


default search action
Request for Comments (RFC) 6500-6599
2012
6501Oscar Novo, Gonzalo Camarillo, David P. Morgan, Jari Urpalainen:
Conference Information Data Model for Centralized Conferencing (XCON). 1-94
6502Gonzalo Camarillo, Srivatsa Srinivasan, Roni Even, Jari Urpalainen:
Conference Event Package Data Format Extension for Centralized Conferencing (XCON). 1-14
6503Mary Barnes, Chris Boulton, Simon Pietro Romano, Henning Schulzrinne:
Centralized Conferencing Manipulation Protocol. 1-119
6504Mary Barnes, Lorenzo Miniero, Roberta Presta, Simon Pietro Romano:
Centralized Conferencing Manipulation Protocol (CCMP) Call Flow Examples. 1-78
6505Scott McGlashan, Tim Melanchuk, Chris Boulton:
A Mixer Control Package for the Media Control Channel Framework. 1-89
6506Manav Bhatia, Vishwas Manral, Acee Lindem:
Supporting Authentication Trailer for OSPFv3. 1-20
6507Michael Groves:
Elliptic Curve-Based Certificateless Signatures for Identity-Based Encryption (ECCSI). 1-17
6508Michael Groves:
Sakai-Kasahara Key Encryption (SAKKE). 1-21
6509Michael Groves:
MIKEY-SAKKE: Sakai-Kasahara Key Encryption in Multimedia Internet KEYing (MIKEY). 1-21
6510Lou Berger, George Swallow:
Resource Reservation Protocol (RSVP) Message Formats for Label Switched Path (LSP) Attributes Objects. 1-8
6511Zafar Ali, George Swallow, Rahul Aggarwal:
Non-Penultimate Hop Popping Behavior and Out-of-Band Mapping for RSVP-TE Label Switched Paths. 1-10
6512IJsbrand Wijnands, Eric C. Rosen, Maria Napierala, Nicolai Leymann:
Using Multipoint LDP When the Backbone Has No Route to the Root. 1-12
6513Eric C. Rosen, Rahul Aggarwal:
Multicast in MPLS/BGP IP VPNs. 1-88
6514Rahul Aggarwal, Eric C. Rosen, Thomas Morin, Yakov Rekhter:
BGP Encodings and Procedures for Multicast in MPLS/BGP IP VPNs. 1-59
6515Rahul Aggarwal, Eric C. Rosen:
IPv4 and IPv6 Infrastructure Addresses in BGP Updates for Multicast VPN. 1-8
6516Yiqun Cai, Eric C. Rosen, IJsbrand Wijnands:
IPv6 Multicast VPN (MVPN) Support Using PIM Control Plane and Selective Provider Multicast Service Interface (S-PMSI) Join Messages. 1-6
6517Thomas Morin, Ben Niven-Jenkins, Yuji Kamite, Raymond Zhang, Nicolai Leymann, Nabil Bitar:
Mandatory Features in a Layer 3 Multicast BGP/MPLS VPN Solution. 1-41
6518Gregory M. Lebovitz, Manav Bhatia:
Keying and Authentication for Routing Protocols (KARP) Design Guidelines. 1-30
6519Roberta Maglione, Alain Durand:
RADIUS Extensions for Dual-Stack Lite. 1-11
6520Robin Seggelmann, Michael Tüxen, Michael G. Williams:
Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension. 1-9
6521Antti Mäkelä, Jouni Korhonen:
Home Agent-Assisted Route Optimization between Mobile IPv4 Networks. 1-53
6522Murray S. Kucherawy:
The Multipart/Report Media Type for the Reporting of Mail System Administrative Messages. 1-9
6525Randall R. Stewart, Michael Tüxen, Peter Lei:
Stream Control Transmission Protocol (SCTP) Stream Reconfiguration. 1-34
6526Benoit Claise, Paul Aitken, Andrew Johnson, Gerhard Münz:
IP Flow Information Export (IPFIX) Per Stream Control Transmission Protocol (SCTP) Stream. 1-23
6527Kalyan Tata:
Definitions of Managed Objects for Virtual Router Redundancy Protocol Version 3 (VRRPv3). 1-31
6528Fernando Gont, Steven M. Bellovin:
Defending against Sequence Number Attacks. 1-12
6529Alexander A. McKenzie, Steve Crocker:
Host/Host Protocol for the ARPA Network. 1-34
6530John Klensin, Yangwoo Ko:
Overview and Framework for Internationalized Email. 1-26
6531Jiankang Yao, Wei Mao:
SMTP Extension for Internationalized Email. 1-18
6532Abel Yang, Shawn Steele, Ned Freed:
Internationalized Email Headers. 1-11
6533Tony Hansen, Chris Newman, Alexey Melnikov:
Internationalized Delivery Status and Disposition Notifications. 1-19
