Academic literature on the topic '8021X Authentication and DHCP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic '8021X Authentication and DHCP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "8021X Authentication and DHCP"
Huangfu, Dapeng, Xiaoping Tian, Xingjian Wang, and Ping Chen. "Research and Mass Deployment of Non-cognitive Authentication Strategy Based on Campus Wireless Network." ITM Web of Conferences 17 (2018): 01013. http://dx.doi.org/10.1051/itmconf/20181701013.
Full textMansoor, Farooq, Khan Rafi, and Hassan Khan Mubashir. "Stout Implementation of Firewall and Network Segmentation for Securing IoT Devices." Indian Journal of Science and Technology 16, no. 33 (2023): 2609–21. https://doi.org/10.17485/IJST/v16i33.1262.
Full textSarip, Nfn, and Arief Setyanto. "Packet Filtering Based On Differentiated Services Code Point For DHCP Starvation Attacks Prevention." Journal Pekommas 4, no. 2 (2019): 137. http://dx.doi.org/10.30818/jpkm.2019.2040204.
Full textYakubu, Bello Musa, Majid Iqbal Khan, and Pattarasinee Bhattarakosol. "IPChain: Blockchain-Based Security Protocol for IoT Address Management Servers in Smart Homes." Journal of Sensor and Actuator Networks 11, no. 4 (2022): 80. http://dx.doi.org/10.3390/jsan11040080.
Full textLiao, Xiao Qun, Jian Chang, and An Xin Zhao. "Design and Development of Campus Network Authentication and Accounting System Based on Radius Protocol." Applied Mechanics and Materials 411-414 (September 2013): 507–13. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.507.
Full textSiregar, Jonathan Daniel, and Ahmad Chusyairi. "Implementasi Authentication Captive Portal Pada Wireless Local Area Network di PT. St. Morita Industries." Jikom: Jurnal Informatika dan Komputer 14, no. 1 (2024): 14–24. http://dx.doi.org/10.55794/jikom.v14i1.119.
Full textOktaviani, Reza, and Dian Novianto. "Manajemen User Dan Bandwidth Pada Hotspot Di Kantor BUMD Provinsi Bangka Belitung Menggunakan Router Mikrotik." Jurnal Sisfokom (Sistem Informasi dan Komputer) 4, no. 1 (2015): 47. http://dx.doi.org/10.32736/sisfokom.v4i1.203.
Full textUmaroh, Lia, and Machsun Rifauddin. "IMPLEMENTASI VIRTUAL PRIVATE NETWORK (VPN) DI PERPUSTAKAAN UNIVERSITAS ISLAM MALANG." BACA: JURNAL DOKUMENTASI DAN INFORMASI 41, no. 2 (2020): 193. http://dx.doi.org/10.14203/j.baca.v41i2.531.
Full textJeong, Yeonseon, Hyunghoon Kim, and Hyo Jin Jo. "ASD: ARP Spoofing Detector Using OpenWrt." Security and Communication Networks 2022 (March 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/2196998.
Full textS, Dr Swapna. "Advanced Threat Detection with Active Directory and SIEM." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2799–805. https://doi.org/10.22214/ijraset.2025.68478.
Full textBook chapters on the topic "8021X Authentication and DHCP"
Demerjian, Jacques, and Ahmed Serhrouchni. "DHCP Authentication Using Certificates." In Security and Protection in Information Processing Systems. Springer US, 2004. http://dx.doi.org/10.1007/1-4020-8143-x_30.
Full textUrama, Gilbert C., Chiagoziem C. Ukwuoma, Md Belal Bin Heyat, et al. "SDN-Based Cryptographic Client Authentication: A New Approach to DHCP Starvation Mitigation." In Advances in Intelligent Systems and Computing. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-0550-8_41.
Full textVeltri, L., A. Molinaro, and O. Marullo. "DHCP-Based Authentication for Mobile Users/Terminals in a Wireless Access Network." In Telecommunications and Networking - ICT 2004. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-27824-5_165.
Full textConference papers on the topic "8021X Authentication and DHCP"
Jony, Asaduzzaman, Muhammad Nazrul Islam, and Rahat Ahmed Talukder. "A Secure Token-Based Approach for DHCP Client Authentication and Replay Attack Prevention." In 2024 27th International Conference on Computer and Information Technology (ICCIT). IEEE, 2024. https://doi.org/10.1109/iccit64611.2024.11022024.
Full textDinu, Dumitru Daniel, and Mihai Togan. "DHCP server authentication using digital certificates." In 2014 10th International Conference on Communications (COMM). IEEE, 2014. http://dx.doi.org/10.1109/iccomm.2014.6866756.
Full textKorkmaz, Mehmet Halis, and Cemal Kose. "Port-based DHCP server design with authentication." In 2017 25th Signal Processing and Communications Applications Conference (SIU). IEEE, 2017. http://dx.doi.org/10.1109/siu.2017.7960334.
Full textDaniel Dinu, Dumitru, and Mihai Togan. "DHCPAuth — A DHCP message authentication module." In 2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (SACI). IEEE, 2015. http://dx.doi.org/10.1109/saci.2015.7208238.
Full textZhang, Fuqiang, and Lin Chen. "OTP_SAM: DHCP security authentication model based on OTP." In 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2016. http://dx.doi.org/10.1109/cscwd.2016.7566012.
Full text"CERTIFICATE-BASED ACCESS CONTROL AND AUTHENTICATION FOR DHCP." In 1st International Conference on E-business and Telecommunication Networks. SciTePress - Science and and Technology Publications, 2004. http://dx.doi.org/10.5220/0001396100990106.
Full textShete, Aishwarya, Atul Lahade, Tejas Patil, and Renuka Pawar. "DHCP Protocol Using OTP Based Two-Factor Authentication." In 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2018. http://dx.doi.org/10.1109/icoei.2018.8553753.
Full textLi, Bing, Songyuan Li, and Bao Ma. "The Research and Reality of DHCP Access and Authentication Based on Embedded Terminal." In 2010 2nd International Conference on Information Technology and Computer Science (ITCS 2010). IEEE, 2010. http://dx.doi.org/10.1109/itcs.2010.125.
Full textXie, Wanjuan, Junhua Yu, and Guoqiang Deng. "A Secure DHCPv6 System Based on MAC Address Whitelist Authentication and DHCP Fingerprint Recognition." In 2021 7th Annual International Conference on Network and Information Systems for Computers (ICNISC). IEEE, 2021. http://dx.doi.org/10.1109/icnisc54316.2021.00114.
Full textReports on the topic "8021X Authentication and DHCP"
Droms, R. Authentication for DHCP Messages. Edited by W. Arbaugh. RFC Editor, 2001. http://dx.doi.org/10.17487/rfc3118.
Full textMorand, L., A. Yegin, S. Kumar, and S. Madanapalli. DHCP Options for Protocol for Carrying Authentication for Network Access (PANA) Authentication Agents. RFC Editor, 2008. http://dx.doi.org/10.17487/rfc5192.
Full textDrach, S. DHCP Option for The Open Group's User Authentication Protocol. RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2485.
Full textStapp, M., and T. Lemon. The Authentication Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Option. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4030.
Full textDroms, R., and J. Schnizlein. Remote Authentication Dial-In User Service (RADIUS) Attributes Suboption for the Dynamic Host Configuration Protocol (DHCP) Relay Agent Information Option. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4014.
Full text