<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.hartke-core-e2e-security-reqs" target="https://datatracker.ietf.org/doc/html/draft-hartke-core-e2e-security-reqs-03">
   <front>
      <title>Requirements for CoAP End-To-End Security</title>
      <author initials="G." surname="Selander" fullname="Göran Selander">
         <organization>Ericsson AB</organization>
      </author>
      <author initials="F." surname="Palombini" fullname="Francesca Palombini">
         <organization>Ericsson AB</organization>
      </author>
      <author initials="K." surname="Hartke" fullname="Klaus Hartke">
         <organization>Universitaet Bremen TZI</organization>
      </author>
      <date month="July" day="29" year="2017" />
      <abstract>
	 <t>   This document analyses threats to CoAP message exchanges traversing
   proxies and derives security requirements for mitigating those
   threats.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-hartke-core-e2e-security-reqs-03" />
   
</reference>
