ic

[ L.156/L.57 (03/18) ] - Air-assisted installation of optical fibre cables

Air-assisted installation of optical fibre cables




ic

[ L.25 (01/15) ] - Optical fibre cable network maintenance

Optical fibre cable network maintenance




ic

[ L.315 (03/18) ] - Water detection in underground closures for the maintenance of optical fibre cable networks with optical monitoring system

Water detection in underground closures for the maintenance of optical fibre cable networks with optical monitoring system




ic

[ L.404 (08/17) ] - Field mountable single-mode optical fibre connectors

Field mountable single-mode optical fibre connectors




ic

[ TD 571-PLEN ] Revision 1 - English - MS Word Document 2007 - A.5 justification information for draft new G.XGS-PON

A.5 justification information for draft new G.XGS-PON
Source: Editors G.XGS-PON
Study Questions: Q2/15




ic

Operational Bulletin No. 1251 (1.IX.2022) and Annexed List: Status of Radiocommunications between Amateur Stations of Different Countries (In accordance with optional provision No. 25.1 of the Radio Regulations) and Form of Call Signs assigned by each Adm

Operational Bulletin No. 1251 (1.IX.2022) and Annexed List: Status of Radiocommunications between Amateur Stations of Different Countries (In accordance with optional provision No. 25.1 of the Radio Regulations) and Form of Call Signs assigned by each Administration to its Amateur and Experimental Stations (Position on 1 September 2022)




ic

Status of Radiocommunications between Amateur Stations of different Countries (In accordance with optional provision No. 25.1 of the Radio Regulations) and Form of Call Signs assigned by each Administration to its Amateur and Experimental Stations

Status of Radiocommunications between Amateur Stations of different Countries (In accordance with optional provision No. 25.1 of the Radio Regulations) and Form of Call Signs assigned by each Administration to its Amateur and Experimental Stations




ic

Operational Bulletin No. 1280 (15.XI.2023) and Annexed List: <br/> Mobile Network Codes (MNC) for the international identification plan for public networks and subscriptions (According to Recommendation ITU-T E.212 (09/2016)) (Position on 15 Novemb

Operational Bulletin No. 1280 (15.XI.2023) and Annexed List:
Mobile Network Codes (MNC) for the international identification plan for public networks and subscriptions (According to Recommendation ITU-T E.212 (09/2016)) (Position on 15 November 2023)




ic

Mobile Network Codes (MNC) for the international identification plan for public networks and subscriptions (According to Recommendation ITU-T E.212 (09/2016))

Mobile Network Codes (MNC) for the international identification plan for public networks and subscriptions (According to Recommendation ITU-T E.212 (09/2016))




ic

[ TD 2564-PLEN ] - English - Word 2003 document - Updates to the Network Forensic and Vulnerability Organizations web page

Updates to the Network Forensic and Vulnerability Organizations web page
Source: Rapporteur Q4/17
Study Questions: Q4/17




ic

[ TD 2118-PLEN ] - English - Word 2003 document - Updates to the Network Forensic and Vulnerability Organizations web page

Updates to the Network Forensic and Vulnerability Organizations web page
Source: Rapporteur Q4/17 (Cybersecurity)
Study Questions: Q4/17




ic

[ TD 87-PLEN ] Revision 2 - English - MS Word Document 2007 - Practical facilities available for the conduct of the work of SG17

Practical facilities available for the conduct of the work of SG17
Source: TSB
Study Questions: QALL/17




ic

[ X.760 (01/18) ] - The measurement framework for the statistical indicators of website traffic

The measurement framework for the statistical indicators of website traffic




ic

[ X.609.5 (01/18) ] - Managed P2P communications: Multimedia streaming overlay management protocol

Managed P2P communications: Multimedia streaming overlay management protocol




ic

[ X.609.4 (01/18) ] - Managed P2P communications: Multimedia streaming peer protocol

Managed P2P communications: Multimedia streaming peer protocol




ic

[ X.1041 (05/18) ] - Security framework for voice-over-long-term-evolution (VoLTE) network operation

Security framework for voice-over-long-term-evolution (VoLTE) network operation




ic

[ X.1080.1 (05/18) ] - e-Health and world-wide telemedicines - Generic telecommunication protocol

e-Health and world-wide telemedicines - Generic telecommunication protocol




ic

[ X.1276 (05/18) ] - Authentication step-up protocol and metadata Version 1.0

Authentication step-up protocol and metadata Version 1.0




ic

[ X.1331 (03/18) ] - Security guidelines for home area network (HAN) devices in smart grid systems

Security guidelines for home area network (HAN) devices in smart grid systems




ic

[ X.1214 (03/18) ] - Security assessment techniques in telecommunication/information and communication technology networks

Security assessment techniques in telecommunication/information and communication technology networks




ic

[ X.1603 (03/18) ] - Data security requirements for the monitoring service of cloud computing

Data security requirements for the monitoring service of cloud computing




ic

[ X.697 (10/17) ] - Information technology - ASN.1 encoding rules: Specification of JavaScript Object Notation Encoding Rules (JER)

Information technology - ASN.1 encoding rules: Specification of JavaScript Object Notation Encoding Rules (JER)




ic

[ X.894 (10/18) ] - Information technology - Generic applications of ASN.1: Cryptographic message syntax

