opment activities. These results might not be suitable for
deployment. This RFC represents the conse... d restrictions with respect
to this document.
Table of Contents
1. Introduction
2. Terminolo... or
privacy issues resulting from:
* predictable IPv4 or IPv6 Identification values (e.g., see
... po1998a], [RFC6274], and [RFC7739]),
* predictable IPv6 IIDs (e.g., see [RFC7217], [RFC7707], and
anty as described
in the Revised BSD License.
Table of Contents
1. Introduction
1.1. Termi... odelist (a list of nodes).
Nodes are the selectable parts of the query argument. The only parts
o... ents, JSONPath expressions became decreasingly portable. For
example, regular expression processing w... opardize the
objective of obtaining a usable, stable JSON query language.
The term _JSONPath_ was
.
RFC0004 | | Shapiro, E., "Network timetable", RFC 4, DOI 10.17487/RFC0004, March 1969, <https... | Williams, T., "Suggestions for a Network Data-Tablet Graphics Protocol", RFC 199, DOI 10.17487/RFC019... 07>.
RFC0208 | | McKenzie, A., "Address tables", RFC 208, DOI 10.17487/RFC0208, August 1971, <h... | Ferguson, B., "Request for monitor host table updates", RFC 620, DOI 10.17487/RFC0620, March 19
write a good Security
Considerations section.
Table of Contents
1. Introduction . . . . . . . . .... t on a legitimate connection. This
is an acceptable situation in contexts such as Web e-commerce wher... s some way to authenticate users. A nearly uncountable
number of such mechanisms have been designed f... intext)
username/password systems are not acceptable in IETF standards.
4.1.2. Challenge Response and
ent activities. These results might not be
suitable for deployment. This RFC represents the consensu... d restrictions with respect
to this document.
Table of Contents
1. Introduction
1.1. CCNin... a hop-by-hop manner along
the Pending Interest Table (PIT) entries. In Figure 2, each router
(Rout... e
PT_CCNINFO_REQUEST and PT_CCNINFO_REPLY (see Table 1). CCNinfo
Request and Reply messages are fo
anty as described
in the Revised BSD License.
Table of Contents
1. Introduction
1.1. Certi... rocessing; however, this information is not
suitable for a corresponding human trust and recognition p... be queried if more than one
certificate is suitable. The human user must select one of them.
Thi... ituation is comparable to a person selecting a suitable plastic
card from their wallet. In this situa
anty as described
in the Revised BSD License.
Table of Contents
1. Introduction
2. Terminolo... -------+-------+------------+
Table 1: Summary of Integer Encodings
Vectors that ... rivation of a variety of
other secrets (see Table 4). For example:
- An _encryption secret... -------------+
Table 2
4.2. Views of a Ratchet Tree
We generally
anty as described
in the Revised BSD License.
Table of Contents
1. Introduction
2. Terminolo... or
privacy issues resulting from:
* predictable IPv4 or IPv6 Identification values (e.g., see
... po1998a], [RFC6274], and [RFC7739]),
* predictable IPv6 IIDs (e.g., see [RFC7217], [RFC7707], and
[RFC7721]),
* predictable transport-protocol ephemeral port numbers (e.g.,
anty as described
in the Revised BSD License.
Table of Contents
1. Introduction
1.1. What ... cess can also be time-consuming and may not be suitable to
act on short-lived changes in the network.
... e achieved in many different ways. The
most notable techniques include analytic methods, simulation, ... traffic aggregate in order to deliver
"acceptable service quality" to the flow or traffic aggregate
anty as described
in the Revised BSD License.
Table of Contents
1. Introduction
2. Terminolo... try]. A summary of the pools is
provided in a table (where 'x' refers to a bit position with value
... 36].
The DSCP space is shown in the following table. Each row corresponds
to one setting of the f... ====+====+=========+====+=========+====+
Table 1: Currently Assigned DSCPs and Their Assigned PH
opment activities. These results might not be suitable for
deployment. This RFC represents the conse... d restrictions with respect
to this document.
Table of Contents
1. Introduction
2. Quantum I... target if the control qubit is set. The
truth table looks like
+====+... +----+-----+
Table 1: CNOT Truth Table
Now, consider performing
anty as described
in the Revised BSD License.
Table of Contents
1. Introduction
2. Terminolo... Section 4.7 of [RFC7252] (mainly PROBING_RATE). Table 1
lists the additional CoAP parameters that ar... Section 7.2 of [RFC9177]). Note that NON in this table refers to
Non-confirmable.
+=... --------+-------------------+
Table 1: Congestion Control Parameters
PROBING_RATE
anty as described
in the Revised BSD License.
Table of Contents
1. Introduction
1.1. Termi... to offer an easier way to maintain the list of suitable
algorithms over time.
1.1. Terminology
T... ases.
Recommendations like those described in Table 2 of NIST SP 800-57
"Recommendation for Key Ma... KM_KW_ALG, PROT_SYM_ALG).
The following table shows the algorithms listed in this document
s