{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T13:25:56Z","timestamp":1751030756558,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/saci.2015.7208238","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T21:52:02Z","timestamp":1440107522000},"page":"405-410","source":"Crossref","is-referenced-by-count":4,"title":["DHCPAuth &amp;#x2014; A DHCP message authentication module"],"prefix":"10.1109","author":[{"given":"Dumitru","family":"Daniel Dinu","sequence":"first","affiliation":[]},{"given":"Mihai","family":"Togan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2014.6866756"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2002.1181774"},{"key":"ref10","article-title":"PGP Message Exchange Formats","author":"atkins","year":"1996","journal-title":"IETF RFC 1991"},{"key":"ref11","article-title":"OpenPGP Message Format","author":"callas","year":"1998","journal-title":"IETF RFC 2440"},{"key":"ref12","article-title":"OpenPGP Message Format","author":"callas","year":"2007","journal-title":"IETF RFC 4880"},{"key":"ref13","article-title":"An Algebra for Assessing Trust in Certification Chains","author":"j?sang","year":"0","journal-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS'99)"},{"article-title":"15 reasons not to start using PGP","year":"0","author":"share","key":"ref14"},{"key":"ref15","article-title":"A Probabilistic Trust Model for GnuPG","author":"jonczy","year":"2006","journal-title":"23rd Chaos Communication Congress"},{"year":"0","key":"ref16","article-title":"ISC DHCP: Enterprise Grade Solutions for Configuration Needs"},{"year":"0","key":"ref17","article-title":"Welcome to OpenSSL Project"},{"year":"0","key":"ref18","article-title":"The GNU Privacy Guard"},{"year":"0","key":"ref19","article-title":"A DHCP Message Authentication Module"},{"article-title":"Dynamic Host Configuration Protocol (DHCP) Authentication using Challenge Handshake Authentication Protocol (CHAP) Challenge","year":"2011","author":"de graaf","key":"ref28"},{"key":"ref4","article-title":"Authentication for DHCP Messages","author":"droms","year":"2001","journal-title":"IETF RFC 3118"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.204"},{"key":"ref3","article-title":"DHCP Options and BOOTP Vendor Extensions","author":"alexander","year":"1997","journal-title":"IETF RFC 2132"},{"key":"ref6","article-title":"Top 10 PKI risks","volume":"xvi","author":"ellison","year":"2000","journal-title":"Computers and Security Journal"},{"key":"ref29","article-title":"DHCP Authentication Via Kerberos V","author":"hornstein","year":"2001","journal-title":"IETF working group"},{"key":"ref5","article-title":"Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)","author":"lemon","year":"2002","journal-title":"IETF RFC 3396"},{"year":"0","key":"ref8","article-title":"DigiNotar"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023787"},{"key":"ref2","article-title":"Dynamic Host Configuration Protocol","author":"droms","year":"1997","journal-title":"RFC 2131 IETF"},{"year":"0","key":"ref9","article-title":"Comedo"},{"year":"0","key":"ref1","article-title":"Internet users in the world"},{"article-title":"Certificate-Based Authentication for DHCP","year":"2003","author":"glazer","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2011.6168490"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-8143-X_30"},{"key":"ref24","article-title":"DHCP Message Authentication with an Effective Key Management","author":"ju","year":"2005","journal-title":"World Academy of Science Engineering and Technology"},{"key":"ref23","article-title":"Securing Network Location Awareness with Authenticated DHCP","author":"tuomas","year":"2007","journal-title":"3rd Internation Conference on Security and Privacy in Communication Networks (SecureComm)"},{"key":"ref26","article-title":"An Authentication Method based on Certificate for DHCP","author":"xu","year":"2011","journal-title":"Internet draft"},{"key":"ref25","article-title":"A Transparent Key Management Scheme for Wireless LAN s Using DHCP","author":"narendar","year":"2001","journal-title":"HP Laboratories"}],"event":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (SACI)","start":{"date-parts":[[2015,5,21]]},"location":"Timisoara, Romania","end":{"date-parts":[[2015,5,23]]}},"container-title":["2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7165000\/7208165\/07208238.pdf?arnumber=7208238","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:41:28Z","timestamp":1490391688000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7208238\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/saci.2015.7208238","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}