callback( { "result":{ "query":":facetid:toc:\"db/journals/rfc/rfc4000-4099.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"188.96" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"98", "@dc":"98", "@oc":"98", "@id":"43480429", "text":":facetid:toc:db/journals/rfc/rfc4000-4099.bht" } }, "hits":{ "@total":"98", "@computed":"98", "@sent":"98", "@first":"0", "hit":[{ "@score":"1", "@id":"5963983", "info":{"authors":{"author":[{"@pid":"209/5063","text":"Michael Daniele"},{"@pid":"77/6389","text":"Brian Haberman"},{"@pid":"167/6541","text":"Shawn A. Routhier"},{"@pid":"39/5680","text":"Jürgen Schönwälder"}]},"title":"Textual Conventions for Internet Network Addresses.","venue":"RFC","volume":"4001","pages":"1-22","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4001","doi":"10.17487/RFC4001","ee":"https://doi.org/10.17487/RFC4001","url":"https://dblp.org/rec/journals/rfc/rfc4001"}, "url":"URL#5963983" }, { "@score":"1", "@id":"5963984", "info":{"authors":{"author":[{"@pid":"67/1616","text":"Rudolf Brandner"},{"@pid":"209/2960","text":"Lawrence Conroy"},{"@pid":"40/8640","text":"Richard Stastny"}]},"title":"IANA Registration for Enumservice 'web' and 'ft'.","venue":"RFC","volume":"4002","pages":"1-10","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4002","doi":"10.17487/RFC4002","ee":"https://doi.org/10.17487/RFC4002","url":"https://dblp.org/rec/journals/rfc/rfc4002"}, "url":"URL#5963984" }, { "@score":"1", "@id":"5963985", "info":{"authors":{"author":{"@pid":"209/1699","text":"Lou Berger"}},"title":"GMPLS Signaling Procedure for Egress Control.","venue":"RFC","volume":"4003","pages":"1-5","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4003","doi":"10.17487/RFC4003","ee":"https://doi.org/10.17487/RFC4003","url":"https://dblp.org/rec/journals/rfc/rfc4003"}, "url":"URL#5963985" }, { "@score":"1", "@id":"5963986", "info":{"authors":{"author":[{"@pid":"209/4074","text":"Pat R. Calhoun"},{"@pid":"176/5499","text":"Tony Johansson"},{"@pid":"77/1931","text":"Charles E. Perkins"},{"@pid":"133/9837","text":"Tom Hiller"},{"@pid":"72/2578","text":"Peter J. McCann"}]},"title":"Diameter Mobile IPv4 Application.","venue":"RFC","volume":"4004","pages":"1-53","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4004","doi":"10.17487/RFC4004","ee":"https://doi.org/10.17487/RFC4004","url":"https://dblp.org/rec/journals/rfc/rfc4004"}, "url":"URL#5963986" }, { "@score":"1", "@id":"5963987", "info":{"authors":{"author":[{"@pid":"209/4074","text":"Pat R. Calhoun"},{"@pid":"166/4010","text":"Glen Zorn"},{"@pid":"209/3511","text":"David W. Spence"},{"@pid":"14/6758","text":"David Mitton"}]},"title":"Diameter Network Access Server Application.","venue":"RFC","volume":"4005","pages":"1-85","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4005","doi":"10.17487/RFC4005","ee":"https://doi.org/10.17487/RFC4005","url":"https://dblp.org/rec/journals/rfc/rfc4005"}, "url":"URL#5963987" }, { "@score":"1", "@id":"5963988", "info":{"authors":{"author":[{"@pid":"209/5033","text":"Harri Hakala"},{"@pid":"209/5113","text":"Leena Mattila"},{"@pid":"209/5057","text":"Juha-Pekka Koskinen"},{"@pid":"209/5071","text":"Marco Stura"},{"@pid":"209/4559","text":"John Loughney"}]},"title":"Diameter Credit-Control Application.","venue":"RFC","volume":"4006","pages":"1-114","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4006","doi":"10.17487/RFC4006","ee":"https://doi.org/10.17487/RFC4006","url":"https://dblp.org/rec/journals/rfc/rfc4006"}, "url":"URL#5963988" }, { "@score":"1", "@id":"5963989", "info":{"authors":{"author":[{"@pid":"68/2490","text":"Stephen E. Deering"},{"@pid":"77/6389","text":"Brian Haberman"},{"@pid":"71/5531","text":"Tatuya Jinmei"},{"@pid":"132/8473","text":"Erik Nordmark"},{"@pid":"26/1494","text":"Brian D. Zill"}]},"title":"IPv6 Scoped Address Architecture.","venue":"RFC","volume":"4007","pages":"1-24","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4007","doi":"10.17487/RFC4007","ee":"https://doi.org/10.17487/RFC4007","url":"https://dblp.org/rec/journals/rfc/rfc4007"}, "url":"URL#5963989" }, { "@score":"1", "@id":"5963990", "info":{"authors":{"author":[{"@pid":"209/5024","text":"R. Rohit"},{"@pid":"93/6103","text":"Pyda Srisuresh"},{"@pid":"209/5023","text":"Rajiv Raghunarayan"},{"@pid":"209/5022","text":"Nalinaksh Pai"},{"@pid":"81/3700","text":"Cliff Wang"}]},"title":"Definitions of Managed Objects for Network Address Translators (NAT).","venue":"RFC","volume":"4008","pages":"1-64","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4008","doi":"10.17487/RFC4008","ee":"https://doi.org/10.17487/RFC4008","url":"https://dblp.org/rec/journals/rfc/rfc4008"}, "url":"URL#5963990" }, { "@score":"1", "@id":"5963991", "info":{"authors":{"author":[{"@pid":"83/1751","text":"Jongwook Park"},{"@pid":"97/6458","text":"Sungjae Lee"},{"@pid":"29/352","text":"Jeeyeon Kim"},{"@pid":"46/5830","text":"Jaeil Lee"}]},"title":"The SEED Encryption Algorithm.","venue":"RFC","volume":"4009","pages":"1-17","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4009","doi":"10.17487/RFC4009","ee":"https://doi.org/10.17487/RFC4009","url":"https://dblp.org/rec/journals/rfc/rfc4009"}, "url":"URL#5963991" }, { "@score":"1", "@id":"5963992", "info":{"authors":{"author":[{"@pid":"83/1751","text":"Jongwook Park"},{"@pid":"97/6458","text":"Sungjae Lee"},{"@pid":"29/352","text":"Jeeyeon Kim"},{"@pid":"46/5830","text":"Jaeil Lee"}]},"title":"Use of the SEED Encryption Algorithm in Cryptographic Message Syntax (CMS).","venue":"RFC","volume":"4010","pages":"1-13","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4010","doi":"10.17487/RFC4010","ee":"https://doi.org/10.17487/RFC4010","url":"https://dblp.org/rec/journals/rfc/rfc4010"}, "url":"URL#5963992" }, { "@score":"1", "@id":"5963993", "info":{"authors":{"author":[{"@pid":"11/6076","text":"Steven Waldbusser"},{"@pid":"208/8687","text":"Jon Saperia"},{"@pid":"209/5078","text":"Thippanna Hongal"}]},"title":"Policy Based Management MIB.","venue":"RFC","volume":"4011","pages":"1-121","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4011","doi":"10.17487/RFC4011","ee":"https://doi.org/10.17487/RFC4011","url":"https://dblp.org/rec/journals/rfc/rfc4011"}, "url":"URL#5963993" }, { "@score":"1", "@id":"5963994", "info":{"authors":{"author":[{"@pid":"209/2769","text":"Larry J. Blunk"},{"@pid":"209/5093","text":"João Damas"},{"@pid":"143/4682","text":"Florent Parent"},{"@pid":"209/5020","text":"Andrei Robachevsky"}]},"title":"Routing Policy Specification Language next generation (RPSLng).","venue":"RFC","volume":"4012","pages":"1-16","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4012","doi":"10.17487/RFC4012","ee":"https://doi.org/10.17487/RFC4012","url":"https://dblp.org/rec/journals/rfc/rfc4012"}, "url":"URL#5963994" }, { "@score":"1", "@id":"5963995", "info":{"authors":{"author":{"@pid":"85/1739","text":"Kurt D. Zeilenga"}},"title":"SASLprep: Stringprep Profile for User Names and Passwords.","venue":"RFC","volume":"4013","pages":"1-6","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4013","doi":"10.17487/RFC4013","ee":"https://doi.org/10.17487/RFC4013","url":"https://dblp.org/rec/journals/rfc/rfc4013"}, "url":"URL#5963995" }, { "@score":"1", "@id":"5963996", "info":{"authors":{"author":[{"@pid":"97/1138","text":"Ralph E. Droms"},{"@pid":"209/4477","text":"John Schnizlein"}]},"title":"Remote Authentication Dial-In User Service (RADIUS) Attributes Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Information Option.","venue":"RFC","volume":"4014","pages":"1-8","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4014","doi":"10.17487/RFC4014","ee":"https://doi.org/10.17487/RFC4014","url":"https://dblp.org/rec/journals/rfc/rfc4014"}, "url":"URL#5963996" }, { "@score":"1", "@id":"5963997", "info":{"authors":{"author":[{"@pid":"46/5171","text":"Reiner Ludwig"},{"@pid":"04/6586","text":"Andrei V. Gurtov"}]},"title":"The Eifel Response Algorithm for TCP.","venue":"RFC","volume":"4015","pages":"1-13","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4015","doi":"10.17487/RFC4015","ee":"https://doi.org/10.17487/RFC4015","url":"https://dblp.org/rec/journals/rfc/rfc4015"}, "url":"URL#5963997" }, { "@score":"1", "@id":"5963998", "info":{"authors":{"author":{"@pid":"209/5098","text":"Mohan Parthasarathy"}},"title":"Protocol for Carrying Authentication and Network Access (PANA) Threat Analysis and Security Requirements.","venue":"RFC","volume":"4016","pages":"1-15","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4016","doi":"10.17487/RFC4016","ee":"https://doi.org/10.17487/RFC4016","url":"https://dblp.org/rec/journals/rfc/rfc4016"}, "url":"URL#5963998" }, { "@score":"1", "@id":"5963999", "info":{"authors":{"author":[{"@pid":"72/5689","text":"Dorothy Stanley"},{"@pid":"22/2341","text":"Jesse Walker"},{"@pid":"152/9472","text":"Bernard Aboba"}]},"title":"Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs.","venue":"RFC","volume":"4017","pages":"1-11","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4017","doi":"10.17487/RFC4017","ee":"https://doi.org/10.17487/RFC4017","url":"https://dblp.org/rec/journals/rfc/rfc4017"}, "url":"URL#5963999" }, { "@score":"1", "@id":"5964000", "info":{"authors":{"author":[{"@pid":"13/1384","text":"Mark Bakke"},{"@pid":"209/4809","text":"John L. Hufferd"},{"@pid":"v/KaladharVoruganti","text":"Kaladhar Voruganti"},{"@pid":"209/4490","text":"Marjorie Krueger"},{"@pid":"209/5040","text":"Todd Sperry"}]},"title":"Finding Internet Small Computer Systems Interface (iSCSI) Targets and Name Servers by Using Service Location Protocol version 2 (SLPv2).","venue":"RFC","volume":"4018","pages":"1-23","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4018","doi":"10.17487/RFC4018","ee":"https://doi.org/10.17487/RFC4018","url":"https://dblp.org/rec/journals/rfc/rfc4018"}, "url":"URL#5964000" }, { "@score":"1", "@id":"5964001", "info":{"authors":{"author":{"@pid":"155/5103","text":"Ghyslain Pelletier"}},"title":"RObust Header Compression (ROHC): Profiles for User Datagram Protocol (UDP) Lite.","venue":"RFC","volume":"4019","pages":"1-23","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4019","doi":"10.17487/RFC4019","ee":"https://doi.org/10.17487/RFC4019","url":"https://dblp.org/rec/journals/rfc/rfc4019"}, "url":"URL#5964001" }, { "@score":"1", "@id":"5964002", "info":{"authors":{"author":[{"@pid":"69/2727","text":"Kireeti Kompella"},{"@pid":"209/4495","text":"Alex Zinin"}]},"title":"Early IANA Allocation of Standards Track Code Points.","venue":"RFC","volume":"4020","pages":"1-7","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4020","doi":"10.17487/RFC4020","ee":"https://doi.org/10.17487/RFC4020","url":"https://dblp.org/rec/journals/rfc/rfc4020"}, "url":"URL#5964002" }, { "@score":"1", "@id":"5964003", "info":{"authors":{"author":[{"@pid":"34/4838","text":"Graham Klyne"},{"@pid":"49/3421","text":"Jacob Palme"}]},"title":"Registration of Mail and MIME Header Fields.","venue":"RFC","volume":"4021","pages":"1-54","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4021","doi":"10.17487/RFC4021","ee":"https://doi.org/10.17487/RFC4021","url":"https://dblp.org/rec/journals/rfc/rfc4021"}, "url":"URL#5964003" }, { "@score":"1", "@id":"5964004", "info":{"authors":{"author":{"@pid":"209/5023","text":"Rajiv Raghunarayan"}},"title":"Management Information Base for the Transmission Control Protocol (TCP).","venue":"RFC","volume":"4022","pages":"1-24","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4022","doi":"10.17487/RFC4022","ee":"https://doi.org/10.17487/RFC4022","url":"https://dblp.org/rec/journals/rfc/rfc4022"}, "url":"URL#5964004" }, { "@score":"1", "@id":"5964005", "info":{"authors":{"author":[{"@pid":"67/2195","text":"Tom Worster"},{"@pid":"75/7030","text":"Yakov Rekhter"},{"@pid":"71/1131","text":"Eric C. Rosen"}]},"title":"Encapsulating MPLS in IP or Generic Routing Encapsulation (GRE).","venue":"RFC","volume":"4023","pages":"1-14","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4023","doi":"10.17487/RFC4023","ee":"https://doi.org/10.17487/RFC4023","url":"https://dblp.org/rec/journals/rfc/rfc4023"}, "url":"URL#5964005" }, { "@score":"1", "@id":"5964006", "info":{"authors":{"author":[{"@pid":"134/5309","text":"Glenn