6534Nick G. Duffield, Al Morton, Joel Sommers:
Loss Episode Metrics for IP Performance Metrics (IPPM). 1-21
6535Bill Huang, Hui Deng, Teemu Savolainen:
Dual-Stack Hosts Using "Bump-in-the-Host" (BIH). 1-25
6536Andy Bierman, Martin Björklund:
Network Configuration Protocol (NETCONF) Access Control Model. 1-49
6537Jeff Ahrenholz:
Host Identity Protocol Distributed Hash Table Interface. 1-20
6538Thomas R. Henderson, Andrei V. Gurtov:
The Host Identity Protocol (HIP) Experiment Report. 1-35
6539Violeta Cakulev, Ganapathy S. Sundaram, Ioannis Broustis:
IBAKE: Identity-Based Authenticated Key Exchange. 1-13
6540Wesley George, Chris Donley, Christopher Liljenstolpe, Lee Howard:
IPv6 Support Required for All IP-Capable Nodes. 1-6
6541Murray S. Kucherawy:
DomainKeys Identified Mail (DKIM) Authorized Third-Party Signatures. 1-16
6542Shawn Emery:
Kerberos Version 5 Generic Security Service Application Program Interface (GSS-API) Channel Binding Hash Agility. 1-6
6543Sri Gundavelli:
Reserved IPv6 Interface Identifier for Proxy Mobile IPv6. 1-5
6544Jonathan D. Rosenberg, Ari Keränen, Bruce Lowekamp, Adam B. Roach:
TCP Candidates with Interactive Connectivity Establishment (ICE). 1-29
6545Kathleen M. Moriarty:
Real-time Inter-network Defense (RID). 1-84
6546Brian Trammell:
Transport of Real-time Inter-network Defense (RID) Messages over HTTP/TLS. 1-8
6547Wesley George:
RFC 3627 to Historic Status. 1-3
6548Nevil Brownlee, Internet Architecture Board:
Independent Submission Model. 1-5
6549Acee Lindem, Abhay Roy, Sina Mirtorabi:
OSPFv2 Multi-Instance Extensions. 1-9
6550Tim Winter, Pascal Thubert, Anders Brandt, Jonathan W. Hui, Richard Kelsey, Philip Alexander Levis, Kris Pister
, René Struik, Jean-Philippe Vasseur, Roger K. Alexander:
RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. 1-157
6551Jean-Philippe Vasseur, Mijeom Kim, Kris Pister
, Nicolas Dejean, Dominique Barthel:
Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks. 1-30
6552Pascal Thubert:
Objective Function Zero for the Routing Protocol for Low-Power and Lossy Networks (RPL). 1-14
6553Jonathan W. Hui, Jean-Philippe Vasseur:
The Routing Protocol for Low-Power and Lossy Networks (RPL) Option for Carrying RPL Information in Data-Plane Datagrams. 1-9
6554Jonathan W. Hui, Jean-Philippe Vasseur, David E. Culler, Vishwas Manral:
An IPv6 Routing Header for Source Routes with the Routing Protocol for Low-Power and Lossy Networks (RPL). 1-13
6555Dan Wing, Andrew Yourtchenko:
Happy Eyeballs: Success with Dual-Stack Hosts. 1-15
6556Fred Baker:
Testing Eyeball Happiness. 1-10
6557Eliot Lear, Paul Eggert:
Procedures for Maintaining the Time Zone Database. 1-9
6558Alexey Melnikov, Barry Leiba, Kepeng Li:
Sieve Extension for Converting Messages before Delivery. 1-8
6559Dino Farinacci, IJsbrand Wijnands, Stig Venaas, Maria Napierala:
A Reliable Transport Mechanism for PIM. 1-29
6560Gareth Richards:
One-Time Password (OTP) Pre-Authentication. 1-43
6561Jason Livingood, Nirmal Mody, Mike O'Reirdan:
Recommendations for the Remediation of Bots in ISP Networks. 1-29
6562Colin Perkins, Jean-Marc Valin:
Guidelines for the Use of Variable Bit Rate Audio with Secure RTP. 1-6
6563Sheng Jiang, David Conrad, Brian E. Carpenter
:
Moving A6 to Historic Status. 1-8
6564Suresh Krishnan, James Woodyatt, Erik Kline, James A. Hoagland, Manav Bhatia:
A Uniform Format for IPv6 Extension Headers. 1-6
6565Padma Pillay-Esnault, Peter Moyer, Jeff Doyle, Emre Ertekin, Michael Lundberg:
OSPFv3 as a Provider Edge to Customer Edge (PE-CE) Routing Protocol. 1-20
6566Young Lee, Greg M. Bernstein, Dan Li, Giovanni Martinelli:
A Framework for the Control of Wavelength Switched Optical Networks (WSONs) with Impairments. 1-31
