This document specifies QUIC version 2, which is identical to QUIC version 1 except for some trivial details. Its purpose is to combat
This document specifies a new parameter that is used to carry fine-grained authorization data in OAuth messages.
This document describes how to extend the Internet Key Exchange Protocol Version 2 (IKEv2) to allow multiple key exchanges to take
This document defines a set of cryptographic transforms for use in the Internet Key Exchange Protocol version 2 (IKEv2). The transforms
This document describes HyStart++, a simple modification to the slow start phase of congestion control algorithms. Slow start can
This document deprecates the use of any “int” domain names that were designated for infrastructure purposes by the IETF, and it identifies
This document specifies a certificate extension for including logotypes in public key certificates and attribute certificates. This
The IETF Nominating Committee (NomCom) appoints candidates to several IETF leadership committees. RFC 8713 provides criteria for NomCom
The data model for network topologies defined in RFC 8345 introduces vertical layering relationships between networks that can be
In large network deployments, a single Diameter node can support over a million concurrent Diameter sessions. In some use cases, Diameter