W. Parsons"},{"@pid":"209/4774","text":"Janusz Maruszak"}]},"title":"Voice Messaging Client Behaviour.","venue":"RFC","volume":"4024","pages":"1-9","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4024","doi":"10.17487/RFC4024","ee":"https://doi.org/10.17487/RFC4024","url":"https://dblp.org/rec/journals/rfc/rfc4024"}, "url":"URL#5964006" }, { "@score":"1", "@id":"5964007", "info":{"authors":{"author":{"@pid":"209/4828","text":"Michael C. Richardson"}},"title":"A Method for Storing IPsec Keying Material in DNS.","venue":"RFC","volume":"4025","pages":"1-12","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4025","doi":"10.17487/RFC4025","ee":"https://doi.org/10.17487/RFC4025","url":"https://dblp.org/rec/journals/rfc/rfc4025"}, "url":"URL#5964007" }, { "@score":"1", "@id":"5964008", "info":{"authors":{"author":[{"@pid":"45/468","text":"Loa Andersson"},{"@pid":"209/5112","text":"Tove Madsen"}]},"title":"Provider Provisioned Virtual Private Network (VPN) Terminology.","venue":"RFC","volume":"4026","pages":"1-20","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4026","doi":"10.17487/RFC4026","ee":"https://doi.org/10.17487/RFC4026","url":"https://dblp.org/rec/journals/rfc/rfc4026"}, "url":"URL#5964008" }, { "@score":"1", "@id":"5964009", "info":{"authors":{"author":{"@pid":"129/5163","text":"Simon Josefsson"}},"title":"Domain Name System Media Types.","venue":"RFC","volume":"4027","pages":"1-6","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4027","doi":"10.17487/RFC4027","ee":"https://doi.org/10.17487/RFC4027","url":"https://dblp.org/rec/journals/rfc/rfc4027"}, "url":"URL#5964009" }, { "@score":"1", "@id":"5964010", "info":{"authors":{"author":[{"@pid":"35/5188","text":"Steve Donovan"},{"@pid":"16/12","text":"Jonathan D. Rosenberg"}]},"title":"Session Timers in the Session Initiation Protocol (SIP).","venue":"RFC","volume":"4028","pages":"1-27","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4028","doi":"10.17487/RFC4028","ee":"https://doi.org/10.17487/RFC4028","url":"https://dblp.org/rec/journals/rfc/rfc4028"}, "url":"URL#5964010" }, { "@score":"1", "@id":"5964011", "info":{"authors":{"author":[{"@pid":"65/4857","text":"Mikael Lind"},{"@pid":"18/1769","text":"Vladimir Ksinant"},{"@pid":"209/5074","text":"Soohong Daniel Park"},{"@pid":"209/5104","text":"Alain Baudot"},{"@pid":"80/210","text":"Pekka Savola"}]},"title":"Scenarios and Analysis for Introducing IPv6 into ISP Networks.","venue":"RFC","volume":"4029","pages":"1-28","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4029","doi":"10.17487/RFC4029","ee":"https://doi.org/10.17487/RFC4029","url":"https://dblp.org/rec/journals/rfc/rfc4029"}, "url":"URL#5964011" }, { "@score":"1", "@id":"5964012", "info":{"authors":{"author":[{"@pid":"132/8503","text":"Mark Stapp"},{"@pid":"145/8009","text":"Ted Lemon"}]},"title":"The Authentication Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Option.","venue":"RFC","volume":"4030","pages":"1-15","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4030","doi":"10.17487/RFC4030","ee":"https://doi.org/10.17487/RFC4030","url":"https://dblp.org/rec/journals/rfc/rfc4030"}, "url":"URL#5964012" }, { "@score":"1", "@id":"5964013", "info":{"authors":{"author":[{"@pid":"174/7991","text":"Marco Carugi"},{"@pid":"25/4292","text":"Dave McDysan"}]},"title":"Service Requirements for Layer 3 Provider Provisioned Virtual Private Networks (PPVPNs).","venue":"RFC","volume":"4031","pages":"1-50","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4031","doi":"10.17487/RFC4031","ee":"https://doi.org/10.17487/RFC4031","url":"https://dblp.org/rec/journals/rfc/rfc4031"}, "url":"URL#5964013" }, { "@score":"1", "@id":"5964014", "info":{"authors":{"author":[{"@pid":"38/6020","text":"Gonzalo Camarillo"},{"@pid":"209/4742","text":"Paul Kyzivat"}]},"title":"Update to the Session Initiation Protocol (SIP) Preconditions Framework.","venue":"RFC","volume":"4032","pages":"1-10","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4032","doi":"10.17487/RFC4032","ee":"https://doi.org/10.17487/RFC4032","url":"https://dblp.org/rec/journals/rfc/rfc4032"}, "url":"URL#5964014" }, { "@score":"1", "@id":"5964015", "info":{"authors":{"author":[{"@pid":"209/5000","text":"Roy Arends"},{"@pid":"133/6347","text":"Rob Austein"},{"@pid":"70/9395","text":"Matt Larson"},{"@pid":"63/6199","text":"Dan Massey"},{"@pid":"13/4027","text":"Scott Rose"}]},"title":"DNS Security Introduction and Requirements.","venue":"RFC","volume":"4033","pages":"1-21","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4033","doi":"10.17487/RFC4033","ee":"https://doi.org/10.17487/RFC4033","url":"https://dblp.org/rec/journals/rfc/rfc4033"}, "url":"URL#5964015" }, { "@score":"1", "@id":"5964016", "info":{"authors":{"author":[{"@pid":"209/5000","text":"Roy Arends"},{"@pid":"133/6347","text":"Rob Austein"},{"@pid":"70/9395","text":"Matt Larson"},{"@pid":"63/6199","text":"Dan Massey"},{"@pid":"13/4027","text":"Scott Rose"}]},"title":"Resource Records for the DNS Security Extensions.","venue":"RFC","volume":"4034","pages":"1-29","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4034","doi":"10.17487/RFC4034","ee":"https://doi.org/10.17487/RFC4034","url":"https://dblp.org/rec/journals/rfc/rfc4034"}, "url":"URL#5964016" }, { "@score":"1", "@id":"5964017", "info":{"authors":{"author":[{"@pid":"209/5000","text":"Roy Arends"},{"@pid":"133/6347","text":"Rob Austein"},{"@pid":"70/9395","text":"Matt Larson"},{"@pid":"63/6199","text":"Dan Massey"},{"@pid":"13/4027","text":"Scott Rose"}]},"title":"Protocol Modifications for the DNS Security Extensions.","venue":"RFC","volume":"4035","pages":"1-53","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4035","doi":"10.17487/RFC4035","ee":"https://doi.org/10.17487/RFC4035","url":"https://dblp.org/rec/journals/rfc/rfc4035"}, "url":"URL#5964017" }, { "@score":"1", "@id":"5964018", "info":{"authors":{"author":{"@pid":"209/4991","text":"Wilson Sawyer"}},"title":"Management Information Base for Data Over Cable Service Interface Specification (DOCSIS) Cable Modem Termination Systems for Subscriber Management.","venue":"RFC","volume":"4036","pages":"1-27","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4036","doi":"10.17487/RFC4036","ee":"https://doi.org/10.17487/RFC4036","url":"https://dblp.org/rec/journals/rfc/rfc4036"}, "url":"URL#5964018" }, { "@score":"1", "@id":"5964019", "info":{"authors":{"author":{"@pid":"25/6795","text":"Alex Rousskov"}},"title":"Open Pluggable Edge Services (OPES) Callout Protocol (OCP) Core.","venue":"RFC","volume":"4037","pages":"1-56","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4037","doi":"10.17487/RFC4037","ee":"https://doi.org/10.17487/RFC4037","url":"https://dblp.org/rec/journals/rfc/rfc4037"}, "url":"URL#5964019" }, { "@score":"1", "@id":"5964020", "info":{"authors":{"author":[{"@pid":"35/5711","text":"Myung-Ki Shin"},{"@pid":"94/7209","text":"YongGeun Hong"},{"@pid":"57/739","text":"Jun-ichiro itojun Hagino"},{"@pid":"80/210","text":"Pekka Savola"},{"@pid":"77/406","text":"Eva M. Castro"}]},"title":"Application Aspects of IPv6 Transition.","venue":"RFC","volume":"4038","pages":"1-33","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4038","doi":"10.17487/RFC4038","ee":"https://doi.org/10.17487/RFC4038","url":"https://dblp.org/rec/journals/rfc/rfc4038"}, "url":"URL#5964020" }, { "@score":"1", "@id":"5964021", "info":{"authors":{"author":[{"@pid":"67/4735","text":"Nohbyung Park"},{"@pid":"118/2132","text":"Young-Keun Kim"},{"@pid":"209/3750","text":"Bernie Volz"}]},"title":"Rapid Commit Option for the Dynamic Host Configuration Protocol version 4 (DHCPv4).","venue":"RFC","volume":"4039","pages":"1-10","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4039","doi":"10.17487/RFC4039","ee":"https://doi.org/10.17487/RFC4039","url":"https://dblp.org/rec/journals/rfc/rfc4039"}, "url":"URL#5964021" }, { "@score":"1", "@id":"5964022", "info":{"authors":{"author":{"@pid":"57/6490","text":"Ruediger Kreuter"}},"title":"RTP Payload Format for a 64 kbit/s Transparent Call.","venue":"RFC","volume":"4040","pages":"1-8","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4040","doi":"10.17487/RFC4040","ee":"https://doi.org/10.17487/RFC4040","url":"https://dblp.org/rec/journals/rfc/rfc4040"}, "url":"URL#5964022" }, { "@score":"1", "@id":"5964023", "info":{"authors":{"author":{"@pid":"99/3063","text":"Adrian Farrel"}},"title":"Requirements for Morality Sections in Routing Area Drafts.","venue":"RFC","volume":"4041","pages":"1-8","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4041","doi":"10.17487/RFC4041","ee":"https://doi.org/10.17487/RFC4041","url":"https://dblp.org/rec/journals/rfc/rfc4041"}, "url":"URL#5964023" }, { "@score":"1", "@id":"5964024", "info":{"authors":{"author":{"@pid":"208/8020","text":"Mark R. Crispin"}},"title":"UTF-9 and UTF-18 Efficient Transformation Formats of Unicode.","venue":"RFC","volume":"4042","pages":"1-9","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4042","doi":"10.17487/RFC4042","ee":"https://doi.org/10.17487/RFC4042","url":"https://dblp.org/rec/journals/rfc/rfc4042"}, "url":"URL#5964024" }, { "@score":"1", "@id":"5964025", "info":{"authors":{"author":[{"@pid":"10/30","text":"Denis Pinkas"},{"@pid":"209/5038","text":"Thomas Gindin"}]},"title":"Internet X.509 Public Key Infrastructure Permanent Identifier.","venue":"RFC","volume":"4043","pages":"1-15","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4043","doi":"10.17487/RFC4043","ee":"https://doi.org/10.17487/RFC4043","url":"https://dblp.org/rec/journals/rfc/rfc4043"}, "url":"URL#5964025" }, { "@score":"1", "@id":"5964026", "info":{"authors":{"author":{"@pid":"69/6189","text":"Keith McCloghrie"}},"title":"Fibre Channel Management MIB.","venue":"RFC","volume":"4044","pages":"1-69","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4044","doi":"10.17487/RFC4044","ee":"https://doi.org/10.17487/RFC4044","url":"https://dblp.org/rec/journals/rfc/rfc4044"}, "url":"URL#5964026" }, { "@score":"1", "@id":"5964027", "info":{"authors":{"author":{"@pid":"41/4724","text":"Gilles Bourdon"}},"title":"Extensions to Support Efficient Carrying of Multicast Traffic in Layer-2 Tunneling Protocol (L2TP).","venue":"RFC","volume":"4045","pages":"1-28","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4045","doi":"10.17487/RFC4045","ee":"https://doi.org/10.17487/RFC4045","url":"https://dblp.org/rec/journals/rfc/rfc4045"}, "url":"URL#5964027" }, { "@score":"1", "@id":"5964028", "info":{"authors":{"author":[{"@pid":"93/3778","text":"Mark Baugher"},{"@pid":"c/RanCanetti","text":"Ran Canetti"},{"@pid":"15/5129","text":"Lakshminath R. Dondeti"},{"@pid":"88/5332","text":"Fredrik Lindholm"}]},"title":"Multicast Security (MSEC) Group Key Management Architecture.","venue":"RFC","volume":"4046","pages":"1-38","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4046","doi":"10.17487/RFC4046","ee":"https://doi.org/10.17487/RFC4046","url":"https://dblp.org/rec/journals/rfc/rfc4046"}, "url":"URL#5964028" }, { "@score":"1", "@id":"5964029", "info":{"authors":{"author":[{"@pid":"04/6691","text":"Steve Allen"},{"@pid":"21/3790","text":"Don Wells"}]},"title":"MIME Sub-type Registrations for Flexible Image Transport System (FITS).","venue":"RFC","volume":"4047","pages":"1-23","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4047","doi":"10.17487/RFC4047","ee":"https://doi.org/10.17487/RFC4047","url":"https://dblp.org/rec/journals/rfc/rfc4047"}, "url":"URL#5964029" }, { "@score":"1", "@id":"5964030", "info":{"authors":{"author":{"@pid":"c/BrianECarpenter","text":"Brian E. Carpenter"}},"title":"RFC 1888 Is Obsolete.","venue":"RFC","volume":"4048","pages":"1-4","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4048","doi":"10.17487/RFC4048","ee":"https://doi.org/10.17487/RFC4048","url":"https://dblp.org/rec/journals/rfc/rfc4048"}, "url":"URL#5964030" }, { "@score":"1", "@id":"5964031", "info":{"authors":{"author":{"@pid":"69/1293","text":"Russell Housley"}},"title":"BinaryTime: An Alternate Format for Representing Date and Time in