Extensions to the Emergency Services Architecture for Dealing With Unauthenticated and Unauthorized Devices. Schulzrinne, H., McCann, S., Bajko, G., Tschofenig, H., & Kroeselberg, D. Technical Report 7406, IETF, December, 2014.
Paper bibtex @techreport{RFC7406,
title = {{Extensions to the Emergency Services Architecture for Dealing With Unauthenticated and Unauthorized Devices}},
author = {Schulzrinne, H. and McCann, S. and Bajko, G. and Tschofenig, H. and Kroeselberg, D.},
type = {RFC},
number = {7406},
institution = {IETF},
month = dec,
year = 2014,
url = {http://tools.ietf.org/rfc/rfc7406.txt},
}
Downloads: 0
{"_id":"EXB6uu3sWwMNxBWkD","bibbaseid":"schulzrinne-mccann-bajko-tschofenig-kroeselberg-extensionstotheemergencyservicesarchitecturefordealingwithunauthenticatedandunauthorizeddevices-2014","author_short":["Schulzrinne, H.","McCann, S.","Bajko, G.","Tschofenig, H.","Kroeselberg, D."],"bibdata":{"bibtype":"techreport","type":"RFC","title":"Extensions to the Emergency Services Architecture for Dealing With Unauthenticated and Unauthorized Devices","author":[{"propositions":[],"lastnames":["Schulzrinne"],"firstnames":["H."],"suffixes":[]},{"propositions":[],"lastnames":["McCann"],"firstnames":["S."],"suffixes":[]},{"propositions":[],"lastnames":["Bajko"],"firstnames":["G."],"suffixes":[]},{"propositions":[],"lastnames":["Tschofenig"],"firstnames":["H."],"suffixes":[]},{"propositions":[],"lastnames":["Kroeselberg"],"firstnames":["D."],"suffixes":[]}],"number":"7406","institution":"IETF","month":"December","year":"2014","url":"http://tools.ietf.org/rfc/rfc7406.txt","bibtex":"@techreport{RFC7406,\n title = {{Extensions to the Emergency Services Architecture for Dealing With Unauthenticated and Unauthorized Devices}},\n author = {Schulzrinne, H. and McCann, S. and Bajko, G. and Tschofenig, H. and Kroeselberg, D.},\n type = {RFC},\n number = {7406},\n institution = {IETF},\n month = dec,\n year = 2014,\n url = {http://tools.ietf.org/rfc/rfc7406.txt},\n}\n\n","author_short":["Schulzrinne, H.","McCann, S.","Bajko, G.","Tschofenig, H.","Kroeselberg, D."],"key":"RFC7406","id":"RFC7406","bibbaseid":"schulzrinne-mccann-bajko-tschofenig-kroeselberg-extensionstotheemergencyservicesarchitecturefordealingwithunauthenticatedandunauthorizeddevices-2014","role":"author","urls":{"Paper":"http://tools.ietf.org/rfc/rfc7406.txt"},"metadata":{"authorlinks":{}},"html":""},"bibtype":"techreport","biburl":"https://raw.github.com/hupili/rfc.bib/master/rfc.bib","dataSources":["QXhRq9CSEi44amsga"],"keywords":[],"search_terms":["extensions","emergency","services","architecture","dealing","unauthenticated","unauthorized","devices","schulzrinne","mccann","bajko","tschofenig","kroeselberg"],"title":"Extensions to the Emergency Services Architecture for Dealing With Unauthenticated and Unauthorized Devices","year":2014}