<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.hallambaker-mesh-security" target="https://datatracker.ietf.org/doc/html/draft-hallambaker-mesh-security-09">
   <front>
      <title>Mathematical Mesh 3.0 Part IX Security Considerations</title>
      <author initials="P." surname="Hallam-Baker" fullname="Phillip Hallam-Baker">
         <organization>ThresholdSecrets.com</organization>
      </author>
      <date month="April" day="20" year="2022" />
      <abstract>
	 <t>   The Mathematical Mesh &#x27;The Mesh&#x27; is an end-to-end secure
   infrastructure that facilitates the exchange of configuration and
   credential data between multiple user devices.  The core protocols of
   the Mesh are described with examples of common use cases and
   reference data.

   [Note to Readers]

   Discussion of this draft takes place on the MATHMESH mailing list
   (mathmesh@ietf.org), which is archived at
   https://mailarchive.ietf.org/arch/search/?email_list=mathmesh.

   This document is also available online at
   http://mathmesh.com/Documents/draft-hallambaker-mesh-security.html.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-hallambaker-mesh-security-09" />
   
</reference>
