Contribuciones
�[�Origen:�Korea (Rep. of)�]��� |
�
|
N�mero�
|
T�tulo
|
Origen
|
AI/Cuesti�n
|
Fecha
|
|
[ 524 ]
�
� |
Minor editorial improvement and modifications of secure software update for ITS communications devices (X.itssec-1)
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2016-02-29 |
|
[ 523 ]
�
� |
Proposal for the baseline text for ITU-T X.gcspi, Guidelines on countermeasures against short message service (SMS) phishing and smishing attack
�
� |
Korea (Rep. of)
� |
Q5/17
� |
2016-02-29 |
|
[ 522 ]
�
� |
Seventh draft of a guideline to technical and operational countermeasure for telebiometric applications using mobile devices
�
� |
Korea (Rep. of)
� |
Q9/17
� |
2016-02-29 |
|
[ 521 ]
�
� |
Proposal for the revised text X.sgsm, "Information security management guidelines for small and medium-sized telecommunication organizations"
�
� |
Korea (Rep. of)
� |
Q3/17
� |
2016-02-29 |
|
[ 520 ]
�
� |
A proposal for the 4th revised text on draft Recommendation ITU-T X.simef: Session Information Message Exchange Format (for determination)
�
� |
Korea (Rep. of)
� |
Q4/17
� |
2016-02-29 |
|
[ 519 ]
�
� |
Proposal for a new work item, guidelines on communication security for advanced metering infrastructure in smart grids
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2016-02-29 |
|
[ 518 ]
�
� |
A proposal on ITU-T X.1051-rev (for consent)
�
� |
Korea (Rep. of)
� |
Q3/17
� |
2016-02-29 |
|
[ 517 ]
�
� |
Proposal for revised draft text of X.1085: Telebiomtric authentication framework using biometric hardware security module
�
� |
Korea (Rep. of)
� |
Q9/17
� |
2016-02-29 |
|
[ 516 ]
�
� |
Proposal for the 3rd revised text for ITU-T X.tigsc, Technical implementation guidelines for X.805
�
� |
Korea (Rep. of)
� |
Q2/17
� |
2016-02-29 |
|
[ 515 ]
�
� |
Proposal for the 3rd revised text for ITU-T X.sup-gpim, Code of practice for personally identifiable information protection based on ITU-T X.gpim for telecommunications organizations
�
� |
Korea (Rep. of)
� |
Q3/17
� |
2016-02-29 |
|
[ 514 ]
�
� |
Proposal for the 3rd revised text for ITU-T X.msec-9, Functional security requirements and architecture for mobile phone anti-theft measures
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2016-02-29 |
|
[ 513 ]
�
� |
Proposal for the 2nd revised text for ITU-T X.iotsec-2, security framework for Internet of Things
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2016-02-29 |
|
[ 512 ]
�
� |
Proposal for the 8th revised text for common text ITU-T X.gpim | ISO/IEC 29151, Code of practice for Personally Identifiable Information protection
�
� |
Korea (Rep. of)
� |
Q3/17
� |
2016-02-29 |
|
[ 511 ]
�
� |
Proposal for refined ITU-T SG 17 Structure for the Study Period (2017-2020)
�
� |
Korea (Rep. of)
� |
QALL/17
� |
2016-02-29 |
|
[ 510 ]
�
� |
Comments on the draft ITU-T recommendation, X.iotsec-1: packet processing procedure for the EAMD authenticated encryption mode
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2016-02-29 |
|
[ 509 ]
�
� |
Proposal of the 2nd revision on the draft Recommendation X.gcsfmpd, Supplement on guidance of countering spam for mobile phone developers
�
� |
Korea (Rep. of)
� |
Q5/17
� |
2016-02-29 |
|
[ 508 ]
�
� |
Proposal for the 3rd revised document of ITU-T X.sgsec-2, Security guidelines for Home Area Network (HAN) devices in Smart Grid systems
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2016-02-29 |
|
[ 507 ]
�
� |
Proposal for modified Recommendation ITU-T X.sgsec-1: Security functional architecture for smart grid services using telecommunication network (consent)
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2016-02-29 |
|
[ 505 ]
�
� |
Revised text for TD 2110 Rev.1 (New baseline text of work item: X.samtn)
�
� |
Korea (Rep. of)
� |
Q4/17
� |
2016-02-29 |
|
[ 504 ]
�
� |
NWIP: "Guidelines on hybrid authentication and key management mechanisms with unbalanced computational capability"
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2016-02-29 |
|
[ 503 ]
�
� |
A proposal for additional description on circle-of-trust (CoT)
�
� |
Korea (Rep. of)
� |
Q10/17, (Q7/17)
� |
2016-02-29 |
Resultados :21 documentos
� |
Telecarga de m�ltiples documentos:�Formatos e idiomas que hay que tener en cuenta (si est�n disponibles):