default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 98 matches
- 2012
- Henning Schulzrinne, Laura Liess, Hannes Tschofenig, Barbara Stark, Andres Kuett:
Location Hiding: Problem Statement and Requirements. RFC 6444: 1-9 (2012) - Aki Niemi, Krisztian Kiss, Salvatore Loreto:
Session Initiation Protocol (SIP) Event Notification Extension for Notification Rate Control. RFC 6446: 1-25 (2012) - Rohan Mahy, Brian Rosen, Hannes Tschofenig:
Filtering Location Notifications in the Session Initiation Protocol (SIP). RFC 6447: 1-19 (2012) - Jouni Korhonen, Jonne Soininen, Basavaraj Patil, Teemu Savolainen, Gabor Bajko, Kaisu Iisakkila:
IPv6 in 3rd Generation Partnership Project (3GPP) Evolved Packet System (EPS). RFC 6459: 1-36 (2012) - Margaret Salter, Russ Housley:
Suite B Profile for Transport Layer Security (TLS). RFC 6460: 1-14 (2012) - Sumanth Channabasappa:
Data for Reachability of Inter-/Intra-NetworK SIP (DRINKS) Use Cases and Protocol Requirements. RFC 6461: 1-15 (2012) - Alissa Cooper:
Report from the Internet Privacy Workshop. RFC 6462: 1-23 (2012) - Jouni Korhonen, Sri Gundavelli, Hidetoshi Yokota, Xiangsong Cui:
Runtime Local Mobility Anchor (LMA) Assignment Support for Proxy Mobile IPv6. RFC 6463: 1-22 (2012) - Alexey Melnikov, Barry Leiba, Kepeng Li:
Sieve Notification Mechanism: SIP MESSAGE. RFC 6468: 1-10 (2012) - Andy Bierman:
Network Configuration Protocol (NETCONF) Base Notifications. RFC 6470: 1-15 (2012) - Chris Lewis, Matt Sergeant:
Overview of Best Email DNS-Based List (DNSBL) Operational Practices. RFC 6471: 1-21 (2012) - Glenn Mansfield Keeni, Kazuhide Koide, Sri Gundavelli, Ryuji Wakikawa:
Proxy Mobile IPv6 Management Information Base. RFC 6475: 1-63 (2012) - Peter Gutmann:
Using Message Authentication Code (MAC) Encryption in the Cryptographic Message Syntax (CMS). RFC 6476: 1-15 (2012) - Alexey Melnikov, Graeme Lunt:
Registration of Military Message Handling System (MMHS) Header Fields for Use in Internet Mail. RFC 6477: 1-21 (2012) - Luca Martini, George Swallow, Giles Heron, Matthew Bocci:
Pseudowire Status for Static Pseudowires. RFC 6478: 1-13 (2012) - Xiangyang Zhang, Tina Tsou:
IPsec Anti-Replay Algorithm without Bit Shifting. RFC 6479: 1-9 (2012) - Matt Lepinski, Stephen T. Kent:
An Infrastructure to Support Secure Internet Routing. RFC 6480: 1-24 (2012) - Geoff Huston, Robert Loomans, George G. Michaelson:
A Profile for Resource Certificate Repository Structure. RFC 6481: 1-15 (2012) - Matt Lepinski, Stephen T. Kent, Derrick Kong:
A Profile for Route Origin Authorizations (ROAs). RFC 6482: 1-9 (2012) - Geoff Huston, George Michaelson:
Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs). RFC 6483: 1-8 (2012) - Stephen T. Kent, Derrick Kong, Karen Seo, Ronald J. Watro:
Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI). RFC 6484: 1-35 (2012) - Geoff Huston:
The Profile for Algorithms and Key Sizes for Use in the Resource Public Key Infrastructure (RPKI). RFC 6485: 1-6 (2012) - Rob Austein, Geoff Huston, Stephen T. Kent, Matt Lepinski:
Manifests for the Resource Public Key Infrastructure (RPKI). RFC 6486: 1-19 (2012) - Geoff Huston, George Michaelson, Robert Loomans:
A Profile for X.509 PKIX Resource Certificates. RFC 6487: 1-32 (2012) - Matt Lepinski, Andrew Chi, Stephen T. Kent:
Signed Object Template for the Resource Public Key Infrastructure (RPKI). RFC 6488: 1-13 (2012) - Geoff Huston, George Michaelson, Stephen T. Kent:
Certification Authority (CA) Key Rollover in the Resource Public Key Infrastructure (RPKI). RFC 6489: 1-10 (2012) - Geoff Huston, Samuel Weiler, George Michaelson, Stephen T. Kent:
Resource Public Key Infrastructure (RPKI) Trust Anchor Locator. RFC 6490: 1-7 (2012) - Terry Manderson, Leo Vegoda, Steve Kent:
Resource Public Key Infrastructure (RPKI) Objects Issued by IANA. RFC 6491: 1-12 (2012) - Geoff Huston, Robert Loomans, Byron Ellacott, Rob Austein:
A Protocol for Provisioning Resource Certificates. RFC 6492: 1-32 (2012) - Randy Bush:
The Resource Public Key Infrastructure (RPKI) Ghostbusters Record. RFC 6493: 1-8 (2012)
skipping 68 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-19 12:25 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint