%% You should probably cite draft-ietf-anima-constrained-voucher-24 instead of this revision. @techreport{ietf-anima-constrained-voucher-02, number = {draft-ietf-anima-constrained-voucher-02}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-anima-constrained-voucher/02/}, author = {Michael Richardson and Peter Van der Stok and Panos Kampanakis}, title = {{Constrained Voucher Artifacts for Bootstrapping Protocols}}, pagetotal = 27, year = 2018, month = sep, day = 11, abstract = {This document defines a strategy to securely assign a pledge to an owner, using an artifact signed, directly or indirectly, by the pledge's manufacturer. This artifact is known as a "voucher". This document builds upon the work in {[}RFC8366{]}, encoding the resulting artifact in CBOR. Use with two signature technologies are described. Additionally, this document explains how constrained vouchers may be transported in the {[}I-D.ietf-ace-coap-est{]} protocol.}, }