메뉴 건너뛰기




Volumn 65, Issue 3, 2013, Pages 321-333

Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol

Author keywords

Authentication; Cryptography; Elliptic curve cryptography; Password guessing attack; Protocol; Session initiation protocol

Indexed keywords

AUTHENTICATION PROTOCOLS; ELLIPTIC CURVE CRYPTOGRAPHY; ELLIPTIC CURVE CRYPTOGRAPHY(ECC); MUTUAL AUTHENTICATION; OFFLINE PASSWORD GUESSING ATTACK; PASSWORD GUESSING ATTACK; SESSION INITIATION PROTOCOL; SESSION INITIATION PROTOCOLS;

EID: 84878306534     PISSN: 13807501     EISSN: 15737721     Source Type: Journal    
DOI: 10.1007/s11042-012-1001-8     Document Type: Article
Times cited : (42)

References (23)
  • 1
    • 84879687830 scopus 로고    scopus 로고
    • Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    • doi: 10.1007/s11042-011-0787-0
    • Arshad R, Ikram N (2011) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tool Appl. doi: 10.1007/s11042-011-0787-0
    • (2011) Multimed Tool Appl.
    • Arshad, R.1    Ikram, N.2
  • 2
  • 3
    • 78651081750 scopus 로고    scopus 로고
    • A secured authentication protocol for SIP using elliptic curves cryptography
    • Chen TH, Yeh HL, Liu PC, Hsiang HC, Shih WK (2010) A secured authentication protocol for SIP using elliptic curves cryptography. CN, CCIS 119:46-55
    • (2010) CN, CCIS , vol.119 , pp. 46-55
    • Chen, T.H.1    Yeh, H.L.2    Liu, P.C.3    Hsiang, H.C.4    Shih, W.K.5
  • 4
    • 84976665942 scopus 로고
    • Timestamps in key distribution systems
    • 10.1145/358722.358740
    • Denning D, Sacco G (1981) Timestamps in key distribution systems. Commun ACM 24:533-536
    • (1981) Commun ACM , vol.24 , pp. 533-536
    • Denning, D.1    Sacco, G.2
  • 8
    • 80051571433 scopus 로고    scopus 로고
    • An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
    • doi: 10.1016/j.inffus.2011.01.001
    • He DB, Chen JH, Hu J (2011) An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inform Fusion. doi: 10.1016/j.inffus.2011.01.001
    • (2011) Inform Fusion
    • He, D.B.1    Chen, J.H.2    Hu, J.3
  • 9
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • doi: 10.1007/s10916-011-9658-5
    • He DB, Chen JH, Zhang R (2011) A more secure authentication scheme for telecare medicine information systems. J Med Syst. doi: 10.1007/s10916-011-9658- 5
    • (2011) J Med Syst.
    • He, D.B.1    Chen, J.H.2    Zhang, R.3
  • 10
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • 866109 0622.94015 10.1090/S0025-5718-1987-0866109-5
    • Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48:203-209
    • (1987) Math Comput , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 11
    • 0037282439 scopus 로고    scopus 로고
    • A password authentication scheme with secure password updating
    • 10.1016/S0167-4048(03)00114-7
    • Lin CL, Hwang T (2003) A password authentication scheme with secure password updating. Comput Secur 22(1):68-72
    • (2003) Comput Secur , vol.22 , Issue.1 , pp. 68-72
    • Lin, C.L.1    Hwang, T.2
  • 12
    • 80053590707 scopus 로고    scopus 로고
    • Cryptanalysis of a SIP authentication scheme
    • Springer Berlin/Heidelberg
    • Liu FW, Koenig H (2011) Cryptanalysis of a SIP authentication scheme, in Communications and Multimedia Security, Springer Berlin/Heidelberg:134-143
    • (2011) Communications and Multimedia Security , pp. 134-143
    • Liu, F.W.1    Koenig, H.2
  • 15
    • 0012452053 scopus 로고    scopus 로고
    • IETF Internet Draft (draftthomas-sip-sec-reg-00.txt)
    • Thomas M (2001) SIP security requirements. IETF Internet Draft (draftthomas-sip-sec-reg-00.txt)
    • (2001) SIP Security Requirements
    • Thomas, M.1
  • 16
    • 70349751143 scopus 로고    scopus 로고
    • Efficient nonce-based authentication scheme for session initiation protocol
    • Tsai JL (2009) Efficient nonce-based authentication scheme for session initiation protocol. Int J Netw Secur 8(3):312-316
    • (2009) Int J Netw Secur , vol.8 , Issue.3 , pp. 312-316
    • Tsai, J.L.1
  • 17
    • 0036870280 scopus 로고    scopus 로고
    • SIP security issues: The SIP authentication procedure and its processing load
    • 10.1109/MNET.2002.1081764
    • Veltri L, Salsano S, Papalilo D (2002) SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw 16(6):38-44
    • (2002) IEEE Netw , vol.16 , Issue.6 , pp. 38-44
    • Veltri, L.1    Salsano, S.2    Papalilo, D.3
  • 18
    • 84855301449 scopus 로고    scopus 로고
    • A new authenticated key agreement for session initiation protocol
    • doi: 10.1002/dac.1286
    • Xie Q (2011) A new authenticated key agreement for session initiation protocol. Int J Commun Syst. doi: 10.1002/dac.1286
    • (2011) Int J Commun Syst.
    • Xie, Q.1
  • 19
    • 24344457092 scopus 로고    scopus 로고
    • Secure authentication scheme for session initiation protocol
    • 10.1016/j.cose.2004.10.007
    • Yang CC, Wang RC, Liu WT (2005) Secure authentication scheme for session initiation protocol. Comput Secur 24:381-386
    • (2005) Comput Secur , vol.24 , pp. 381-386
    • Yang, C.C.1    Wang, R.C.2    Liu, W.T.3
  • 21
    • 77952524229 scopus 로고    scopus 로고
    • Robust mutual authentication with a key agreement scheme for the session initiation protocol
    • 10.4103/0256-4602.62780
    • Yoon EJ, Koo KY (2010) Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Tech Rev 27(3):203-213
    • (2010) IETE Tech Rev , vol.27 , Issue.3 , pp. 203-213
    • Yoon, E.J.1    Koo, K.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.