6567Alan B. Johnston, Laura Liess:
Problem Statement and Requirements for Transporting User-to-User Call Control Information in SIP. 1-11
6568Eunsook Kim, Dominik Kaspar, Jean-Philippe Vasseur:
Design and Application Spaces for IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs). 1-28
6569Jean-Marc Valin, Slava Borilin, Koen Vos, Christopher Montgomery, Raymond (Juin-Hwey) Chen:
Guidelines for Development of an Audio Codec within the IETF. 1-14
6570Joe Gregorio, Roy T. Fielding, Marc Hadley, Mark Nottingham, David Orchard:
URI Template. 1-34
6571Clarence Filsfils, Pierre François, Mike Shand, Bruno Decraene, James Uttaro, Nicolai Leymann, Martin Horneffer:
Loop-Free Alternate (LFA) Applicability in Service Provider (SP) Networks. 1-35
6572Frank Xia, Behçet Sarikaya, Jouni Korhonen, Sri Gundavelli, Damjan Damic:
RADIUS Support for Proxy Mobile IPv6. 1-36
6573Mike Amundsen:
The Item and Collection Link Relations. 1-5
6574Hannes Tschofenig, Jari Arkko:
Report from the Smart Object Workshop. 1-32
6575Himanshu Shah, Eric C. Rosen, Giles Heron, Vach Kompella:
Address Resolution Protocol (ARP) Mediation for IP Interworking of Layer 2 VPNs. 1-28
6576Rüdiger Geib, Al Morton, Reza Fardid, Alexander Steinmitz:
IP Performance Metrics (IPPM) Standard Advancement Testing. 1-37
6577Murray S. Kucherawy:
Authentication-Results Registration Update for Sender Policy Framework (SPF) Results. 1-5
6578Cyrus Daboo, Arnaud Quillaud:
Collection Synchronization for Web Distributed Authoring and Versioning (WebDAV). 1-29
6579Mykyta Yevstifeyev:
The 'disclosure' Link Relation Type. 1-5
6580Michael Ko, David L. Black:
IANA Registries for the Remote Direct Data Placement (RDDP) Protocols. 1-10
6581Arkady Kanevsky, Caitlin Bestler, Robert Sharp, Steve Wise:
Enhanced Remote Direct Memory Access (RDMA) Connection Establishment. 1-25
6582Thomas R. Henderson, Sally Floyd, Andrei V. Gurtov, Yoshifumi Nishida:
The NewReno Modification to TCP's Fast Recovery Algorithm. 1-16
6583Igor Gashinsky, Joel P. Jaeggli, Warren Kumari:
Operational Neighbor Discovery Problems. 1-12
6584Vincent Roca:
Simple Authentication Schemes for the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols. 1-30
6585Mark Nottingham, Roy T. Fielding:
Additional HTTP Status Codes. 1-10
6586Jari Arkko, Ari Keränen:
Experiences from an IPv6-Only Network. 1-21
6587Rainer Gerhards, Chris Lonvick:
Transmission of Syslog Messages over TCP. 1-11
6588Chiaki Ishikawa:
A URN Namespace for ucode. 1-8
6589Jason Livingood:
Considerations for Transitioning Content to IPv6. 1-27
6590J. D. Falk, Murray S. Kucherawy:
Redaction of Potentially Sensitive Data from Mail Abuse Reports. 1-8
6591Hilda L. Fontana:
Authentication Failure Reporting Using the Abuse Reporting Format. 1-16
6592Carlos Pignataro:
The Null Packet. 1-6
6593Carlos Pignataro, Joe Clarke, Gonzalo Salgueiro:
Service Undiscovery Using Hide-and-Go-Seek for the Domain Pseudonym System (DPS). 1-8
6594Ondrej Sury:
Use of the SHA-256 Algorithm with RSA, Digital Signature Algorithm (DSA), and Elliptic Curve DSA (ECDSA) in SSHFP Resource Records. 1-9
6595Klaas Wierenga, Eliot Lear, Simon Josefsson:
A Simple Authentication and Security Layer (SASL) and GSS-API Mechanism for the Security Assertion Markup Language (SAML). 1-22
6596Maile Ohye, Joachim Kupke:
The Canonical Link Relation. 1-8
6597Jeff Downs, J. Arbeiter:
RTP Payload Format for Society of Motion Picture and Television Engineers (SMPTE) ST 336 Encoded Data. 1-13
6598Jason Weil, Victor Kuarsingh, Chris Donley, Christopher Liljenstolpe, Marla Azinger:
IANA-Reserved IPv4 Prefix for Shared Address Space. 1-11

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














