Uni�n Internacional de Telecomunicaciones UIT
EnglishFran�ais
Mapa Cont�ctenos Copia Imprimible
P�gina principal : UIT-T : SG17 : Reuni�n�2005-10-05�: Contribuciones Tard�as� Nuevo�-� Busque los documentos de la reuni�n
UIT-T�SG17� D�(2005-10-05)�

UIT-T�SG17

Seguridad, lenguajes y soporte l�gico de telecomunicaciones

Periodo de estudios 2005

Reuni�n� del 2005-10-05 al 2005-10-14

Lugar : Suiza [Ginebra]

Otras reuniones : 2009-09-16� 2009-02-11� 2008-09-15� 2008-04-07� 2007-12-10� 2007-09-19� 2007-04-20� 2007-04-18� 2007-04-16� 2006-12-06� 2006-04-192006-01-16� [ 2005-10-05 ]� 2005-03-30

Resultados :65 documentos
Resultados :� 1 - 2 �-�Siguiente Next
Contribuciones Tard�as��Documents / Contributions

N�mero
T�tulo Origen AI/Cuesti�n
Fecha
[ 120 ]
First draft of the ITU-T Recommendation X.xxx (Division the security features between the network and the users) � Russian Federation Q5/17 2005-09-29
[ 119 ]
Further proposal for draft Recommendation X.physiol � AULM Q8/17 2005-09-28
[ 118 ]
Correlative reacting system in mobile data communication � Huawei Technologies Q9/17 2005-09-27
[ 117 ]
Considerations for the guideline on the protection of personal information and privacy for RFID � ETRI Q9/17 2005-09-26
[ 116 ]
Proposal for the study on a security framework for mobile RFID applications as a new work item on mobile security � ETRI, Korea Q9/17 2005-09-26
[ 115 ]
Proposal for requirement of a telebiometric infrastructure (TBI) based on PMI and PKI � Huawei Technologies Co., Ltd Q8/17 2005-09-26
[ 114 ]
Proposal on the discussion items related to the authentication architecture in study item X.msec-4 � Huawei Technologies Co., Ltd Q9/17 2005-09-26
[ 113 ]
Draft text for X.msec-4: Authentication architecture in mobile end-to-end data communication � Huawei Technologies Co., Ltd Q9/17 2005-09-26
[ 112 ]
Proposal on discussion concerning Telebiometrics System Mechanism � Huawei Technologies Co., Ltd Q8/17 2005-09-26
[ 111 ]
Proposal of a telebiometrics infrastructure (TBI) based on PMI and PKI � Huawei Technologies Co, Ltd Q8/17 2005-09-26
[ 110 ]
Proposed modification of section 7 for X.msec-3 � ZTE Corp. and China Mobile Communications Corp. Q9/17 2005-09-26
[ 109 ]
Impact of ICANN Activity on IDN � UK Q16/17 2005-09-26
[ 108 ]
Proposals for Question and Initial Activity on IDNs � UK Q16/17 2005-09-26
[ 107 ]
NGN Directory Services � UK Q2/17 2005-09-26
[ 106 ]
Proposed N-plex reliable data transfer scheme � Korea, Rep. of Q1/17 2005-09-26
[ 105 ]
Basic Concept of Relayed MultiCast Protocol for mobile Environment � Korea, Rep. of Q1/17 2005-09-26
[ 104 ]
Requirement of Relayed MultiCast Protocol for Mobile Environment � Korea, Rep. of Q1/17 2005-09-26
[ 103 ]
Proposal of RMCP-3 messages and its controls � Korea, Rep. of Q1/17 2005-09-26
[ 102 ]
Proposed modification of RMCP-2 text � Korea, Rep. of Q1/17 2005-09-26
[ 101 ]
Proposal of tree management algorithm for Annex A of RMCP-2 text � Korea, Rep. of Q1/17 2005-09-26
[ 100 ]
Proposal of considerations for coordinated policy-based network security control management � Korea, Rep. of Q5/17 2005-09-26
[ 99 ]
Proposal of Guideline on Security Architecture for Message Security in Mobile Web Services � Korea, Rep. of Q9/17 2005-09-26
[ 98 ]
Proposal of Security Considerations for Ubiquitous Networking Environment based on Web Services � Korea, Rep. of Q9/17 2005-09-26
[ 97 ]
Security roadmap for the future mobile environment � Korea, Rep. of Q9/17 2005-09-26
[ 96 ]
