1. R. Li, and H. Asaeda, “Requirements for Key Management Schemes in Content-Centric Networking/Named Data Networking,” Internet Draft, (work-in-progress) Mar. 2018. [ver. 00]
2. R. Li, and H. Asaeda, “HopAuth: Hop-by-Hop Authentication with Suspension Chain Model,” IETF ICNRG, Mar. 29, 2019.
3. R. Li, and H. Asaeda, “Hop-by-Hop Authentication in Content-Centric Networking/Named Data Networking,” Internet Draft, July 2019. [ver. 00] (work-in-progress) https://tools.ietf.org/html/draft-li-icnrg-hopauth-00
4. R. Li, and H. Asaeda, “Hop-by-Hop Authentication in Content-Centric Networking/Named Data Networking,” Internet Draft, Nov. 2019. [ver. 01] https://tools.ietf.org/html/draft-li-icnrg-hopauth-01
5. C. Wang, A. Rahman, and R. Li, “Applications and Use Cases for the Quantum Internet,” Internet Draft, Feb. 2020. [ver. 02] https://tools.ietf.org/html/draft-wang-qirg-quantum-internet-use-cases-02
6. R. Li, and H. Asaeda, “Hop-by-Hop Authentication in Content-Centric Networking/Named Data Networking,” Internet Draft, Mar. 2020. [ver. 02] https://tools.ietf.org/html/draft-li-icnrg-hopauth-02
7. C. Wang, A. Rahman, and R. Li, “Applications and Use Cases for the Quantum Internet,” Internet Draft, Feb. 2020. [ver. 02, 03, 04, 05] https://tools.ietf.org/html/draft-wang-qirg-quantum-internet-use-cases-02 03, 04, 05
8. C. Wang, A. Rahman, R. Li, and M. Aelmans, “Applications and Use Cases for the Quantum Internet,” Quantum Internet Research Group Working Group Draft, Feb. 2020. [ver. 00] https://datatracker.ietf.org/doc/draft-irtf-qirg-quantum-internet-use-cases/?include_text=1