[11] Glazer, G., Hussey, C. and Shea, R. (2003) Certificate-Based Authentication for DHCP. [12] Duangphasuk, S., Kungpisdan, S. and Hankla, S. (2011) Design and Implementation of Improved Security Protocols for DHCP Using Digital Certificates. ICON, Singapore. [13] De Graaf, K., Liddy, J., Raison, P., Scano, J.C. and Wadhwa, S. (2011) Dynamic Host Configuration Protocol (DHCP) Authentication Using Challenge Handshake Authentication Protocol (CHAP) Challenge. United States Patent Application 20110154440. [14] Hornstein, K., Lemon, T., Adoba, B. and Trostle, J. (2001) DHCP Authentication via Kerberos V. IETF DHC Working Group. [15] Ricciardi, F. (2007) Kerberos Protocol Tutorial. The National Institute of Nuclear Physics Computing and Network Services, LECCE, Italy. [16] Ju, H. and Han, J.W. (2005) DHCP Message Authentication with an Effective Key Management. Proceedings of the World Academy of Science, Engineering and Technology, 8. [17] Komori, T. and Saito, T. (2002) The Secure DHCP System with User Authentication. Proceedings of the 27th Annual IEEE Conference on Local Computer Networks, Tampa, 6-8 November 2002.
http://dx.doi.org/10.1109/lcn.2002.1181774 [18] Yang, C., Wang, R. and Liu, W. (2005) Secure Authentication Scheme for Session Initiation Protocol. Computers & Security, 24, 381-386.
http://dx.doi.org/10.1016/j.cose.2004.10.007 [19] Open SSL. Open SSL Project.
http://www.openssl.org/

  
comments powered by Disqus
JCC Subscription
E-Mail Alert
JCC Most popular papers
Publication Ethics & OA Statement
JCC News
Frequently Asked Questions
Recommend to Peers
Recommend to Library
Contact Us

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.