Proposal about method indicating available biometric for individual in multi-biometric system � Korea, Rep. of Q8/17 2005-09-26
[ 95 ]
Proposal on user authentication mechanisms for home network service � Korea, Rep. of Q9/17 2005-09-26
[ 94 ]
A Proposal for Standard Issue of Relayed Multicast Security Framework � Korea, Rep. of Q1/17 2005-09-26
[ 93 ]
Device certificate profile for the home network � Korea, Rep. of Q9/17 2005-09-26
[ 92 ]
Guideline on strong password authentication protocols � Korea, Rep. of Q9/17 2005-09-26
[ 91 ]
Updated framework of security technologies for home network � Korea, Rep. of Q9/17 2005-09-26
[ 90 ]
Access Control Methods for UDDI in Web Services using XACML � Korea, Rep. of Q9/17 2005-09-26
[ 89 ]
Proposal on the guideline for the Architecture supporting Single Sign-On in Mobile Web Environments � Korea, Rep. of Q9/17 2005-09-26
[ 88 ]
The cryptographic Authentication based on Biometric Information � Korea, Rep. of Q8/17 2005-09-26
[ 87 ]
Necessity of Separate Recommendations on IP Multimedia Application Spam � Korea, Rep. of Q17/17 2005-09-26
[ 86 ]
Proposed Contents of Guideline Document on Countering SPAM � Korea, Rep. of Q17/17 2005-09-26
[ 85 ]
Direction of Standardization on Spam Issues � Korea, Rep. of Q17/17 2005-09-26
[ 84 ]
Contribution on the guideline for the protection of personal information and privacy on web � Korea, Rep. of Q9/17 2005-09-26
[ 83 ]
Business Continuity Management � Korea, Rep. of Q7/17 2005-09-26
[ 82 ]
Information Security Incident Management � Korea, Rep. of Q7/17 2005-09-26
[ 81 ]
A Guideline of Technical and Managerial Countermeasures for Biometric Data Security � Korea, Rep. of Q8/17 2005-09-26
[ 80 ]
Proposed modification of section 6 for X.gcs � MII, P.R. China Q17/17 2005-09-23
[ 79 ]
Proposed modification of X.fcs-Technical Framework for countering SPAM � MII, P.R. China Q17/17 2005-09-26
[ 78 ]
Proposal for studying P2P network security � Korea Q9/17 2005-09-23
[ 77 ]
Proposal about classification of authentication and key establishment model � ETRI Q9/17 2005-09-23
[ 76 ]
First draft Recommendation of Telebiometrics System Mechanism (X.tsm) - General biometric authentication system mechanism on telecommunication systems � Japan Q8/17 2005-09-22
[ 75 ]
Proposal on the new study item about secure communication using TTP services � Japan Q9/17 2005-09-22
[ 74 ]
Proposal for studying anonymous authentication architecture in community communication � Japan Q9/17 2005-09-22
[ 73 ]
A Study item for Standardization of Vulnerability data format � Japan Q6/17 2005-09-22
[ 72 ]
(Rev.1)
IDN ICANN repository amendment � NASK Q16/17 2005-09-22
[ 71 ]
Overview of Cybersecurity (Table of Contents) � Nortel Networks Q6/17 2005-09-22
Resultados :65 documentos
Resultados :� 1 - 2 �-�Siguiente Next
Telecarga de m�ltiples documentos:�Marcar las casillas correspondientes a los documentos seleccionados, a continuaci�n pulsar "Telecargar"

Preferencias del usuario:
Telecarga de m�ltiples documentos:�Formatos e idiomas que hay que tener en cuenta (si est�n disponibles):
P�ginas de navegaci�n HTML
Formatos �+�Otros formatos
Idiomas (m�ximo 2) �+�Multiling�e �
(E: ingl�s - F: franc�s - S: espa�ol - A: �rabe - C: chino - R: ruso)

Pruebe ITU Translate, la herramienta de traducci�n autom�tica de documentos
Comienzo de la p�gina�-� Comentarios�-� Cont�ctenos�-� Copyright � UIT�2008�Reservados todos los derechos
Contacto p�blico :� TSB EDH
Actualizado el :�2005-08-18