-
1
-
-
84874338995
-
-
Private header (P-header) extensions to the session initiation protocol (SIP) for the 3rd-generation partnership project (3GPP). IETF RFC 3455
-
Martine M, Henrikson E, Mills D. Private header (P-header) extensions to the session initiation protocol (SIP) for the 3rd-generation partnership project (3GPP). IETF RFC 3455, 2003.
-
(2003)
-
-
Martine, M.1
Henrikson, E.2
Mills, D.3
-
2
-
-
84874338590
-
-
HTTP authentication: basic and digest access authentication. IETF RFC 2617
-
Franks J, Hallam-Baker P, Hostetler J, et al. HTTP authentication: basic and digest access authentication. IETF RFC 2617, 1999.
-
(1999)
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
-
3
-
-
0036870280
-
SIP security issues: the SIP authentication procedure and its processing load
-
Salsano S, Veltri L, Papalilo D. SIP security issues: the SIP authentication procedure and its processing load. IEEE Network 2002; 16(16):38-44.
-
(2002)
IEEE Network
, vol.16
, Issue.16
, pp. 38-44
-
-
Salsano, S.1
Veltri, L.2
Papalilo, D.3
-
4
-
-
84881472647
-
Survrery of security vulnerabilities in session initial protocol
-
Geneiatakis D, Dagiuklas T, Kambourakis G, Lambrinoudakis C, Gritzalis S. Survrery of security vulnerabilities in session initial protocol. IEEE Communications surveys and tutorials 2006; 8(3):68-81.
-
(2006)
IEEE Communications surveys and tutorials
, vol.8
, Issue.3
, pp. 68-81
-
-
Geneiatakis, D.1
Dagiuklas, T.2
Kambourakis, G.3
Lambrinoudakis, C.4
Gritzalis, S.5
-
5
-
-
33750013256
-
Denial of service attacks targeting a SIP VoIP infrastructure: stack scenarios and prevention mechanisms
-
Sisalemd D, Kuthan J, Ehlerts S. Denial of service attacks targeting a SIP VoIP infrastructure: stack scenarios and prevention mechanisms. IEEE Network 2006; 20(5):26-31.
-
(2006)
IEEE Network
, vol.20
, Issue.5
, pp. 26-31
-
-
Sisalemd, D.1
Kuthan, J.2
Ehlerts, S.3
-
7
-
-
77955431593
-
A secure and efficient SIP authentication scheme for converged VoIP networks
-
Yoon E, Yoo K, Kim C, Hong Y, Jo M, Chen H. A secure and efficient SIP authentication scheme for converged VoIP networks. Computer Communications 2010; 33(14):1674-1681.
-
(2010)
Computer Communications
, vol.33
, Issue.14
, pp. 1674-1681
-
-
Yoon, E.1
Yoo, K.2
Kim, C.3
Hong, Y.4
Jo, M.5
Chen, H.6
-
8
-
-
84874330788
-
-
User authentication in SIP. TKK T-110.5290 seminar on Network Security, 12-11/12
-
Vesterinen P. User authentication in SIP. TKK T-110.5290 seminar on Network Security, 12-11/12, 2006.
-
(2006)
-
-
Vesterinen, P.1
-
9
-
-
24344457092
-
Secure authentication scheme for session initiation protocol
-
Yang C, Wang R, Liu W. Secure authentication scheme for session initiation protocol. Computer and Security 2005; 24:381-386.
-
(2005)
Computer and Security
, vol.24
, pp. 381-386
-
-
Yang, C.1
Wang, R.2
Liu, W.3
-
10
-
-
84874295227
-
-
A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography. Proc. of AusCert R&D Stream;
-
Ring J, Choo K, Foo E, Looi M. A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography. Proc. of AusCert R&D Stream 2006; 61-72.
-
(2006)
, pp. 61-72
-
-
Ring, J.1
Choo, K.2
Foo, E.3
Looi, M.4
-
11
-
-
44549086712
-
A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography
-
Wang F, Zhang Y. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Computer Communication 2008; 31:2142-2149.
