Transfer Protocol Extension for Message Transfer Priorities
نویسنده
چکیده
This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
منابع مشابه
Secure Mail Transfer Protocol (SecMTP)
Simple Mail Transfer Protocol (SMTP) is a common protocol for transferring email messages worldwide. SMTP is anonymous and provides only the basic functions required to transfer a message, namely specifying a sender, recipients, and message text. SMTP was designed without consideration for security. We propose a new protocol, Secure Mail Transfer Protocol (SecMTP), to provide user-to-user secur...
متن کاملAn Outline of Initial Design of the Structured Hypertext Transfer Protocol (STTP)
This paper presents an introduction to the initial design of the Structured Hypertext Transfer Protocol (STTP), a compatible extension to the HTTP. It includes a new message set for the control of resource transmission, and the Structured Hypertext Markup Language (STML) for describing the structural information of Web pages. Experimental tests show that STTP can be significantly faster than HT...
متن کاملBridging GeoMQTT and REST
Wireless geo sensor networks (WGSN) use different ways to publish their measured data in the Sensor Web to make time series of this data accessible by means of the World Wide Web (WWW). In earlier papers, we proposed the use of GeoMQTT, a spatiotemporal extension to the widely known and used “Internet-of-Things” (IoT) protocol Message Queue and Telemetry Transport (MQTT). In this paper, we prop...
متن کاملA Non-Repudiation Message Transfer Protocol for E-commerce
In the business world, exchange of signatures or receipts is a common practice in case of future dispute. Likewise, it is critical in E-commerce applications to have the security service that generates, distributes, validates, and maintains the evidence of an electronic transaction. Quite of number of non-repudiation protocols have been proposed in distributed systems and evaluated based on som...
متن کاملA new Protocol for 1-2 Oblivious Transfer
A new protocol for 1-2 (String) Oblivious Transfer is proposed. The protocol uses 5 rounds of message exchange.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012