Contribuciones Tard�as�� |
�
|
N�mero�
|
T�tulo
|
Origen
|
AI/Cuesti�n
|
Fecha
|
|
[ 196 ]
�
� |
Framework for P2P Detection and Control
�
� |
ETRI
� |
Q9/17
� |
2006-04-11 |
|
[ 195 ]
�
� |
Trusty ID authentication architecture in decentralized P2P networks
�
� |
ETRI
� |
Q9/17
� |
2006-04-11 |
|
[ 194 ]
�
� |
A reputation system for DHT-based structured P2P Networks
�
� |
ETRI
� |
Q9/17
� |
2006-04-11 |
|
[ 193 ]
�
(Rev.1)� |
Secure Routing on P2P Overlay Network
�
� |
ETRI
� |
Q9/17
� |
2006-04-11 |
|
[ 192 ]
�
� |
Technical notes on P2P security trust model
�
� |
Huawei Technloogies Co., Ltd
� |
Q9/17
� |
2006-04-10 |
|
[ 191 ]
�
� |
Further discussion concerning Telebiometrics System Mechanism (X.tsm)
�
� |
Huawei Technologies Co., Ltd
� |
Q8/17
� |
2006-04-10 |
|
[ 190 ]
�
� |
A Proposal for TSM in telecommunication mechanism
�
� |
Huawei Technologies Co., Ltd.
� |
Q8/17
� |
2006-04-10 |
|
[ 189 ]
�
(Rev.1)� |
New draft text of X.crs: Correlative reacting system in mobile data communication
�
� |
Huawei Technologies Co., Ltd
� |
Q9/17
� |
2006-04-10 |
|
[ 188 ]
�
� |
Draft text of X.tai: Telebiometrics Authentication Infrastructure (TAI)
�
� |
Huawei Technologies Co., Ltd
� |
Q8/17
� |
2006-04-10 |
|
[ 187 ]
�
� |
Revised text of X.msec-4 from the Editors
�
� |
Huawei Technologies Co., Ltd
� |
Q9/17
� |
2006-04-10 |
|
[ 186 ]
�
� |
Proposal of a new study item on Information Security Management Platform (ISMP)
�
� |
Huawei Technologies Co. Ltd
� |
Q7/17
� |
2006-04-10 |
|
[ 185 ]
�
(Rev.1)� |
Proposed Modification of x.msec-3
�
� |
ZTE Corporation and China Mobile Com. Corp.
� |
Q9/17
� |
2006-04-07 |
|
[ 184 ]
�
� |
ITU-T Candidate Recommendation X.cso - Overview of Cybersecurity
�
� |
Nortel Networks, Canada
� |
Q6/17
� |
2006-04-07 |
|
[ 183 ]
�
� |
X.tdigik (Telebiometric Digital Key): The Cryptographic Authentication based on Biometric Information
�
� |
Korea, Rep. of
� |
Q8/17
� |
2006-04-07 |
|
[ 182 ]
�
� |
A proposed modification on ECTP-5 (ITU-T draft Recommendation X.608)
�
� |
Korea, Rep. of
� |
Q1/17
� |
2006-04-07 |
|
[ 181 ]
�
(Rev.1)� |
Various Activities on Countering spam for IP Multimedia Applications
�
� |
Korea, Rep. of
� |
Q17/17
� |
2006-04-07 |
|
[ 180 ]
�
� |
Activities of Various organizations on Countering E-mail spam
�
� |
Korea, Rep. of
� |
Q17/17
� |
2006-04-07 |
|
[ 179 ]
�
� |
Activities on development of Technical Specifications for Countering E-mail spam
�
� |
Korea, Rep. of
� |
Q17/17
� |
2006-04-07 |
|
[ 178 ]
�
� |
Proposed revision of X.ocsip text
�
� |
Korea, Rep. of
� |
Q17/17
� |
2006-04-07 |
|
[ 177 ]
�
� |
Proposal of Problem statements of countering spam on IP multimedia services for X.ocsip text
�
� |
Korea, Rep. of
� |
Q17/17
� |
2006-04-07 |
|
[ 176 ]
�
� |
Proposal for the first draft of X.homesec-3 - User authentication mechanism for home network services
�
� |
Korea, Rep. of
� |
Q9/17
� |
2006-04-07 |
|
[ 175 ]
�
� |
Guideline on Single Sign-On and Access Control Methods for Mobile Web Environments
�
� |
Korea, Rep. of
� |
Q9/17
� |
2006-04-07 |
|
[ 174 ]
�
� |
Guideline on Security Architecture for Message Security in Mobile Web Services
�
� |
Korea, Rep. of
� |
Q9/17
� |
2006-04-07 |
|
[ 173 ]
�
� |
Draft text on X.homesec-2 : Device certificate profile for the home network
�
� |
Korea, Rep. of
� |
Q9/17
� |
2006-04-07 |
|
[ 172 ]
�
� |
Updated first draft Recommendation X.homesec-1: Framework of security technologies for home network
�
� |
Korea, Rep. of
� |
Q9/17
� |
2006-04-07 |
|
[ 171 ]
�
� |
