LURK Protocol version 1
This is an older version of an Internet-Draft whose latest revision state is "Expired".
Expired & archived
|Last updated||2018-08-13 (Latest revision 2018-02-09)|
|Stream||Stream state||(No stream defined)|
|RFC Editor Note||(None)|
|Send notices to||(None)|
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
This document describes the Limited Usage of Remote Key (LURK) Architecture, the LURK Protocol as well as the LURK Extensions that enables remote interactions with cryptographic material. The specificities of these interactions are expected to be closely tied to some context and thus be defined in LURK Extensions.
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)