{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T05:43:18Z","timestamp":1749620598045},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/iccomm.2014.6866756","type":"proceedings-article","created":{"date-parts":[[2014,7,30]],"date-time":"2014-07-30T21:12:11Z","timestamp":1406754731000},"source":"Crossref","is-referenced-by-count":16,"title":["DHCP server authentication using digital certificates"],"prefix":"10.1109","author":[{"given":"Dumitru Daniel","family":"Dinu","sequence":"first","affiliation":[]},{"given":"Mihai","family":"Togan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550359"},{"key":"22","year":"0","journal-title":"ISC DHCP Enterprise Grade Solutions for Configuration Needs"},{"key":"17","article-title":"DHCP authentication via kerberos V","author":"hornstein","year":"2001","journal-title":"IETF working group"},{"key":"23","year":"0","journal-title":"Welcome to OpenSSL Project"},{"key":"18","author":"ju","year":"2005","journal-title":"DHCP Message Authentication with An Effective Key Management"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.204"},{"key":"16","author":"de graaf","year":"2011","journal-title":"Dynamic Host Configuration Protocol (DHCP) Authentication Using Challenge Handshake Authentication Protocol (CHAP) Challenge"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8143-X_30"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2011.6168490"},{"key":"11","author":"xu","year":"2011","journal-title":"An Authentication Method Based on Certificate for DHCP"},{"key":"12","author":"glazer","year":"2003","journal-title":"Certificate-Based Authentication for DHCP"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2002.1181774"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2132"},{"key":"20","author":"shankar","year":"2001","journal-title":"A Transparent Key Management Scheme for Wireless LANs Using DHCP"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2131"},{"key":"1","author":"droms","year":"2002","journal-title":"The DHCP Handbook"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3396"},{"key":"7","author":"lindner","year":"0","journal-title":"Exploiting DORA - Attacks on the DHCP Protocol"},{"key":"6","author":"jones","year":"2002","journal-title":"DHCP Man in the Middle Attack"},{"key":"5","author":"tulloch","year":"2004","journal-title":"DHCP Server Security (Part 1)"},{"key":"4","year":"0","journal-title":"DHCP Security Issues"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3118"},{"key":"8","author":"security","year":"2010","journal-title":"DHCP Starvation - Quick and Dirty"}],"event":{"name":"2014 10th International Conference on Communications (COMM)","location":"Bucharest, Romania","start":{"date-parts":[[2014,5,29]]},"end":{"date-parts":[[2014,5,31]]}},"container-title":["2014 10th International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6856368\/6866648\/06866756.pdf?arnumber=6866756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T20:46:43Z","timestamp":1490302003000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6866756\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2014.6866756","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}