<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.richardson-anima-ace-constrained-voucher" target="https://datatracker.ietf.org/doc/html/draft-richardson-anima-ace-constrained-voucher-00">
   <front>
      <title>Constrained Voucher Profile for Bootstrapping Protocols</title>
      <author initials="M." surname="Richardson" fullname="Michael Richardson">
         <organization>Sandelman Software Works</organization>
      </author>
      <date month="December" day="11" year="2017" />
      <abstract>
	 <t>   This document defines a strategy to securely assign a pledge to an
   owner, using an artifact signed, directly or indirectly, by the
   pledge&#x27;s manufacturer.  This artifact is known as a &quot;voucher&quot;.

   This document builds upon the work in [I-D.ietf-anima-voucher],
   encoding the resulting artifact in CBOR.  Use with two signature
   technologies are described.

   Additionally, this document explains how constrained vouchers may be
   transported in the [I-D.vanderstok-ace-coap-est] protocol.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-richardson-anima-ace-constrained-voucher-00" />
   
</reference>
