{"id":"https://openalex.org/W2545990795","doi":"https://doi.org/10.17487/rfc9000","title":"QUIC: A UDP-Based Multiplexed and Secure Transport","display_name":"QUIC: A UDP-Based Multiplexed and Secure Transport","publication_year":2021,"publication_date":"2021-05-01","ids":{"openalex":"https://openalex.org/W2545990795","doi":"https://doi.org/10.17487/rfc9000","mag":"2545990795"},"language":"en","primary_location":{"id":"doi:10.17487/rfc9000","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc9000","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"type":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":747,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/multiplexing","display_name":"Multiplexing","score":0.48887866735458374},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45648571848869324},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.435200035572052},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16938376426696777}],"concepts":[{"id":"https://openalex.org/C19275194","wikidata":"https://www.wikidata.org/wiki/Q222903","display_name":"Multiplexing","level":2,"score":0.48887866735458374},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45648571848869324},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.435200035572052},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16938376426696777}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.17487/rfc9000","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc9000","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2072978486"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2350741829","https://openalex.org/W2530322880","https://openalex.org/W1596801655","https://openalex.org/W2359140296"],"abstract_inverted_index":{"QUIC":[0,13,36,58,68,91],"is":[1,37],"a":[2,26],"multiplexed":[3],"and":[4,19,45,98,108,112,120,122],"secure":[5],"transport":[6,17],"protocol":[7,83,102],"that":[8,21],"runs":[9],"on":[10,15],"top\nof":[11],"UDP.":[12],"builds":[14],"past":[16],"experience,":[18],"implements\nmechanisms":[20],"make":[22],"it":[23],"useful":[24],"as":[25,32,81],"modern":[27],"general-purpose":[28],"transport\nprotocol.":[29],"Using":[30],"UDP":[31],"the":[33,89,93,123],"basis":[34],"of":[35,49,61,100,125],"intended":[38],"to":[39,67,78],"address\ncompatibility":[40],"issues":[41],"with":[42],"legacy":[43],"clients":[44],"middleboxes.":[46],"QUIC\nauthenticates":[47],"all":[48],"its":[50,62],"headers,":[51,63],"preventing":[52],"third":[53],"parties":[54],"from":[55],"from\nchanging":[56],"them.":[57],"encrypts":[59],"most":[60],"thereby":[64],"limiting\nprotocol":[65],"evolution":[66],"endpoints":[69],"only.":[70],"Therefore,":[71],"middleboxes,":[72],"in\nlarge":[73],"part,":[74],"are":[75],"not":[76],"required":[77],"be":[79],"updated":[80],"new":[82],"versions\nare":[84],"deployed.":[85],"This":[86],"document":[87],"describes":[88],"core":[90],"protocol,\nincluding":[92],"conceptual":[94],"design,":[95],"wire":[96],"format,":[97],"mechanisms":[99],"the\nQUIC":[101],"for":[103,128],"connection":[104],"establishment,":[105],"stream":[106],"multiplexing,\nstream":[107],"connection-level":[109],"flow":[110],"control,":[111],"data":[113],"reliability.\nAccompanying":[114],"documents":[115],"describe":[116],"QUIC's":[117],"loss":[118],"recovery":[119],"congestion\ncontrol,":[121],"use":[124],"TLS":[126],"1.3":[127],"key":[129],"negotiation.":[130]},"counts_by_year":[{"year":2026,"cited_by_count":26},{"year":2025,"cited_by_count":128},{"year":2024,"cited_by_count":137},{"year":2023,"cited_by_count":142},{"year":2022,"cited_by_count":110},{"year":2021,"cited_by_count":80},{"year":2020,"cited_by_count":60},{"year":2019,"cited_by_count":36},{"year":2018,"cited_by_count":14},{"year":2017,"cited_by_count":12},{"year":2016,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
