{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:29:22Z","timestamp":1725470962948},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540383413"},{"type":"electronic","value":"9783540383437"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11836810_23","type":"book-chapter","created":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T10:36:57Z","timestamp":1159871817000},"page":"311-326","source":"Crossref","is-referenced-by-count":3,"title":["A Security Architecture for Protecting LAN Interactions"],"prefix":"10.1007","author":[{"given":"Andr\u00e9","family":"Z\u00faquete","sequence":"first","affiliation":[]},{"given":"Hugo","family":"Marques","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"IEEE: IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control. IEEE Std 802.1X-2001 (2001)"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Droms, R.: Dynamic Host Configuration Protocol. RFC 2131, IETF (1997)","DOI":"10.17487\/rfc2131"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Plummer, D.: Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware. RFC 826, IETF (1982)","DOI":"10.17487\/rfc0826"},{"key":"23_CR4","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/S0920-5489(00)00047-7","volume":"22","author":"R. Khoussainov","year":"2000","unstructured":"Khoussainov, R., Patel, A.: LAN security: problems and solutions for Ethernet networks. Computer Standards & Interfaces\u00a022, 191\u2013202 (2000)","journal-title":"Computer Standards & Interfaces"},{"key":"23_CR5","unstructured":"Hunleth, F.: Secure Link Layer (2001), http:\/\/www.hunleth.com\/fhunleth\/projects\/sll\/sll_report.pdf"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Bruschi, D., Ornaghi, A., Rosti, E.: S-ARP: a Secure Address Resolution Protocol. In: 19th Annual Computer Security Applications Conf. (ACSAC 2003), Las Vegas, NV, USA (2003)","DOI":"10.1109\/CSAC.2003.1254311"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Gouda, M.G., Huang, C.: A Secure Address Resolution Protocol. Computer Networks\u00a041(1) (2003)","DOI":"10.1016\/S1389-1286(02)00326-2"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Lootah, W., Enck, W., McDaniel, P.: TARP: Ticket-based Address Resolution Protocol. In: 21st Annual Computer Security Applications Conf (ACSAC 2005), Tucson, AZ, USA (2005)","DOI":"10.1109\/CSAC.2005.55"},{"key":"23_CR9","unstructured":"Dubrawsky, I.: SAFE Layer 2 Security In-depth Version 2. White Paper (2004), http:\/\/www.cisco.com\/warp\/public\/cc\/so\/cuso\/epso\/sqfr\/sfblu_wp.pdf"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Hedrick, C.: Routing Information Protocol. RFC 1058, IETF (1988)","DOI":"10.17487\/rfc1058"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Postel, J.: Internet Control Message Protocol. RFC 792, IETF (1981)","DOI":"10.17487\/rfc0777"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Thayer, R., Doraswamy, N., Glenn, R.: IP Security Document Roadmap. RFC 2411, IETF (1998)","DOI":"10.17487\/rfc2411"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Harkins, D., Carrel, D.: The Internet Key Exchange (IKE). RFC 2409, IETF (1998)","DOI":"10.17487\/rfc2409"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Kohl, J., Neuman, C.: The Kerberos Network Authentication Service (V5). RFC 1510 (1993)","DOI":"10.17487\/rfc1510"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP). RFC 3748, IETF (2004)","DOI":"10.17487\/rfc3748"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Droms, R., Arbaugh, W. (eds.): Authentication for DHCP Messages. RFC 3118, IETF (2001)","DOI":"10.17487\/rfc3118"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11836810_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:19:42Z","timestamp":1605644382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11836810_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540383413","9783540383437"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11836810_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}