메뉴 건너뛰기




Volumn , Issue , 2010, Pages 334-339

A three-factor authenticated key agreement scheme for SIP on elliptic curves

Author keywords

Authentication; Elliptic curve cryptosystem; Key agreement; Session initial protocol; Three factor

Indexed keywords

AUTHENTICATED KEY AGREEMENT; AUTHENTICATION TECHNIQUES; CRYPTOSYSTEMS; ELLIPTIC CURVE; ELLIPTIC CURVE CRYPTOSYSTEM; KEY AGREEMENT; KEY SIZES; SECURITY ATTACKS; SESSION INITIAL PROTOCOLS; SIP SERVER; STRONG AUTHENTICATION; THREE-FACTOR;

EID: 78650387830     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NSS.2010.101     Document Type: Conference Paper
Times cited : (10)

References (22)
  • 1
    • 0037984544 scopus 로고    scopus 로고
    • SIP: Session initial protocol
    • June
    • J. Rosenberg et al., SIP: Session Initial Protocol, IETF RFC 3261, June 2002.
    • (2002) IETF RFC , vol.3261
    • Rosenberg, J.1
  • 2
    • 0003559321 scopus 로고    scopus 로고
    • SIP: Session initial protocol
    • March
    • M. Handley et al., SIP: Session Initial Protocol, IETF RFC 2543, March 1999.
    • (1999) IETF RFC , vol.2543
    • Handley, M.1
  • 3
    • 24344457092 scopus 로고    scopus 로고
    • Secure authentication scheme for session initiation protocol
    • C. C. Yang et al., Secure authentication scheme for session initiation protocol, Computer & Security (24) (2005) 381-386.
    • (2005) Computer & Security , Issue.24 , pp. 381-386
    • Yang, C.C.1
  • 5
    • 44549088249 scopus 로고    scopus 로고
    • A new authentication mechanism and key agreement protocol for SIP using identitybased cryptography
    • J. Ring, K. K. R. Choo, E. Foo, M. Looi, A new authentication mechanism and key agreement protocol for SIP using identitybased cryptography, Proceedings of AusCert R&D Stream (2006) 61-72.
    • (2006) Proceedings of AusCert R&D Stream , pp. 61-72
    • Ring, J.1    Choo, K.K.R.2    Foo, E.3    Looi, M.4
  • 6
    • 63149153148 scopus 로고    scopus 로고
    • A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment
    • D. Geneiatakis, C. Lambrinoudakis, A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment, Telecommunication Systems Springer 36 (4) (2007) 153-159.
    • (2007) Telecommunication Systems Springer , vol.36 , Issue.4 , pp. 153-159
    • Geneiatakis, D.1    Lambrinoudakis, C.2
  • 7
    • 44549086712 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement mechanism for SIP using certificateless publickey cryptography
    • F. Wang, Y. Zhang, A new provably secure authentication and key agreement mechanism for SIP using certificateless publickey cryptography, Computer Communication 31 (2008) 2142-2149.
    • (2008) Omputer Communication , vol.31 , pp. 2142-2149
    • Wang, F.1    Zhang, Y.2
  • 8
    • 55749113850 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement protocol for SIP using ECC
    • L. Wu et al., A new provably secure authentication and key agreement protocol for SIP using ECC, Computer Standard & Interfaces 31 (2) (2009) 286-291.
    • (2009) Computer Standard & Interfaces , vol.31 , Issue.2 , pp. 286-291
    • Wu, L.1
  • 9
    • 77955431593 scopus 로고    scopus 로고
    • A secure and efficient SIP authentication scheme for converged VoIP networks
    • doi:10.1016/ j.comcom.2010.03.026
    • E.J. Yoon et al., A secure and efficient SIP authentication scheme for converged VoIP networks, Computer Communication (2010), doi:10.1016/ j.comcom.2010.03.026.
    • (2010) Computer Communication
    • Yoon, E.J.1
  • 10
    • 74149091306 scopus 로고    scopus 로고
    • A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves
    • Y. Liao, S. Wang, A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves, Computer Communication 33 (2010) 372-380.
    • (2010) Computer Communication , vol.33 , pp. 372-380
    • Liao, Y.1    Wang, S.2
  • 11
    • 38049074773 scopus 로고    scopus 로고
    • A secure chaotic hash-based biometric remote user authentication scheme using mobile devices
    • E. J. Yoon, K. Y. Yoo, A secure chaotic hash-based biometric remote user authentication scheme using mobile devices, Lecture Notes in Computer Science 4537 (2007) 612-623.
    • (2007) Lecture Notes in Computer Science , vol.4537 , pp. 612-623
    • Yoon, E.J.1    Yoo, K.Y.2
  • 12
    • 34548620637 scopus 로고    scopus 로고
    • Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
    • M. K. Khan, Z. Jiashu, X. M. Wang, Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices, Chaos, Solitons & Fractals 35 (3) (2008) 519-524.
    • (2008) Chaos, Solitons & Fractals , vol.35 , Issue.3 , pp. 519-524
    • Khan, M.K.1    Jiashu, Z.2    Wang, X.M.3
  • 13
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • C. T. Li, M. S. Hwang, An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and Computer Applications 33 (1) (2010) 1-5.
    • (2010) Journal of Network and Computer Applications , vol.33 , Issue.1 , pp. 1-5
    • Li, C.T.1    Hwang, M.S.2
  • 14
    • 0242309175 scopus 로고    scopus 로고
    • Security protocols for biometricsbased cardholder authentication in smartcards
    • L. Rila, C. J. Mitchell, Security protocols for biometricsbased cardholder authentication in smartcards, Lecture Notes in Computer Science 2846 (2003) 254-264.
    • (2003) Lecture Notes in Computer Science , vol.2846 , pp. 254-264
    • Rila, L.1    Mitchell, C.J.2
  • 16
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, Elliptic curve cryptosystems, Mathematical Computation 48 (1987) 203-209.
    • (1987) Mathematical Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 18
    • 33750533142 scopus 로고    scopus 로고
    • An improved BioHashing for human authentication
    • A. Lumini, L. Nanni, An improved BioHashing for human authentication, Pattern Recognition 40 (2007) 1057-1065.
    • (2007) Pattern Recognition , vol.40 , pp. 1057-1065
    • Lumini, A.1    Nanni, L.2
  • 20
    • 69949114528 scopus 로고    scopus 로고
    • Theoretical framework for constructing matching algorithms in biometric authentication systems
    • M. Inuma, A. Otsuka, H. Imai, Theoretical framework for constructing matching algorithms in biometric authentication systems, Lecture Notes in Computer Science 5558 (2009) 806-815.
    • (2009) Lecture Notes in Computer Science , vol.5558 , pp. 806-815
    • Inuma, M.1    Otsuka, A.2    Imai, H.3
  • 21
    • 77951620437 scopus 로고    scopus 로고
    • Robust iris verification for key management
    • doi:10.1016/j.patrec.2009.12.028
    • S. Ziauddin, M. N. Dailey, Robust iris verification for key management, Pattern Recognition Letters (2010), doi:10.1016/j.patrec.2009.12.028.
    • (2010) Pattern Recognition Letters
    • Ziauddin, S.1    Dailey, M.N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.