References from draft-bryan-p2psip-dsip
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
BCP 14 |
References Referenced by |
normatively references | ||
BCP 78 |
References Referenced by |
informatively references | ||
draft-bryan-sipping-p2p-usecases |
Use Cases for Peer-to-Peer Session Initiation Protocol (P2P SIP)
References Referenced by |
informatively references | ||
draft-ietf-behave-rfc3489bis |
Session Traversal Utilities for NAT (STUN)
References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-behave-turn |
Traversal Using Relays around NAT (TURN): Relay Extensions to Session Traversal Utilities for NAT (STUN)
References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-mmusic-ice |
Interactive Connectivity Establishment (ICE): A Protocol for Network Address Translator (NAT) Traversal for Offer/Answer Protocols
References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-sip-certs |
Certificate Management Service for the Session Initiation Protocol (SIP)
References Referenced by |
Proposed Standard | normatively references | |
draft-lowekamp-p2psip-dsip-security |
Authenticated Identity Extensions to dSIP
References Referenced by |
normatively references | ||
draft-matthews-p2psip-dsip-nat-traversal |
NAT Traversal for dSIP
References Referenced by |
normatively references | ||
draft-willis-p2psip-concepts |
Concepts and Terminology for Peer to Peer SIP
References Referenced by |
normatively references | ||
draft-zangrilli-p2psip-dsip-dhtbamboo |
A Bamboo-based DHT for Resource Lookup in P2PSIP
References Referenced by |
normatively references | ||
draft-zangrilli-p2psip-dsip-dhtchord |
A Chord-based DHT for Resource Lookup in P2PSIP
References Referenced by |
normatively references | ||
RFC 2104 |
HMAC: Keyed-Hashing for Message Authentication
References Referenced by |
Informational | normatively references | |
RFC 2119 |
Key words for use in RFCs to Indicate Requirement Levels
References Referenced by |
Best Current Practice | Possible Reference | |
RFC 3174 |
US Secure Hash Algorithm 1 (SHA1)
References Referenced by |
Informational | normatively references | |
RFC 3261 |
SIP: Session Initiation Protocol
References Referenced by |
Proposed Standard | normatively references | |
RFC 3841 |
Caller Preferences for the Session Initiation Protocol (SIP)
References Referenced by |
Proposed Standard | normatively references | |
RFC 4474 |
Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP)
References Referenced by |
Proposed Standard | normatively references |