- Introduction
- 1. The IETF
- 1.1. New Working Groups
- 1.2. Birds of a Feather (BOFs)
- 1.2.1. Authenticated Transfer(atp)
- 1.2.2. Web Bot Auth(webbotauth)
- 1.2.3. PKI, Logs, And Tree SignaturesBoF(plants)
- 1.3. General Area
- 1.3.1. Moderation Procedures(modpod)
- 1.4. Applications and Real-Time Area
- 1.4.1. More Instant Messaging Interoperability (mimi)
- 1.4.2. Registration Protocols Extensions (regext)
- 1.4.3. RESTful Provisioning Protocol(rpp)
- 1.4.4. Secure Telephony Identity Revisited (stir)
- 1.4.5. Virtualized Conversations(vcon)
- 1.4.6. Workload Identity in Multi System Environments (wimse)
- 1.5. Internet Area
- 1.5.1. Adaptive DNS Discovery (add)
- 1.5.2. DNS Delegation(deleg)
- 1.5.3. Taking IP To Other Planets(tiptop)
- 1.6. Operations and Management Area
- 1.6.1. Getting Ready for Energy Efficient Networking (green)
- 1.6.2. Network Inventory YANG(ivy)
- 1.6.3. SRv6 Operations
- 1.7. Security Area
- 1.7.1. Detecting Unwanted Location Trackers (dult)
- 1.7.2. Messaging Layer Security (mls)
- 1.7.3. Post-Quantum Use In Protocols (pquip)
- 1.7.4. Remote ATtestation ProcedureS (rats)
- 1.7.5. Secure Patterns for Internet CrEdentials (spice)
- 1.7.6. Security Dispatch (secdispatch)
- 1.7.7. Secure Evidence and Attestation Transport (seat)
- 1.7.8. Software Updates for Internet of Things (suit)
- 1.7.9. Supply Chain Integrity, Transparency, and Trust (scitt)
- 1.8. Web and Internet Transport
- 1.8.1. AI preferences
- 1.8.2. Multiplexed Application Substrate over QUIC Encryption (masque)
- 1.8.3. Standard Communication with Network Elements (scone)
- 2. The IRTF
- 2.1. Research Groups
- 2.1.1. Crypto Forum (cfrc)
- 2.1.2. Decentralization of the Internet Research Group (dinrg)
- 2.1.3. Global Access to the Internet for All (gaia)
- 2.1.4. Human Rights Protocol Considerations
- 2.1.5. Quantum Internet Research Group(qirg)
- 2.1.6. Sustainability and the Internet Proposed Research Group (sustain)
- 3. The IAB
- 3.1. IAB Open
- 4. During an IETF meeting
- Appendix About this document