-
(2008)
Computer Communication
, vol.31
, pp. 2142-2149
-
-
Wang, F.1
Zhang, Y.2
-
12
-
-
63149153148
-
A lightweight protection mechanism against signaling attacks in a SIP-Based VoIP environment
-
Dimitris G, Costas L. A lightweight protection mechanism against signaling attacks in a SIP-Based VoIP environment. Telecommunication Systems 2007; 36(4):153-159.
-
(2007)
Telecommunication Systems
, vol.36
, Issue.4
, pp. 153-159
-
-
Dimitris, G.1
Costas, L.2
-
13
-
-
55749113850
-
A new provably secure authentication and key agreement protocol for SIP using ECC
-
Wu L, Zhang Y, Wang F. A new provably secure authentication and key agreement protocol for SIP using ECC. Computer Standard and Interfaces 2009; 31(2):286-291.
-
(2009)
Computer Standard and Interfaces
, vol.31
, Issue.2
, pp. 286-291
-
-
Wu, L.1
Zhang, Y.2
Wang, F.3
-
14
-
-
74149091306
-
A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves
-
Liao Y, Wang S. A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Computer Communications 2010; 33(3):372-380.
-
(2010)
Computer Communications
, vol.33
, Issue.3
, pp. 372-380
-
-
Liao, Y.1
Wang, S.2
-
16
-
-
0000112683
-
Elliptic curve cryptosystem
-
Koblitz N. Elliptic curve cryptosystem. Mathematics of Computation 1987; 48:203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
17
-
-
84958760024
-
-
Elliptic curve based password authenticated key exchange protocols. Proc. of ACISP'01.;
-
Boyd C, Montague P, Nguyen K. Elliptic curve based password authenticated key exchange protocols. Proc. of ACISP'01. 2001; 487-501.
-
(2001)
, pp. 487-501
-
-
Boyd, C.1
Montague, P.2
Nguyen, K.3
-
18
-
-
79953312656
-
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication
-
Han K, Yeun C, Shon T, Park J, Kim K. A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication. International Journal of Communication Systems 2011; 24(4):461-472.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.4
, pp. 461-472
-
-
Han, K.1
Yeun, C.2
Shon, T.3
Park, J.4
Kim, K.5
-
20
-
-
84879687830
-
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
-
doi:10.1007/s11042-011-0787-0
-
Arshad R, Ikram N. Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimedia Tools and Applications 2011. doi:10.1007/s11042-011-0787-0.
-
(2011)
Multimedia Tools and Applications
-
-
Arshad, R.1
Ikram, N.2
-
21
-
-
24144443144
-
-
Simple password-based encrypted key exchange protocols. Proc. of CT-RSA'05(LNCS 3376).;
-
Abdalla M, Pointcheval D. Simple password-based encrypted key exchange protocols. Proc. of CT-RSA'05(LNCS 3376). 2005; 191-208.
-
(2005)
, pp. 191-208
-
-
Abdalla, M.1
Pointcheval, D.2
-
25
-
-
29144477624
-
Refinements of Miller's algorithm for computing Weil/Tate pairing
-
Blake I, Murty K, Xu G. Refinements of Miller's algorithm for computing Weil/Tate pairing. Journal of Algorithms 2006; 58(2): 134-149.
-
(2006)
Journal of Algorithms
, vol.58
, Issue.2
, pp. 134-149
-
-
Blake, I.1
Murty, K.2
Xu, G.3
-
26
-
-
84874318583
-
-
Short programs for functions on curves. Unpublished Manuscrip.
-
Miller V. Short programs for functions on curves. Unpublished Manuscrip. 1986, http://crypto.stanford.edu/miller/miller.pdf.
-
(1986)
-
-
Miller, V.1
-
27
-
-
84937428623
-
-
Efficient algorithms for pairing-based cryptosystems. Proc. of CRYPTO'02 (LNCS 2442)
-
Barreto P, Kim H, Lynn B. Efficient algorithms for pairing-based cryptosystems. Proc. of CRYPTO'02 (LNCS 2442), 2002; 354-368.
