<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.brockners-proof-of-transit" target="https://datatracker.ietf.org/doc/html/draft-brockners-proof-of-transit-03">
   <front>
      <title>Proof of Transit</title>
      <author initials="F." surname="Brockners" fullname="Frank Brockners">
         <organization>Cisco</organization>
      </author>
      <author initials="S." surname="Bhandari" fullname="Shwetha Bhandari">
         <organization>Cisco</organization>
      </author>
      <author initials="S." surname="Dara" fullname="Sashank Dara">
         <organization>Cisco</organization>
      </author>
      <author initials="C." surname="Pignataro" fullname="Carlos Pignataro">
         <organization>Cisco</organization>
      </author>
      <author initials="J." surname="Leddy" fullname="John Leddy">
         <organization>Comcast</organization>
      </author>
      <author initials="S." surname="Youell" fullname="Stephen Youell">
         <organization>JMPC</organization>
      </author>
      <author initials="D." surname="Mozes" fullname="David Mozes">
         <organization>Mellanox Technologies Ltd.</organization>
      </author>
      <author initials="T." surname="Mizrahi" fullname="Tal Mizrahi">
         <organization>Marvell</organization>
      </author>
      <date month="March" day="13" year="2017" />
      <abstract>
	 <t>   Several technologies such as Traffic Engineering (TE), Service
   Function Chaining (SFC), and policy based routing are used to steer
   traffic through a specific, user-defined path.  This document defines
   mechanisms to securely prove that traffic transited said defined
   path.  These mechanisms allow to securely verify whether, within a
   given path, all packets traversed all the nodes that they are
   supposed to visit.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-brockners-proof-of-transit-03" />
   
</reference>
