ifier.
RFCs may be obtained in a number of ways, using HTTP, FTP, or email.
See the RFC Editor Web page ... N) (DOI: 10.17487/RFC0109)
0110 Conventions for Using an IBM 2741 Terminal as a User Console for
A... OWN) (DOI: 10.17487/RFC0253)
0254 Scenarios for using ARPANET computers. A. Bhushan. October 1971.
... tus: UNKNOWN)
(DOI: 10.17487/RFC0306)
0307 Using network Remote Job Entry. E. Harslem. February 19
FC0110 | | Winett, J., "Conventions for Using an IBM 2741 Terminal as a User Console for Access... RFC0254 | | Bhushan, A., "Scenarios for using ARPANET computers", RFC 254, DOI 10.17487/RFC0254... info/rfc306>.
RFC0307 | | Harslem, E., "Using network Remote Job Entry", RFC 307, DOI 10.17487/... /info/rfc376>.
RFC0377 | | Braden, R., "Using TSO via ARPA Network Virtual Terminal", RFC 377,
ee Hashes
7.9. Parent Hashes
7.9.1. Using Parent Hashes
7.9.2. Verifying Parent Has... d with
their own sender key. On the one hand, using sender keys improves
efficiency relative to pa... s vary over significant
ranges. So instead of using a fixed-size length field, we use a
variable-size length using a variable-length integer encoding based
on th
htweight communication security extension to CoAP using
CBOR and COSE. In order to establish good qua... T/CCS [RFC8392] identified by a key identifier
using 'kid' [RFC9052] or in X.509 certificates identified by a hash
value using 'x5t' [RFC9360]. EDHOC always uses ephemeral-eph... and random material used in
EDHOC are derived using EDHOC_KDF with as much previous information
as
Handling Resolution Failures
3.2. Clients Using a Proxy
4. DNS Server Behavior
4.1. Aut... on and Connection Reuse
5.2. Generating and Using Incomplete Responses
6. SVCB-Compatible RR Ty... ceMode RR Compatibility and Mandatory Keys
9. Using Service Bindings with HTTP
9.1. Query Names... -specific parsing
The SvcParamValue is parsed using the character-string decoding
algorithm (Appen
Path steering is the ability to forward packets using more
information than just knowledge of the ne... ludes when control is
provided by a controller using a network-facing control protocol.
Resource m... be derived from the
resource-level performance using appropriate rules of composition,
depending up... :
* manually
* automatically and online using constraint-based routing processes
implemen
ange data. It is believed
that the feature of using more than one post-quantum algorithm is
import... this
mechanism, the key exchange is initiated using a smaller, possibly
classical primitive, such ... load. The additional key exchanges are performed using
IKE_INTERMEDIATE messages that follow the IKE_... orms the IKE_SA_INIT for a single key
exchange using a Transform Type 4 (possibly with a post-quantum
CONNECT
2.2.4.2. Authentication Using the AUTH Property
2.2.5. Broker Token Val... d subscribe to topics
hosted on an MQTT Broker using an access token that is bound to a
Proof-of-Po... ribers. This functionality
may be implemented using the proposal outlined in the ACE Pub-Sub
Profi... ribed for HTTPS-based communication [RFC9110],
using the "application/ace+json" content type and, unle
efore be displayed
in CBOR diagnostic notation using, e.g., the CBOR playground
[CborMe], which mak... 41 18
The transcript hash TH_2 is calculated using the EDHOC hash
algorithm:
TH_2 = H( G_Y, H... b4 d8 39 cf 7b 28
Then, PRK_2e is calculated using EDHOC_Extract(), which is determined
by the ED...
Since METHOD = 0, the Responder authenticates using signatures.
Since the selected cipher suite is
vent unauthorized or illegitimate
parties from using leaked or stolen access tokens, by binding a toke... possession of the corresponding private key when using the token.
This constrains the legitimate send... cess.
Audience-restricted access tokens (e.g., using the JWT [RFC7519] aud
claim) can prevent such ... ed
by the client and sent with an HTTP request using the DPoP header
field. Each HTTP request requ
ncapsulating binary HTTP messages [BINARY]
using Hybrid Public Key Encryption (HPKE) [HPKE] to pro... through a trusted Oblivious Relay
Resource using HTTP, and
3. requirements for how the Oblivi... heme represents a performance
improvement over using just one request in each connection. With
lim... message and
then encapsulates that message using HPKE and the process from
Section 4.3.
5.3.2. expand_message_xof
5.3.3. Using DSTs Longer than 255 Bytes
5.3.4. Definin... t is
suitable for a given protocol implemented using a given elliptic
curve is often unclear from t... lications of elliptic curves
generally require using a (sub)group of prime order. Let G be such a
... GF(9767^19) that meets these requirements while using fewer output
bits from expand_message than has
el, e.g., HTTP; protocol
blocking often occurs using deep packet inspection (DPI) to identify
a forbidden protocol; IP blocking tends to take place using IP
addresses in IPv4/IPv6 headers. Some censo... ,
to content that is sent, received, or stored using centralized
content applications and services ... either directly identifies undesirable content using the identifiers
described below and then uses
pularity of wireless-based
LANs, such as those using 802.11. Since the data is simply broadcast
on... to the server and pose
as the client and login using the captured password.
Rescorla & Korver ... e attacker recovers data which has been processed using
the victim's secret key and then mounts a cryp... hen NIS is
used. The Unix password is crypted using a one-way function, but
tools exist to break s
or advertises SRv6 SIDs
associated with a node using Direct as the Protocol-ID, it derives
the SRv6... a node is advertised via the BGP-
LS Node NLRI using the BGP-LS Attribute TLVs as follows:
* The ... duced for SRv6 are advertised
(Section 3.2) using the Node MSD TLV specified in [RFC8814].
* A... a link is advertised via the BGP-
LS Link NLRI using the BGP-LS Attribute TLVs as follows:
* The