References from draft-selander-ace-cose-ecdhe

This is an experimental product. These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.

Reference type help

Document Title Status Type Downref
BCP 14 Key words for use in RFCs to Indicate Requirement Levels
Refs Ref'd by
Best Current Practice normatively references
BCP 188 Pervasive Monitoring Is an Attack
Refs Ref'd by
Best Current Practice informatively references
draft-hartke-core-e2e-security-reqs Requirements for CoAP End-To-End Security
Refs Ref'd by
informatively references
draft-ietf-6tisch-dtsecurity-zerotouch-join 6tisch Zero-Touch Secure Join protocol
Refs Ref'd by
informatively references
draft-ietf-ace-oauth-authz Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)
Refs Ref'd by
Proposed Standard informatively references
draft-ietf-ace-oscore-profile OSCORE profile of the Authentication and Authorization for Constrained Environments Framework
Refs Ref'd by
Proposed Standard informatively references
draft-ietf-cbor-7049bis Concise Binary Object Representation (CBOR)
Refs Ref'd by
normatively references
draft-ietf-cbor-cddl Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures
Refs Ref'd by
Proposed Standard normatively references
draft-ietf-core-echo-request-tag CoAP: Echo, Request-Tag, and Token Processing
Refs Ref'd by
normatively references
draft-ietf-core-object-security Object Security for Constrained RESTful Environments (OSCORE)
Refs Ref'd by
Proposed Standard normatively references
draft-ietf-core-resource-directory CoRE Resource Directory
Refs Ref'd by
Proposed Standard informatively references
draft-ietf-lwig-security-protocol-comparison Comparison of CoAP Security Protocols
Refs Ref'd by
informatively references
draft-ietf-tls-dtls13 The Datagram Transport Layer Security (DTLS) Protocol Version 1.3
Refs Ref'd by
Proposed Standard informatively references
draft-schaad-cose-x509 CBOR Object Signing and Encryption (COSE): Headers for carrying and referencing X.509 certificates
Refs Ref'd by
normatively references
RFC 2119 Key words for use in RFCs to Indicate Requirement Levels
Refs Ref'd by
Best Current Practice normatively references
RFC 5116 An Interface and Algorithms for Authenticated Encryption
Refs Ref'd by
Proposed Standard normatively references
RFC 5869 HMAC-based Extract-and-Expand Key Derivation Function (HKDF)
Refs Ref'd by
Informational normatively references
RFC 6090 Fundamental Elliptic Curve Cryptography Algorithms
Refs Ref'd by
Informational normatively references
RFC 6979 Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)
Refs Ref'd by
Informational normatively references
RFC 7228 Terminology for Constrained-Node Networks
Refs Ref'd by
Informational informatively references
RFC 7252 The Constrained Application Protocol (CoAP)
Refs Ref'd by
Proposed Standard normatively references
RFC 7258 Pervasive Monitoring Is an Attack
Refs Ref'd by
Best Current Practice informatively references
RFC 7959 Block-Wise Transfers in the Constrained Application Protocol (CoAP)
Refs Ref'd by
Proposed Standard normatively references
RFC 8152 CBOR Object Signing and Encryption (COSE)
Refs Ref'd by
Proposed Standard normatively references
RFC 8174 Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words
Refs Ref'd by
Best Current Practice normatively references
RFC 8446 The Transport Layer Security (TLS) Protocol Version 1.3
Refs Ref'd by
Proposed Standard informatively references