1

[ X.1041 (05/18) ] - Security framework for voice-over-long-term-evolution (VoLTE) network operation

Security framework for voice-over-long-term-evolution (VoLTE) network operation




1

[ X.1080.1 (05/18) ] - e-Health and world-wide telemedicines - Generic telecommunication protocol

e-Health and world-wide telemedicines - Generic telecommunication protocol




1

[ X.1276 (05/18) ] - Authentication step-up protocol and metadata Version 1.0

Authentication step-up protocol and metadata Version 1.0




1

[ X.1500 (2011) Amendment 12 (03/18) ] - Revised structured cybersecurity information exchange techniques

Revised structured cybersecurity information exchange techniques




1

[ X.Sup26 (2016) Corrigendum 1 (03/18) ] -




1

[ X.1080.0 (2017) Corrigendum 1 (03/18) ] -




1

[ X.1331 (03/18) ] - Security guidelines for home area network (HAN) devices in smart grid systems

Security guidelines for home area network (HAN) devices in smart grid systems




1

[ X.1214 (03/18) ] - Security assessment techniques in telecommunication/information and communication technology networks

Security assessment techniques in telecommunication/information and communication technology networks




1

[ X.1603 (03/18) ] - Data security requirements for the monitoring service of cloud computing

Data security requirements for the monitoring service of cloud computing




1

[ X.1051 (2016) Corrigendum 1 (09/17) ] -




1

[ X.682 (2015) Corrigendum 2 (05/18) ] -




1

[ X.681 (2015) Corrigendum 1 (05/18) ] -




1

[ X.696 (2015) Corrigendum 3 (05/18) ] -




1

[ X.683 (2015) Corrigendum 1 (05/18) ] -




1

[ X.697 (10/17) ] - Information technology - ASN.1 encoding rules: Specification of JavaScript Object Notation Encoding Rules (JER)

Information technology - ASN.1 encoding rules: Specification of JavaScript Object Notation Encoding Rules (JER)




1

[ X.680 (2015) Corrigendum 3 (05/18) ] -




1

[ X.894 (10/18) ] - Information technology - Generic applications of ASN.1: Cryptographic message syntax

Information technology - Generic applications of ASN.1: Cryptographic message syntax




1

[ X.Sup13 (09/18) ] - ITU-T X.1051 - Supplement on information security management users' guide for Recommendation ITU-T X.1051

ITU-T X.1051 - Supplement on information security management users' guide for Recommendation ITU-T X.1051




1

[ X.1093 (11/18) ] - Telebiometric access control with smart ID cards

Telebiometric access control with smart ID cards




1

[ X.1361 (09/18) ] - Security framework for the Internet of things based on the gateway model

Security framework for the Internet of things based on the gateway model




1

[ X.676 (11/18) ] - Object identifier-based resolution framework for IoT grouped services

Object identifier-based resolution framework for IoT grouped services




1

[ X.1147 (11/18) ] - Security requirements and framework for big data analytics in mobile Internet services

Security requirements and framework for big data analytics in mobile Internet services




1

[ X.1278 (11/18) ] - Client to authenticator protocol/Universal 2-factor framework

Client to authenticator protocol/Universal 2-factor framework




1

[ X.1450 (10/18) ] - Guidelines on hybrid authentication and key management mechanisms in the client-server model

Guidelines on hybrid authentication and key management mechanisms in the client-server model




1

[ X.1277 (11/18) ] - Universal authentication framework

Universal authentication framework




1

[ X.680 (2015) Amendment 1 (05/18) ] - Relaxing IMPORTS clause to allow importation of definitions from new versions of a given module

Relaxing IMPORTS clause to allow importation of definitions from new versions of a given module




1

[ X.609.6 (12/18) ] - Managed P2P communications: Content distribution signalling requirements

Managed P2P communications: Content distribution signalling requirements




1

[ X.609.7 (12/18) ] - Managed P2P communications: Content distribution peer protocol

Managed P2P communications: Content distribution peer protocol




1

[ X.1249 (01/19) ] - Technical framework for countering mobile in-application advertising spam

Technical framework for countering mobile in-application advertising spam




1

[ X.1215 (01/19) ] - Use cases for structured threat information expression

Use cases for structured threat information expression




1

[ X.894 (2018) Corrigendum 1 (03/19) ] -




1

[ X.Sup27 (09/16) ] - ITU-T X.1054 - Supplement on best practice for governance of information security - Case of Burkina Faso

ITU-T X.1054 - Supplement on best practice for governance of information security - Case of Burkina Faso




1

[ X.Sup28 (09/16) ] - ITU-T X.1245 - Supplement on technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE)

ITU-T X.1245 - Supplement on technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE)




1

[ X.Sup29 (09/17) ] - ITU-T X.1242 - Supplement on guidelines on countermeasures against short message service phishing and smishing attacks

ITU-T X.1242 - Supplement on guidelines on countermeasures against short message service phishing and smishing attacks




1

[ X.Sup30 (09/17) ] - ITU-T X.805 - Supplement on security guidelines for mobile virtual network operators

ITU-T X.805 - Supplement on security guidelines for mobile virtual network operators




1

[ X.Sup31 (09/17) ] - ITU-T X.660 - Supplement on guidelines for using object identifiers for the Internet of things

ITU-T X.660 - Supplement on guidelines for using object identifiers for the Internet of things




1

[ X.Sup33 (09/18) ] - ITU-T X.1231 - Supplement on technical framework for countering telephone service scams

ITU-T X.1231 - Supplement on technical framework for countering telephone service scams




1

[ X.Sup32 (03/18) ] - ITU-T X.1058 - Supplement on code of practice for personally identifiable information (PII) protection for telecommunication organizations

ITU-T X.1058 - Supplement on code of practice for personally identifiable information (PII) protection for telecommunication organizations




1

[ X.1042 (01/19) ] - Security services using software-defined networking

Security services using software-defined networking




1

[ X.1043 (03/19) ] - Security framework and requirements for service function chaining based on software-defined networking

Security framework and requirements for service function chaining based on software-defined networking




1

[ X.Sup34 (01/19) ] - ITU-T X.1051 - Supplement on code of practice for information security controls for telecommunication organizations

ITU-T X.1051 - Supplement on code of practice for information security controls for telecommunication organizations




1

[ X.1094 (03/19) ] - Telebiometric authentication using biosignals

Telebiometric authentication using biosignals




1

[ X.1197 (2012) Amendment 1 (09/19) ] -




1

[ Q.1912.5 (2018) Erratum 1 (11/19) ] -




1

[ Q.1912.5 (2018) Corrigendum 1 (07/18) ] -




1

[ Q.3053 (03/17) ] - Signalling architecture and requirements for IP-based short message service over ITU-T defined NGN

Signalling architecture and requirements for IP-based short message service over ITU-T defined NGN




1

[ Q.1912.5 (01/18) ] - Interworking between session initiation protocol (SIP) and bearer independent call control protocol or ISDN user part

Interworking between session initiation protocol (SIP) and bearer independent call control protocol or ISDN user part




1

[ Q.3642 (04/19) ] - IMS references to Release 12 for communication between IMS and NGN networks to support end-to-end service interoperability

IMS references to Release 12 for communication between IMS and NGN networks to support end-to-end service interoperability




1

[ Q.3630 (03/17) ] - Inter-IMS network to network interface - Protocol specification

Inter-IMS network to network interface - Protocol specification




1

[ Q.3054 (04/19) ] - Signalling architecture for virtualization of control network entities

Signalling architecture for virtualization of control network entities