ASN.1.","venue":"RFC","volume":"4049","pages":"1-7","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4049","doi":"10.17487/RFC4049","ee":"https://doi.org/10.17487/RFC4049","url":"https://dblp.org/rec/journals/rfc/rfc4049"}, "url":"URL#5964031" }, { "@score":"1", "@id":"5964032", "info":{"authors":{"author":[{"@pid":"65/3057","text":"Simon Blake-Wilson"},{"@pid":"80/11330","text":"Gregor Karlinger"},{"@pid":"34/4882","text":"Tetsutaro Kobayashi"},{"@pid":"w/YonggeWang","text":"Yongge Wang"}]},"title":"Using the Elliptic Curve Signature Algorithm (ECDSA) for XML Digital Signatures.","venue":"RFC","volume":"4050","pages":"1-19","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4050","doi":"10.17487/RFC4050","ee":"https://doi.org/10.17487/RFC4050","url":"https://dblp.org/rec/journals/rfc/rfc4050"}, "url":"URL#5964032" }, { "@score":"1", "@id":"5964033", "info":{"authors":{"author":{"@pid":"74/4160","text":"Donald E. Eastlake III"}},"title":"Additional XML Security Uniform Resource Identifiers (URIs).","venue":"RFC","volume":"4051","pages":"1-17","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4051","doi":"10.17487/RFC4051","ee":"https://doi.org/10.17487/RFC4051","url":"https://dblp.org/rec/journals/rfc/rfc4051"}, "url":"URL#5964033" }, { "@score":"1", "@id":"5964034", "info":{"authors":{"author":[{"@pid":"69/7584","text":"Leslie Daigle"},{"@pid":"181/2657","text":"Internet Architecture Board"}]},"title":"IAB Processes for Management of IETF Liaison Relationships.","venue":"RFC","volume":"4052","pages":"1-9","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4052","doi":"10.17487/RFC4052","ee":"https://doi.org/10.17487/RFC4052","url":"https://dblp.org/rec/journals/rfc/rfc4052"}, "url":"URL#5964034" }, { "@score":"1", "@id":"5964035", "info":{"authors":{"author":[{"@pid":"206/1732","text":"Stephen J. Trowbridge"},{"@pid":"36/6968","text":"Scott O. Bradner"},{"@pid":"04/2169","text":"Fred Baker"}]},"title":"Procedures for Handling Liaison Statements to and from the IETF.","venue":"RFC","volume":"4053","pages":"1-19","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4053","doi":"10.17487/RFC4053","ee":"https://doi.org/10.17487/RFC4053","url":"https://dblp.org/rec/journals/rfc/rfc4053"}, "url":"URL#5964035" }, { "@score":"1", "@id":"5964036", "info":{"authors":{"author":[{"@pid":"209/4990","text":"John Strand"},{"@pid":"49/3160","text":"Angela L. Chiu"}]},"title":"Impairments and Other Constraints on Optical Layer Routing.","venue":"RFC","volume":"4054","pages":"1-29","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4054","doi":"10.17487/RFC4054","ee":"https://doi.org/10.17487/RFC4054","url":"https://dblp.org/rec/journals/rfc/rfc4054"}, "url":"URL#5964036" }, { "@score":"1", "@id":"5964037", "info":{"authors":{"author":[{"@pid":"209/4321","text":"Jim Schaad"},{"@pid":"12/5585","text":"Burt Kaliski"},{"@pid":"69/1293","text":"Russ Housley"}]},"title":"Additional Algorithms and Identifiers for RSA Cryptography for use in the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile.","venue":"RFC","volume":"4055","pages":"1-25","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4055","doi":"10.17487/RFC4055","ee":"https://doi.org/10.17487/RFC4055","url":"https://dblp.org/rec/journals/rfc/rfc4055"}, "url":"URL#5964037" }, { "@score":"1", "@id":"5964038", "info":{"authors":{"author":{"@pid":"209/4321","text":"Jim Schaad"}},"title":"Use of the RSASSA-PSS Signature Algorithm in Cryptographic Message Syntax (CMS).","venue":"RFC","volume":"4056","pages":"1-6","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4056","doi":"10.17487/RFC4056","ee":"https://doi.org/10.17487/RFC4056","url":"https://dblp.org/rec/journals/rfc/rfc4056"}, "url":"URL#5964038" }, { "@score":"1", "@id":"5964039", "info":{"authors":{"author":{"@pid":"127/7053","text":"Jim Bound"}},"title":"IPv6 Enterprise Network Scenarios.","venue":"RFC","volume":"4057","pages":"1-17","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4057","doi":"10.17487/RFC4057","ee":"https://doi.org/10.17487/RFC4057","url":"https://dblp.org/rec/journals/rfc/rfc4057"}, "url":"URL#5964039" }, { "@score":"1", "@id":"5964040", "info":{"authors":{"author":[{"@pid":"87/1646","text":"Alper E. Yegin"},{"@pid":"26/3402","text":"Yoshihiro Ohba"},{"@pid":"209/4706","text":"Reinaldo Penno"},{"@pid":"40/10693","text":"George Tsirtsis"},{"@pid":"81/3700","text":"Cliff Wang"}]},"title":"Protocol for Carrying Authentication for Network Access (PANA) Requirements.","venue":"RFC","volume":"4058","pages":"1-19","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4058","doi":"10.17487/RFC4058","ee":"https://doi.org/10.17487/RFC4058","url":"https://dblp.org/rec/journals/rfc/rfc4058"}, "url":"URL#5964040" }, { "@score":"1", "@id":"5964041", "info":{"authors":{"author":[{"@pid":"209/5016","text":"Duane Linsenbardt"},{"@pid":"209/5122","text":"Sue Pontius"},{"@pid":"51/4272","text":"Alice Sturgeon"}]},"title":"Internet X.509 Public Key Infrastructure Warranty Certificate Extension.","venue":"RFC","volume":"4059","pages":"1-9","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4059","doi":"10.17487/RFC4059","ee":"https://doi.org/10.17487/RFC4059","url":"https://dblp.org/rec/journals/rfc/rfc4059"}, "url":"URL#5964041" }, { "@score":"1", "@id":"5964042", "info":{"authors":{"author":[{"@pid":"39/5247","text":"Qiaobing Xie"},{"@pid":"48/768-2","text":"David Pearce 0002"}]},"title":"RTP Payload Formats for European Telecommunications Standards Institute (ETSI) European Standard ES 202 050, ES 202 211, and ES 202 212 Distributed Speech Recognition Encoding.","venue":"RFC","volume":"4060","pages":"1-19","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4060","doi":"10.17487/RFC4060","ee":"https://doi.org/10.17487/RFC4060","url":"https://dblp.org/rec/journals/rfc/rfc4060"}, "url":"URL#5964042" }, { "@score":"1", "@id":"5964043", "info":{"authors":{"author":[{"@pid":"209/5075","text":"Vishwas Manral"},{"@pid":"117/9635","text":"Russ White"},{"@pid":"s/AmanShaikh","text":"Aman Shaikh"}]},"title":"Benchmarking Basic OSPF Single Router Control Plane