-
1
-
-
78651061728
-
Comparison of H. 323 and Sip for Ip Telephony Signaling
-
Lahore, Pakistan
-
Siddiqui, K. , Kamran, M. , Tajammul, S. : Comparison of H. 323 and Sip for Ip Telephony Signaling. In: IEEE 4th International Multioptics Conference, Lahore, Pakistan (2001)
-
(2001)
IEEE 4th International Multioptics Conference
-
-
Siddiqui, K.1
Kamran, M.2
Tajammul, S.3
-
2
-
-
0003365506
-
Http Authentication: Basic and Digest Access Authentication
-
June
-
Franks, J. , Northwestern, U. , Hallam-Baker, P. , Hostetler, J. , AbiSource, I. , Lawrence, S. , Agranat Systems, I. , Leach, P. , Microsoft, C. , Luotonen, A. , Netscape, C. C. , Stewart, L. , Open Market, I. : Http Authentication: Basic and Digest Access Authentication. IETF RFC2617 (June 1999)
-
(1999)
IETF RFC 2617
-
-
Franks, J.1
Northwestern, U.2
Hallam-Baker, P.3
Hostetler, J.4
Abisource, I.5
Lawrence, S.6
Agranat, S.I.7
Leach, P.8
Microsoft, C.9
Luotonen, A.10
Netscape, C.C.11
Stewart, L.12
Open Market, I.13
-
3
-
-
0036870280
-
Sip Security Issues: The Sip Authentication Procedure and Its Processing Load
-
Salsano, S. , Veltri, L. , Papalilo, D. : Sip Security Issues: The Sip Authentication Procedure and Its Processing Load. Network 16, 38-44 (2002)
-
(2002)
Network
, vol.16
, pp. 38-44
-
-
Salsano, S.1
Veltri, L.2
Papalilo, D.3
-
5
-
-
84881472647
-
Survey of Security Vulnerabilities in Session Initial Protocol
-
Geneiatakis, D. , Dagiuklas, T. , Kambourakis, G. , Lambrinoudakis, C. : Survey of Security Vulnerabilities in Session Initial Protocol. IEEE Communications Surveys & Tutorials 8(3), 68-81 (2006)
-
(2006)
IEEE Communications Surveys & Tutorials
, vol.8
, Issue.3
, pp. 68-81
-
-
Geneiatakis, D.1
Dagiuklas, T.2
Kambourakis, G.3
Lambrinoudakis, C.4
-
6
-
-
33750013256
-
Denial of Service Attacks Targeting a Sip Voip Infrastructure: Stack Scenarios and Prevention Mechanisms
-
Sisalemd, D. , Kuthan, J. , Ehlerts, S. : Denial of Service Attacks Targeting a Sip Voip Infrastructure: Stack Scenarios and Prevention Mechanisms. Network IEEE 20(5), 26-31 (2006)
-
(2006)
Network IEEE
, vol.20
, Issue.5
, pp. 26-31
-
-
Sisalemd, D.1
Kuthan, J.2
Ehlerts, S.3
-
7
-
-
24344457092
-
Secure Authentication Scheme for Session Initiation Protocol
-
Yang, C.-C. , Wang, R.-C. , Liu, W.-T. : Secure Authentication Scheme for Session Initiation Protocol. Comput Secur. 24, 381-386 (2005)
-
(2005)
Comput Secur.