-
(2002)
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Lynn, B.3
-
28
-
-
82955246861
-
-
Implementing the Tate pairing. Proc. of ANTS-V (LNCS 2369)
-
Galbraith S, Harrison K, Soldera D. Implementing the Tate pairing. Proc. of ANTS-V (LNCS 2369), 2002; 324-337.
-
(2002)
, pp. 324-337
-
-
Galbraith, S.1
Harrison, K.2
Soldera, D.3
-
29
-
-
84874312220
-
-
3rd Generation Partnership Project. TS 33.106: 'Lawful Interception Requirements'. V8.1.0 edn
-
3rd Generation Partnership Project. TS 33.106: 'Lawful Interception Requirements'. V8.1.0 edn, 2008.
-
(2008)
-
-
-
30
-
-
77952524229
-
Robust mutual authentication with a key agreement scheme for the session initiation protocol
-
Yoon E, Shin Y, Jeon I, Yoo K. Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Technical Review 2010; 27(3):203-213.
-
(2010)
IETE Technical Review
, vol.27
, Issue.3
, pp. 203-213
-
-
Yoon, E.1
Shin, Y.2
Jeon, I.3
Yoo, K.4
-
31
-
-
84855301449
-
A new authenticated key agreement for session initiation protocol
-
doi:10.1002/dac.1286
-
Xie Q. A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems 2011. doi:10.1002/dac.1286.
-
(2011)
International Journal of Communication Systems
-
-
Xie, Q.1
-
33
-
-
26444476977
-
Interactive Diffie-Hellman assumptions with applications to password-based authentication
-
Springer-Verlag
-
Abdalla M, Pointcheval D. Interactive Diffie-Hellman assumptions with applications to password-based authentication. In Proc. of FC'05. Springer-Verlag, 2005; 341-356.
-
(2005)
Proc. of FC'05
, pp. 341-356
-
-
Abdalla, M.1
Pointcheval, D.2
-
34
-
-
33646805409
-
Examining indistinguishability-based proof models for key establishment protocols
-
Springer-Verlag
-
Choo K, Boyd C, Hitchcock Y. Examining indistinguishability-based proof models for key establishment protocols. In Proc. of ASIACRYPT'05. Springer-Verlag, 2005; 585-604.
-
(2005)
Proc. of ASIACRYPT'05
, pp. 585-604
-
-
Choo, K.1
Boyd, C.2
Hitchcock, Y.3
-
35
-
-
84873466407
-
Authenticated key exchange secure against dictionary attacks
-
Springer-Verlag
-
Bellare M, Pointcheval D, Rogaway P. Authenticated key exchange secure against dictionary attacks. In Proc. of EUROCRYPT'00. Springer-Verlag, 2000; 139-155.
-
(2000)
Proc. of EUROCRYPT'00
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
36
-
-
84937579774
-
The oracle Diffie-Hellman assumptions and an analysis of DHIES
-
Springer-Verlag
-
Abdalla M, Bellare M, Rogaway P. The oracle Diffie-Hellman assumptions and an analysis of DHIES. In Proc. of CT-RSA'01. Springer-Verlag, 2001; 143-158.
-
(2001)
Proc. of CT-RSA'01
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
37
-
-
24144444566
-
One-time verifier-based encrypted key exchange
-
Springer-Verlag
-
Abdalla M, Chevassut O, Pointcheval D. One-time verifier-based encrypted key exchange. In Proc. ofPKC'05. Springer-Verlag, 2005; 47-64.
-
(2005)
Proc. ofPKC'05
, pp. 47-64
-
-
Abdalla, M.1
Chevassut, O.2
Pointcheval, D.3
-
38
-
-
84937389342
-
The gap-problems: a new class of problems for the security of cryptographic schemes
-
Springer-Verlag
-
Okamoto T, Pointcheval D. The gap-problems: a new class of problems for the security of cryptographic schemes. In Proc. of PKC'01. Springer-Verlag, 2001; 104-118.
-
(2001)
Proc. of PKC'01
, pp. 104-118
-
-
Okamoto, T.1
Pointcheval, D.2
|