Convergence.","venue":"RFC","volume":"4061","pages":"1-16","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4061","doi":"10.17487/RFC4061","ee":"https://doi.org/10.17487/RFC4061","url":"https://dblp.org/rec/journals/rfc/rfc4061"}, "url":"URL#5964043" }, { "@score":"1", "@id":"5964044", "info":{"authors":{"author":[{"@pid":"209/5075","text":"Vishwas Manral"},{"@pid":"117/9635","text":"Russ White"},{"@pid":"s/AmanShaikh","text":"Aman Shaikh"}]},"title":"OSPF Benchmarking Terminology and Concepts.","venue":"RFC","volume":"4062","pages":"1-9","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4062","doi":"10.17487/RFC4062","ee":"https://doi.org/10.17487/RFC4062","url":"https://dblp.org/rec/journals/rfc/rfc4062"}, "url":"URL#5964044" }, { "@score":"1", "@id":"5964045", "info":{"authors":{"author":[{"@pid":"209/5075","text":"Vishwas Manral"},{"@pid":"117/9635","text":"Russ White"},{"@pid":"s/AmanShaikh","text":"Aman Shaikh"}]},"title":"Considerations When Using Basic OSPF Convergence Benchmarks.","venue":"RFC","volume":"4063","pages":"1-11","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4063","doi":"10.17487/RFC4063","ee":"https://doi.org/10.17487/RFC4063","url":"https://dblp.org/rec/journals/rfc/rfc4063"}, "url":"URL#5964045" }, { "@score":"1", "@id":"5964046", "info":{"authors":{"author":[{"@pid":"54/2246","text":"Alpesh Patel"},{"@pid":"60/2541","text":"Kent Leung"}]},"title":"Experimental Message, Extensions, and Error Codes for Mobile IPv4.","venue":"RFC","volume":"4064","pages":"1-11","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4064","doi":"10.17487/RFC4064","ee":"https://doi.org/10.17487/RFC4064","url":"https://dblp.org/rec/journals/rfc/rfc4064"}, "url":"URL#5964046" }, { "@score":"1", "@id":"5964047", "info":{"authors":{"author":{"@pid":"39/5920","text":"James Kempf"}},"title":"Instructions for Seamoby and Experimental Mobility Protocol IANA Allocations.","venue":"RFC","volume":"4065","pages":"1-8","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4065","doi":"10.17487/RFC4065","ee":"https://doi.org/10.17487/RFC4065","url":"https://dblp.org/rec/journals/rfc/rfc4065"}, "url":"URL#5964047" }, { "@score":"1", "@id":"5964048", "info":{"authors":{"author":[{"@pid":"95/4291","text":"Marco Liebsch"},{"@pid":"41/5250","text":"Ajoy Singh"},{"@pid":"120/8086","text":"Hemant Chaskar"},{"@pid":"33/5801","text":"Daichi Funato"},{"@pid":"03/6492","text":"Eunsoo Shim"}]},"title":"Candidate Access Router Discovery (CARD).","venue":"RFC","volume":"4066","pages":"1-46","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4066","doi":"10.17487/RFC4066","ee":"https://doi.org/10.17487/RFC4066","url":"https://dblp.org/rec/journals/rfc/rfc4066"}, "url":"URL#5964048" }, { "@score":"1", "@id":"5964049", "info":{"authors":{"author":[{"@pid":"209/4559","text":"John Loughney"},{"@pid":"132/1318","text":"Madjid Nakhjiri"},{"@pid":"77/1931","text":"Charles E. Perkins"},{"@pid":"39/4016","text":"Rajeev Koodli"}]},"title":"Context Transfer Protocol (CXTP).","venue":"RFC","volume":"4067","pages":"1-33","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4067","doi":"10.17487/RFC4067","ee":"https://doi.org/10.17487/RFC4067","url":"https://dblp.org/rec/journals/rfc/rfc4067"}, "url":"URL#5964049" }, { "@score":"1", "@id":"5964050", "info":{"authors":{"author":{"@pid":"39/4016","text":"Rajeev Koodli"}},"title":"Fast Handovers for Mobile IPv6.","venue":"RFC","volume":"4068","pages":"1-42","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4068","doi":"10.17487/RFC4068","ee":"https://doi.org/10.17487/RFC4068","url":"https://dblp.org/rec/journals/rfc/rfc4068"}, "url":"URL#5964050" }, { "@score":"1", "@id":"5964051", "info":{"authors":{"author":[{"@pid":"209/4988","text":"Menachem Dodge"},{"@pid":"209/4653","text":"Bob Ray"}]},"title":"Definitions of Managed Object Extensions for Very High Speed Digital Subscriber Lines (VDSL) Using Single Carrier Modulation (SCM) Line Coding.","venue":"RFC","volume":"4069","pages":"1-19","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4069","doi":"10.17487/RFC4069","ee":"https://doi.org/10.17487/RFC4069","url":"https://dblp.org/rec/journals/rfc/rfc4069"}, "url":"URL#5964051" }, { "@score":"1", "@id":"5964052", "info":{"authors":{"author":[{"@pid":"209/4988","text":"Menachem Dodge"},{"@pid":"209/4653","text":"Bob Ray"}]},"title":"Definitions of Managed Object Extensions for Very High Speed Digital Subscriber Lines (VDSL) Using Multiple Carrier Modulation (MCM) Line Coding.","venue":"RFC","volume":"4070","pages":"1-24","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4070","doi":"10.17487/RFC4070","ee":"https://doi.org/10.17487/RFC4070","url":"https://dblp.org/rec/journals/rfc/rfc4070"}, "url":"URL#5964052" }, { "@score":"1", "@id":"5964053", "info":{"authors":{"author":[{"@pid":"133/6347","text":"Rob Austein"},{"@pid":"02/6539","text":"Bert Wijnen"}]},"title":"Structure of the IETF Administrative Support Activity (IASA).","venue":"RFC","volume":"4071","pages":"1-20","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4071","doi":"10.17487/RFC4071","ee":"https://doi.org/10.17487/RFC4071","url":"https://dblp.org/rec/journals/rfc/rfc4071"}, "url":"URL#5964053" }, { "@score":"1", "@id":"5964054", "info":{"authors":{"author":[{"@pid":"83/2988","text":"Pasi Eronen"},{"@pid":"133/9837","text":"Tom Hiller"},{"@pid":"166/4010","text":"Glen Zorn"}]},"title":"Diameter Extensible Authentication Protocol (EAP) Application.","venue":"RFC","volume":"4072","pages":"1-33","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4072","doi":"10.17487/RFC4072","ee":"https://doi.org/10.17487/RFC4072","url":"https://dblp.org/rec/journals/rfc/rfc4072"}, "url":"URL#5964054" }, { "@score":"1", "@id":"5964055", "info":{"authors":{"author":{"@pid":"69/1293","text":"Russell Housley"}},"title":"Protecting Multiple Contents with the Cryptographic Message Syntax (CMS).","venue":"RFC","volume":"4073","pages":"1-9","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4073","doi":"10.17487/RFC4073","ee":"https://doi.org/10.17487/RFC4073","url":"https://dblp.org/rec/journals/rfc/rfc4073"}, "url":"URL#5964055" }, { "@score":"1", "@id":"5964056", "info":{"authors":{"author":[{"@pid":"209/5058","text":"Yasuhiro