

{"id":298,"date":"2021-03-08T17:16:09","date_gmt":"2021-03-08T08:16:09","guid":{"rendered":"http:\/\/www.li-nlab.org\/?page_id=298"},"modified":"2021-03-08T23:40:35","modified_gmt":"2021-03-08T14:40:35","slug":"standardizations-2","status":"publish","type":"page","link":"http:\/\/www.li-nlab.org\/?page_id=298","title":{"rendered":"Standardizations"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">1.&nbsp;R. Li, and H. Asaeda, &#8220;Requirements for Key Management Schemes in Content-Centric Networking\/Named Data&nbsp;Networking,&#8221;&nbsp;Internet Draft, (work-in-progress) Mar. 2018. [ver. 00]<\/p>\n\n\n\n<p class=\"has-medium-font-size\">2.&nbsp;R. Li, and H. Asaeda, &#8220;HopAuth: Hop-by-Hop Authentication with Suspension Chain Model,&#8221; IETF ICNRG, Mar. 29, 2019.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">3.&nbsp;R. Li, and H. Asaeda, \u201cHop-by-Hop Authentication in Content-Centric Networking\/Named Data Networking,\u201d Internet Draft, July 2019. [ver. 00]&nbsp;(work-in-progress)&nbsp;https:\/\/tools.ietf.org\/html\/draft-li-icnrg-hopauth-00<\/p>\n\n\n\n<p class=\"has-medium-font-size\">4.&nbsp;R. Li, and H. Asaeda, \u201cHop-by-Hop Authentication in Content-Centric Networking\/Named Data Networking,\u201d Internet Draft, Nov. 2019. [ver. 01] https:\/\/tools.ietf.org\/html\/draft-li-icnrg-hopauth-01<\/p>\n\n\n\n<p class=\"has-medium-font-size\">5. C. Wang, A. Rahman, and&nbsp;R. Li, \u201cApplications and Use Cases for the Quantum Internet,\u201d Internet Draft, Feb. 2020. [ver. 02] https:\/\/tools.ietf.org\/html\/draft-wang-qirg-quantum-internet-use-cases-02&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">6.&nbsp;R. Li, and H. Asaeda, \u201cHop-by-Hop Authentication in Content-Centric Networking\/Named Data Networking,\u201d Internet Draft, Mar. 2020. [ver. 02] https:\/\/tools.ietf.org\/html\/draft-li-icnrg-hopauth-02<\/p>\n\n\n\n<p class=\"has-medium-font-size\">7. C. Wang, A. Rahman, and R. Li, \u201cApplications and Use Cases for the Quantum Internet,\u201d Internet Draft, Feb. 2020. [ver. 02, 03, 04, 05] https:\/\/tools.ietf.org\/html\/draft-wang-qirg-quantum-internet-use-cases-02 03, 04, 05&nbsp;<\/p>\n\n\n\n<p class=\"has-medium-font-size\">8. C. Wang, A. Rahman, R. Li, and M. Aelmans, \u201cApplications and Use Cases for the Quantum Internet,\u201d Quantum Internet Research Group Working Group Draft, Feb. 2020. [ver. 00] https:\/\/datatracker.ietf.org\/doc\/draft-irtf-qirg-quantum-internet-use-cases\/?include_text=1<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.&nbsp;R. Li, and H. Asaeda, &#8220;Requirements for Key Management Schemes in Content-Centric Networking\/Nam [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":191,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-298","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=298"}],"version-history":[{"count":2,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/298\/revisions"}],"predecessor-version":[{"id":402,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/298\/revisions\/402"}],"up":[{"embeddable":true,"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=\/wp\/v2\/pages\/191"}],"wp:attachment":[{"href":"http:\/\/www.li-nlab.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}