callback( { "result":{ "query":":facetid:toc:\"db/journals/rfc/rfc4800-4899.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.70" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"98", "@dc":"98", "@oc":"98", "@id":"43480437", "text":":facetid:toc:db/journals/rfc/rfc4800-4899.bht" } }, "hits":{ "@total":"98", "@computed":"98", "@sent":"98", "@first":"0", "hit":[{ "@score":"1", "@id":"5628879", "info":{"authors":{"author":[{"@pid":"154/6478","text":"Thomas D. Nadeau"},{"@pid":"99/3063","text":"Adrian Farrel"}]},"title":"Definitions of Textual Conventions for Generalized Multiprotocol Label Switching (GMPLS) Management.","venue":"RFC","volume":"4801","pages":"1-9","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4801","doi":"10.17487/RFC4801","ee":"https://doi.org/10.17487/RFC4801","url":"https://dblp.org/rec/journals/rfc/rfc4801"}, "url":"URL#5628879" }, { "@score":"1", "@id":"5628880", "info":{"authors":{"author":[{"@pid":"154/6478","text":"Thomas D. Nadeau"},{"@pid":"99/3063","text":"Adrian Farrel"}]},"title":"Generalized Multiprotocol Label Switching (GMPLS) Traffic Engineering Management Information Base.","venue":"RFC","volume":"4802","pages":"1-60","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4802","doi":"10.17487/RFC4802","ee":"https://doi.org/10.17487/RFC4802","url":"https://dblp.org/rec/journals/rfc/rfc4802"}, "url":"URL#5628880" }, { "@score":"1", "@id":"5628881", "info":{"authors":{"author":[{"@pid":"154/6478","text":"Thomas D. Nadeau"},{"@pid":"99/3063","text":"Adrian Farrel"}]},"title":"Generalized Multiprotocol Label Switching (GMPLS) Label Switching Router (LSR) Management Information Base.","venue":"RFC","volume":"4803","pages":"1-42","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4803","doi":"10.17487/RFC4803","ee":"https://doi.org/10.17487/RFC4803","url":"https://dblp.org/rec/journals/rfc/rfc4803"}, "url":"URL#5628881" }, { "@score":"1", "@id":"5628882", "info":{"authors":{"author":{"@pid":"125/0891","text":"Francois Le Faucheur"}},"title":"Aggregation of Resource ReSerVation Protocol (RSVP) Reservations over MPLS TE/DS-TE Tunnels.","venue":"RFC","volume":"4804","pages":"1-31","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4804","doi":"10.17487/RFC4804","ee":"https://doi.org/10.17487/RFC4804","url":"https://dblp.org/rec/journals/rfc/rfc4804"}, "url":"URL#5628882" }, { "@score":"1", "@id":"5628883", "info":{"authors":{"author":{"@pid":"209/3679","text":"Orly Nicklass"}},"title":"Definitions of Managed Objects for the DS1, J1, E1, DS2, and E2 Interface Types.","venue":"RFC","volume":"4805","pages":"1-94","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4805","doi":"10.17487/RFC4805","ee":"https://doi.org/10.17487/RFC4805","url":"https://dblp.org/rec/journals/rfc/rfc4805"}, "url":"URL#5628883" }, { "@score":"1", "@id":"5628884", "info":{"authors":{"author":[{"@pid":"00/6798","text":"Michael Myers"},{"@pid":"97/4804","text":"Hannes Tschofenig"}]},"title":"Online Certificate Status Protocol (OCSP) Extensions to IKEv2.","venue":"RFC","volume":"4806","pages":"1-11","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4806","doi":"10.17487/RFC4806","ee":"https://doi.org/10.17487/RFC4806","url":"https://dblp.org/rec/journals/rfc/rfc4806"}, "url":"URL#5628884" }, { "@score":"1", "@id":"5628885", "info":{"authors":{"author":[{"@pid":"47/689","text":"Michael Baer"},{"@pid":"209/6103","text":"Ricky Charlet"},{"@pid":"53/6495","text":"Wes Hardaker"},{"@pid":"209/6051","text":"Robert Story"},{"@pid":"81/3700","text":"Cliff Wang"}]},"title":"IPsec Security Policy Database Configuration MIB.","venue":"RFC","volume":"4807","pages":"1-71","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4807","doi":"10.17487/RFC4807","ee":"https://doi.org/10.17487/RFC4807","url":"https://dblp.org/rec/journals/rfc/rfc4807"}, "url":"URL#5628885" }, { "@score":"1", "@id":"5628886", "info":{"authors":{"author":{"@pid":"00/1396","text":"Steven M. Bellovin"}},"title":"Key Change Strategies for TCP-MD5.","venue":"RFC","volume":"4808","pages":"1-8","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4808","doi":"10.17487/RFC4808","ee":"https://doi.org/10.17487/RFC4808","url":"https://dblp.org/rec/journals/rfc/rfc4808"}, "url":"URL#5628886" }, { "@score":"1", "@id":"5628887", "info":{"authors":{"author":[{"@pid":"209/4722","text":"Chris Bonatti"},{"@pid":"10/9921","text":"Sean Turner"},{"@pid":"209/6112","text":"Gregory M. Lebovitz"}]},"title":"Requirements for an IPsec Certificate Management Profile.","venue":"RFC","volume":"4809","pages":"1-45","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4809","doi":"10.17487/RFC4809","ee":"https://doi.org/10.17487/RFC4809","url":"https://dblp.org/rec/journals/rfc/rfc4809"}, "url":"URL#5628887" }, { "@score":"1", "@id":"5628888", "info":{"authors":{"author":[{"@pid":"39/7986","text":"Carl Wallace"},{"@pid":"66/3594","text":"Ulrich Pordesch"},{"@pid":"30/3665","text":"Ralf Brandner"}]},"title":"Long-Term Archive Service Requirements.","venue":"RFC","volume":"4810","pages":"1-17","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4810","doi":"10.17487/RFC4810","ee":"https://doi.org/10.17487/RFC4810","url":"https://dblp.org/rec/journals/rfc/rfc4810"}, "url":"URL#5628888" }, { "@score":"1", "@id":"5628889", "info":{"authors":{"author":[{"@pid":"209/4599","text":"Liem Nguyen"},{"@pid":"209/4752","text":"Abhay Roy"},{"@pid":"209/4495","text":"Alex Zinin"}]},"title":"OSPF Out-of-Band Link State Database (LSDB) Resynchronization.","venue":"RFC","volume":"4811","pages":"1-10","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4811","doi":"10.17487/RFC4811","ee":"https://doi.org/10.17487/RFC4811","url":"https://dblp.org/rec/journals/rfc/rfc4811"}, "url":"URL#5628889" }, { "@score":"1", "@id":"5628890", "info":{"authors":{"author":[{"@pid":"209/4599","text":"Liem Nguyen"},{"@pid":"209/4752","text":"Abhay Roy"},{"@pid":"209/4495","text":"Alex Zinin"}]},"title":"OSPF Restart Signaling.","venue":"RFC","volume":"4812","pages":"1-7","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4812","doi":"10.17487/RFC4812","ee":"https://doi.org/10.17487/RFC4812","url":"https://dblp.org/rec/journals/rfc/rfc4812"}, "url":"URL#5628890" }, { "@score":"1", "@id":"5628891", "info":{"authors":{"author":[{"@pid":"55/2708","text":"Barry Friedman"},{"@pid":"209/4599","text":"Liem Nguyen"},{"@pid":"209/4752","text":"Abhay Roy"},{"@pid":"209/4834","text":"Derek M. Yeung"},{"@pid":"209/4495","text":"Alex Zinin"}]},"title":"OSPF Link-Local Signaling.","venue":"RFC","volume":"4813","pages":"1-10","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4813","doi":"10.17487/RFC4813","ee":"https://doi.org/10.17487/RFC4813","url":"https://dblp.org/rec/journals/rfc/rfc4813"}, "url":"URL#5628891" }, { "@score":"1", "@id":"5628892", "info":{"authors":{"author":[{"@pid":"40/5988","text":"David Newman"},{"@pid":"209/5903","text":"Timmons C. Player"}]},"title":"Hash and Stuffing: Overlooked Factors in Network Device Benchmarking.","venue":"RFC","volume":"4814","pages":"1-26","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4814","doi":"10.17487/RFC4814","ee":"https://doi.org/10.17487/RFC4814","url":"https://dblp.org/rec/journals/rfc/rfc4814"}, "url":"URL#5628892" }, { "@score":"1", "@id":"5628893", "info":{"authors":{"author":[{"@pid":"93/5679","text":"Lars-Erik Jonsson"},{"@pid":"04/1686","text":"Kristofer Sandlund"},{"@pid":"155/5103","text":"Ghyslain Pelletier"},{"@pid":"16/4089","text":"Péter Krémer"}]},"title":"RObust Header Compression (ROHC): Corrections and Clarifications to RFC 3095.","venue":"RFC","volume":"4815","pages":"1-33","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4815","doi":"10.17487/RFC4815","ee":"https://doi.org/10.17487/RFC4815","url":"https://dblp.org/rec/journals/rfc/rfc4815"}, "url":"URL#5628893" }, { "@score":"1", "@id":"5628894", "info":{"authors":{"author":[{"@pid":"206/9863","text":"Andrew G. Malis"},{"@pid":"70/499","text":"Luca Martini"},{"@pid":"209/5990","text":"Jeremy Brayley"},{"@pid":"08/2845","text":"Tom Walsh"}]},"title":"Pseudowire Emulation Edge-to-Edge (PWE3) Asynchronous Transfer Mode (ATM) Transparent Cell Transport Service.","venue":"RFC","volume":"4816","pages":"1-5","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4816","doi":"10.17487/RFC4816","ee":"https://doi.org/10.17487/RFC4816","url":"https://dblp.org/rec/journals/rfc/rfc4816"}, "url":"URL#5628894" }, { "@score":"1", "@id":"5628895", "info":{"authors":{"author":[{"@pid":"203/0789","text":"W. Mark Townsley"},{"@pid":"176/5857","text":"Carlos Pignataro"},{"@pid":"209/5890","text":"S. Wainner"},{"@pid":"209/5978","text":"Ted Seely"},{"@pid":"77/6762","text":"Jeff Young"}]},"title":"Encapsulation of MPLS over Layer 2 Tunneling Protocol Version 3.","venue":"RFC","volume":"4817","pages":"1-12","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4817","doi":"10.17487/RFC4817","ee":"https://doi.org/10.17487/RFC4817","url":"https://dblp.org/rec/journals/rfc/rfc4817"}, "url":"URL#5628895" }, { "@score":"1", "@id":"5628896", "info":{"authors":{"author":[{"@pid":"209/5044","text":"Joseph Salowey"},{"@pid":"97/1138","text":"Ralph E. Droms"}]},"title":"RADIUS Delegated-IPv6-Prefix Attribute.","venue":"RFC","volume":"4818","pages":"1-7","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4818","doi":"10.17487/RFC4818","ee":"https://doi.org/10.17487/RFC4818","url":"https://dblp.org/rec/journals/rfc/rfc4818"}, "url":"URL#5628896" }, { "@score":"1", "@id":"5628897", "info":{"authors":{"author":[{"@pid":"209/5006","text":"Joseph Galbraith"},{"@pid":"209/6079","text":"Jeff P. Van Dyke"},{"@pid":"209/5918","text":"Jon Bright"}]},"title":"Secure Shell Public Key Subsystem.","venue":"RFC","volume":"4819","pages":"1-17","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4819","doi":"10.17487/RFC4819","ee":"https://doi.org/10.17487/RFC4819","url":"https://dblp.org/rec/journals/rfc/rfc4819"}, "url":"URL#5628897" }, { "@score":"1", "@id":"5628898", "info":{"authors":{"author":[{"@pid":"43/6209","text":"Michael Tüxen"},{"@pid":"38/1108","text":"Randall R. Stewart"},{"@pid":"209/6097","text":"Peter Lei"}]},"title":"Padding Chunk and Parameter for the Stream Control Transmission Protocol (SCTP).","venue":"RFC","volume":"4820","pages":"1-6","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4820","doi":"10.17487/RFC4820","ee":"https://doi.org/10.17487/RFC4820","url":"https://dblp.org/rec/journals/rfc/rfc4820"}, "url":"URL#5628898" }, { "@score":"1", "@id":"5628899", "info":{"authors":{"author":[{"@pid":"00/3534","text":"Matt Mathis"},{"@pid":"65/2252","text":"John Heffner"}]},"title":"Packetization Layer Path MTU Discovery.","venue":"RFC","volume":"4821","pages":"1-32","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4821","doi":"10.17487/RFC4821","ee":"https://doi.org/10.17487/RFC4821","url":"https://dblp.org/rec/journals/rfc/rfc4821"}, "url":"URL#5628899" }, { "@score":"1", "@id":"5628900", "info":{"authors":{"author":[{"@pid":"26/4552","text":"Randall J. Atkinson"},{"@pid":"209/5957","text":"Matthew J. Fanto"}]},"title":"RIPv2 Cryptographic Authentication.","venue":"RFC","volume":"4822","pages":"1-22","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4822","doi":"10.17487/RFC4822","ee":"https://doi.org/10.17487/RFC4822","url":"https://dblp.org/rec/journals/rfc/rfc4822"}, "url":"URL#5628900" }, { "@score":"1", "@id":"5628901", "info":{"authors":{"author":[{"@pid":"209/4550","text":"Terry Harding"},{"@pid":"134/2049","text":"Richard Scott"}]},"title":"FTP Transport for Secure Peer-to-Peer Business Data Interchange over the Internet.","venue":"RFC","volume":"4823","pages":"1-40","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4823","doi":"10.17487/RFC4823","ee":"https://doi.org/10.17487/RFC4823","url":"https://dblp.org/rec/journals/rfc/rfc4823"}, "url":"URL#5628901" }, { "@score":"1", "@id":"5628902", "info":{"authors":{"author":[{"@pid":"209/6111","text":"Jogi Hofmueller"},{"@pid":"209/6107","text":"Aaron Bachmann"},{"@pid":"175/3207","text":"Johannes Zmölnig"}]},"title":"The Transmission of IP Datagrams over the Semaphore Flag Signaling System (SFSS).","venue":"RFC","volume":"4824","pages":"1-13","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4824","doi":"10.17487/RFC4824","ee":"https://doi.org/10.17487/RFC4824","url":"https://dblp.org/rec/journals/rfc/rfc4824"}, "url":"URL#5628902" }, { "@score":"1", "@id":"5628903", "info":{"authors":{"author":{"@pid":"16/12","text":"Jonathan D. Rosenberg"}},"title":"The Extensible Markup Language (XML) Configuration Access Protocol (XCAP).","venue":"RFC","volume":"4825","pages":"1-71","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4825","doi":"10.17487/RFC4825","ee":"https://doi.org/10.17487/RFC4825","url":"https://dblp.org/rec/journals/rfc/rfc4825"}, "url":"URL#5628903" }, { "@score":"1", "@id":"5628904", "info":{"authors":{"author":{"@pid":"16/12","text":"Jonathan D. Rosenberg"}},"title":"Extensible Markup Language (XML) Formats for Representing Resource Lists.","venue":"RFC","volume":"4826","pages":"1-31","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4826","doi":"10.17487/RFC4826","ee":"https://doi.org/10.17487/RFC4826","url":"https://dblp.org/rec/journals/rfc/rfc4826"}, "url":"URL#5628904" }, { "@score":"1", "@id":"5628905", "info":{"authors":{"author":[{"@pid":"127/2806","text":"Markus Isomäki"},{"@pid":"209/5968","text":"Eva Leppanen"}]},"title":"An Extensible Markup Language (XML) Configuration Access Protocol (XCAP) Usage for Manipulating Presence Document Contents.","venue":"RFC","volume":"4827","pages":"1-11","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4827","doi":"10.17487/RFC4827","ee":"https://doi.org/10.17487/RFC4827","url":"https://dblp.org/rec/journals/rfc/rfc4827"}, "url":"URL#5628905" }, { "@score":"1", "@id":"5628906", "info":{"authors":{"author":[{"@pid":"25/1323","text":"Sally Floyd"},{"@pid":"78/5231","text":"Eddie Kohler"}]},"title":"TCP Friendly Rate Control (TFRC): The Small-Packet (SP) Variant.","venue":"RFC","volume":"4828","pages":"1-46","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4828","doi":"10.17487/RFC4828","ee":"https://doi.org/10.17487/RFC4828","url":"https://dblp.org/rec/journals/rfc/rfc4828"}, "url":"URL#5628906" }, { "@score":"1", "@id":"5628907", "info":{"authors":{"author":[{"@pid":"52/6825","text":"Jaudelice Cavalcante de Oliveira"},{"@pid":"27/6742","text":"Jean-Philippe Vasseur"},{"@pid":"52/4122","text":"Leonardo C. Chen"},{"@pid":"31/822","text":"Caterina M. Scoglio"}]},"title":"Label Switched Path (LSP) Preemption Policies for MPLS Traffic Engineering.","venue":"RFC","volume":"4829","pages":"1-19","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4829","doi":"10.17487/RFC4829","ee":"https://doi.org/10.17487/RFC4829","url":"https://dblp.org/rec/journals/rfc/rfc4829"}, "url":"URL#5628907" }, { "@score":"1", "@id":"5628908", "info":{"authors":{"author":{"@pid":"39/5920","text":"James Kempf"}},"title":"Problem Statement for Network-Based Localized Mobility Management (NETLMM).","venue":"RFC","volume":"4830","pages":"1-13","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4830","doi":"10.17487/RFC4830","ee":"https://doi.org/10.17487/RFC4830","url":"https://dblp.org/rec/journals/rfc/rfc4830"}, "url":"URL#5628908" }, { "@score":"1", "@id":"5628909", "info":{"authors":{"author":{"@pid":"39/5920","text":"James Kempf"}},"title":"Goals for Network-Based Localized Mobility Management (NETLMM).","venue":"RFC","volume":"4831","pages":"1-14","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4831","doi":"10.17487/RFC4831","ee":"https://doi.org/10.17487/RFC4831","url":"https://dblp.org/rec/journals/rfc/rfc4831"}, "url":"URL#5628909" }, { "@score":"1", "@id":"5628910", "info":{"authors":{"author":[{"@pid":"76/636-1","text":"Christian Vogt 0001"},{"@pid":"39/5920","text":"James Kempf"}]},"title":"Security Threats to Network-Based Localized Mobility Management (NETLMM).","venue":"RFC","volume":"4832","pages":"1-12","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4832","doi":"10.17487/RFC4832","ee":"https://doi.org/10.17487/RFC4832","url":"https://dblp.org/rec/journals/rfc/rfc4832"}, "url":"URL#5628910" }, { "@score":"1", "@id":"5628911", "info":{"authors":{"author":[{"@pid":"27/4397","text":"Eliot Lear"},{"@pid":"50/9916","text":"Paul Eggert"}]},"title":"Timezone Options for DHCP.","venue":"RFC","volume":"4833","pages":"1-10","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4833","doi":"10.17487/RFC4833","ee":"https://doi.org/10.17487/RFC4833","url":"https://dblp.org/rec/journals/rfc/rfc4833"}, "url":"URL#5628911" }, { "@score":"1", "@id":"5628912", "info":{"authors":{"author":{"@pid":"209/6090","text":"Thomas Morin"}},"title":"Requirements for Multicast in Layer 3 Provider-Provisioned Virtual Private Networks (PPVPNs).","venue":"RFC","volume":"4834","pages":"1-37","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4834","doi":"10.17487/RFC4834","ee":"https://doi.org/10.17487/RFC4834","url":"https://dblp.org/rec/journals/rfc/rfc4834"}, "url":"URL#5628912" }, { "@score":"1", "@id":"5628913", "info":{"authors":{"author":{"@pid":"209/5075","text":"Vishwas Manral"}},"title":"Cryptographic Algorithm Implementation Requirements for Encapsulating Security Payload (ESP) and Authentication Header (AH).","venue":"RFC","volume":"4835","pages":"1-10","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4835","doi":"10.17487/RFC4835","ee":"https://doi.org/10.17487/RFC4835","url":"https://dblp.org/rec/journals/rfc/rfc4835"}, "url":"URL#5628913" }, { "@score":"1", "@id":"5628914", "info":{"authors":{"author":{"@pid":"209/6054","text":"Edward Beili"}},"title":"Definitions of Managed Objects for IEEE 802.3 Medium Attachment Units (MAUs).","venue":"RFC","volume":"4836","pages":"1-67","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4836","doi":"10.17487/RFC4836","ee":"https://doi.org/10.17487/RFC4836","url":"https://dblp.org/rec/journals/rfc/rfc4836"}, "url":"URL#5628914" }, { "@score":"1", "@id":"5628915", "info":{"authors":{"author":{"@pid":"118/9599","text":"Lior Khermosh"}},"title":"Managed Objects of Ethernet Passive Optical Networks (EPON).","venue":"RFC","volume":"4837","pages":"1-91","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4837","doi":"10.17487/RFC4837","ee":"https://doi.org/10.17487/RFC4837","url":"https://dblp.org/rec/journals/rfc/rfc4837"}, "url":"URL#5628915" }, { "@score":"1", "@id":"5628916", "info":{"authors":{"author":[{"@pid":"c/VintonGCerf","text":"Vinton