New Draft Text of X.sap-1: Guideline on secure password-based authentication protocol with key exchange
�
� |
Korea, Rep. of
� |
Q9/17
� |
2006-04-07 |
|
[ 170 ]
�
� |
X.tpp-1(Telebiometric Protection Procedures-Part1): A Guideline of Technical and Managerial Countermeasures for Biometric Data Security
�
� |
Korea, Rep. of
� |
Q8/17
� |
2006-04-07 |
|
[ 169 ]
�
� |
Report on embedding method of biometric data for secure transmission of multi-modal biometric data
�
� |
Korea, Rep. of
� |
Q8/17
� |
2006-04-07 |
|
[ 168 ]
�
� |
Report on test of secure and efficient transmission of biometric image
�
� |
Korea, Rep. of
� |
Q8/17
� |
2006-04-07 |
|
[ 167 ]
�
� |
A Guideline for Secure and Efficient Transmission of Multi-modal Biometric Data (X.tpp-2)
�
� |
Korea, Rep. of
� |
Q8/17
� |
2006-04-07 |
|
[ 166 ]
�
� |
Document Structure of Security Incident Management Guidelines for Telecommunications
�
� |
Korea, Rep. of
� |
Q7/17
� |
2006-04-07 |
|
[ 165 ]
�
� |
A proposal for personal identifier management framework on the Internet
�
� |
Korea, Rep. of
� |
Q9/17, Q5/17
� |
2006-04-07 |
|
[ 164 ]
�
� |
New draft of X.ngn-akm: Framework for authentication and key management framework of NGN
�
� |
Korea, Rep. of
� |
Q5/17
� |
2006-04-07 |
|
[ 163 ]
�
� |
The First Draft of X.spn: Framework for creation, storage, distribution, and enforcement of policies for network security
�
� |
Korea, Rep. of
� |
Q5/17
� |
2006-04-07 |
|
[ 162 ]
�
� |
A Proposal of real-time data delivery mechanism for RMCP-3
�
� |
Korea, Rep. of
� |
Q1/17
� |
2006-04-07 |
|
[ 161 ]
�
� |
Status report on implementation and testing of RMCP-2
�
� |
Korea, Rep. of
� |
Q1/17
� |
2006-04-07 |
|
[ 160 ]
�
� |
A Draft on Recommendation for A Security Protocol for RMCP-2
�
� |
Korea, Rep. of
� |
Q1/17
� |
2006-04-07 |
|
[ 159 ]
�
� |
A Proposal of Security Requirements for Mobile RMCP framework
�
� |
Korea, Rep. of
� |
Q1/17
� |
2006-04-07 |
|
[ 158 ]
�
� |
A proposed initial draft Recommendation of mobile relayed multicast framework
�
� |
Korea, Rep. of
� |
Q1/17
� |
2006-04-07 |
|
[ 157 ]
�
� |
A proposal of tree management mechanism for RMCP-3
�
� |
Korea, Rep. of
� |
Q1/17
� |
2006-04-07 |
|
[ 156 ]
�
� |
A proposed modifications on Draft Rec. X.rmcp-2
�
� |
Korea, Rep. of
� |
Q1/17
� |
2006-04-07 |
|
[ 155 ]
�
� |
Review report of Standardization Issues on Network Aspects of Identification including RFID
�
� |
ETRI
� |
Q10/17, Q2/17
� |
2006-04-06 |
|
[ 154 ]
�
� |
Draft new Question 17 on "Countering spam by technical means"
�
� |
UK, France
� |
Q17/17
� |
2006-04-06 |
|
[ 153 ]
�
� |
A new work item proposal for directory service in ID-based application
�
� |
ETRI
� |
Q2/17
� |
2006-04-06 |
|
[ 152 ]
�
� |
A new work item proposal for URN representation for identification codes
�
� |
ETRI
� |
Q10/17
� |
2006-04-06 |
|
[ 151 ]
�
� |
Proposal on the introduction of USIM in X.msec-4
�
� |
ETRI
� |
Q9/17
� |
2006-04-06 |
|
[ 150 ]
�
� |
Proposal for the profile based privacy protection framework for the RFID application services
�
� |
ETRI
� |
Q9/17
� |
2006-04-06 |
|
[ 149 ]
�
� |
Technical requirements on countering spam
�
� |
MII, P.R.China
� |
Q17/17
� |
2006-04-06 |
|
[ 148 ]
�
� |
The designing thought of Technical Framework for countering spam
�
� |
MII, P.R. China
� |
Q17/17
� |
2006-04-06 |
|
[ 147 ]
�
� |
Proposed modification of X.fcs-Technical Framework for countering spam
�
� |
MII, P.R. China
� |
Q17/17
� |
2006-04-06 |
Resultados :61 documentos Resultados :�
1 -
2
�-�Siguiente
� |
Telecarga de m�ltiples documentos:�Formatos e idiomas que hay que tener en cuenta (si est�n disponibles):