References from draft-marin-ace-wg-coap-eap
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
BCP 14 |
Key words for use in RFCs to Indicate Requirement Levels References Referenced by |
Best Current Practice | normatively references | |
draft-ietf-ace-oauth-authz |
Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth) References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-lwig-coap |
CoAP Implementation Guidance References Referenced by |
normatively references | ||
draft-ingles-eap-edhoc |
EAP method based on EDHOC Authentication References Referenced by |
normatively references | ||
draft-kumar-dice-dtls-relay |
DTLS Relay for Constrained Environments References Referenced by |
normatively references | ||
draft-ohba-core-eap-based-bootstrapping |
Provisioning Credentials for CoAP Applications using EAP References Referenced by |
normatively references | ||
draft-pelov-core-cosol |
Constrained Signaling Over LP-WAN References Referenced by |
normatively references | ||
RFC 2119 |
Key words for use in RFCs to Indicate Requirement Levels References Referenced by |
Best Current Practice | normatively references | |
RFC 3748 |
Extensible Authentication Protocol (EAP) References Referenced by |
Proposed Standard | normatively references | |
RFC 4279 |
Pre-Shared Key Ciphersuites for Transport Layer Security (TLS) References Referenced by |
Proposed Standard | normatively references | |
RFC 4493 |
The AES-CMAC Algorithm References Referenced by |
Informational | normatively references | |
RFC 4615 |
The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE) References Referenced by |
Proposed Standard | normatively references | |
RFC 4764 |
The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method References Referenced by |
Experimental | normatively references | |
RFC 5191 |
Protocol for Carrying Authentication for Network Access (PANA) References Referenced by |
Proposed Standard | normatively references | |
RFC 5247 |
Extensible Authentication Protocol (EAP) Key Management Framework References Referenced by |
Proposed Standard | normatively references | |
RFC 5295 |
Specification for the Derivation of Root Keys from an Extended Master Session Key (EMSK) References Referenced by |
Proposed Standard | normatively references | |
RFC 5869 |
HMAC-based Extract-and-Expand Key Derivation Function (HKDF) References Referenced by |
Informational | normatively references | |
RFC 6345 |
Protocol for Carrying Authentication for Network Access (PANA) Relay Element References Referenced by |
Proposed Standard | normatively references | |
RFC 6696 |
EAP Extensions for the EAP Re-authentication Protocol (ERP) References Referenced by |
Proposed Standard | normatively references | |
RFC 7228 |
Terminology for Constrained-Node Networks References Referenced by |
Informational | normatively references | |
RFC 7252 |
The Constrained Application Protocol (CoAP) References Referenced by |
Proposed Standard | normatively references | |
RFC 7833 |
A RADIUS Attribute, Binding, Profiles, Name Identifier Format, and Confirmation Methods for the Security Assertion Markup Language (SAML) References Referenced by |
Proposed Standard | normatively references | |
RFC 7967 |
Constrained Application Protocol (CoAP) Option for No Server Response References Referenced by |
Informational | normatively references |