-
1
-
-
78649603675
-
An effective IPv4-IPv6 translation mechanism for SIP applications in next generation networks
-
W. E. Chen, Y. L. Huang, Y. B. Lin. An effective IPv4-IPv6 translation mechanism for SIP applications in next generation networks. International Journal of Communication Systems, 2010, Vol. 23, No. 8, 919-928.
-
(2010)
International Journal of Communication Systems
, vol.23
, Issue.8
, pp. 919-928
-
-
Chen, W.E.1
Huang, Y.L.2
Lin, Y.B.3
-
2
-
-
79951813707
-
An ex-tended certificate-based authentication and security protocol for mobile networks
-
C. C. Lee, I. E. Liao, M. S. Hwang. An ex-tended certificate-based authentication and security protocol for mobile networks. Information Technology and Control, 2009, Vol. 38, No. 1, 61-66.
-
(2009)
Information Technology and Control
, vol.38
, Issue.1
, pp. 61-66
-
-
Lee, C.C.1
Liao, I.E.2
Hwang, M.S.3
-
3
-
-
84871363867
-
A more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications
-
C. T. Li. A more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. Information Technology and Control, 2012, Vol. 41, No. 1, 69-76
-
(2012)
Information Technology and Control
, vol.41
, Issue.1
, pp. 69-76
-
-
Li, C.T.1
-
4
-
-
84865690758
-
Efficient hierarchical SIP mobility management for WiMAX networks
-
Y. H. Cheng, F. M. Chang, S. J. Kao. Efficient hierarchical SIP mobility management for WiMAX networks. Computers & Mathematics with Applica-tions, 2012, Vol. 64, No. 5, 1522-1531.
-
(2012)
Computers & Mathematics With Applica-tions
, vol.64
, Issue.5
, pp. 1522-1531
-
-
Cheng, Y.H.1
Chang, F.M.2
Kao, S.J.3
-
5
-
-
84881472647
-
Survey of security vulnerabilities in session initiation protocol
-
D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehlert, D. Sisalem. Survey of security vulnerabilities in session initiation protocol. IEEE Communications Surveys and Tutorials, 2006, Vol. 8, No. 3, 68-81.
-
(2006)
IEEE Communications Surveys and Tutorials
, vol.8
, Issue.3
, pp. 68-81
-
-
Geneiatakis, D.1
Dagiuklas, T.2
Kambourakis, G.3
Lambrinoudakis, C.4
Gritzalis, S.5
Ehlert, S.6
Sisalem, D.7
-
6
-
-
84890346107
-
Proposed secure SIP authentication scheme based on elliptic curve cryptography
-
S. S. Mousavi-Nik, M. H. Yaghmaee-Moghaddam, M. B. Ghaznavi-Ghoushchi. Proposed secure SIP authentication scheme based on elliptic curve cryptography. International Journal of Computer Applications. 2012, Vol. 58, No. 8, 25-30.
-
(2012)
International Journal of Computer Applications
, vol.58
, Issue.8
, pp. 25-30
-
-
Mousavi-Nik, S.S.1
Yaghmaee-Moghaddam, M.H.2
Ghaznavi-Ghoushchi, M.B.3
-
7
-
-
77955431593
-
A secure and efficient SIP authentication scheme for converged VoIP networks
-
E. J. Yoon, K. Y. Yoo, C. Kim, Y. S. Hong, M. Jo, H. H. Chen. A secure and efficient SIP authentication scheme for converged VoIP networks. Computer Communications, 2010, Vol. 33, No. 14, 1674-1681.
-
(2010)
Computer Communications
, vol.33
, Issue.14
, pp. 1674-1681
-
-
Yoon, E.J.1
Yoo, K.Y.2
Kim, C.3
Hong, Y.S.4
Jo, M.5
Chen, H.H.6
-
8
-
-
55749113850
-
A new provably secure authentication and key agreement protocol for SIP using ECC
-
L. Wu, Y. Zhang, F. Wang. A new provably secure authentication and key agreement protocol for SIP using ECC. Computer Standards & Interfaces, 2009, Vol. 31, No. 2, 286-291.
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.2
, pp. 286-291
-
-
Wu, L.1
Zhang, Y.2
Wang, F.3
-
9
-
-
74149091306
-
A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves
-
Y.P. Liao, S. S. Wang. A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Computer Communications, 2010, Vol. 33, No. 3, 372-380.
-
(2010)
Computer Communications
, vol.33
, Issue.3
, pp. 372-380
-
-
Liao, Y.P.1
Wang, S.S.2
-
10
-
-
84872342509
-
Practical authentication scheme for SIP
-
S. Wu, Q. Pu, F. Kang. Practical authentication scheme for SIP. Peer-to-Peer Networking and Applications. 2013, Vol. 6, No. 1, 61-74.
-
(2013)
Peer-to-Peer Networking and Applications
, vol.6
, Issue.1
, pp. 61-74
-
-
Wu, S.1
Pu, Q.2
Kang, F.3
-
11
-
-
84863985527
-
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
-
D. He, J. Chen, Y. Chen. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks, 2012, Vol. 5, No. 12, 1423-1429.
-
(2012)
Security and Communication Networks
, vol.5
, Issue.12
, pp. 1423-1429
-
-
He, D.1
Chen, J.2
Chen, Y.3
-
12
-
-
80053369762
-
An new efficient key agreement scheme for VSAT satellite communications based on elliptic curve cryptosystem
-
J. W. Hong, S. Y. Yoon, D. I. Park, M. J. Choi, E. J. Yoon, K. Y. Yoo. An new efficient key agreement scheme for VSAT satellite communications based on elliptic curve cryptosystem. Information Technology and Control, 2011, Vol. 40, No. 3, 252-259.