G. Cerf"},{"@pid":"31/4209","text":"Scott C. Burleigh"},{"@pid":"77/6441","text":"Adrian Hooke"},{"@pid":"209/5982","text":"Leigh Torgerson"},{"@pid":"43/1352","text":"Robert C. Durst"},{"@pid":"209/6016","text":"Keith L. Scott"},{"@pid":"38/3635","text":"Kevin Fall"},{"@pid":"209/6025","text":"Howard S. Weiss"}]},"title":"Delay-Tolerant Networking Architecture.","venue":"RFC","volume":"4838","pages":"1-35","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4838","doi":"10.17487/RFC4838","ee":"https://doi.org/10.17487/RFC4838","url":"https://dblp.org/rec/journals/rfc/rfc4838"}, "url":"URL#5628916" }, { "@score":"1", "@id":"5628917", "info":{"authors":{"author":[{"@pid":"209/5924","text":"Garth Conboy"},{"@pid":"209/6083","text":"John Rivlin"},{"@pid":"209/6108","text":"Jon Ferraiolo"}]},"title":"Media Type Registrations for the Open eBook Publication Structure (OEBPS) Package File (OPF).","venue":"RFC","volume":"4839","pages":"1-5","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4839","doi":"10.17487/RFC4839","ee":"https://doi.org/10.17487/RFC4839","url":"https://dblp.org/rec/journals/rfc/rfc4839"}, "url":"URL#5628917" }, { "@score":"1", "@id":"5628918", "info":{"authors":{"author":[{"@pid":"152/9472","text":"Bernard Aboba"},{"@pid":"209/4676","text":"Elwyn B. Davies"},{"@pid":"63/370","text":"David Thaler"}]},"title":"Multiple Encapsulation Methods Considered Harmful.","venue":"RFC","volume":"4840","pages":"1-27","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4840","doi":"10.17487/RFC4840","ee":"https://doi.org/10.17487/RFC4840","url":"https://dblp.org/rec/journals/rfc/rfc4840"}, "url":"URL#5628918" }, { "@score":"1", "@id":"5628919", "info":{"authors":{"author":{"@pid":"209/4814","text":"C. M. Heard"}},"title":"RFC 4181 Update to Recognize the IETF Trust.","venue":"RFC","volume":"4841","pages":"1-3","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4841","doi":"10.17487/RFC4841","ee":"https://doi.org/10.17487/RFC4841","url":"https://dblp.org/rec/journals/rfc/rfc4841"}, "url":"URL#5628919" }, { "@score":"1", "@id":"5628920", "info":{"authors":{"author":[{"@pid":"206/9863","text":"Andrew G. Malis"},{"@pid":"209/4576","text":"Prayson Pate"},{"@pid":"209/4358","text":"Ron Cohen"},{"@pid":"209/6045","text":"David Zelig"}]},"title":"Synchronous Optical Network/Synchronous Digital Hierarchy (SONET/SDH) Circuit Emulation over Packet (CEP).","venue":"RFC","volume":"4842","pages":"1-43","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4842","doi":"10.17487/RFC4842","ee":"https://doi.org/10.17487/RFC4842","url":"https://dblp.org/rec/journals/rfc/rfc4842"}, "url":"URL#5628920" }, { "@score":"1", "@id":"5628921", "info":{"authors":{"author":[{"@pid":"61/4034","text":"Pekka Nikander"},{"@pid":"26/6803","text":"Julien Laganier"},{"@pid":"27/418","text":"Francis Dupont"}]},"title":"An IPv6 Prefix for Overlay Routable Cryptographic Hash Identifiers (ORCHID).","venue":"RFC","volume":"4843","pages":"1-14","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4843","doi":"10.17487/RFC4843","ee":"https://doi.org/10.17487/RFC4843","url":"https://dblp.org/rec/journals/rfc/rfc4843"}, "url":"URL#5628921" }, { "@score":"1", "@id":"5628922", "info":{"authors":{"author":[{"@pid":"69/7584","text":"Leslie Daigle"},{"@pid":"181/2657","text":"Internet Architecture Board"}]},"title":"The RFC Series and RFC.","venue":"RFC","volume":"4844","pages":"1-20","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4844","doi":"10.17487/RFC4844","ee":"https://doi.org/10.17487/RFC4844","url":"https://dblp.org/rec/journals/rfc/rfc4844"}, "url":"URL#5628922" }, { "@score":"1", "@id":"5628923", "info":{"authors":{"author":[{"@pid":"69/7584","text":"Leslie Daigle"},{"@pid":"181/2657","text":"Internet Architecture Board"}]},"title":"Process for Publication of IAB RFCs.","venue":"RFC","volume":"4845","pages":"1-5","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4845","doi":"10.17487/RFC4845","ee":"https://doi.org/10.17487/RFC4845","url":"https://dblp.org/rec/journals/rfc/rfc4845"}, "url":"URL#5628923" }, { "@score":"1", "@id":"5628924", "info":{"authors":{"author":[{"@pid":"20/1355","text":"John C. Klensin"},{"@pid":"63/370","text":"David Thaler"}]},"title":"Independent Submissions to the RFC Editor.","venue":"RFC","volume":"4846","pages":"1-16","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4846","doi":"10.17487/RFC4846","ee":"https://doi.org/10.17487/RFC4846","url":"https://dblp.org/rec/journals/rfc/rfc4846"}, "url":"URL#5628924" }, { "@score":"1", "@id":"5628925", "info":{"authors":{"author":{"@pid":"45/6716","text":"Tomonori Takeda"}},"title":"Framework and Requirements for Layer 1 Virtual Private Networks.","venue":"RFC","volume":"4847","pages":"1-38","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4847","doi":"10.17487/RFC4847","ee":"https://doi.org/10.17487/RFC4847","url":"https://dblp.org/rec/journals/rfc/rfc4847"}, "url":"URL#5628925" }, { "@score":"1", "@id":"5628926", "info":{"authors":{"author":{"@pid":"69/7584","text":"Leslie Daigle"}},"title":"Domain-Based Application Service Location Using URIs and the Dynamic Delegation Discovery Service (DDDS).","venue":"RFC","volume":"4848","pages":"1-10","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4848","doi":"10.17487/RFC4848","ee":"https://doi.org/10.17487/RFC4848","url":"https://dblp.org/rec/journals/rfc/rfc4848"}, "url":"URL#5628926" }, { "@score":"1", "@id":"5628927", "info":{"authors":{"author":[{"@pid":"56/4198","text":"Paul Congdon"},{"@pid":"97/5254","text":"Mauricio Sánchez"},{"@pid":"152/9472","text":"Bernard Aboba"}]},"title":"RADIUS Filter Rule Attribute.","venue":"RFC","volume":"4849","pages":"1-9","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4849","doi":"10.17487/RFC4849","ee":"https://doi.org/10.17487/RFC4849","url":"https://dblp.org/rec/journals/rfc/rfc4849"}, "url":"URL#5628927" }, { "@score":"1", "@id":"5628928", "info":{"authors":{"author":{"@pid":"209/6005","text":"Dave