|
Paul Wouters
|
Authentication and Authorization for Constrained Environments |
Tim Hollebeek,
Loganaden Velvindron
|
|
Deb Cooley
|
Automated Certificate Management Environment |
Yoav Nir,
Tomofumi Okubo
|
|
Paul Wouters
|
CBOR Object Signing and Encryption |
Michael B. Jones,
Matthew A. Miller,
Ivaylo Petrov
|
|
Paul Wouters
|
DANE Authentication for Network Clients Everywhere |
Wes Hardaker,
Joey Salazar
|
|
Deb Cooley
|
Detecting Unwanted Location Trackers |
Erica Olsen,
Sean Turner
|
|
Paul Wouters
|
EAP Method Update |
Joseph A. Salowey,
Peter E. Yee
|
|
Deb Cooley
|
Grant Negotiation and Authorization Protocol |
Leif Johansson,
Yaron Sheffer
|
|
Deb Cooley
|
IP Security Maintenance and Extensions |
Tero Kivinen,
Yoav Nir
|
|
Deb Cooley
|
Javascript Object Signing and Encryption |
John Bradley,
John Preuß Mattsson,
Karen O'Donoghue
|
|
Deb Cooley
|
Key Transparency |
Prachi Jain,
Shivan Kaul Sahib
|
|
Paul Wouters
|
Common Authentication Technology Next Generation |
Benjamin Kaduk,
Alexey Melnikov
|
|
Paul Wouters
|
Lightweight Authenticated Key Exchange |
Stephen Farrell,
Mališa Vučinić
|
|
Deb Cooley
|
Limited Additional Mechanisms for PKIX and SMIME |
Tim Hollebeek,
Russ Housley
|
|
Paul Wouters
|
Messaging Layer Security |
Nick Sullivan,
Sean Turner
|
|
Deb Cooley
|
Web Authorization Protocol |
Rifaat Shekh-Yusef,
Hannes Tschofenig
|
|
Francesca Palombini
|
Oblivious HTTP Application Intermediation |
Richard Barnes,
Shivan Kaul Sahib
(Assigned AD: Francesca Palombini)
|
|
Paul Wouters
|
Open Specification for Pretty Good Privacy |
Stephen Farrell,
Daniel Kahn Gillmor
|
|
Deb Cooley
|
Privacy Preserving Measurement |
Benjamin M. Schwartz,
Samuel Weiler
|
|
Paul Wouters
|
Post-Quantum Use In Protocols |
Sofia Celi,
Paul E. Hoffman
|
|
Paul Wouters
|
Privacy Pass |
Joseph A. Salowey,
Benjamin M. Schwartz
|
|
Paul Wouters
|
RADIUS EXTensions |
Margaret Cullen,
Valery Smyslov
|
|
Deb Cooley
|
Remote ATtestation ProcedureS |
Nancy Cam-Winget,
Kathleen Moriarty,
Ned Smith
|
|
Deb Cooley
|
System for Cross-domain Identity Management |
Nancy Cam-Winget,
Aaron Parecki
|
|
Deb Cooley
|
Supply Chain Integrity, Transparency, and Trust |
Jon Geater,
Christopher Inacio
|
|
Paul Wouters
|
Security Dispatch |
Daniel Kahn Gillmor,
Rifaat Shekh-Yusef
|
|
Paul Wouters
|
Secure Patterns for Internet CrEdentials |
Heather Flanagan,
Martin Thomson
|
|
Deb Cooley
|
Secure Shell Maintenance |
Stephen Farrell,
Job Snijders
|
|
Deb Cooley
|
Software Updates for Internet of Things |
Akira Tsukamoto,
David Waltermire
|
|
Paul Wouters
|
Trusted Execution Environment Provisioning |
Nancy Cam-Winget,
Tirumaleswar Reddy.K
|
|
Paul Wouters
|
Transport Layer Security |
Deirdre Connolly,
Joseph A. Salowey,
Sean Turner
|
|
Paul Wouters
|
Using TLS in Applications |
Alan DeKok,
Valery Smyslov
|