Morishita"},{"@pid":"14/2203","text":"Tatsuya Jinmei"}]},"title":"Common Misbehavior Against DNS Queries for IPv6 Addresses.","venue":"RFC","volume":"4074","pages":"1-6","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4074","doi":"10.17487/RFC4074","ee":"https://doi.org/10.17487/RFC4074","url":"https://dblp.org/rec/journals/rfc/rfc4074"}, "url":"URL#5964056" }, { "@score":"1", "@id":"5964057", "info":{"authors":{"author":{"@pid":"209/4696","text":"Vijayabhaskar A. Kalusivalingam"}},"title":"Simple Network Time Protocol (SNTP) Configuration Option for DHCPv6.","venue":"RFC","volume":"4075","pages":"1-5","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4075","doi":"10.17487/RFC4075","ee":"https://doi.org/10.17487/RFC4075","url":"https://dblp.org/rec/journals/rfc/rfc4075"}, "url":"URL#5964057" }, { "@score":"1", "@id":"5964058", "info":{"authors":{"author":[{"@pid":"99/2859","text":"Tim Chown"},{"@pid":"49/498","text":"Stig Venaas"},{"@pid":"209/4696","text":"Vijayabhaskar A. Kalusivalingam"}]},"title":"Renumbering Requirements for Stateless Dynamic Host Configuration Protocol for IPv6 (DHCPv6).","venue":"RFC","volume":"4076","pages":"1-8","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4076","doi":"10.17487/RFC4076","ee":"https://doi.org/10.17487/RFC4076","url":"https://dblp.org/rec/journals/rfc/rfc4076"}, "url":"URL#5964058" }, { "@score":"1", "@id":"5964059", "info":{"authors":{"author":{"@pid":"12/1984","text":"Adam B. Roach"}},"title":"A Negative Acknowledgement Mechanism for Signaling Compression.","venue":"RFC","volume":"4077","pages":"1-16","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4077","doi":"10.17487/RFC4077","ee":"https://doi.org/10.17487/RFC4077","url":"https://dblp.org/rec/journals/rfc/rfc4077"}, "url":"URL#5964059" }, { "@score":"1", "@id":"5964060", "info":{"authors":{"author":[{"@pid":"209/4997","text":"Nigel Earnshaw"},{"@pid":"99/5906","text":"Shigeru Aoki"},{"@pid":"209/5025","text":"Alex Ashley"},{"@pid":"94/1299","text":"Wataru Kameyama"}]},"title":"The TV-Anytime Content Reference Identifier (CRID).","venue":"RFC","volume":"4078","pages":"1-10","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4078","doi":"10.17487/RFC4078","ee":"https://doi.org/10.17487/RFC4078","url":"https://dblp.org/rec/journals/rfc/rfc4078"}, "url":"URL#5964060" }, { "@score":"1", "@id":"5964061", "info":{"authors":{"author":{"@pid":"26/6217","text":"Jon Peterson"}},"title":"A Presence Architecture for the Distribution of GEOPRIV Location Objects.","venue":"RFC","volume":"4079","pages":"1-7","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4079","doi":"10.17487/RFC4079","ee":"https://doi.org/10.17487/RFC4079","url":"https://dblp.org/rec/journals/rfc/rfc4079"}, "url":"URL#5964061" }, { "@score":"1", "@id":"5964062", "info":{"authors":{"author":[{"@pid":"191/5104","text":"Robert Hancock"},{"@pid":"83/1616","text":"Georgios Karagiannis"},{"@pid":"209/4559","text":"John Loughney"},{"@pid":"87/2650","text":"Sven Van den Bosch"}]},"title":"Next Steps in Signaling (NSIS): Framework.","venue":"RFC","volume":"4080","pages":"1-49","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4080","doi":"10.17487/RFC4080","ee":"https://doi.org/10.17487/RFC4080","url":"https://dblp.org/rec/journals/rfc/rfc4080"}, "url":"URL#5964062" }, { "@score":"1", "@id":"5964063", "info":{"authors":{"author":[{"@pid":"97/4804","text":"Hannes Tschofenig"},{"@pid":"00/7442","text":"Dirk Kröselberg"}]},"title":"Security Threats for Next Steps in Signaling (NSIS).","venue":"RFC","volume":"4081","pages":"1-28","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4081","doi":"10.17487/RFC4081","ee":"https://doi.org/10.17487/RFC4081","url":"https://dblp.org/rec/journals/rfc/rfc4081"}, "url":"URL#5964063" }, { "@score":"1", "@id":"5964064", "info":{"authors":{"author":[{"@pid":"16/6873","text":"Adrian Perrig"},{"@pid":"s/DXSong","text":"Dawn Song"},{"@pid":"c/RanCanetti","text":"Ran Canetti"},{"@pid":"t/JDTygar","text":"J. D. Tygar"},{"@pid":"49/3745","text":"Bob Briscoe"}]},"title":"Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction.","venue":"RFC","volume":"4082","pages":"1-22","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4082","doi":"10.17487/RFC4082","ee":"https://doi.org/10.17487/RFC4082","url":"https://dblp.org/rec/journals/rfc/rfc4082"}, "url":"URL#5964064" }, { "@score":"1", "@id":"5964065", "info":{"authors":{"author":{"@pid":"33/6288","text":"Miguel A. Garcia-Martin"}},"title":"Input 3rd-Generation Partnership Project (3GPP) Release 5 Requirements on the Session Initiation Protocol (SIP).","venue":"RFC","volume":"4083","pages":"1-36","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4083","doi":"10.17487/RFC4083","ee":"https://doi.org/10.17487/RFC4083","url":"https://dblp.org/rec/journals/rfc/rfc4083"}, "url":"URL#5964065" }, { "@score":"1", "@id":"5964066", "info":{"authors":{"author":{"@pid":"20/1355","text":"John C. Klensin"}},"title":"Terminology for Describing Internet Connectivity.","venue":"RFC","volume":"4084","pages":"1-11","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4084","doi":"10.17487/RFC4084","ee":"https://doi.org/10.17487/RFC4084","url":"https://dblp.org/rec/journals/rfc/rfc4084"}, "url":"URL#5964066" }, { "@score":"1", "@id":"5964067", "info":{"authors":{"author":{"@pid":"37/1566","text":"David Plonka"}},"title":"Embedding Globally-Routable Internet Addresses Considered Harmful.","venue":"RFC","volume":"4085","pages":"1-10","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4085","doi":"10.17487/RFC4085","ee":"https://doi.org/10.17487/RFC4085","url":"https://dblp.org/rec/journals/rfc/rfc4085"}, "url":"URL#5964067" }, { "@score":"1", "@id":"5964068", "info":{"authors":{"author":[{"@pid":"74/4160","text":"Donald E. Eastlake III"},{"@pid":"16/6001","text":"Jeffrey I. Schiller"},{"@pid":"49/6744","text":"Steve Crocker"}]},"title":"Randomness Requirements for