Skip to main content

Use Case Analysis and Potential Bandwidth Optimization Methods for Encrypted Traffic
slides-marnewws-use-case-analysis-and-potential-bandwidth-optimization-methods-for-encrypted-traffic-00

Recipient expansions

Mail trigger To Cc
ballot_deferred The IESG <iesg@ietf.org>, iesg-secretary@ietf.org
doc_telechat_details_changed The IESG <iesg@ietf.org>, iesg-secretary@ietf.org
iesg_ballot_saved The IESG <iesg@ietf.org>