Contributions
�[�AI/Question:�Q5/17�]��� |
�
|
Num�ro�
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 226 ]
�
� |
Identification and authentication of bearer traffic (contribution to the draft Recommendation Y.NGN Authentication)
�
� |
Lucent Technologies (USA)
� |
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17, Q4/13, Q15/13
� |
2007-09-12 |
|
[ 225 ]
�
� |
Mechanism for authenticating flow of bearer traffic in NGN (contribution to the draft Recommendation Y.NGN Security Mechanisms)
�
� |
Lucent Technologies (USA)
� |
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17, Q4/13, Q15/13
� |
2007-09-12 |
|
[ 219 ]
�
� |
Proposed idea on the structure of Security Activities for the next study period
�
� |
Japan
� |
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17
� |
2007-09-10 |
|
[ 198 ]
�
� |
Comments on draft Recommendation X.805+, COM 17 - C 86 - E
�
� |
Lucent Technologies (USA)
� |
Q5/17
� |
2007-09-10 |
|
[ 195 ]
�
� |
Comments on draft Recommendation X.spn: Framework for creation, storage, distribution, and enforcement of policies for network security
�
� |
Lucent Technologies (USA)
� |
Q5/17
� |
2007-09-10 |
|
[ 194 ]
�
� |
Guidelines for Implementing System & Network Security
�
� |
Lucent Technologies (USA)
� |
Q5/17
� |
2007-09-10 |
|
[ 167 ]
�
� |
Proposal for revised draft Recommendation on X.akm: Framework for EAP-based Authentication and Key Management in a data communication network
�
� |
Korea (Republic of)
� |
Q5/17
� |
2007-09-09 |
|
[ 166 ]
�
� |
Revised draft of the ITU-T Recommendation X.spn
�
� |
Korea (Republic of)
� |
Q5/17
� |
2007-09-09 |
Resultats:8 documents
� |
T�l�chargement de multiples documents:�Formats et langues � prendre en compte (si disponibles):