Wysochanski"}},"title":"Declarative Public Extension Key for Internet Small Computer Systems Interface (iSCSI) Node Architecture.","venue":"RFC","volume":"4850","pages":"1-9","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4850","doi":"10.17487/RFC4850","ee":"https://doi.org/10.17487/RFC4850","url":"https://dblp.org/rec/journals/rfc/rfc4850"}, "url":"URL#5628928" }, { "@score":"1", "@id":"5628929", "info":{"authors":{"author":[{"@pid":"00/2917","text":"Nancy Cam-Winget"},{"@pid":"m/DavidAMcGrew","text":"David A. McGrew"},{"@pid":"209/5044","text":"Joseph Salowey"},{"@pid":"63/778","text":"Hao Zhou"}]},"title":"The Flexible Authentication via Secure Tunneling Extensible Authentication Protocol Method (EAP-FAST).","venue":"RFC","volume":"4851","pages":"1-64","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4851","doi":"10.17487/RFC4851","ee":"https://doi.org/10.17487/RFC4851","url":"https://dblp.org/rec/journals/rfc/rfc4851"}, "url":"URL#5628929" }, { "@score":"1", "@id":"5628930", "info":{"authors":{"author":[{"@pid":"127/7053","text":"Jim Bound"},{"@pid":"14/3088","text":"Yanick Pouffary"},{"@pid":"209/5949","text":"Steve Klynsma"},{"@pid":"99/2859","text":"Tim Chown"},{"@pid":"48/1376","text":"David Green"}]},"title":"IPv6 Enterprise Network Analysis - IP Layer 3 Focus.","venue":"RFC","volume":"4852","pages":"1-32","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4852","doi":"10.17487/RFC4852","ee":"https://doi.org/10.17487/RFC4852","url":"https://dblp.org/rec/journals/rfc/rfc4852"}, "url":"URL#5628930" }, { "@score":"1", "@id":"5628931", "info":{"authors":{"author":{"@pid":"69/1293","text":"Russell Housley"}},"title":"Cryptographic Message Syntax (CMS) Multiple Signer Clarification.","venue":"RFC","volume":"4853","pages":"1-5","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4853","doi":"10.17487/RFC4853","ee":"https://doi.org/10.17487/RFC4853","url":"https://dblp.org/rec/journals/rfc/rfc4853"}, "url":"URL#5628931" }, { "@score":"1", "@id":"5628932", "info":{"authors":{"author":{"@pid":"38/5739","text":"Peter Saint-Andre"}},"title":"A Uniform Resource Name (URN) Namespace for Extensions to the Extensible Messaging and Presence Protocol (XMPP).","venue":"RFC","volume":"4854","pages":"1-9","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4854","doi":"10.17487/RFC4854","ee":"https://doi.org/10.17487/RFC4854","url":"https://dblp.org/rec/journals/rfc/rfc4854"}, "url":"URL#5628932" }, { "@score":"1", "@id":"5628933", "info":{"authors":{"author":{"@pid":"185/2998","text":"Stephen L. Casner"}},"title":"Media Type Registration of RTP Payload Formats.","venue":"RFC","volume":"4855","pages":"1-11","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4855","doi":"10.17487/RFC4855","ee":"https://doi.org/10.17487/RFC4855","url":"https://dblp.org/rec/journals/rfc/rfc4855"}, "url":"URL#5628933" }, { "@score":"1", "@id":"5628934", "info":{"authors":{"author":{"@pid":"185/2998","text":"Stephen L. Casner"}},"title":"Media Type Registration of Payload Formats in the RTP Profile for Audio and Video Conferences.","venue":"RFC","volume":"4856","pages":"1-29","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4856","doi":"10.17487/RFC4856","ee":"https://doi.org/10.17487/RFC4856","url":"https://dblp.org/rec/journals/rfc/rfc4856"}, "url":"URL#5628934" }, { "@score":"1", "@id":"5628935", "info":{"authors":{"author":[{"@pid":"157/9444","text":"Eva Fogelstrom"},{"@pid":"15/4548","text":"Annika Jonsson"},{"@pid":"77/1931","text":"Charles E. Perkins"}]},"title":"Mobile IPv4 Regional Registration.","venue":"RFC","volume":"4857","pages":"1-35","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4857","doi":"10.17487/RFC4857","ee":"https://doi.org/10.17487/RFC4857","url":"https://dblp.org/rec/journals/rfc/rfc4857"}, "url":"URL#5628935" }, { "@score":"1", "@id":"5628936", "info":{"authors":{"author":[{"@pid":"209/4718","text":"Henrik Levkowetz"},{"@pid":"23/2643","text":"David Meyer"},{"@pid":"71/1693","text":"Lars Eggert"},{"@pid":"46/2909","text":"Allison Mankin"}]},"title":"Document Shepherding from Working Group Last Call to Publication.","venue":"RFC","volume":"4858","pages":"1-21","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4858","doi":"10.17487/RFC4858","ee":"https://doi.org/10.17487/RFC4858","url":"https://dblp.org/rec/journals/rfc/rfc4858"}, "url":"URL#5628936" }, { "@score":"1", "@id":"5628937", "info":{"authors":{"author":{"@pid":"99/3063","text":"Adrian Farrel"}},"title":"Codepoint Registry for the Flags Field in the Resource Reservation Protocol-Traffic Engineering (RSVP-TE) Session Attribute Object.","venue":"RFC","volume":"4859","pages":"1-5","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4859","doi":"10.17487/RFC4859","ee":"https://doi.org/10.17487/RFC4859","url":"https://dblp.org/rec/journals/rfc/rfc4859"}, "url":"URL#5628937" }, { "@score":"1", "@id":"5628938", "info":{"authors":{"author":[{"@pid":"125/0891","text":"Francois Le Faucheur"},{"@pid":"99/3875","text":"Bruce Davie"},{"@pid":"53/718","text":"Pratik Bose"},{"@pid":"80/4599","text":"Chris Christou"},{"@pid":"74/111","text":"Michael Davenport"}]},"title":"Generic Aggregate Resource ReSerVation Protocol (RSVP) Reservations.","venue":"RFC","volume":"4860","pages":"1-32","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4860","doi":"10.17487/RFC4860","ee":"https://doi.org/10.17487/RFC4860","url":"https://dblp.org/rec/journals/rfc/rfc4860"}, "url":"URL#5628938" }, { "@score":"1", "@id":"5628939", "info":{"authors":{"author":[{"@pid":"n/ThomasNarten","text":"Thomas Narten"},{"@pid":"132/8473","text":"Erik Nordmark"},{"@pid":"01/4712","text":"William Allen Simpson"},{"@pid":"124/1835","text":"Hesham Soliman"}]},"title":"Neighbor Discovery for IP version 6 (IPv6).","venue":"RFC","volume":"4861","pages":"1-97","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4861","doi":"10.17487/RFC4861","ee":"https://doi.org/10.17487/RFC4861","url":"https://dblp.org/rec/journals/rfc/rfc4861"}, "url":"URL#5628939" }, { "@score":"1", "@id":"5628940", "info":{"authors":{"author":[{"@pid":"09/8464-2","text":"Susan Thomson 