0230 Toward reliable operation of minicomputer-based terminals on a TIP.
T. Pyke. September 1971.... UNKNOWN) (DOI: 10.17487/RFC0312)
0313 Computer based instruction. T.C. O'Sullivan. March 1972. (Format... /RFC0706)
0707 High-level framework for network-based resource sharing. J.E. White.
December 1975.... 7487/RFC0755)
0756 NIC name server - a datagram-based information utility. J.R.
Pickens, E.J. Fein
e, T., "Toward reliable operation of minicomputer-based terminals on a TIP", RFC 230, DOI 10.17487/RFC023... .
RFC0313 | | O'Sullivan, T., "Computer based instruction", RFC 313, DOI 10.17487/RFC0313, Marc... | White, J., "High-level framework for network-based resource sharing", RFC 707, DOI 10.17487/RFC0707,... E., and J. Mathis, "NIC name server - a datagram-based information utility", RFC 756, DOI 10.17487/RFC07
ocumentation Protocol Number
4. Other OUI/CID-Based Parameters
4.1. LLDP IETF Organizationally ... Identifier Block Template
A.2. IANA OUI/CID-Based Protocol Number Template
A.3. Other IANA OUI/CID-Based Parameter Template
Appendix B. EtherTypes
... and other
organizationally unique code points based on that OUI. This document
specifies IANA con
e
5.2. Use Case of Bluetooth LE: Smartphone-Based Interaction
5.3. Use Case of DECT-ULE: Smar... A typical
usage of Bluetooth LE is smartphone-based interaction with
constrained devices. Bluetoo... ty and preserves
packet order, but delivery is based on best effort.
The current DECT-ULE MAC laye... mation networks.
An MS/TP device is typically based on a low-cost microcontroller with
limited pro
The ClientHello message is unencrypted for TCP-based TLS. When using
QUIC, the ClientHello message... results in the use of ESNI in the face of
SNI-based filtering [Chai-2019] in some countries.
Doma... ble
their provision in countries employing SNI-based filtering. These
services used the cover prov... ead the SNI. Improper
configuration of an SNI-based block can result in significant over-
blocking
10. Security Considerations
10.1. Policy-Based Information Provisioning for Request
10.2. ... ion Bases (FIBs), which are populated by name-
based routing protocols. CCN also enables receivers to... Trip Time (RTT) for the path. However, this IP-based network tool
cannot trace the name prefix paths used in CCN. Moreover, such IP-
based network tools do not obtain the states of the in-
Similarly, when considering host-tracking attacks based on IPv6
Interface Identifiers, we consider an ... nique to perform TCP data injection
attacks based on predictable IPv4 Identification values, which
... 13:
A patch to incorporate support for IPv6-based idle scans in nmap
is submitted [Morbitzer2... ation values.
February 2016:
[RFC7739] (based on [draft-ietf-6man-predictable-fragment-id-10])
. . . . . . . . 18
4.4.2. Certificate Based Systems. . . . . . . . . . . 18
4.5. Provi... same data
that the sender has sent. In paper-based systems, some data
integrity comes automatical... seful way of organizing attacks is to divide them based on
the capabilities required to mount the atta... ith the recent and growing popularity of wireless-based
LANs, such as those using 802.11. Since the d
24
Flush Mechanism for Customer MAC Addresses Based on Service Instance
Identifier (I-SID) in Pro... n Requirements
3. EVPN BGP Encoding for I-SID-Based C-MAC Flush
4. Solution Description
4.1. I-SID-Based C-MAC Flush Activation Procedures
4.2. C-MA... --+
Figure 1: PBB-EVPN and Non-ES-Based Redundancy
In the example in Figure 1, CE1, C
This is currently not the case for the Signature-based
Handling of Asserted information using toKENs ... the ACME client MUST identify the Token Authority based
on locally configured information or local pol... he requesting party is authorized to represent
based on their pre-established, verified, and secure re... er (OCN) or service provider identifier (SPID)). Based
on number allocations, that provider is also g
9061: A YANG Data Model for IPsec Flow Protection Based on
Software-Defined Networking (SDN), S... 9061: A YANG Data Model for IPsec Flow Protection Based on
Software-Defined Networking (SDN), S... packets that would be held longer than this time, based
on the current tunnel configuration... cia, "A YANG Data Model for IPsec Flow Protection Based
on Software-Defined Networking (SDN
ures
Abstract
This document specifies an RSA-based blind signature protocol. RSA
blind signature... alid inputs. However, this error cannot occur
based on how RSAVP1 is invoked, so this error is not in... attacks, even
for implementations that are not based on the Chinese remainder
theorem.
7.2. Messa... cument is not post-
quantum ready, since it is based on RSA. Shor's polynomial-time
factorization
ames up to 255 bytes plus a terminating zero byte based
on a different interpretation of RFC 103... that changes some of the answers that it returns based on policy
criteria, such as to prevent acce... urce IP address
of a query, but can also be based on the destination IP address,
the type of ... oric in nature.
Root zone: The zone of a DNS-based tree whose apex is the zero-
length label.
ed using the CBOR diagnostic notation. A
Ruby-based tool exists [CBORDIAG] that can convert between t... curve Digital Signature Algorithm
HKDF: HMAC-based Key Derivation Function
HMAC: Hashed Message... he initial draft version of the specification was based to some
degree on the outputs of the JOSE and
has the same problem.
[RFC5441] defines a PCE-based TE LSP computation method (called
"Backward-Re... , "A Path
Computation Element (PCE)-Based Architecture", RFC 4655,
DOI 10.174... Le Roux,
"A Backward-Recursive PCE-Based Computation (BRPC)
Procedure to Com