%% You should probably cite draft-ietf-anima-constrained-voucher-24 instead of this revision. @techreport{ietf-anima-constrained-voucher-08, number = {draft-ietf-anima-constrained-voucher-08}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-anima-constrained-voucher/08/}, author = {Michael Richardson and Peter Van der Stok and Panos Kampanakis}, title = {{Constrained Voucher Artifacts for Bootstrapping Protocols}}, pagetotal = 41, year = , month = , day = , abstract = {This document defines a strategy to securely assign a pledge to an owner, using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher". This document builds upon the work in {[}RFC8366{]}, encoding the resulting artifact in CBOR. Use with two signature technologies are described. Additionally, this document explains how constrained vouchers may be transported as an extension to the {[}I-D.ietf-ace-coap-est{]} protocol.}, }