Contributions�� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 256 ]
�
(Rev.1)� |
Proposed mechanisms on inter-federation trust establishment for X.giim
�
� |
ZTE Corporation
� |
Q10/17
� |
2010-03-26 |
|
[ 255 ]
�
(Rev.1)� |
Proposed Application Scenarios to X.giim
�
� |
MIIT, China
� |
Q10/17
� |
2010-03-26 |
|
[ 254 ]
�
� |
Comparing analysis of abnormal traffic system deployment solutions in X.abnot
�
� |
China Mobile, Huawei
� |
Q4/17
� |
2010-03-26 |
|
[ 253 ]
�
� |
Clarify Some Issues on IdM in the Cloud Computing
�
� |
MIIT, China
� |
Q10/17
� |
2010-03-26 |
|
[ 252 ]
�
� |
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
China Mobile, ZTE
� |
Q4/17
� |
2010-03-26 |
|
[ 251 ]
�
� |
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
ZTE, China Mobile
� |
Q4/17
� |
2010-03-26 |
|
[ 250 ]
�
� |
Weighted Parameters Filtering
�
� |
Huawei Technologies Co.,Ltd.
� |
Q5/17
� |
2010-03-26 |
|
[ 249 ]
�
� |
Secure Interface between UAC and VSPS
�
� |
Huawei Technologies Co.,Ltd.
� |
Q5/17
� |
2010-03-26 |
|
[ 248 ]
�
(Rev.1)� |
Proposal for a new work item on Requirements and Framework of secure dynamic virtual network
�
� |
Huawei Technologies Co.,Ltd.
,
China Telecom
� |
Q6/17
� |
2010-03-26 |
|
[ 247 ]
�
� |
Propose to consider ICGS deployment in wireless network
�
� |
Huawei Technologies Co., Ltd.
� |
Q5/17
� |
2010-03-26 |
|
[ 246 ]
�
� |
Multiple VSPS Scenarios and functional extension to VSP-RBL and URS
�
� |
Huawei Technologies Co.,Ltd.
� |
Q5/17
� |
2010-03-26 |
|
[ 245 ]
�
� |
IRC botnet detection
�
� |
Huawei Technologies Co.,Ltd.
� |
Q4/17
� |
2010-03-26 |
|
[ 244 ]
�
� |
First packet detection for Botnet Detection
�
� |
Huawei Technologies Co.,Ltd.
� |
Q4/17
� |
2010-03-26 |
|
[ 243 ]
�
� |
Assets Management in X.ismf
�
� |
China Mobile
� |
Q3/17
� |
2010-03-26 |
|
[ 242 ]
�
� |
An analysis of X.authi: Authentication integration between the network and service layers
�
� |
China Mobile, China MII, ZTE
� |
Q10/17
� |
2010-03-26 |
|
[ 241 ]
�
� |
A solution to solve the repeated clean problem in the abnormal traffic control system deployment
�
� |
China Mobile, Huawei
� |
Q4/17
� |
2010-03-26 |
|
[ 240 ]
�
� |
A proposal of revision text for X.gep: A guideline for evaluating telebiometric template protection techniques
�
� |
Japan
� |
Q9/17
� |
2010-03-26 |
|
[ 239 ]
�
� |
Proposal of draft text of X.sap-4
�
� |
Japan
� |
Q7/17, Q10/17
� |
2010-03-26 |
|
[ 238 ]
�
� |
Proposed draft text for Best Practice against Botnets
�
� |
Korea (Republic of) and Japan
� |
Q4/17, Q1/17
� |
2010-03-26 |
|
[ 237 ]
�
� |
A draft proposed text for X.sgsm based on X.1051 | ISO/IEC 27002
�
� |
Japan
� |
Q3/17
� |
2010-03-26 |
|
[ 236 ]
�
� |
X.iptvsec-3: Comments on X.iptvsec-3, Document TD 0743
�
� |
Federal Republic of Germany
� |
Q6/17
� |
2010-03-26 |
|
[ 235 ]
�
� |
Revised draft text of X.tif: Integrated framework for telebiometric data protection in telehealth and worldwide telemedicines
�
� |
Korea (Republic of)
� |
Q9/17
� |
2010-03-26 |
|
[ 234 ]
�
� |
Proposed modification of the document TD 0553, the draft Recommendation X.iptvsec-5, SCP interoperability scheme
�
� |
Korea (Republic of)
� |
Q6/17
� |
2010-03-26 |
|
[ 233 ]
�
(Rev.1)� |
Proposal on overall editorial modifications of X.fcsip
�
� |
Korea (Republic of)
� |
Q5/17
� |
2010-03-26 |
|
[ 232 ]
�
� |
Proposal of a new work item on baseline capabilities and a framework for mobile identity management
�
� |
Korea (Republic of)
� |
Q10/17
� |
2010-03-26 |
|
[ 231 ]
�
� |
Proposal of 2nd revised text for X.idmsg: Security Guidelines for Identity Management Systems
�
� |
Korea (Republic of)
� |
Q10/17
� |
2010-03-26 |
|
[ 230 ]
�
� |
Draft Recommendation of x.mcsec-1: Security Requirements and Framework for multicast communication for Consent
�
� |
Korea (Republic of)
� |
Q6/17
� |
2010-03-26 |
|
[ 229 ]
�
� |
Revised draft Recommendation for X.usnsec-2 : USN middleware security guidelines
�
� |
Korea (Republic of)
� |
Q6/17
� |
2010-03-26 |
|
[ 228 ]
�
� |
Revised draft Recommendation on X.gopw: Guideline on preventing malicious code spreading in a data communication network
