ifier.
RFCs may be obtained in a number of ways, using HTTP, FTP, or email.
See the RFC Editor Web page ... N) (DOI: 10.17487/RFC0109)
0110 Conventions for Using an IBM 2741 Terminal as a User Console for
A... OWN) (DOI: 10.17487/RFC0253)
0254 Scenarios for using ARPANET computers. A. Bhushan. October 1971.
... tus: UNKNOWN)
(DOI: 10.17487/RFC0306)
0307 Using network Remote Job Entry. E. Harslem. February 19
FC0110 | | Winett, J., "Conventions for Using an IBM 2741 Terminal as a User Console for Access... RFC0254 | | Bhushan, A., "Scenarios for using ARPANET computers", RFC 254, DOI 10.17487/RFC0254... info/rfc306>.
RFC0307 | | Harslem, E., "Using network Remote Job Entry", RFC 307, DOI 10.17487/... /info/rfc376>.
RFC0377 | | Braden, R., "Using TSO via ARPA Network Virtual Terminal", RFC 377,
ee Hashes
7.9. Parent Hashes
7.9.1. Using Parent Hashes
7.9.2. Verifying Parent Has... d with
their own sender key. On the one hand, using sender keys improves
efficiency relative to pa... s vary over significant
ranges. So instead of using a fixed-size length field, we use a
variable-size length using a variable-length integer encoding based
on th
Path steering is the ability to forward packets using more
information than just knowledge of the ne... ludes when control is
provided by a controller using a network-facing control protocol.
Resource m... be derived from the
resource-level performance using appropriate rules of composition,
depending up... :
* manually
* automatically and online using constraint-based routing processes
implemen
pularity of wireless-based
LANs, such as those using 802.11. Since the data is simply broadcast
on... to the server and pose
as the client and login using the captured password.
Rescorla & Korver ... e attacker recovers data which has been processed using
the victim's secret key and then mounts a cryp... hen NIS is
used. The Unix password is crypted using a one-way function, but
tools exist to break s
el, e.g., HTTP; protocol
blocking often occurs using deep packet inspection (DPI) to identify
a forbidden protocol; IP blocking tends to take place using IP
addresses in IPv4/IPv6 headers. Some censo... ,
to content that is sent, received, or stored using centralized
content applications and services ... either directly identifies undesirable content using the identifiers
described below and then uses
or advertises SRv6 SIDs
associated with a node using Direct as the Protocol-ID, it derives
the SRv6... a node is advertised via the BGP-
LS Node NLRI using the BGP-LS Attribute TLVs as follows:
* The ... duced for SRv6 are advertised
(Section 3.2) using the Node MSD TLV specified in [RFC8814].
* A... a link is advertised via the BGP-
LS Link NLRI using the BGP-LS Attribute TLVs as follows:
* The
Validation Checks
3.1.9. DNR Information Using Other Provisioning Mechanisms
3.2. Handling... discovery of encrypted DNS resolvers
that are using protocols such as DNS over HTTPS (DoH) [RFC8484],... ent can discover local encrypted
DNS resolvers using DHCP (Sections 4 and 5) and Neighbor Discovery
... ollowing the same rules
for encoding SvcParams using the wire format specified in Section 2.2
of [R
y support indication
of which applications are using the advertised value for a given
link. This d... 1. Support for indicating which applications are using the link
attribute advertisements on a lin... s in the Application
Identifier Bit Mask or by using a zero-length Application Identifier
Bit Mask.... herefore, such applications have been
deployed using the RSVP-TE LSA advertisements. The standard
[RFC1034] defines the "domain name
space" using mathematical trees and their nodes in graph theor... resolvable in the global DNS" or "but
only using the presentation format".
Label: An ordered ... that makes up a
portion of a domain name. Using graph theory, a label identifies
one node i... ph of all possible domain names.
Global DNS: Using the short set of facets listed in "Naming system"
viders to support Secure Telephone Identity (STI) using
the TNAuthList defined by STI certificates.
S... Validating the TNAuthList Authority Token
7. Using ACME-Issued Certificates with JSON Web Signature
... ity (CA).
This document is a profile document using the Authority Token
mechanism defined in [RFC9... (PASSporTs) [RFC8225], which can be carried
in using protocols such as SIP [RFC8224]. Currently, the
obal usage, a unique IPv6 address must be derived using an
assigned prefix and a unique interface I... g
protocol for low-power and lossy networks using directed acyclic
graphs. 6LoWPAN is routing... avoids
multicast lookups from all nodes by using non-onlink prefixes.
Router Advertisements ... vices [RFC8376].
The main application domains using Wi-SUN are smart utility and smart
city networ
ion 5. For instance, A may be the
client when using TCP or TLS as an underlying protocol, and B may b...
bias introduced by the modulation. Protocols using this
specification MUST define the method used... uted as a MAC over the
protocol transcript TT, using KcA as follows: cA = MAC(KcA, TT).
Similarly, B MUST send A a confirmation message using a MAC that is
computed equivalently, except wi
==== Internal ====
Internal links are created by using square brackets. You can either just give a [[pag... ame|link text]].
Internal links are created by using square brackets. You can either just give
a [[p... not allowed.
You can use [[some:namespaces]] by using a colon in the pagename.
You can use [[some:namespaces]] by using a colon in the pagename.
For details about names
gnature) pair,
where the signature is computed using a deterministic blind signature
protocol.
... a protocol for computing RSA blind
signatures using RSA-PSS encoding and (2) a family of variants
... tes.
random(n):
Generate n random bytes using a cryptographically secure random
number ge... nature sig over the
prepared message input_msg using the server public key pk by invoking
the RSASS