0002"},{"@pid":"n/ThomasNarten","text":"Thomas Narten"},{"@pid":"71/5531","text":"Tatuya Jinmei"}]},"title":"IPv6 Stateless Address Autoconfiguration.","venue":"RFC","volume":"4862","pages":"1-30","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4862","doi":"10.17487/RFC4862","ee":"https://doi.org/10.17487/RFC4862","url":"https://dblp.org/rec/journals/rfc/rfc4862"}, "url":"URL#5628940" }, { "@score":"1", "@id":"5628941", "info":{"authors":{"author":[{"@pid":"70/499","text":"Luca Martini"},{"@pid":"209/2615","text":"George Swallow"}]},"title":"Wildcard Pseudowire Type.","venue":"RFC","volume":"4863","pages":"1-6","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4863","doi":"10.17487/RFC4863","ee":"https://doi.org/10.17487/RFC4863","url":"https://dblp.org/rec/journals/rfc/rfc4863"}, "url":"URL#5628941" }, { "@score":"1", "@id":"5628942", "info":{"authors":{"author":[{"@pid":"209/6105","text":"Gunter Van de Velde"},{"@pid":"133/6820","text":"Tony Hain"},{"@pid":"97/1138","text":"Ralph E. Droms"},{"@pid":"c/BrianECarpenter","text":"Brian E. Carpenter"},{"@pid":"89/3309","text":"Eric Klein"}]},"title":"Local Network Protection for IPv6.","venue":"RFC","volume":"4864","pages":"1-36","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4864","doi":"10.17487/RFC4864","ee":"https://doi.org/10.17487/RFC4864","url":"https://dblp.org/rec/journals/rfc/rfc4864"}, "url":"URL#5628942" }, { "@score":"1", "@id":"5628943", "info":{"authors":{"author":[{"@pid":"209/6041","text":"Gregory A. White"},{"@pid":"21/1221","text":"Gregory M. Vaudreuil"}]},"title":"SMTP Submission Service Extension for Future Message Release.","venue":"RFC","volume":"4865","pages":"1-11","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4865","doi":"10.17487/RFC4865","ee":"https://doi.org/10.17487/RFC4865","url":"https://dblp.org/rec/journals/rfc/rfc4865"}, "url":"URL#5628943" }, { "@score":"1", "@id":"5628944", "info":{"authors":{"author":[{"@pid":"94/2908","text":"Jari Arkko"},{"@pid":"76/636-1","text":"Christian Vogt 0001"},{"@pid":"127/6832","text":"Wassim Haddad"}]},"title":"Enhanced Route Optimization for Mobile IPv6.","venue":"RFC","volume":"4866","pages":"1-54","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4866","doi":"10.17487/RFC4866","ee":"https://doi.org/10.17487/RFC4866","url":"https://dblp.org/rec/journals/rfc/rfc4866"}, "url":"URL#5628944" }, { "@score":"1", "@id":"5628945", "info":{"authors":{"author":[{"@pid":"68/7139","text":"Johan Sjöberg"},{"@pid":"128/4054","text":"Magnus Westerlund"},{"@pid":"91/6626","text":"Ari Lakaniemi"},{"@pid":"39/5247","text":"Qiaobing Xie"}]},"title":"RTP Payload Format and File Storage Format for the Adaptive Multi-Rate (AMR) and Adaptive Multi-Rate Wideband (AMR-WB) Audio Codecs.","venue":"RFC","volume":"4867","pages":"1-59","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4867","doi":"10.17487/RFC4867","ee":"https://doi.org/10.17487/RFC4867","url":"https://dblp.org/rec/journals/rfc/rfc4867"}, "url":"URL#5628945" }, { "@score":"1", "@id":"5628946", "info":{"authors":{"author":[{"@pid":"209/5944","text":"Scott G. Kelly"},{"@pid":"94/1321","text":"Sheila Frankel"}]},"title":"Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec.","venue":"RFC","volume":"4868","pages":"1-21","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4868","doi":"10.17487/RFC4868","ee":"https://doi.org/10.17487/RFC4868","url":"https://dblp.org/rec/journals/rfc/rfc4868"}, "url":"URL#5628946" }, { "@score":"1", "@id":"5628947", "info":{"authors":{"author":[{"@pid":"28/4504","text":"Laurie Law"},{"@pid":"54/771","text":"Jerome A. Solinas"}]},"title":"Suite B Cryptographic Suites for IPsec.","venue":"RFC","volume":"4869","pages":"1-9","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4869","doi":"10.17487/RFC4869","ee":"https://doi.org/10.17487/RFC4869","url":"https://dblp.org/rec/journals/rfc/rfc4869"}, "url":"URL#5628947" }, { "@score":"1", "@id":"5628948", "info":{"authors":{"author":{"@pid":"209/5915","text":"Mark Delany"}},"title":"Domain-Based Email Authentication Using Public Keys Advertised in the DNS (DomainKeys).","venue":"RFC","volume":"4870","pages":"1-41","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4870","doi":"10.17487/RFC4870","ee":"https://doi.org/10.17487/RFC4870","url":"https://dblp.org/rec/journals/rfc/rfc4870"}, "url":"URL#5628948" }, { "@score":"1", "@id":"5628949", "info":{"authors":{"author":[{"@pid":"71/1984","text":"Eric Allman"},{"@pid":"21/6989","text":"Jon Callas"},{"@pid":"209/5915","text":"Mark Delany"},{"@pid":"98/7129","text":"Miles Libbey"},{"@pid":"23/7130","text":"Jim Fenton"},{"@pid":"10/695","text":"Michael Thomas"}]},"title":"DomainKeys Identified Mail (DKIM) Signatures.","venue":"RFC","volume":"4871","pages":"1-71","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4871","doi":"10.17487/RFC4871","ee":"https://doi.org/10.17487/RFC4871","url":"https://dblp.org/rec/journals/rfc/rfc4871"}, "url":"URL#5628949" }, { "@score":"1", "@id":"5628950", "info":{"authors":{"author":[{"@pid":"31/2452","text":"Jonathan P. Lang"},{"@pid":"75/7030","text":"Yakov Rekhter"},{"@pid":"29/1825","text":"Dimitri Papadimitriou"}]},"title":"RSVP-TE Extensions in Support of End-to-End Generalized Multi-Protocol Label Switching (GMPLS) Recovery.","venue":"RFC","volume":"4872","pages":"1-47","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4872","doi":"10.17487/RFC4872","ee":"https://doi.org/10.17487/RFC4872","url":"https://dblp.org/rec/journals/rfc/rfc4872"}, "url":"URL#5628950" }, { "@score":"1", "@id":"5628951", "info":{"authors":{"author":[{"@pid":"209/1699","text":"Lou Berger"},{"@pid":"209/5076","text":"Igor Bryskin"},{"@pid":"29/1825","text":"Dimitri Papadimitriou"},{"@pid":"99/3063","text":"Adrian Farrel"}]},"title":"GMPLS Segment Recovery.","venue":"RFC","volume":"4873","pages":"1-25","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4873","doi":"10.17487/RFC4873","ee":"https://doi.org/10.17487/RFC4873","url":"https://dblp.org/rec/journals/rfc/rfc4873"}, "url":"URL#5628951" }, { "@score":"1", "@id":"5628952", "info":{"authors":{"author":[{"@pid":"209/6071","text":"Cheng-Yin