Information technology - Generic applications of ASN.1: Cryptographic message syntax




ic

[ X.1093 (11/18) ] - Telebiometric access control with smart ID cards

Telebiometric access control with smart ID cards




ic

[ X.676 (11/18) ] - Object identifier-based resolution framework for IoT grouped services

Object identifier-based resolution framework for IoT grouped services




ic

[ X.1147 (11/18) ] - Security requirements and framework for big data analytics in mobile Internet services

Security requirements and framework for big data analytics in mobile Internet services




ic

[ X.1278 (11/18) ] - Client to authenticator protocol/Universal 2-factor framework

Client to authenticator protocol/Universal 2-factor framework




ic

[ X.1450 (10/18) ] - Guidelines on hybrid authentication and key management mechanisms in the client-server model

Guidelines on hybrid authentication and key management mechanisms in the client-server model




ic

[ X.1277 (11/18) ] - Universal authentication framework

Universal authentication framework




ic

[ X.609.6 (12/18) ] - Managed P2P communications: Content distribution signalling requirements

Managed P2P communications: Content distribution signalling requirements




ic

[ X.609.7 (12/18) ] - Managed P2P communications: Content distribution peer protocol

Managed P2P communications: Content distribution peer protocol




ic

[ X.1249 (01/19) ] - Technical framework for countering mobile in-application advertising spam

Technical framework for countering mobile in-application advertising spam




ic

[ X.Sup27 (09/16) ] - ITU-T X.1054 - Supplement on best practice for governance of information security - Case of Burkina Faso

ITU-T X.1054 - Supplement on best practice for governance of information security - Case of Burkina Faso




ic

[ X.Sup28 (09/16) ] - ITU-T X.1245 - Supplement on technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE)

ITU-T X.1245 - Supplement on technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE)




ic

[ X.Sup29 (09/17) ] - ITU-T X.1242 - Supplement on guidelines on countermeasures against short message service phishing and smishing attacks

ITU-T X.1242 - Supplement on guidelines on countermeasures against short message service phishing and smishing attacks




ic

[ X.Sup33 (09/18) ] - ITU-T X.1231 - Supplement on technical framework for countering telephone service scams

ITU-T X.1231 - Supplement on technical framework for countering telephone service scams




ic

[ X.Sup32 (03/18) ] - ITU-T X.1058 - Supplement on code of practice for personally identifiable information (PII) protection for telecommunication organizations

ITU-T X.1058 - Supplement on code of practice for personally identifiable information (PII) protection for telecommunication organizations




ic

[ X.1042 (01/19) ] - Security services using software-defined networking

Security services using software-defined networking




ic

[ X.1043 (03/19) ] - Security framework and requirements for service function chaining based on software-defined networking

Security framework and requirements for service function chaining based on software-defined networking




ic

[ X.Sup34 (01/19) ] - ITU-T X.1051 - Supplement on code of practice for information security controls for telecommunication organizations

ITU-T X.1051 - Supplement on code of practice for information security controls for telecommunication organizations




ic

[ X.1094 (03/19) ] - Telebiometric authentication using biosignals

Telebiometric authentication using biosignals




ic

[ Q.3053 (03/17) ] - Signalling architecture and requirements for IP-based short message service over ITU-T defined NGN

Signalling architecture and requirements for IP-based short message service over ITU-T defined NGN




ic

[ Q.3642 (04/19) ] - IMS references to Release 12 for communication between IMS and NGN networks to support end-to-end service interoperability

IMS references to Release 12 for communication between IMS and NGN networks to support end-to-end service interoperability




ic

[ Q.3630 (03/17) ] - Inter-IMS network to network interface - Protocol specification

Inter-IMS network to network interface - Protocol specification




ic

[ Q.4014.1 (04/19) ] - PSTN/ISDN terminal equipment using IP Multimedia core network subsystem; Conformance testing; Part 1: PICS

PSTN/ISDN terminal equipment using IP Multimedia core network subsystem; Conformance testing; Part 1: PICS




ic

[ Q.5050 (03/19) ] - Framework for solutions to combat counterfeit ICT devices

Framework for solutions to combat counterfeit ICT devices




ic

[ Q.4042.1 (12/18) ] - Cloud interoperability testing for web applications - part 1: Interoperability testing between the CSC and CSP

Cloud interoperability testing for web applications - part 1: Interoperability testing between the CSC and CSP




ic

[ Q.731.6 (04/19) ] - Stage 3 description for number identification supplementary services using Signalling System No. 7 : Stage 3 description for number identification supplementary services using Signalling System no.7 - Connected line identification re

Stage 3 description for number identification supplementary services using Signalling System No. 7 : Stage 3 description for number identification supplementary services using Signalling System no.7 - Connected line identification restriction




ic

[ Q.731.5 (04/19) ] - Stage 3 description for number identification supplementary services using Signalling System No. 7 : Stage 3 description for number identification supplementary services using Signalling System No.7 - Connected line identification pr

Stage 3 description for number identification supplementary services using Signalling System No. 7 : Stage 3 description for number identification supplementary services using Signalling System No.7 - Connected line identification presentation




ic

[ Q.731.4 (04/19) ] - Stage 3 description for number identification supplementary services using Signalling System No. 7 : Stage 3 description for number identification supplementary services using Signalling System No.7 - Calling line identification rest

Stage 3 description for number identification supplementary services using Signalling System No. 7 : Stage 3 description for number identification supplementary services using Signalling System No.7 - Calling line identification restriction