| Paul Wouters | Authentication and Authorization for Constrained Environments | Tim Hollebeek,Loganaden Velvindron |
| Deb Cooley | Automated Certificate Management Environment | Yoav Nir,Mike Ounsworth |
| Paul Wouters | CBOR Object Signing and Encryption | Michael B. Jones,Ivaylo Petrov |
| Paul Wouters | DANE Authentication for Network Clients Everywhere | Wes Hardaker,Joey Salazar |
| Deb Cooley | Detecting Unwanted Location Trackers | Erica Olsen,Sean Turner |
| Paul Wouters | EAP Method Update | Joseph A. Salowey,Peter E. Yee |
| Deb Cooley | HPKE Publication, Kept Efficient | Yaroslav Rosomakho,Martin Thomson |
| Deb Cooley | IP Security Maintenance and Extensions | Tero Kivinen,Yoav Nir |
| Deb Cooley | Javascript Object Signing and Encryption | John Bradley,Karen O'Donoghue,Michael P |
| Deb Cooley | Key Transparency | Prachi Jain,Shivan Kaul Sahib |
| Paul Wouters | Common Authentication Technology Next Generation | Benjamin Kaduk,Alexey Melnikov |
| Paul Wouters | Lightweight Authenticated Key Exchange | Renzo Navas,Mališa Vučinić |
| Deb Cooley | Limited Additional Mechanisms for PKIX and SMIME | Tim Hollebeek,Russ Housley |
| Paul Wouters | Messaging Layer Security | Nick Sullivan,Sean Turner |
| Deb Cooley | Web Authorization Protocol | Rifaat Shekh-Yusef,Hannes Tschofenig |
| Mike Bishop | Oblivious HTTP Application Intermediation | Richard Barnes,Shivan Kaul Sahib (Assigned AD:Mike Bishop) |
| Paul Wouters | Open Specification for Pretty Good Privacy | Stephen Farrell,Daniel Kahn Gillmor |
| Deb Cooley | Privacy Preserving Measurement | Benjamin M. Schwartz,Sam Weiler |
| Paul Wouters | Post-Quantum Use In Protocols | Sofia Celi,Paul E. Hoffman |
| Paul Wouters | Privacy Pass | Joseph A. Salowey,Benjamin M. Schwartz |
| Paul Wouters | RADIUS EXTensions | Margaret Cullen,Valery Smyslov |
| Deb Cooley | Remote ATtestation ProcedureS | Kathleen Moriarty,Ned Smith |
| Deb Cooley | System for Cross-domain Identity Management | Nancy Cam-Winget,Aaron Parecki |
| Deb Cooley | Supply Chain Integrity, Transparency, and Trust | Jon Geater,Christopher Inacio |
| Paul Wouters | Secure Evidence and Attestation Transport | Nancy Cam-Winget,Yaroslav Rosomakho |
| Paul Wouters | Security Dispatch | Daniel Kahn Gillmor,Rifaat Shekh-Yusef |
| Paul Wouters | Secure Patterns for Internet CrEdentials | Heather Flanagan,Martin Thomson |
| Deb Cooley | Secure Shell Maintenance | Stephen Farrell,Job Snijders |
| Deb Cooley | Software Updates for Internet of Things | Jacqueline McCall,Akira Tsukamoto |
| Paul Wouters | Trusted Execution Environment Provisioning | Nancy Cam-Winget,Tirumaleswar Reddy.K |
| Paul Wouters | Transport Layer Security | Deirdre Connolly,Joseph A. Salowey,Sean Turner |
| Paul Wouters | Using TLS in Applications | Alan DeKok,Valery Smyslov |