, vol.24
, pp. 381-386
-
-
Yang, C.-C.1
Wang, R.-C.2
Liu, W.-T.3
-
9
-
-
78651068514
-
-
2005: Proceedings of World Academy of Science. Engineering And Technology (October
-
Durlanik, A. , Sogukpinar, I. : Sip Authentication Scheme Using Ecdh. In: 2005: Proceedings of World Academy of Science. Engineering And Technology (October 2005)
-
(2005)
Sip Authentication Scheme Using Ecdh
-
-
Durlanik, A.1
Sogukpinar, I.2
-
10
-
-
33751060286
-
A Lightweight Scheme for Securely and Reliably Locating Sip Users VoIP Management and Security
-
Kong, L. , Balasubramaniyan, V. B. , Ahamad, M. : A Lightweight Scheme for Securely and Reliably Locating Sip Users. In: VoIP Management and Security, IEEE Workshop, pp. 9-17 (2006)
-
(2006)
IEEE Workshop
, pp. 9-17
-
-
Kong, L.1
Balasubramaniyan, V.B.2
Ahamad, M.3
-
11
-
-
44549088249
-
A New Authentication Mechanism and Key Agreement Protocol for Sip Using Identity Based Cryptography
-
Ring, J. , Raymond Choo, K.-K. , Foo, E. , Looi, M. : A New Authentication Mechanism and Key Agreement Protocol for Sip Using Identity Based Cryptography. In: Proceedings of AusCERT R&D Stream, pp. 61-72 (2006)
-
(2006)
Proceedings of AusCERT R&D Stream
, pp. 61-72
-
-
Ring, J.1
Raymond Choo, K.-K.2
Foo, E.3
Looi, M.4
-
12
-
-
33845286191
-
Authentication of Signaling in Voip Applications
-
Srinivasan, R. , Vaidehi, V. , Harish, K. , Lakshmi-Narasimhan, K. , LokeshwerBabu, S. , Srikanth, V. : Authentication of Signaling in Voip Applications. In: Communications, Asia-Pacific Conference, pp. 530-533 (2005)
-
(2005)
Communications, Asia-Pacific Conference
, pp. 530-533
-
-
Srinivasan, R.1
Vaidehi, V.2
Harish, K.3
Lakshmi-Narasimhan, K.4
Lokeshwerbabu, S.5
Srikanth, V.6
-
15
-
-
85020598353
-
Identity-Based Cryptosystems and Signature Schemes
-
Blakely, G. R. , Chaum, D. (eds. ), Springer, Heidelberg
-
Shamir, A. : Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G. R. , Chaum, D. (eds. ) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984. LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
16
-
-
46849100481
-
A Scalable Key Management and Clustering Scheme for Wireless Ad Hoc and Sensor Networks
-
Li, J. H. , Bhattacharjee, B. , Yu, M. , Levy, R. : A Scalable Key Management and Clustering Scheme for Wireless Ad Hoc and Sensor Networks. Future Gener. Comp. Sy. 24, 860-869 (2008)
-
(2008)
Future Gener. Comp. Sy.
, vol.24
, pp. 860-869
-
-
Li, J.H.1
Bhattacharjee, B.2
Yu, M.3
Levy, R.4
-
17
-
-
84942246351
-
Identity Based Authenticated Key Agreement Protocol from Pairings
-
IEEE Computer Society Press, Los Alamitos
-
Chen, L. , Kudla, C. : Identity Based Authenticated Key Agreement Protocol from Pairings. In: CSFW 2003, pp. 213-219. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
CSFW 2003
, pp. 213-219
-
-
Chen, L.1
Kudla, C.2
-
18
-
-
35248835575
-
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
-
Biham, E. (ed. ) , Springer, Heidelberg
-
Boneh, D. , Gentry, C. , Lynn, B. , Shacham, H. : Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed. ) EUROCRYPT 2003. LNCS, vol. 2656, Springer, Heidelberg (2003)
-
(2003)
EUROCRYPT 2003. LNCS
, vol.2656
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
19
-
-
46849089265
-
Access Control Management for Ubiquitous Computing
-
Wang, H. , Zhang, Y. , Cao, J. : Access Control Management for Ubiquitous Computing. Future Gener. Comp. Sy. 24, 870-878 (2008)
-
(2008)
Future Gener. Comp. Sy.
, vol.24
, pp. 870-878
-
-
Wang, H.1
Zhang, Y.2
Cao, J.3
-
20
-
-
67349189496
-
A Secure Credit-Based Cooperation Stimulating Mechanism for Manets Using Hash Chains
-
Janzadeh, H. , Fayazbakhsh, K. , Dehghan, M. , Fallah, M. S. : A Secure Credit-Based Cooperation Stimulating Mechanism for Manets Using Hash Chains. Future Gener. Comp. Sy. 25, 926-934 (2009)
-
(2009)
Future Gener. Comp. Sy.
