메뉴 건너뛰기




Volumn 42, Issue 4, 2013, Pages 333-342

An enhanced authenticated key agreement for session initiation protocol

Author keywords

Authenticated key agreement; AVISPA tools; Elliptic curve; Impersonation attack; Password guessing attack; Session initiation protocol

Indexed keywords


EID: 84890424682     PISSN: 1392124X     EISSN: None     Source Type: Journal    
DOI: 10.5755/j01.itc.42.4.2496     Document Type: Article
Times cited : (63)

References (28)
  • 1
    • 78649603675 scopus 로고    scopus 로고
    • An effective IPv4-IPv6 translation mechanism for SIP applications in next generation networks
    • W. E. Chen, Y. L. Huang, Y. B. Lin. An effective IPv4-IPv6 translation mechanism for SIP applications in next generation networks. International Journal of Communication Systems, 2010, Vol. 23, No. 8, 919-928.
    • (2010) International Journal of Communication Systems , vol.23 , Issue.8 , pp. 919-928
    • Chen, W.E.1    Huang, Y.L.2    Lin, Y.B.3
  • 2
    • 79951813707 scopus 로고    scopus 로고
    • An ex-tended certificate-based authentication and security protocol for mobile networks
    • C. C. Lee, I. E. Liao, M. S. Hwang. An ex-tended certificate-based authentication and security protocol for mobile networks. Information Technology and Control, 2009, Vol. 38, No. 1, 61-66.
    • (2009) Information Technology and Control , vol.38 , Issue.1 , pp. 61-66
    • Lee, C.C.1    Liao, I.E.2    Hwang, M.S.3
  • 3
    • 84871363867 scopus 로고    scopus 로고
    • A more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications
    • C. T. Li. A more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. Information Technology and Control, 2012, Vol. 41, No. 1, 69-76
    • (2012) Information Technology and Control , vol.41 , Issue.1 , pp. 69-76
    • Li, C.T.1
  • 4
    • 84865690758 scopus 로고    scopus 로고
    • Efficient hierarchical SIP mobility management for WiMAX networks
    • Y. H. Cheng, F. M. Chang, S. J. Kao. Efficient hierarchical SIP mobility management for WiMAX networks. Computers & Mathematics with Applica-tions, 2012, Vol. 64, No. 5, 1522-1531.
    • (2012) Computers & Mathematics With Applica-tions , vol.64 , Issue.5 , pp. 1522-1531
    • Cheng, Y.H.1    Chang, F.M.2    Kao, S.J.3
  • 7
    • 77955431593 scopus 로고    scopus 로고
    • A secure and efficient SIP authentication scheme for converged VoIP networks
    • E. J. Yoon, K. Y. Yoo, C. Kim, Y. S. Hong, M. Jo, H. H. Chen. A secure and efficient SIP authentication scheme for converged VoIP networks. Computer Communications, 2010, Vol. 33, No. 14, 1674-1681.
    • (2010) Computer Communications , vol.33 , Issue.14 , pp. 1674-1681
    • Yoon, E.J.1    Yoo, K.Y.2    Kim, C.3    Hong, Y.S.4    Jo, M.5    Chen, H.H.6
  • 8
    • 55749113850 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement protocol for SIP using ECC
    • L. Wu, Y. Zhang, F. Wang. A new provably secure authentication and key agreement protocol for SIP using ECC. Computer Standards & Interfaces, 2009, Vol. 31, No. 2, 286-291.
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.2 , pp. 286-291
    • Wu, L.1    Zhang, Y.2    Wang, F.3
  • 9
    • 74149091306 scopus 로고    scopus 로고
    • A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves
    • Y.P. Liao, S. S. Wang. A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Computer Communications, 2010, Vol. 33, No. 3, 372-380.
    • (2010) Computer Communications , vol.33 , Issue.3 , pp. 372-380
    • Liao, Y.P.1    Wang, S.S.2
  • 11
    • 84863985527 scopus 로고    scopus 로고
    • A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    • D. He, J. Chen, Y. Chen. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks, 2012, Vol. 5, No. 12, 1423-1429.
    • (2012) Security and Communication Networks , vol.5 , Issue.12 , pp. 1423-1429
    • He, D.1    Chen, J.2    Chen, Y.3
  • 12
    • 80053369762 scopus 로고    scopus 로고
    • An new efficient key agreement scheme for VSAT satellite communications based on elliptic curve cryptosystem
