1 |
J. Bound, 'Dual Stack IPv6 Dominant Transition Mechanism,' IETF, Internet Draft draft-bound-dstm-exp-04, October 2005
|
2 |
R. Droms, J. Bound, B. Volz, T. Lemon, C.Perkins, and M. Carney, 'Dynamic Host Configuration Protocol for IPv6,' IETF, RFC 3315, July 2003
|
3 |
T. Komori and T. Saito, 'The Secure DHCP System with User Authentication,' in Proc. LCN2002, November 2002
|
4 |
H. Krawczyk, M. Bellare, and R. Canetti, 'HMAC: Keyed-Hashing for Message Authentication,' IETF, RFC 2104, February 1997
|
5 |
Internet Systems Consortium, DHCP 3.0.4b, http://www.isc.org/index.pl?/sw/dhcp/
|
6 |
R. Droms, 'Authentication for DHCP Messages,' IETF, RFC 3118, June 2001
|
7 |
R. Droms, 'Dynamic Host Configuration Protocol,' IETF, RFC 2131, March 1997
|
8 |
R. Rivest, 'The MD5 Message-Digest Algorithm,' IETF, RFC 1321, April 1992
|
9 |
'Secure Hash Standard,' National Institute of Standards and Technology, FIPS-180-1, April 1995
|