifications to draft Supplement: Users' guide for ITU-T X.1051
�
� |
KDDI Corporation
� |
Q3/17
� |
2012-02-07 |
|
[ 580 ]
�
(Rev.1)� |
Proposed text of Clause7.4 to draft Recommendation of X.giim
�
� |
Ministry of Industry and Information Technology (MIIT)
� |
Q10/17
� |
2012-02-07 |
|
[ 579 ]
�
(Rev.1)� |
Proposal for refined text to draft Recommendation X.giim: Generic IdM interoperability mechanisms
�
� |
Ministry of Industry and Information Technology (MIIT)
� |
Q10/17
� |
2012-02-07 |
|
[ 578 ]
�
(Rev.1)� |
Proposal on security requirements of ubiquitous networking in NGN
�
� |
ZTE Corporation
� |
Q6/17
� |
2012-02-07 |
|
[ 577 ]
�
(Rev.1)� |
Revised text for chapter 14 in draft X.srfctse
�
� |
ZTE Corporation
� |
Q8/17
� |
2012-02-07 |
|
[ 576 ]
�
� |
Propose a chapter on cloud security for X.srfctse
�
� |
ZTE Corporation
� |
Q8/17
� |
2012-02-07 |
|
[ 575 ]
�
(Rev.1)� |
Proposal for a new work item on Framework of Detection, Tracking and Response of Mobile Botnets
�
� |
China Unicom
� |
Q7/17
� |
2012-02-07 |
|
[ 574 ]
�
� |
Improving Intrusion Detection Systems with Hierarchical Architecture Using an Inter layer Messaging System
�
� |
Ministry of Information and Communication Technology (MICT)
� |
Q4/17
� |
2012-02-07 |
|
[ 573 ]
�
� |
Key Pre-distribution Using Nonlinear Codes on Z4 for Mobile Ad Hoc Networks
�
� |
Ministry of Information and Communication Technology (MICT)
� |
Q1/17
� |
2012-02-07 |
|
[ 572 ]
�
� |
�
Withdrawn
� |
N/A
� |
Q4/17
� |
2012-02-07 |
|
[ 571 ]
�
� |
A New Architecture for Redirecting Intruders to Honeypots
�
� |
Ministry of Information and Communication Technology (MICT)
� |
Q4/17
� |
2012-02-07 |
|
[ 570 ]
�
(Rev.1)� |
Open identity trust framework - proposed changes
�
� |
Microsoft Corporation
� |
Q10/17
� |
2012-02-07 |
|
[ 569 ]
�
(Rev.1)� |
Proposal of draft for X.atag
�
� |
KDDI Corporation
� |
Q10/17
� |
2012-02-07 |
|
[ 568 ]
�
� |
Propose the requirement of cloud storage security for X.srfctse
�
� |
ZTE Corporation
� |
Q8/17
� |
2012-02-07 |
|
[ 567 ]
�
(Rev.1)� |
Report of the Correspondence Group on COP17 (Child Online Protection/ITU-T SG17), September 2011-January 2012
�
� |
Yaana Technologies, LLC
� |
QALL/17
� |
2012-02-06 |
|
[ 566 ]
�
� |
Proposed text for security guidelines chapter of X.ccsec
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2012-02-06 |
|
[ 565 ]
�
� |
Proposed text for security challenges chapter of X.ccsec
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2012-02-06 |
|
[ 564 ]
�
� |
Proposed new work item on Requirements and framework of operational security for Cloud Computing
�
� |
China
,
China Telecommunications Corporation
,
ZTE Corporation
� |
Q8/17
� |
2012-02-06 |
|
[ 563 ]
�
(Rev.1)� |
Update proposal of X.p2p-4: Use of service providers' user authentication infrastructure to implement PKI for peer-to-peer networks
�
� |
KDDI Corporation
� |
Q7/17
� |
2012-02-06 |
|
[ 562 ]
�
(Rev.1)� |
Proposal of a new work item "Secure application management framework for communication devices"
�
� |
KDDI Corporation
,
Sony Corporation
� |
Q6/17
� |
2012-02-06 |
|
[ 561 ]
�
(Rev.1)� |
Comments on X.ticvs (Technologies involved in countering voice spam in telecommunications organizations)
�
� |
KDDI Corporation
� |
Q5/17
� |
2012-02-06 |
|
[ 560 ]
�
(Rev.1-2)� |
Proposal on new appendix for X.msec-6
�
� |
China
,
China Unicom
� |
Q6/17
� |
2012-02-06 |
|
[ 559 ]
�
(Rev.1)� |
The security threats of disclosure and congestion for ubiquitous networking
�
� |
China Unicom
� |
Q6/17
� |
2012-02-06 |
Results:111 total items. Result page:�
Previous�-�
1 -
2 -
3
�-�Next
� |
Multiple Document Download:�Formats and Languages to be included (when available):