    • J. W. Hong, S. Y. Yoon, D. I. Park, M. J. Choi, E. J. Yoon, K. Y. Yoo. An new efficient key agreement scheme for VSAT satellite communications based on elliptic curve cryptosystem. Information Technology and Control, 2011, Vol. 40, No. 3, 252-259.
    • (2011) Information Technology and Control , vol.40 , Issue.3 , pp. 252-259
    • Hong, J.W.1    Yoon, S.Y.2    Park, D.I.3    Choi, M.J.4    Yoon, E.J.5    Yoo, K.Y.6
  • 13
    • 24344457092 scopus 로고    scopus 로고
    • Secure authentication scheme for session initiation protocol
    • C. C. Yang, R. C. Wang, W. T. Liu. Secure authentication scheme for session initiation protocol. Computers & Security, 2005, Vol. 24, No. 5, 381-386.
    • (2005) Computers & Security , vol.24 , Issue.5 , pp. 381-386
    • Yang, C.C.1    Wang, R.C.2    Liu, W.T.3
  • 15
    • 73549097525 scopus 로고    scopus 로고
    • Off-line Password-guessing Attack to Yang's and Huang's Authentication Schemes For Session Initiation Protocol
    • H. Jo, Y. Lee, M. Kim, S. Kim, D. Won. Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol. Fifth International Joint Conference on INC, IMS and IDC, 2009, pp. 618-621.
    • (2009) Fifth International Joint Conference on INC, IMS and IDC , pp. 618-621
    • Jo, H.1    Lee, Y.2    Kim, M.3    Kim, S.4    Won, D.5
  • 18
    • 80053590707 scopus 로고    scopus 로고
    • Cryptanalysis of a SIP authentication scheme. In: 12th IFIP TC6/TC11 International Conference
    • F. W. Liu, H. Koenig. Cryptanalysis of a SIP authentication scheme. In: 12th IFIP TC6/TC11 International Conference, CMS 2011, Lecture Notes in Computer Science, 2011, Vol. 7025, 134-143.
    • (2011) CMS 2011, Lecture Notes In Computer Science , vol.7025 , pp. 134-143
    • Liu, F.W.1    Koenig, H.2
  • 19
    • 70349751143 scopus 로고    scopus 로고
    • Efficient nonce-based authentication scheme for session initiation protocol
    • J. L. Tsai. Efficient nonce-based authentication scheme for session initiation protocol. International Journal of Network Security, 2009, Vol. 8, No. 3, 312-316.
    • (2009) International Journal of Network Security , vol.8 , Issue.3 , pp. 312-316
    • Tsai, J.L.1
  • 22
    • 84879687830 scopus 로고    scopus 로고
    • Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
    • R. Arshad, N. Ikram. Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimedia Tools and Applications, 2013, Vol. 66, No. 2, 165-178.
    • (2013) Multimedia Tools and Applications , vol.66 , Issue.2 , pp. 165-178
    • Arshad, R.1    Ikram, N.2
  • 23
    • 84878306534 scopus 로고    scopus 로고
    • Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol
    • H. Tang, X. Liu. Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol, Multimedia Tools and Applications, 2013, Vol. 65, No. 3, 165-178.
    • (2013) Multimedia Tools and Applications , vol.65 , Issue.3 , pp. 165-178
    • Tang, H.1    Liu, X.2
  • 24
    • 77952524229 scopus 로고    scopus 로고
    • Robust mutual authentication with a key agreement scheme for the session initiation protocol
    • E. J. Yoon, Y. N. Shin, I. S. Jeon, K. Y. Yoo. Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Technical Review, 2010, Vol. 27, No. 3, 203-213.
    • (2010) IETE Technical Review , vol.27 , Issue.3 , pp. 203-213
    • Yoon, E.J.1    Shin, Y.N.2    Jeon, I.S.3    Yoo, K.Y.4
  • 25
    • 84855301449 scopus 로고    scopus 로고
    • A new authenticated key agreement for session initiation protocol
    • Q. Xie. A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems, 2012, Vol. 25, No. 1, 47-54.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.1 , pp. 47-54
    • Xie, Q.1
  • 26
    • 84890372205 scopus 로고    scopus 로고
    • The AVISPA Project
    • The AVISPA Project. http://www.avispa-project.org.
  • 28
    • 48949088211 scopus 로고    scopus 로고
    • The Scyther Tool: Verification, falsification, and analysis of security protocols
    • C. Cremers. The Scyther Tool: verification, falsification, and analysis of security protocols. In: CAV08, LNCS, 2008, Vol. 5123, pp. 414-418.
    • (2008) CAV08, LNCS , vol.5123 , pp. 414-418
    • Cremers, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.