References from draft-ietf-ace-wg-coap-eap
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
draft-ingles-eap-edhoc |
Using the Extensible Authentication Protocol with Ephemeral Diffie-Hellman over COSE (EDHOC)
References Referenced by |
informatively references | ||
RFC 2119 |
Key words for use in RFCs to Indicate Requirement Levels
References Referenced by |
Best Current Practice | normatively references | |
RFC 3748 |
Extensible Authentication Protocol (EAP)
References Referenced by |
Proposed Standard | normatively references | |
RFC 4017 |
Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs
References Referenced by |
Informational | informatively references | |
RFC 4137 |
State Machines for Extensible Authentication Protocol (EAP) Peer and Authenticator
References Referenced by |
Informational | informatively references | |
RFC 4764 |
The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method
References Referenced by |
Experimental | informatively references | |
RFC 5191 |
Protocol for Carrying Authentication for Network Access (PANA)
References Referenced by |
Proposed Standard | informatively references | |
RFC 5247 |
Extensible Authentication Protocol (EAP) Key Management Framework
References Referenced by |
Proposed Standard | normatively references | |
RFC 5448 |
Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')
References Referenced by |
Informational | informatively references | |
RFC 5869 |
HMAC-based Extract-and-Expand Key Derivation Function (HKDF)
References Referenced by |
Informational | informatively references | |
RFC 6677 |
Channel-Binding Support for Extensible Authentication Protocol (EAP) Methods
References Referenced by |
Proposed Standard | normatively references | |
RFC 6696 |
EAP Extensions for the EAP Re-authentication Protocol (ERP)
References Referenced by |
Proposed Standard | informatively references | |
RFC 6762 |
Multicast DNS
References Referenced by |
Proposed Standard | informatively references | |
RFC 7252 |
The Constrained Application Protocol (CoAP)
References Referenced by |
Proposed Standard | normatively references | |
RFC 7833 |
A RADIUS Attribute, Binding, Profiles, Name Identifier Format, and Confirmation Methods for the Security Assertion Markup Language (SAML)
References Referenced by |
Proposed Standard | informatively references | |
RFC 7959 |
Block-Wise Transfers in the Constrained Application Protocol (CoAP)
References Referenced by |
Proposed Standard | normatively references | |
RFC 7967 |
Constrained Application Protocol (CoAP) Option for No Server Response
References Referenced by |
Informational | informatively references | |
RFC 8174 |
Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words
References Referenced by |
Best Current Practice | normatively references | |
RFC 8323 |
CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets
References Referenced by |
Proposed Standard | normatively references | |
RFC 8415 |
Dynamic Host Configuration Protocol for IPv6 (DHCPv6)
References Referenced by |
Proposed Standard | informatively references | |
RFC 8446 |
The Transport Layer Security (TLS) Protocol Version 1.3
References Referenced by |
Proposed Standard | normatively references | |
RFC 8613 |
Object Security for Constrained RESTful Environments (OSCORE)
References Referenced by |
Proposed Standard | normatively references | |
RFC 8615 |
Well-Known Uniform Resource Identifiers (URIs)
References Referenced by |
Proposed Standard | informatively references | |
RFC 8824 |
Static Context Header Compression (SCHC) for the Constrained Application Protocol (CoAP)
References Referenced by |
Proposed Standard | informatively references | |
RFC 8949 |
Concise Binary Object Representation (CBOR)
References Referenced by |
Internet Standard | normatively references | |
RFC 9031 |
Constrained Join Protocol (CoJP) for 6TiSCH
References Referenced by |
Proposed Standard | informatively references | |
RFC 9053 |
CBOR Object Signing and Encryption (COSE): Initial Algorithms
References Referenced by |
Informational | informatively references | |
RFC 9140 |
Nimble Out-of-Band Authentication for EAP (EAP-NOOB)
References Referenced by |
Proposed Standard | informatively references | |
RFC 9147 |
The Datagram Transport Layer Security (DTLS) Protocol Version 1.3
References Referenced by |
Proposed Standard | informatively references | |
RFC 9176 |
Constrained RESTful Environments (CoRE) Resource Directory
References Referenced by |
Proposed Standard | informatively references | |
RFC 9190 |
EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3
References Referenced by |
Proposed Standard | informatively references | |
RFC 9200 |
Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth)
References Referenced by |
Proposed Standard | informatively references |