This document defines DHCPv6 options so that a Homenet Naming Authority (HNA) can automatically set the appropriate configuration
This document relaxes the packet verification rules defined in "MAC Authentication for the Babel Routing Protocol" (RFC 8967) in order to
The "Management Techniques in Encrypted Networks (M-TEN)" workshop was convened by the Internet Architecture Board (IAB) from 17 October
This specification updates the registration policies for adding new entries to registries within the IANA "Secure Shell (SSH) Protocol
This document describes the Namespace Identifier (NID) "ddi" for Uniform Resource Names (URNs) used to identify resources that conform
This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make
An Oblivious Pseudorandom Function (OPRF) is a two-party protocol between a client and a server for computing the output of a
In many environments, a component external to a network is called upon to perform computations based on the network topology and the
This memo specifies two prime-order groups, ristretto255 and decaf448, suitable for safely implementing higher-level and complex
Secure Telephone Identity Revisited (STIR) provides a means of attesting the identity of a telephone caller via a signed token in