�
� |
Korea (Republic of)
� |
Q4/17
� |
2010-03-26 |
|
[ 227 ]
�
� |
Proposed Draft of X.isgf (Information Security Governance Framework)
�
� |
Korea (Republic of)
� |
Q3/17
� |
2010-03-26 |
|
[ 226 ]
�
� |
Proposal for additional text of X.websec-4: Security Framework for Enhanced Web based Telecommunication Service
�
� |
Korea (Republic of)
� |
Q8/17, Q7/17
� |
2010-03-26 |
|
[ 225 ]
�
� |
The draft text on ITU-T draft Recommendation X.iptvsec-2: Functional requirements and mechanisms for secure transcodable scheme of IPTV
�
� |
Korea (Republic of)
� |
Q6/17
� |
2010-03-26 |
|
[ 224 ]
�
� |
Proposed Recommendation ITU-T X.1086 Amendment 1
�
� |
Korea (Republic of)
� |
Q9/17
� |
2010-03-26 |
|
[ 223 ]
�
� |
A proposal for the 1st revised text on draft Recommendation ITU-T X.trm: Traceback mechanisms
�
� |
Korea (Republic of)
� |
Q4/17
� |
2010-03-26 |
|
[ 222 ]
�
� |
A proposal for the 1st revised text on ITU-T draft Recommendation X.eipwa: Exchange of Information for preventing web-based attacks
�
� |
Korea (Republic of)
� |
Q4/17
� |
2010-03-26 |
|
[ 221 ]
�
� |
A proposal for revised text on draft Recommendation ITU-T X.tb-ucc: Traceback use cases and capabilities
�
� |
Korea (Republic of)
� |
Q4/17
� |
2010-03-26 |
|
[ 220 ]
�
� |
A proposal for the 3rd draft text of revised Recommendation ITU-T X.1034: Guideline on extensible authentication protocol based authentication and key management in a data communication network
�
� |
Korea (Republic of)
� |
Q2/17
� |
2010-03-26 |
|
[ 219 ]
�
� |
Proposal for 5th revised text on ITU-T X.usnsec-1 | I SO/IEC CD 29180: Security framework for ubiquitous sensor network
�
� |
Korea (Republic of)
� |
Q6/17
� |
2010-03-26 |
|
[ 218 ]
�
� |
A proposal for establishing a new work item on guidelines for Cybersecurity Index (CSI)
�
� |
Korea (Republic of)
� |
Q4/17
� |
2010-03-26 |
|
[ 217 ]
�
� |
A proposal for the 6th revised text on draft Recommendation X.iptvsec-3: Key management framework for secure IPTV services
�
� |
Korea (Republic of)
� |
Q6/17
� |
2010-03-26 |
|
[ 216 ]
�
� |
Necessity for studying the Framework for the Downloadable SCP system in the mobile IPTV environment
�
� |
Korea (Republic of)
� |
Q6/17
� |
2010-03-26 |
|
[ 215 ]
�
� |
A proposal for a new work item on cryptographic algorithm suites for the IPTV SCP
�
� |
Korea (Republic of)
� |
Q6/17
� |
2010-03-26 |
|
[ 214 ]
�
� |
Support for establishing JCA on Security in SG 17
�
� |
Korea (Republic of)
� |
QALL/17
� |
2010-03-26 |
|
[ 213 ]
�
� |
A Proposal of draft text for draft Recommendation X.sips: A framework for countering cyber attacks in SIP-based services
�
� |
Korea (Republic of)
� |
Q4/17
� |
2010-03-26 |
|
[ 212 ]
�
� |
Proposal of the 2nd draft text for X.amg : Asset Management Guidelines in Telecommunication Organizations
�
� |
Korea (Republic of)
� |
Q3/17
� |
2010-03-26 |
|
[ 211 ]
�
� |
Proposal of the 3rd draft text for X.sap-3: The management framework of one time password-based authentication service
�
� |
Korea (Republic of)
� |
Q7/17
� |
2010-03-26 |
|
[ 210 ]
�
� |
A Proposal of 2nd Draft text of Information Security Management Guidelines for Small and Medium Telecommunication Organizations (X.sgsm)
�
� |
Korea (Republic of)
� |
Q3/17
� |
2010-03-26 |
|
[ 209 ]
�
� |
Proposal for the 3rd revised text on the draft Recommendation X.usnsec-3: Secure routing mechanisms for Wireless Sensor Network
�
� |
Korea (Republic of)
� |
Q6/17
� |
2010-03-26 |
|
[ 208 ]
�
� |
A Proposal for the 3rd revised text on ITU-T draft Recommendation X.tcs-2: Technical means for countering VoIP spam
�
� |
Korea (Republic of)
� |
Q5/17
� |
2010-03-26 |
|
[ 207 ]
�
� |
Addition of Appendix II to ITU-T draft Recommendation X.fcsip: Framework for countering spam in IP-based multimedia applications
�
� |
Korea (Republic of)
� |
Q5/17
� |
2010-03-26 |
Results:756 total items. Result page:�
Previous�-�
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11 -
12 -
13 -
14 -
15 -
16
�-�Next
� |
Multiple Document Download:�Formats and Languages to be included (when available):