×
Past year
  • Any time
  • Past hour
  • Past 24 hours
  • Past week
  • Past month
  • Past year
All results
13 Jun 2023 · A client can create a bidirectional stream and transfer its ownership to WebTransport by providing a special signal in the first bytes. · A server can create a ...
21 Apr 2024 · Using CSP allows authorization servers to specify multiple origins in a single response header field and to constrain these using flexible patterns (see ...
24 Jun 2023 · Figure 2: Example: JWT using a Subject Identifier with the "sub_id" claim ... using a URI as defined in [RFC3986]. This ... in the application stack (e.g., using ...
28 Feb 2024 · OAuth 2.0 for Browser-Based Apps. Abstract. This specification details the threats, attack consequences, security considerations and best practices that ...
22 Feb 2024 · The "IETF XML" Registry. This document registers three URIs in the "ns" subregistry of the IETF XML Registry [RFC3688]. Following the format in [ ...
17 Nov 2023 · 1. Introduction. 1.1. Document Roadmap. 1.2. Goals. 1.3. Terminology. 1.4. Recap of Existing ECN feedback in IP/TCP · 2. AccECN Protocol Overview and Rationale.
4 Mar 2024 · A YANG Data Model for the Alternate Marking Method (Internet-Draft, 2024)
23 Feb 2024 · This document registers a URI in the "IETF XML Registry" [RFC3688]. ... For the same destination multiple DetNet flows use ... Ingress 1 192.0.2.2 Transit 1 Transit ...
28 Feb 2024 · A YANG Data Model for Microwave Topology. Abstract. This document defines a YANG data model to describe microwave/millimeter radio links in a network ...
22 Jan 2024 · 1. Introduction. 1.1. Motivation. Many Internet of Things (IoT) deployments require technologies which are highly performant in constrained environments [ ...
In order to show you the most relevant results, we have omitted some entries very similar to the 10 already displayed. If you like, you can repeat the search with the omitted results included.