References from draft-ietf-core-oscore-groupcomm

These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.

Reference type help

Document Title Status Type Downref
BCP 106 Randomness Requirements for Security
References Referenced by
Best Current Practice normatively references
BCP 14 Key words for use in RFCs to Indicate Requirement Levels
References Referenced by
Best Current Practice normatively references
draft-dijk-core-groupcomm-bis Group Communication for the Constrained Application Protocol (CoAP)
References Referenced by
informatively references
draft-ietf-ace-key-groupcomm Key Provisioning for Group Communication using ACE
References Referenced by
informatively references
draft-ietf-ace-key-groupcomm-oscore Key Management for OSCORE Groups in ACE
References Referenced by
informatively references
draft-ietf-ace-oauth-authz Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)
References Referenced by
Proposed Standard informatively references
draft-ietf-core-echo-request-tag CoAP: Echo, Request-Tag, and Token Processing
References Referenced by
informatively references
draft-ietf-core-groupcomm-bis Group Communication for the Constrained Application Protocol (CoAP)
References Referenced by
normatively references
draft-ietf-core-object-security Object Security for Constrained RESTful Environments (OSCORE)
References Referenced by
Proposed Standard informatively references
draft-ietf-cose-rfc8152bis-algs CBOR Object Signing and Encryption (COSE): Initial Algorithms
References Referenced by
Informational normatively references
draft-ietf-cose-rfc8152bis-struct CBOR Object Signing and Encryption (COSE): Structures and Process
References Referenced by
Internet Standard normatively references
draft-ietf-lwig-curve-representations Alternative Elliptic Curve Representations
References Referenced by
Informational informatively references
draft-ietf-lwig-security-protocol-comparison Comparison of CoAP Security Protocols
References Referenced by
informatively references
draft-mattsson-cfrg-det-sigs-with-noise Deterministic ECDSA and EdDSA Signatures with Additional Randomness
References Referenced by
informatively references
draft-palombini-ace-key-groupcomm Key Provisioning for Group Communication using ACE
References Referenced by
informatively references
draft-somaraju-ace-multicast Security for Low-Latency Group Communication
References Referenced by
informatively references
draft-tiloca-core-observe-multicast-notifications Observe Notifications as CoAP Multicast Responses
References Referenced by
informatively references
FYI 36 Internet Security Glossary, Version 2
References Referenced by
Informational informatively references
RFC 2119 Key words for use in RFCs to Indicate Requirement Levels
References Referenced by
Best Current Practice normatively references
RFC 4086 Randomness Requirements for Security
References Referenced by
Best Current Practice normatively references
RFC 4944 Transmission of IPv6 Packets over IEEE 802.15.4 Networks
References Referenced by
Proposed Standard informatively references
RFC 4949 Internet Security Glossary, Version 2
References Referenced by
Informational informatively references
RFC 6282 Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks
References Referenced by
Proposed Standard informatively references
RFC 6347 Datagram Transport Layer Security Version 1.2
References Referenced by
Proposed Standard informatively references
RFC 7228 Terminology for Constrained-Node Networks
References Referenced by
Informational informatively references
RFC 7252 The Constrained Application Protocol (CoAP)
References Referenced by
Proposed Standard normatively references
RFC 7641 Observing Resources in the Constrained Application Protocol (CoAP)
References Referenced by
Proposed Standard informatively references
RFC 7748 Elliptic Curves for Security
References Referenced by
Informational normatively references
RFC 7959 Block-Wise Transfers in the Constrained Application Protocol (CoAP)
References Referenced by
Proposed Standard informatively references
RFC 8032 Edwards-Curve Digital Signature Algorithm (EdDSA)
References Referenced by
Informational normatively references
RFC 8174 Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words
References Referenced by
Best Current Practice normatively references
RFC 8613 Object Security for Constrained RESTful Environments (OSCORE)
References Referenced by
Proposed Standard normatively references