default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 99 matches
- 2007
- Paul Hethmon:
Extensions to FTP. RFC 3659: 1-61 (2007) - 2004
- Michael Mealling:
A Uniform Resource Name (URN) Namespace for the Liberty Alliance Project. RFC 3622: 1-7 (2004) - Shiho Moriai, Akihiro Kato:
Use of the Camellia Encryption Algorithm in Cryptographic Message Syntax (CMS). RFC 3657: 1-14 (2004) - Paul E. Hoffman:
The AES-XCBC-PRF-128 Algorithm for the Internet Key Exchange Protocol (IKE). RFC 3664: 1-4 (2004) - Scott O. Bradner:
IETF Rights in Contributions. RFC 3667: 1-18 (2004) - Scott O. Bradner:
Intellectual Property Rights in IETF Technology. RFC 3668: 1-17 (2004) - Scott W. Brim:
Guidelines for Working Groups on Intellectual Property Issues. RFC 3669: 1-17 (2004) - Bob Moore, David Durham, John Strassner, Andrea Westerinen, Walter Weiss:
Information Model for Describing Network Device QoS Datapath Mechanisms. RFC 3670: 1-97 (2004) - Donald E. Eastlake III:
.sex Considered Dangerous. RFC 3675: 1-22 (2004) - Randall Gellens:
The Text/Plain Format and DelSp Parameters. RFC 3676: 1-20 (2004) - David Thaler, Bill Fenner, Bob Quinn:
Socket Interface Extensions for Multicast Source Filters. RFC 3678: 1-18 (2004) - Ralph E. Droms:
Unused Dynamic Host Configuration Protocol (DHCP) Option Codes. RFC 3679: 1-8 (2004) - Jonathan D. Rosenberg:
A Session Initiation Protocol (SIP) Event Package for Registrations. RFC 3680: 1-26 (2004) - Randy Bush, Robert L. Fink:
Delegation of E.F.F.3.IP6.ARPA. RFC 3681: 1-4 (2004) - Vijay Gill, John Heasley, David Meyer:
The Generalized TTL Security Mechanism (GTSM). RFC 3682: 1-11 (2004) - Marshall T. Rose:
A Practice for Revoking Posting Rights to IETF Mailing Lists. RFC 3683: 1-13 (2004) - Richard G. Ogier, Fred L. Templin, Mark G. Lewis:
Topology Dissemination Based on Reverse-Path Forwarding (TBRPF). RFC 3684: 1-46 (2004) - Cyrus Daboo:
SIEVE Email Filtering: Spamtest and VirusTest Extensions. RFC 3685: 1-9 (2004) - Russell Housley:
Using Advanced Encryption Standard (AES) Counter Mode With IPsec Encapsulating Security Payload (ESP). RFC 3686: 1-19 (2004) - Steven Legg:
Lightweight Directory Access Protocol (LDAP) and X.500 Component Matching Rules. RFC 3687: 1-42 (2004) - Michael Mealling:
The IETF XML Registry. RFC 3688: 1-8 (2004) - Ken Carlberg, Randall J. Atkinson:
General Requirements for Emergency Telecommunication Service (ETS). RFC 3689: 1-10 (2004) - Ken Carlberg, Randall J. Atkinson:
IP Telephony Requirements for Emergency Telecommunication Service (ETS). RFC 3690: 1-7 (2004) - Alexey Melnikov:
Internet Message Access Protocol (IMAP) UNSELECT command. RFC 3691: 1-5 (2004) - Thomas Narten:
Assigning Experimental and Testing Numbers Considered Useful. RFC 3692: 1-7 (2004) - Jorge Cuéllar, John B. Morris, Deirdre K. Mulligan, Jon Peterson, James M. Polk:
Geopriv Requirements. RFC 3693: 1-30 (2004) - Michelle Engelhardt Danley, Deirdre K. Mulligan, John B. Morris, Jon Peterson:
Threat Analysis of the Geopriv Protocol. RFC 3694: 1-18 (2004) - Michael Luby, Lorenzo Vicisano:
Compact Forward Error Correction (FEC) Schemes. RFC 3695: 1-13 (2004) - John C. Klensin:
Application Techniques for Checking and Transformation of Names. RFC 3696: 1-16 (2004) - Jarno Rajahalme, Alex Conta, Brian E. Carpenter, Steve Deering:
IPv6 Flow Label Specification. RFC 3697: 1-9 (2004)
skipping 69 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-10 16:52 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint