References to draft-ietf-core-object-security

This is an experimental product. These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.

Showing RFCs and active Internet-Drafts, sorted by reference type, then document name.

Document Title Status Type Downref
draft-ietf-6tisch-dtsecurity-zerotouch-join 6tisch Zero-Touch Secure Join protocol
Refs Ref'd by
normatively references
draft-ietf-6tisch-minimal-security Minimal Security Framework for 6TiSCH
Refs Ref'd by
normatively references
draft-ietf-ace-key-groupcomm-oscore Key Management for OSCORE Groups in ACE
Refs Ref'd by
normatively references
draft-ietf-ace-oscore-profile OSCORE profile of the Authentication and Authorization for Constrained Environments Framework
Refs Ref'd by
normatively references
draft-ietf-anima-constrained-voucher Constrained Voucher Artifacts for Bootstrapping Protocols
Refs Ref'd by
normatively references
draft-ietf-core-oscore-groupcomm Group OSCORE - Secure Group Communication for CoAP
Refs Ref'd by
normatively references
draft-ietf-lpwan-coap-static-context-hc LPWAN Static Context Header Compression (SCHC) for CoAP
Refs Ref'd by
Proposed Standard normatively references
draft-irtf-t2trg-rest-iot RESTful Design for Internet of Things Systems
Refs Ref'd by
Informational normatively references
draft-selander-ace-coap-est-oscore Protecting EST payloads with OSCORE
Refs Ref'd by
normatively references
draft-selander-ace-cose-ecdhe Ephemeral Diffie-Hellman Over COSE (EDHOC)
Refs Ref'd by
normatively references
draft-vanderstok-constrained-anima-dtls-join-proxy Constrained Join Proxy for Bootstrapping Protocols
Refs Ref'd by
normatively references
draft-bormann-t2trg-sworn SWORN: Secure Wake on Radio Nudging
Refs Ref'd by
informatively references
draft-hartke-core-stateless Extended Tokens and Stateless Clients in the Constrained Application Protocol (CoAP)
Refs Ref'd by
informatively references
draft-ietf-6tisch-architecture An Architecture for IPv6 over the TSCH mode of IEEE 802.15.4
Refs Ref'd by
Proposed Standard informatively references
draft-ietf-ace-actors An architecture for authorization in constrained environments
Refs Ref'd by
informatively references
draft-ietf-ace-oauth-authz Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)
Refs Ref'd by
Proposed Standard informatively references
draft-ietf-core-coap-pubsub Publish-Subscribe Broker for the Constrained Application Protocol (CoAP)
Refs Ref'd by
informatively references
draft-ietf-core-echo-request-tag Echo and Request-Tag
Refs Ref'd by
informatively references
draft-ietf-cose-rfc8152bis-struct CBOR Object Signing and Encryption (COSE) - Structures and Process
Refs Ref'd by
informatively references
draft-ietf-lwig-security-protocol-comparison Comparison of CoAP Security Protocols
Refs Ref'd by
informatively references
draft-irtf-t2trg-iot-seccons State-of-the-Art and Challenges for the Internet of Things Security
Refs Ref'd by
Informational informatively references
draft-mattsson-core-coap-actuators Controlling Actuators with CoAP
Refs Ref'd by
informatively references
draft-tiloca-core-oscore-discovery Discovery of OSCORE Groups with the CoRE Resource Directory
Refs Ref'd by
informatively references
RFC 8323 CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets
Refs Ref'd by
Proposed Standard informatively references