Contribuciones
�[�Origen:�Lucent Technologies (USA)�]��� |
�
|
N�mero�
|
T�tulo
|
Origen
|
AI/Cuesti�n
|
Fecha
|
|
[ 226 ]
�
� |
Identification and authentication of bearer traffic (contribution to the draft Recommendation Y.NGN Authentication)
�
� |
Lucent Technologies (USA)
� |
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17, Q4/13, Q15/13
� |
2007-09-12 |
|
[ 225 ]
�
� |
Mechanism for authenticating flow of bearer traffic in NGN (contribution to the draft Recommendation Y.NGN Security Mechanisms)
�
� |
Lucent Technologies (USA)
� |
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17, Q4/13, Q15/13
� |
2007-09-12 |
|
[ 198 ]
�
� |
Comments on draft Recommendation X.805+, COM 17 - C 86 - E
�
� |
Lucent Technologies (USA)
� |
Q5/17
� |
2007-09-10 |
|
[ 197 ]
�
� |
Comments on draft ITU-T Recommendation X.1205, Overview of cybersecurity
�
� |
Lucent Technologies (USA)
� |
Q6/17
� |
2007-09-10 |
|
[ 196 ]
�
� |
Comments on "A vendor-neutral framework for automatic checking of the presence of vulnerabilities information update (X.vds)," TD2584rev 3
�
� |
Lucent Technologies (USA)
� |
Q6/17
� |
2007-09-10 |
|
[ 195 ]
�
� |
Comments on draft Recommendation X.spn: Framework for creation, storage, distribution, and enforcement of policies for network security
�
� |
Lucent Technologies (USA)
� |
Q5/17
� |
2007-09-10 |
|
[ 194 ]
�
� |
Guidelines for Implementing System & Network Security
�
� |
Lucent Technologies (USA)
� |
Q5/17
� |
2007-09-10 |
Resultados :7 documentos
� |
Telecarga de m�ltiples documentos:�Formatos e idiomas que hay que tener en cuenta (si est�n disponibles):