-
1
-
-
0037984544
-
SIP: Session initial protocol
-
June
-
J. Rosenberg et al., SIP: Session Initial Protocol, IETF RFC 3261, June 2002.
-
(2002)
IETF RFC
, vol.3261
-
-
Rosenberg, J.1
-
2
-
-
0003559321
-
SIP: Session initial protocol
-
March
-
M. Handley et al., SIP: Session Initial Protocol, IETF RFC 2543, March 1999.
-
(1999)
IETF RFC
, vol.2543
-
-
Handley, M.1
-
3
-
-
24344457092
-
Secure authentication scheme for session initiation protocol
-
C. C. Yang et al., Secure authentication scheme for session initiation protocol, Computer & Security (24) (2005) 381-386.
-
(2005)
Computer & Security
, Issue.24
, pp. 381-386
-
-
Yang, C.C.1
-
5
-
-
44549088249
-
A new authentication mechanism and key agreement protocol for SIP using identitybased cryptography
-
J. Ring, K. K. R. Choo, E. Foo, M. Looi, A new authentication mechanism and key agreement protocol for SIP using identitybased cryptography, Proceedings of AusCert R&D Stream (2006) 61-72.
-
(2006)
Proceedings of AusCert R&D Stream
, pp. 61-72
-
-
Ring, J.1
Choo, K.K.R.2
Foo, E.3
Looi, M.4
-
6
-
-
63149153148
-
A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment
-
D. Geneiatakis, C. Lambrinoudakis, A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment, Telecommunication Systems Springer 36 (4) (2007) 153-159.
-
(2007)
Telecommunication Systems Springer
, vol.36
, Issue.4
, pp. 153-159
-
-
Geneiatakis, D.1
Lambrinoudakis, C.2
-
7
-
-
44549086712
-
A new provably secure authentication and key agreement mechanism for SIP using certificateless publickey cryptography
-
F. Wang, Y. Zhang, A new provably secure authentication and key agreement mechanism for SIP using certificateless publickey cryptography, Computer Communication 31 (2008) 2142-2149.
-
(2008)
Omputer Communication
, vol.31
, pp. 2142-2149
-
-
Wang, F.1
Zhang, Y.2
-
8
-
-
55749113850
-
A new provably secure authentication and key agreement protocol for SIP using ECC
-
L. Wu et al., A new provably secure authentication and key agreement protocol for SIP using ECC, Computer Standard & Interfaces 31 (2) (2009) 286-291.
-
(2009)
Computer Standard & Interfaces
, vol.31
, Issue.2
, pp. 286-291
-
-
Wu, L.1
-
9
-
-
77955431593
-
A secure and efficient SIP authentication scheme for converged VoIP networks
-
doi:10.1016/ j.comcom.2010.03.026
-
E.J. Yoon et al., A secure and efficient SIP authentication scheme for converged VoIP networks, Computer Communication (2010), doi:10.1016/ j.comcom.2010.03.026.
-
(2010)
Computer Communication
-
-
Yoon, E.J.1
-
10
-
-
74149091306
-
A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves
-
Y. Liao, S. Wang, A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves, Computer Communication 33 (2010) 372-380.
-
(2010)
Computer Communication
, vol.33
, pp. 372-380
-
-
Liao, Y.1
Wang, S.2
-
11
-
-
38049074773
-
A secure chaotic hash-based biometric remote user authentication scheme using mobile devices
-
E. J. Yoon, K. Y. Yoo, A secure chaotic hash-based biometric remote user authentication scheme using mobile devices, Lecture Notes in Computer Science 4537 (2007) 612-623.
-
(2007)
Lecture Notes in Computer Science
, vol.4537
, pp. 612-623
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
12
-
-
34548620637
-
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
-
M. K. Khan, Z. Jiashu, X. M. Wang, Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices, Chaos, Solitons & Fractals 35 (3) (2008) 519-524.
-
(2008)
Chaos, Solitons & Fractals
, vol.35
, Issue.3
, pp. 519-524
-
-
Khan, M.K.1
Jiashu, Z.2
Wang, X.M.3
-
13
-
-
70349792182
-
An efficient biometrics-based remote user authentication scheme using smart cards
-
C. T. Li, M. S. Hwang, An efficient biometrics-based remote user authentication scheme using smart cards, Journal of Network and Computer Applications 33 (1) (2010) 1-5.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.1
, pp. 1-5
-
-
Li, C.T.1
Hwang, M.S.2
-
14
-
-
0242309175
-
Security protocols for biometricsbased cardholder authentication in smartcards
-
L. Rila, C. J. Mitchell, Security protocols for biometricsbased cardholder authentication in smartcards, Lecture Notes in Computer Science 2846 (2003) 254-264.
-
(2003)
Lecture Notes in Computer Science
, vol.2846
, pp. 254-264
-
-
Rila, L.1
Mitchell, C.J.2
-
15
-
-
11244267013
-
-
Springer, New York
-
D. Hankerson, A. Menezes, S. Vanstone, Guide to Elliptic Curve Cryptography, Springer, New York, 2004.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
16
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, Elliptic curve cryptosystems, Mathematical Computation 48 (1987) 203-209.
-
(1987)
Mathematical Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
18
-
-
33750533142
-
An improved BioHashing for human authentication
-
A. Lumini, L. Nanni, An improved BioHashing for human authentication, Pattern Recognition 40 (2007) 1057-1065.
-
(2007)
Pattern Recognition
, vol.40
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
19
-
-
35148829897
-
Symmetric hash functions for secure fingerprint biometric systems
-
S. Tulyakov, F. Farooq, P. Mansukhani, V. Govindaraju, Symmetric hash functions for secure fingerprint biometric systems, Pattern Recognition Letters 28 (2007) 2427-2436.
-
(2007)
Pattern Recognition Letters
, vol.28
, pp. 2427-2436
-
-
Tulyakov, S.1
Farooq, F.2
Mansukhani, P.3
Govindaraju, V.4
-
20
-
-
69949114528
-
Theoretical framework for constructing matching algorithms in biometric authentication systems
-
M. Inuma, A. Otsuka, H. Imai, Theoretical framework for constructing matching algorithms in biometric authentication systems, Lecture Notes in Computer Science 5558 (2009) 806-815.
-
(2009)
Lecture Notes in Computer Science
, vol.5558
, pp. 806-815
-
-
Inuma, M.1
Otsuka, A.2
Imai, H.3
-
21
-
-
77951620437
-
Robust iris verification for key management
-
doi:10.1016/j.patrec.2009.12.028
-
S. Ziauddin, M. N. Dailey, Robust iris verification for key management, Pattern Recognition Letters (2010), doi:10.1016/j.patrec.2009.12.028.
-
(2010)
Pattern Recognition Letters
-
-
Ziauddin, S.1
Dailey, M.N.2
-
22
-
-
0004192381
-
-
CRC Press, New York
-
A. J. Menezes, P. C. Oorschot, S. A. Vanstone, Handbook of applied cryptograph, CRC Press, New York, 1997.
-
(1997)
Handbook of Applied Cryptograph
-
-
Menezes, A.J.1
Oorschot, P.C.2
Vanstone, S.A.3
|