Contributions
�[�Source:�China�]��� |
�
|
Num�ro�
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 180 ]
�
+Corr.1� |
Proposed text for section 6 of X.idmgen
�
� |
China Mobile, ZTE Corporation
� |
Q10/17
� |
2009-09-07 |
|
[ 179 ]
�
+Corr.1� |
Proposed text for authentication assurance interoperation in X.idm-ifa
�
� |
China Mobile, ZTE Corporation
� |
Q10/17
� |
2009-09-07 |
|
[ 178 ]
�
� |
Proposal for modification to chapter 8 of draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
China Mobile, ZTE
� |
Q4/17
� |
2009-09-07 |
|
[ 177 ]
�
� |
Proposal for miscellaneous modification to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
China Mobile, ZTE
� |
Q4/17
� |
2009-09-07 |
|
[ 176 ]
�
� |
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
China Mobile, ZTE
� |
Q4/17
� |
2009-09-07 |
|
[ 175 ]
�
� |
Proposal for adding chapter 9 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
China Mobile, ZTE
� |
Q4/17
� |
2009-09-07 |
|
[ 174 ]
�
+Corr.1� |
Proposed text for trust establishment in X.idm-ifa
�
� |
China Mobile, ZTE Corporation
� |
Q10/17
� |
2009-09-07 |
|
[ 165 ]
�
� |
Proposed use cases for X.tb-ucr
�
� |
CATR, MIIT, China
� |
Q4/17
� |
2009-09-07 |
|
[ 164 ]
�
� |
Updated draft text on Recommendation X.tb-ucc: Traceback use cases and capabilities
�
� |
CATR, MIIT, China
� |
Q4/17
� |
2009-09-07 |
|
[ 162 ]
�
+Corr.1� |
Proposal for a new work item on overview of security threats to and security mechanisms for smart phones
�
� |
MIIT, China
� |
Q6/17
� |
2009-09-07 |
|
[ 161 ]
�
� |
Comments on X.fcsip, Framework for countering spam in IP-based multimedia applications
�
� |
MIIT, China
� |
Q5/17
� |
2009-09-07 |
|
[ 160 ]
�
� |
Proposed a new work item on Generic IdM interoperability mechanisms
�
� |
MIIT, China
� |
Q10/17
� |
2009-09-07 |
|
[ 105 ]
�
� |
Basic concept for authentication mechanism of P2P-based telecommunication network
�
� |
China Mobile, China MII, ZTE
� |
Q7/17
� |
2009-09-03 |
|
[ 104 ]
�
� |
Draft Recommendation X.abnot: Abnormal traffic detection and control guideline for telecommunication network
�
� |
China Mobile, Huawei
� |
Q4/17
� |
2009-09-03 |
|
[ 103 ]
�
� |
Draft Recommendation X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
�
� |
China Mobile, China MII, ZTE
� |
Q7/17
� |
2009-09-03 |
|
[ 102 ]
�
� |
Proposed draft Recommendation. X.ismf, Information security management framework
�
� |
China Mobile
� |
Q3/17
� |
2009-09-03 |
|
[ 101 ]
�
� |
Proposal of new work item - Integration of the network layer authentication and the service layer authentication
�
� |
China Mobile, China MII, ZTE
� |
Q10/17
� |
2009-09-03 |
Resultats:17 documents
� |
T�l�chargement de multiples documents:�Formats et langues � prendre en compte (si disponibles):