, vol.25
, pp. 926-934
-
-
Janzadeh, H.1
Fayazbakhsh, K.2
Dehghan, M.3
Fallah, M.S.4
-
21
-
-
44549086712
-
A New Provably Secure Authentication and Key Agreement Mechanism for Sip Using Certificateless Public-Key Cryptography
-
Wang, F. , Zhang, Y. : A New Provably Secure Authentication and Key Agreement Mechanism for Sip Using Certificateless Public-Key Cryptography. Computer Communications 31, 2142-2149 (2008)
-
(2008)
Computer Communications
, vol.31
, pp. 2142-2149
-
-
Wang, F.1
Zhang, Y.2
-
22
-
-
0345490607
-
Certificateless Public Key Cryptography
-
Laih, C.-S. (ed. ) , Springer, Heidelberg
-
Al-Riyami, S. S. , Paterson, K. G. : Certificateless Public Key Cryptography. In: Laih, C.-S. (ed. ) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452-473. Springer, Heidelberg (2003)
-
(2003)
ASIACRYPT 2003. LNCS
, vol.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
23
-
-
78651063942
-
Efficient Nonce-Based Authentication Scheme for Session Initiation Protocol
-
Tsai, J.-L. : Efficient Nonce-Based Authentication Scheme for Session Initiation Protocol. International Journal of Network Security 9(1), 12-16 (2009)
-
(2009)
International Journal of Network Security
, vol.9
, Issue.1
, pp. 12-16
-
-
Tsai, J.-L.1
-
24
-
-
76349090342
-
On Security of an Efficient Nonce-Based Authentication Scheme for Session Initiation Protocol
-
Lee, C. C. : On Security of an Efficient Nonce-Based Authentication Scheme for Session Initiation Protocol. International Journal of Network Security 9, 201-203 (2009)
-
(2009)
International Journal of Network Security
, vol.9
, pp. 201-203
-
-
Lee, C.C.1
-
25
-
-
77957937072
-
Security Improvement on a Remote User Authentication Scheme Using Smart Cards
-
Bandyopadhyay, S. K. , Adi, W. , Kim, T.-h. , Xiao, Y. (eds. ), Springer, Heidelberg
-
Chen, T.-H. , Hsiang, H.-C. , Shih, W.-K. : Security Improvement on a Remote User Authentication Scheme Using Smart Cards. In: Bandyopadhyay, S. K. , Adi, W. , Kim, T.-h. , Xiao, Y. (eds. ) ISA 2010. Communications in Computer and Information Science, vol. 76, pp. 9-16. Springer, Heidelberg (2010)
-
(2010)
ISA 2010. Communications in Computer and Information Science
, vol.76
, pp. 9-16
-
-
Chen, T.-H.1
Hsiang, H.-C.2
Shih, W.-K.3
-
26
-
-
0034140374
-
A New Remote User Authentication Scheme Using Smart Cards
-
Hwang, M. S. , Li, L. H. : A New Remote User Authentication Scheme Using Smart Cards. Ieee T. Consum. Electr. 46, 28-30 (2000)
-
(2000)
IEEE T. Consum. Electr.
, vol.46
, pp. 28-30
-
-
Hwang, M.S.1
Li, L.H.2
-
27
-
-
4043152192
-
Further Improvement of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards
-
Yoon, E. J. , Ryu, E. K. , Yoo, K. Y. : Further Improvement of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards. Ieee T. Consum. Electr. 50, 612-614 (2004)
-
(2004)
IEEE T. Consum. Electr.
, vol.50
, pp. 612-614
-
-
Yoon, E.J.1
Ryu, E.K.2
Yoo, K.Y.3
-
28
-
-
4043087111
-
Improved Efficient Remote User Authentication Scheme Using Smart Cards
-
Lee, S. W. , Kim, H. S. , Yoo, K. Y. : Improved Efficient Remote User Authentication Scheme Using Smart Cards. Ieee T. Consum. Electr. 50, 565-567 (2004)
-
(2004)
IEEE T. Consum. Electr.
, vol.50
, pp. 565-567
-
-
Lee, S.W.1
Kim, H.S.2
Yoo, K.Y.3
-
29
-
-
78049329614
-
Security Enhancement on an Improvement on Two Remote User Authentication Scheme Using Smart Cards
-
in press, Accepted Manuscript doi:10. 1016/j. future. 2010. 08. 007
-
Chen, T. H. , Hsiang, H. C. , Shih, W. K. : Security Enhancement on an Improvement on Two Remote User Authentication Scheme Using Smart Cards. In: Future Gener. Comp. System, (in press) Accepted Manuscript doi:10. 1016/j. future. 2010. 08. 007
-
Future Gener. Comp. System
-
-
Chen, T.H.1
Hsiang, H.C.2
Shih, W.K.3
-
30
-
-
0003240332
-
Sip: Session Initiation Protocol
-
Rosenberg, J. , Schulzeinne, H. , Camarillo, G. , Johnston, A. , Peterson, J. , Sparks, R. , Handley, M. , Schooler, E. : Sip: Session Initiation Protocol. IETF RFC3261 (2002)
-
(2002)
IETF RFC3261
-
-