Lee"},{"@pid":"99/3063","text":"Adrian Farrel"},{"@pid":"79/6945","text":"Stefaan De Cnodder"}]},"title":"Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE).","venue":"RFC","volume":"4874","pages":"1-27","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4874","doi":"10.17487/RFC4874","ee":"https://doi.org/10.17487/RFC4874","url":"https://dblp.org/rec/journals/rfc/rfc4874"}, "url":"URL#5628952" }, { "@score":"1", "@id":"5628953", "info":{"authors":{"author":[{"@pid":"93/5608","text":"Rahul Aggarwal"},{"@pid":"29/1825","text":"Dimitri Papadimitriou"},{"@pid":"11/3818","text":"Seisho Yasukawa"}]},"title":"Extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for Point-to-Multipoint TE Label Switched Paths (LSPs).","venue":"RFC","volume":"4875","pages":"1-53","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4875","doi":"10.17487/RFC4875","ee":"https://doi.org/10.17487/RFC4875","url":"https://dblp.org/rec/journals/rfc/rfc4875"}, "url":"URL#5628953" }, { "@score":"1", "@id":"5628954", "info":{"authors":{"author":[{"@pid":"209/6124","text":"Bob Neal-Joslin"},{"@pid":"209/2793","text":"Luke Howard"},{"@pid":"209/6015","text":"Morteza Ansari"}]},"title":"A Configuration Profile Schema for Lightweight Directory Access Protocol (LDAP)-Based Agents.","venue":"RFC","volume":"4876","pages":"1-39","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4876","doi":"10.17487/RFC4876","ee":"https://doi.org/10.17487/RFC4876","url":"https://dblp.org/rec/journals/rfc/rfc4876"}, "url":"URL#5628954" }, { "@score":"1", "@id":"5628955", "info":{"authors":{"author":[{"@pid":"75/5539","text":"Vijay Devarapalli"},{"@pid":"27/418","text":"Francis Dupont"}]},"title":"Mobile IPv6 Operation with IKEv2 and the Revised IPsec Architecture.","venue":"RFC","volume":"4877","pages":"1-26","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4877","doi":"10.17487/RFC4877","ee":"https://doi.org/10.17487/RFC4877","url":"https://dblp.org/rec/journals/rfc/rfc4877"}, "url":"URL#5628955" }, { "@score":"1", "@id":"5628956", "info":{"authors":{"author":{"@pid":"46/323","text":"Matthew B. Squire"}},"title":"Definitions and Managed Objects for Operations, Administration, and Maintenance (OAM) Functions on Ethernet-Like Interfaces.","venue":"RFC","volume":"4878","pages":"1-58","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4878","doi":"10.17487/RFC4878","ee":"https://doi.org/10.17487/RFC4878","url":"https://dblp.org/rec/journals/rfc/rfc4878"}, "url":"URL#5628956" }, { "@score":"1", "@id":"5628957", "info":{"authors":{"author":{"@pid":"n/ThomasNarten","text":"Thomas Narten"}},"title":"Clarification of the Third Party Disclosure Procedure in RFC 3979.","venue":"RFC","volume":"4879","pages":"1-4","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4879","doi":"10.17487/RFC4879","ee":"https://doi.org/10.17487/RFC4879","url":"https://dblp.org/rec/journals/rfc/rfc4879"}, "url":"URL#5628957" }, { "@score":"1", "@id":"5628958", "info":{"authors":{"author":[{"@pid":"21/6989","text":"Jon Callas"},{"@pid":"79/6690","text":"Lutz Donnerhacke"},{"@pid":"209/2653","text":"Hal Finney"},{"@pid":"63/6058","text":"David Shaw"},{"@pid":"97/1101","text":"Rodney Thayer"}]},"title":"OpenPGP Message Format.","venue":"RFC","volume":"4880","pages":"1-90","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4880","doi":"10.17487/RFC4880","ee":"https://doi.org/10.17487/RFC4880","url":"https://dblp.org/rec/journals/rfc/rfc4880"}, "url":"URL#5628958" }, { "@score":"1", "@id":"5628959", "info":{"authors":{"author":{"@pid":"47/2943","text":"Karim El-Malki"}},"title":"Low-Latency Handoffs in Mobile IPv4.","venue":"RFC","volume":"4881","pages":"1-64","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4881","doi":"10.17487/RFC4881","ee":"https://doi.org/10.17487/RFC4881","url":"https://dblp.org/rec/journals/rfc/rfc4881"}, "url":"URL#5628959" }, { "@score":"1", "@id":"5628960", "info":{"authors":{"author":{"@pid":"39/4016","text":"Rajeev Koodli"}},"title":"IP Address Location Privacy and Mobile IPv6: Problem Statement.","venue":"RFC","volume":"4882","pages":"1-11","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4882","doi":"10.17487/RFC4882","ee":"https://doi.org/10.17487/RFC4882","url":"https://dblp.org/rec/journals/rfc/rfc4882"}, "url":"URL#5628960" }, { "@score":"1", "@id":"5628961", "info":{"authors":{"author":[{"@pid":"46/937","text":"Gábor Fehér"},{"@pid":"25/861","text":"Krisztián Németh"},{"@pid":"77/8508","text":"András Korn"},{"@pid":"65/1337","text":"István Cselényi"}]},"title":"Benchmarking Terminology for Resource Reservation Capable Routers.","venue":"RFC","volume":"4883","pages":"1-24","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4883","doi":"10.17487/RFC4883","ee":"https://doi.org/10.17487/RFC4883","url":"https://dblp.org/rec/journals/rfc/rfc4883"}, "url":"URL#5628961" }, { "@score":"1", "@id":"5628962", "info":{"authors":{"author":[{"@pid":"30/5814","text":"Ronald P. Bonica"},{"@pid":"209/2629","text":"Der-hwa Gan"},{"@pid":"92/4159","text":"Daniel C. Tappan"},{"@pid":"176/5857","text":"Carlos Pignataro"}]},"title":"Extended ICMP to Support Multi-Part Messages.","venue":"RFC","volume":"4884","pages":"1-19","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4884","doi":"10.17487/RFC4884","ee":"https://doi.org/10.17487/RFC4884","url":"https://dblp.org/rec/journals/rfc/rfc4884"}, "url":"URL#5628962" }, { "@score":"1", "@id":"5628963", "info":{"authors":{"author":[{"@pid":"60/3016","text":"Thierry Ernst"},{"@pid":"60/4501","text":"Hong-Yon Lach"}]},"title":"Network Mobility Support Terminology.","venue":"RFC","volume":"4885","pages":"1-19","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4885","doi":"10.17487/RFC4885","ee":"https://doi.org/10.17487/RFC4885","url":"https://dblp.org/rec/journals/rfc/rfc4885"}, "url":"URL#5628963" }, { "@score":"1", "@id":"5628964", "info":{"authors":{"author":{"@pid":"60/3016","text":"Thierry Ernst"}},"title":"Network Mobility Support Goals and