ETSI logo

docbox.etsi.org / Workshop / 2009 / 200901_SECURITYWORKSHOP

  sort by name/desc           sort by date/desc           sort by size/desc
icon 00BIOGRAPHIES.pdf 2009-01-19 13:27 1167,3 KB
icon 00SECURITYWS_AGENDA.pdf 2009-01-19 13:20 871,8 KB
icon ALCATELLUCENT_SUNDARAM_SecuringEmergingWirelessNetworkandServices.pdf 2009-01-13 10:18 1057 KB
icon CEN_BAINS_CENWORKSHOPonDataProtectionandPrivacy.pdf 2009-01-13 13:34 55,2 KB
icon CYBERSECURITY_NIZAMKASSIM_UnderstandingMobilePhoneThreatVectors.pdf 2009-01-13 11:16 310,7 KB
icon DVB_CPCM_JEFFREY_ContentProtectionforTelevisionintheHOme.pdf 2009-01-14 8:44 2713,4 KB
icon EC_CONTE_ICTStandardizationandCybersecurityPolicyDevelopments.pdf 2009-01-13 8:42 38,5 KB
icon EC_GALLER_ActionPlanoneSignatureandeIdentification.pdf 2009-01-14 9:07 197,8 KB
icon EC_Masera_TowardsStandardizationMeasurestoSupportTheSecurityofControlandRealTimeSystems.pdf 2009-01-13 13:19 339,6 KB
icon ENISA_GORNIAK_ENISAactivitiesinsecurity_resilienceOfeCommunicationNetworks.pdf 2009-01-13 9:01 877,1 KB
icon ETSISecurity_WhitePaper_Edition2.pdf 2009-01-13 11:03 1428,2 KB
icon ETSI_Carmine-Rizzo_ETSISSecurityOverview.pdf 2009-01-13 10:37 99 KB
icon FRAUNHOFER_GERLACH_CAR2X.pdf 2009-01-13 14:40 2882,7 KB
icon G&D_Vedder_UICC_SecurityPlatformforValueAddedServices.pdf 2009-01-14 10:24 4753,7 KB
icon HARROP_- ITU update.pdf 2009-01-14 8:16 811,7 KB
icon IDPARTNERS_DECOUESSIN_Cyberidentity_UniqueIdentificationSystemsforOrganizations.pdf 2009-01-13 13:49 174,9 KB
icon INFOSOC_COM 2008 798_EN.pdf 2009-01-14 13:25 72,8 KB
icon INTEL_VISHIK_IncorporatingPrivacyIntoSecurityStandardization.pdf 2009-01-13 14:54 824,7 KB
icon NOKIA_ValtteriNiemi_3GPPSecurityHotTopics_LTESAEandHome(e)NB.pdf 2009-01-13 10:24 138,7 KB
icon NXP_MEINDL_NFCIP1SecurityStandardProtectsNearFieldCommunication.pdf 2009-01-14 8:35 247,8 KB
icon OMTP_DavidRogers_OMTPSecurityRecommendationsandtheAdvancedTrustedEnvironment_OMTP_TR1.pdf 2009-01-13 10:47 988,1 KB
icon PANELDISCUSSION_CONCLUSIONS.zip 2009-01-29 21:25 269,5 KB
icon Report_4th_Security_Workshop.pdf 2009-01-30 9:16 3764,4 KB
icon SECURITYRESEARCH_FenzOntologyandBayesianBasedInformationSecurityRiskManagement.pdf 2009-01-14 14:22 2015,6 KB
icon SHEPEHRs_pourazin_contenttagsecurity.pdf 2009-01-14 14:25 109,9 KB
icon SONY_SATO_FingerVeinAuthentication.pdf 2009-01-13 16:38 884,8 KB
icon STF342-cadzow_Profiles.pdf 2009-01-13 15:37 75,8 KB
icon STF352_PETERSEN_securityAndPersonalizedEhealthSystems.pdf 2009-01-13 15:57 607,5 KB
icon STF356-MakingBetterSecurityStandards_cadzow.pdf 2009-01-14 10:13 108,1 KB
icon TATA_JAYDIP_SecureMulticastandBroadcastCommunicationinBroadbandWirelessNetworks.pdf 2009-01-14 8:18 343 KB
icon TBESI_Genghini_ElectronicSignatureActivies_cornerstoneForInteroperabilityofDigitalDocumentsinEurope.pdf 2009-01-13 14:49 196,3 KB
icon TCLI_VANDERAREND_HandlingofRetainedDatainETSIStandards.pdf 2009-01-14 11:45 284,6 KB
icon TECHUniMunchen_pongratz_searchEngineBasedDataLeakage.pdf 2009-01-13 16:23 378,3 KB
icon TechUniversityBerlin_Hermanns_ICTstandardizationinUAVSystem.pdf 2009-01-14 14:06 469,1 KB
icon TELECOMITALIA_DELUTIIS_NextGenerationAccessNetwork(in)Security.pdf 2009-01-14 11:26 129,1 KB
icon Telefonica_I+D_SEGURAVINCENTE_ImplementingaSecurityMetricsDashboardinTelefonicaEspana.pdf 2009-01-14 13:16 1210 KB
icon TheCottinghamGroup_Harrop_IdentityManagement.pdf 2009-01-14 10:43 1517,6 KB
icon TISPAN_Judith_Rossebo_TispanNGNSecurityStandards.pdf 2009-01-14 11:08 706,2 KB
icon UNINA_dantonio_IntersectionvulnerabilityDB.pdf 2009-01-14 13:54 1673 KB
icon UNIVERSITYOFLAUSANNE_IGLITASHI.pdf 2009-01-14 13:38 1061,7 KB

40 items.