<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.dukhovni-opportunistic-security" target="https://datatracker.ietf.org/doc/html/draft-dukhovni-opportunistic-security-06">
   <front>
      <title>Opportunistic Security: Some Protection Most of the Time</title>
      <author initials="V." surname="Dukhovni" fullname="Viktor Dukhovni">
         <organization>Two Sigma</organization>
      </author>
      <date month="November" day="26" year="2014" />
      <abstract>
	 <t>This document defines the concept &quot;Opportunistic Security&quot; in the context of communications protocols.  Protocol designs based on Opportunistic Security use encryption even when authentication is not available, and use authentication when possible, thereby removing barriers to the widespread use of encryption on the Internet.
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-dukhovni-opportunistic-security-06" />
   
</reference>