Security.","venue":"RFC","volume":"4086","pages":"1-48","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4086","doi":"10.17487/RFC4086","ee":"https://doi.org/10.17487/RFC4086","url":"https://dblp.org/rec/journals/rfc/rfc4086"}, "url":"URL#5964068" }, { "@score":"1", "@id":"5964069", "info":{"authors":{"author":{"@pid":"63/370","text":"David Thaler"}},"title":"IP Tunnel MIB.","venue":"RFC","volume":"4087","pages":"1-25","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4087","doi":"10.17487/RFC4087","ee":"https://doi.org/10.17487/RFC4087","url":"https://dblp.org/rec/journals/rfc/rfc4087"}, "url":"URL#5964069" }, { "@score":"1", "@id":"5964070", "info":{"authors":{"author":[{"@pid":"76/1966-1","text":"David L. Black 0001"},{"@pid":"69/6189","text":"Keith McCloghrie"},{"@pid":"39/5680","text":"Jürgen Schönwälder"}]},"title":"Uniform Resource Identifier (URI) Scheme for the Simple Network Management Protocol (SNMP).","venue":"RFC","volume":"4088","pages":"1-18","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4088","doi":"10.17487/RFC4088","ee":"https://doi.org/10.17487/RFC4088","url":"https://dblp.org/rec/journals/rfc/rfc4088"}, "url":"URL#5964070" }, { "@score":"1", "@id":"5964071", "info":{"authors":{"author":[{"@pid":"142/5339","text":"Scott Hollenbeck"},{"@pid":"181/2657","text":"Internet Architecture Board"},{"@pid":"181/2651","text":"Internet Engineering Steering Group"}]},"title":"IAB and IESG Recommendation for IETF Administrative Restructuring.","venue":"RFC","volume":"4089","pages":"1-55","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4089","doi":"10.17487/RFC4089","ee":"https://doi.org/10.17487/RFC4089","url":"https://dblp.org/rec/journals/rfc/rfc4089"}, "url":"URL#5964071" }, { "@score":"1", "@id":"5964072", "info":{"authors":{"author":[{"@pid":"70/2099","text":"Ping Pan"},{"@pid":"209/2615","text":"George Swallow"},{"@pid":"79/5904","text":"Alia Atlas"}]},"title":"Fast Reroute Extensions to RSVP-TE for LSP Tunnels.","venue":"RFC","volume":"4090","pages":"1-38","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4090","doi":"10.17487/RFC4090","ee":"https://doi.org/10.17487/RFC4090","url":"https://dblp.org/rec/journals/rfc/rfc4090"}, "url":"URL#5964072" }, { "@score":"1", "@id":"5964073", "info":{"authors":{"author":[{"@pid":"38/6020","text":"Gonzalo Camarillo"},{"@pid":"16/12","text":"Jonathan D. Rosenberg"}]},"title":"The Alternative Network Address Types (ANAT) Semantics for the Session Description Protocol (SDP) Grouping Framework.","venue":"RFC","volume":"4091","pages":"1-7","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4091","doi":"10.17487/RFC4091","ee":"https://doi.org/10.17487/RFC4091","url":"https://dblp.org/rec/journals/rfc/rfc4091"}, "url":"URL#5964073" }, { "@score":"1", "@id":"5964074", "info":{"authors":{"author":[{"@pid":"38/6020","text":"Gonzalo Camarillo"},{"@pid":"16/12","text":"Jonathan D. Rosenberg"}]},"title":"Usage of the Session Description Protocol (SDP) Alternative Network Address Types (ANAT) Semantics in the Session Initiation Protocol (SIP).","venue":"RFC","volume":"4092","pages":"1-6","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4092","doi":"10.17487/RFC4092","ee":"https://doi.org/10.17487/RFC4092","url":"https://dblp.org/rec/journals/rfc/rfc4092"}, "url":"URL#5964074" }, { "@score":"1", "@id":"5964075", "info":{"authors":{"author":[{"@pid":"209/5001","text":"Farid Adrangi"},{"@pid":"209/4718","text":"Henrik Levkowetz"}]},"title":"Problem Statement: Mobile IPv4 Traversal of Virtual Private Network (VPN) Gateways.","venue":"RFC","volume":"4093","pages":"1-19","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4093","doi":"10.17487/RFC4093","ee":"https://doi.org/10.17487/RFC4093","url":"https://dblp.org/rec/journals/rfc/rfc4093"}, "url":"URL#5964075" }, { "@score":"1", "@id":"5964076", "info":{"authors":{"author":[{"@pid":"09/6049","text":"Jukka Manner"},{"@pid":"33/4231","text":"Xiaoming Fu 0001"}]},"title":"Analysis of Existing Quality-of-Service Signaling Protocols.","venue":"RFC","volume":"4094","pages":"1-45","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4094","doi":"10.17487/RFC4094","ee":"https://doi.org/10.17487/RFC4094","url":"https://dblp.org/rec/journals/rfc/rfc4094"}, "url":"URL#5964076" }, { "@score":"1", "@id":"5964077", "info":{"authors":{"author":{"@pid":"147/6206","text":"Carl Malamud"}},"title":"Attaching Meaning to Solicitation Class Keywords.","venue":"RFC","volume":"4095","pages":"1-11","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4095","doi":"10.17487/RFC4095","ee":"https://doi.org/10.17487/RFC4095","url":"https://dblp.org/rec/journals/rfc/rfc4095"}, "url":"URL#5964077" }, { "@score":"1", "@id":"5964078", "info":{"authors":{"author":{"@pid":"147/6206","text":"Carl Malamud"}},"title":"Policy-Mandated Labels Such as "Adv:" in Email Subject Headers Considered Ineffective At Best.","venue":"RFC","volume":"4096","pages":"1-14","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4096","doi":"10.17487/RFC4096","ee":"https://doi.org/10.17487/RFC4096","url":"https://dblp.org/rec/journals/rfc/rfc4096"}, "url":"URL#5964078" }, { "@score":"1", "@id":"5964079", "info":{"authors":{"author":{"@pid":"97/9442","text":"Mary Barnes"}},"title":"Middlebox Communications (MIDCOM) Protocol Evaluation.","venue":"RFC","volume":"4097","pages":"1-44","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4097","doi":"10.17487/RFC4097","ee":"https://doi.org/10.17487/RFC4097","url":"https://dblp.org/rec/journals/rfc/rfc4097"}, "url":"URL#5964079" }, { "@score":"1", "@id":"5964080", "info":{"authors":{"author":[{"@pid":"87/6742","text":"Howard C. Berkowitz"},{"@pid":"209/4676","text":"Elwyn B. Davies"},{"@pid":"131/7348","text":"Susan Hares"},{"@pid":"65/5159","text":"Padma Krishnaswamy"},{"@pid":"25/5327","text":"Marianne Lepp"}]},"title":"Terminology for Benchmarking BGP Device Convergence in the Control Plane.","venue":"RFC","volume":"4098","pages":"1-36","year":"2005","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4098","doi":"10.17487/RFC4098","ee":"https://doi.org/10.17487/RFC4098","url":"https://dblp.org/rec/journals/rfc/rfc4098"}, "url":"URL#5964080" } ] } } } )