Rosenberg, J.1
Schulzeinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
31
-
-
0003288971
-
Sip: Session Initiation Protocol
-
March
-
Handley, M. , Schulzrinne, H. , Schooler, C. U. E. , Tech, C. , Rosenberg, J. , Bell, L. : Sip: Session Initiation Protocol. In: IETF RFC2543 (March 1999)
-
(1999)
IETF RFC2543
-
-
Handley, M.1
Schulzrinne, H.2
Schooler, C.U.E.3
Tech, C.4
Rosenberg, J.5
Bell, L.6
-
32
-
-
0003487140
-
-
I. T Union, Recommendation H. 323, Telecommunication Standardization Sector of Itu, Geneva, Switzerland ,Febuary
-
I. T Union, Packet Based Multimedia Communication Systems, in: Recommendation H. 323, Telecommunication Standardization Sector of Itu, Geneva, Switzerland (Febuary 1998)
-
(1998)
Packet Based Multimedia Communication Systems
-
-
-
33
-
-
1542400135
-
A Comparison of Sip and H. 323 for Internet Telephony
-
Cambridge, England, July
-
Schulzrinne, H. , Rosenberg, J. : A Comparison of Sip and H. 323 for Internet Telephony. In: International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV), Cambridge, England, pp. 83-86 (July 1998)
-
(1998)
International Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV)
, pp. 83-86
-
-
Schulzrinne, H.1
Rosenberg, J.2
-
34
-
-
55749113850
-
A New Provably Secure Authentication and Key Agreement Protocol for Sip Using Ecc
-
Wu, L. , Zhang, Y. , Wang, F. : A New Provably Secure Authentication and Key Agreement Protocol for Sip Using Ecc. Computer Standards & Interfaces 31, 286-291 (2009)
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 286-291
-
-
Wu, L.1
Zhang, Y.2
Wang, F.3
-
35
-
-
78049334450
-
A Robust Mutual Authentication Protocol for Wireless Sensor Networks
-
to be published.
-
Chen, T.-H. , Shih, W. K. : A Robust Mutual Authentication Protocol for Wireless Sensor Networks. ETRI Journal 32 (2010 to be published. )
-
(2010)
ETRI Journal
, vol.32
-
-
Chen, T.-H.1
Shih, W.K.2
-
37
-
-
0004192381
-
-
CRC Press Inc. , Boca Raton
-
Menezes, A. , Oorschot, P. V. , Sa, V. : Handbook of Applied Cryptography. CRC Press Inc. , Boca Raton (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Oorschot, P.V.2
Sa, V.3
-
38
-
-
85015402934
-
Use of Elliptic Curves in Cryptography
-
Williams, H. C. (ed. ) , Springer, Heidelberg
-
Miller, V. S. : Use of Elliptic Curves in Cryptography. In: Williams, H. C. (ed. ) CRYPTO 1985. LNCS, vol. 218, p. 417. Springer, Heidelberg (1986)
-
(1986)
CRYPTO 1985. LNCS
, vol.218
, pp. 417
-
-
Miller, V.S.1
-
39
-
-
17644373459
-
Authentication Primitives for Secure Protocol Specifications
-
Bodei, C. , Degano, P. , Focardi, R. , Priami, C. : Authentication Primitives for Secure Protocol Specifications. Future Gener. Comp. Sy. 21, 645-653 (2005)
-
(2005)
Future Gener. Comp. Sy.
, vol.21
, pp. 645-653
-
-
Bodei, C.1
Degano, P.2
Focardi, R.3
Priami, C.4
-
40
-
-
0037211327
-
A New Remote User Authentication Scheme for Multi-Server Architecture
-
Lin, I.-C. , Hwang, M.-S. , Li, L.-H. : A New Remote User Authentication Scheme for Multi-Server Architecture. Future Gener. Comp. Sy. 19, 13-22 (2003)
-
(2003)
Future Gener. Comp. Sy.
, vol.19
, pp. 13-22
-
-
Lin, I.-C.1
Hwang, M.-S.2
Li, L.-H.3
-
41
-
-
78651087043
-
An Advanced Ecc Id-Based Remote Mutual Authentication Scheme for Mobile Devices
-
Chen, T.-H. , Chen, Y.-C. , Shih, W.-K. : An Advanced Ecc Id-Based Remote Mutual Authentication Scheme for Mobile Devices. In: The 2010 International Symposium on Service, Security and its Data management technologies in Ubi-com (SSDU), Xi'an, China (2010)
-
(2010)
The 2010 International Symposium on Service Security and Its Data Management Technologies in Ubi-com (SSDU) xi'An China
-
-
Chen, T.-H.1
Chen, Y.-C.2
Shih, W.-K.3
-
42
-
-
0742324846
-
Design and Implementation of Secure E-Mail System Using Elliptic Curve Cryptosystem
-
Lee, W. , Lee, J. : Design and Implementation of Secure E-Mail System Using Elliptic Curve Cryptosystem. Future Gener. Comp. Sy. 20, 315-326 (2004)
-
(2004)
Future Gener. Comp. Sy.
, vol.20
, pp. 315-326
-
-
Lee, W.1
Lee, J.2
|