Requirements.","venue":"RFC","volume":"4886","pages":"1-13","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4886","doi":"10.17487/RFC4886","ee":"https://doi.org/10.17487/RFC4886","url":"https://dblp.org/rec/journals/rfc/rfc4886"}, "url":"URL#5628964" }, { "@score":"1", "@id":"5628965", "info":{"authors":{"author":[{"@pid":"62/10126","text":"Pascal Thubert"},{"@pid":"85/4258","text":"Ryuji Wakikawa"},{"@pid":"75/5539","text":"Vijay Devarapalli"}]},"title":"Network Mobility Home Network Models.","venue":"RFC","volume":"4887","pages":"1-19","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4887","doi":"10.17487/RFC4887","ee":"https://doi.org/10.17487/RFC4887","url":"https://dblp.org/rec/journals/rfc/rfc4887"}, "url":"URL#5628965" }, { "@score":"1", "@id":"5628966", "info":{"authors":{"author":[{"@pid":"192/6049","text":"Chan-Wah Ng"},{"@pid":"62/10126","text":"Pascal Thubert"},{"@pid":"13/5156","text":"Masafumi Watari"},{"@pid":"32/5135","text":"Fan Zhao"}]},"title":"Network Mobility Route Optimization Problem Statement.","venue":"RFC","volume":"4888","pages":"1-26","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4888","doi":"10.17487/RFC4888","ee":"https://doi.org/10.17487/RFC4888","url":"https://dblp.org/rec/journals/rfc/rfc4888"}, "url":"URL#5628966" }, { "@score":"1", "@id":"5628967", "info":{"authors":{"author":[{"@pid":"192/6049","text":"Chan-Wah Ng"},{"@pid":"32/5135","text":"Fan Zhao"},{"@pid":"13/5156","text":"Masafumi Watari"},{"@pid":"62/10126","text":"Pascal Thubert"}]},"title":"Network Mobility Route Optimization Solution Space Analysis.","venue":"RFC","volume":"4889","pages":"1-38","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4889","doi":"10.17487/RFC4889","ee":"https://doi.org/10.17487/RFC4889","url":"https://dblp.org/rec/journals/rfc/rfc4889"}, "url":"URL#5628967" }, { "@score":"1", "@id":"5628968", "info":{"authors":{"author":[{"@pid":"209/4676","text":"Elwyn B. Davies"},{"@pid":"10/2630","text":"János Mohácsi"}]},"title":"Recommendations for Filtering ICMPv6 Messages in Firewalls.","venue":"RFC","volume":"4890","pages":"1-38","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4890","doi":"10.17487/RFC4890","ee":"https://doi.org/10.17487/RFC4890","url":"https://dblp.org/rec/journals/rfc/rfc4890"}, "url":"URL#5628968" }, { "@score":"1", "@id":"5628969", "info":{"authors":{"author":[{"@pid":"63/1646","text":"Richard Graveman"},{"@pid":"209/5098","text":"Mohan Parthasarathy"},{"@pid":"80/210","text":"Pekka Savola"},{"@pid":"97/4804","text":"Hannes Tschofenig"}]},"title":"Using IPsec to Secure IPv6-in-IPv4 Tunnels.","venue":"RFC","volume":"4891","pages":"1-23","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4891","doi":"10.17487/RFC4891","ee":"https://doi.org/10.17487/RFC4891","url":"https://dblp.org/rec/journals/rfc/rfc4891"}, "url":"URL#5628969" }, { "@score":"1", "@id":"5628970", "info":{"authors":{"author":[{"@pid":"209/5971","text":"Suzanne Woolf"},{"@pid":"209/2844","text":"David Conrad"}]},"title":"Requirements for a Mechanism Identifying a Name Server Instance.","venue":"RFC","volume":"4892","pages":"1-8","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4892","doi":"10.17487/RFC4892","ee":"https://doi.org/10.17487/RFC4892","url":"https://dblp.org/rec/journals/rfc/rfc4892"}, "url":"URL#5628970" }, { "@score":"1", "@id":"5628971", "info":{"authors":{"author":[{"@pid":"209/6066","text":"Quaizar Vohra"},{"@pid":"209/1787","text":"Enke Chen"}]},"title":"BGP Support for Four-octet AS Number Space.","venue":"RFC","volume":"4893","pages":"1-10","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4893","doi":"10.17487/RFC4893","ee":"https://doi.org/10.17487/RFC4893","url":"https://dblp.org/rec/journals/rfc/rfc4893"}, "url":"URL#5628971" }, { "@score":"1", "@id":"5628972", "info":{"authors":{"author":{"@pid":"209/3005","text":"Paul E. Hoffman"}},"title":"Use of Hash Algorithms in Internet Key Exchange (IKE) and IPsec.","venue":"RFC","volume":"4894","pages":"1-11","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4894","doi":"10.17487/RFC4894","ee":"https://doi.org/10.17487/RFC4894","url":"https://dblp.org/rec/journals/rfc/rfc4894"}, "url":"URL#5628972" }, { "@score":"1", "@id":"5628973", "info":{"authors":{"author":[{"@pid":"43/6209","text":"Michael Tüxen"},{"@pid":"38/1108","text":"Randall R. Stewart"},{"@pid":"209/6097","text":"Peter Lei"},{"@pid":"79/4995","text":"Eric Rescorla"}]},"title":"Authenticated Chunks for the Stream Control Transmission Protocol (SCTP).","venue":"RFC","volume":"4895","pages":"1-19","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4895","doi":"10.17487/RFC4895","ee":"https://doi.org/10.17487/RFC4895","url":"https://dblp.org/rec/journals/rfc/rfc4895"}, "url":"URL#5628973" }, { "@score":"1", "@id":"5628974", "info":{"authors":{"author":[{"@pid":"04/6561","text":"Abigail Surtees"},{"@pid":"209/5091","text":"Mark A. West"},{"@pid":"12/1984","text":"Adam B. Roach"}]},"title":"Signaling Compression (SigComp) Corrections and Clarifications.","venue":"RFC","volume":"4896","pages":"1-28","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4896","doi":"10.17487/RFC4896","ee":"https://doi.org/10.17487/RFC4896","url":"https://dblp.org/rec/journals/rfc/rfc4896"}, "url":"URL#5628974" }, { "@score":"1", "@id":"5628975", "info":{"authors":{"author":[{"@pid":"20/1355","text":"John C. Klensin"},{"@pid":"01/2098","text":"Sam Hartman"}]},"title":"Handling Normative References to Standards-Track Documents.","venue":"RFC","volume":"4897","pages":"1-6","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4897","doi":"10.17487/RFC4897","ee":"https://doi.org/10.17487/RFC4897","url":"https://dblp.org/rec/journals/rfc/rfc4897"}, "url":"URL#5628975" }, { "@score":"1", "@id":"5628976", "info":{"authors":{"author":[{"@pid":"00/3534","text":"Matt Mathis"},{"@pid":"65/2252","text":"John Heffner"},{"@pid":"209/5023","text":"Rajiv Raghunarayan"}]},"title":"TCP Extended Statistics MIB.","venue":"RFC","volume":"4898","pages":"1-75","year":"2007","type":"Informal and Other Publications","access":"open","key":"journals/rfc/rfc4898","doi":"10.17487/RFC4898","ee":"https://doi.org/10.17487/RFC4898","url":"https://dblp.org/rec/journals/rfc/rfc4898"}, "url":"URL#5628976" } ] } } } )