-
(2011)
Information Technology and Control
, vol.40
, Issue.3
, pp. 252-259
-
-
Hong, J.W.1
Yoon, S.Y.2
Park, D.I.3
Choi, M.J.4
Yoon, E.J.5
Yoo, K.Y.6
-
13
-
-
24344457092
-
Secure authentication scheme for session initiation protocol
-
C. C. Yang, R. C. Wang, W. T. Liu. Secure authentication scheme for session initiation protocol. Computers & Security, 2005, Vol. 24, No. 5, 381-386.
-
(2005)
Computers & Security
, vol.24
, Issue.5
, pp. 381-386
-
-
Yang, C.C.1
Wang, R.C.2
Liu, W.T.3
-
15
-
-
73549097525
-
Off-line Password-guessing Attack to Yang's and Huang's Authentication Schemes For Session Initiation Protocol
-
H. Jo, Y. Lee, M. Kim, S. Kim, D. Won. Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol. Fifth International Joint Conference on INC, IMS and IDC, 2009, pp. 618-621.
-
(2009)
Fifth International Joint Conference on INC, IMS and IDC
, pp. 618-621
-
-
Jo, H.1
Lee, Y.2
Kim, M.3
Kim, S.4
Won, D.5
-
18
-
-
80053590707
-
Cryptanalysis of a SIP authentication scheme. In: 12th IFIP TC6/TC11 International Conference
-
F. W. Liu, H. Koenig. Cryptanalysis of a SIP authentication scheme. In: 12th IFIP TC6/TC11 International Conference, CMS 2011, Lecture Notes in Computer Science, 2011, Vol. 7025, 134-143.
-
(2011)
CMS 2011, Lecture Notes In Computer Science
, vol.7025
, pp. 134-143
-
-
Liu, F.W.1
Koenig, H.2
-
19
-
-
70349751143
-
Efficient nonce-based authentication scheme for session initiation protocol
-
J. L. Tsai. Efficient nonce-based authentication scheme for session initiation protocol. International Journal of Network Security, 2009, Vol. 8, No. 3, 312-316.
-
(2009)
International Journal of Network Security
, vol.8
, Issue.3
, pp. 312-316
-
-
Tsai, J.L.1
-
20
-
-
70349751538
-
A new authentication scheme for session initiation protocol
-
E. J. Yoon, K. Y. Yoo. A new authentication scheme for session initiation protocol. In: International Conference on Complex, Intelligent and Soft-ware Intensive Systems, CISIS'09, 2009, pp. 549-554.
-
(2009)
International Conference On Complex, Intelligent and Soft-ware Intensive Systems, CISIS'09
, pp. 549-554
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
21
-
-
78651081750
-
A secured authentication protocol for SIP using elliptic curves cryptography. In: FGCN 2010, Part I
-
T. H. Chen, H. L. Yeh, P. C. Liu, H. C. Hsiang, W. K. Shih. A secured authentication protocol for SIP using elliptic curves cryptography. In: FGCN 2010, Part I, Communications in Computer and Information Science, 2010, Vol. 119, pp. 46-55.
-
(2010)
Communications In Computer and Information Science
, vol.119
, pp. 46-55
-
-
Chen, T.H.1
Yeh, H.L.2
Liu, P.C.3
Hsiang, H.C.4
Shih, W.K.5
-
22
-
-
84879687830
-
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
-
R. Arshad, N. Ikram. Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimedia Tools and Applications, 2013, Vol. 66, No. 2, 165-178.
-
(2013)
Multimedia Tools and Applications
, vol.66
, Issue.2
, pp. 165-178
-
-
Arshad, R.1
Ikram, N.2
-
23
-
-
84878306534
-
Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol
-
H. Tang, X. Liu. Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol, Multimedia Tools and Applications, 2013, Vol. 65, No. 3, 165-178.
-
(2013)
Multimedia Tools and Applications
, vol.65
, Issue.3
, pp. 165-178
-
-
Tang, H.1
Liu, X.2
-
24
-
-
77952524229
-
Robust mutual authentication with a key agreement scheme for the session initiation protocol
-
E. J. Yoon, Y. N. Shin, I. S. Jeon, K. Y. Yoo. Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Technical Review, 2010, Vol. 27, No. 3, 203-213.
-
(2010)
IETE Technical Review
, vol.27
, Issue.3
, pp. 203-213
-
-
Yoon, E.J.1
Shin, Y.N.2
Jeon, I.S.3
Yoo, K.Y.4
-
25
-
-
84855301449
-
A new authenticated key agreement for session initiation protocol
-
Q. Xie. A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems, 2012, Vol. 25, No. 1, 47-54.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.1
, pp. 47-54
-
-
Xie, Q.1
-
26
-
-
84890372205
-
-
The AVISPA Project
-
The AVISPA Project. http://www.avispa-project.org.
-
-
-
-
28
-
-
48949088211
-
The Scyther Tool: Verification, falsification, and analysis of security protocols
-
C. Cremers. The Scyther Tool: verification, falsification, and analysis of security protocols. In: CAV08, LNCS, 2008, Vol. 5123, pp. 414-418.
-
(2008)
CAV08, LNCS
, vol.5123
, pp. 414-418
-
-
Cremers, C.1
|