메뉴 건너뛰기




Volumn 8, Issue 3, 2014, Pages 83-91

Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84894239804     PISSN: 17518628     EISSN: None     Source Type: Journal    
DOI: 10.1049/iet-com.2012.0783     Document Type: Article
Times cited : (18)

References (22)
  • 2
    • 79960900018 scopus 로고    scopus 로고
    • 'A dependable privacy protection for end-to-end VoIP via elliptic-curve Diffie-Hellan and dynamic key changes'
    • Wang, C.-H., Liu, Y.-S.: 'A dependable privacy protection for end-to-end VoIP via elliptic-curve Diffie-Hellan and dynamic key changes', J. Netw. Comput. Appl., 2011, 34, pp. 1545-1556
    • (2011) J. Netw. Comput. Appl. , vol.34 , pp. 1545-1556
    • Wang, C.-H.1    Liu, Y.-S.2
  • 3
    • 24344457092 scopus 로고    scopus 로고
    • 'Secure authentication scheme for session initiation protocol'
    • Yang, C., Wang, R., Liu, W.: 'Secure authentication scheme for session initiation protocol', Comput. Secur., 2005, 24, pp. 381-386
    • (2005) Comput. Secur. , vol.24 , pp. 381-386
    • Yang, C.1    Wang, R.2    Liu, W.3
  • 4
    • 33847747356 scopus 로고    scopus 로고
    • 'A new efficient authentication scheme for session initiation protocol'
    • Kaohsiung, Taiwan, ROC, October
    • Huang, H., Wei, W., Brown, G.: 'A new efficient authentication scheme for session initiation protocol'. Proc. JCIS 06, Kaohsiung, Taiwan, ROC, October 2006
    • (2006) Proc. JCIS 06
    • Huang, H.1    Wei, W.2    Brown, G.3
  • 5
    • 73549097525 scopus 로고    scopus 로고
    • 'Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol'
    • Jo, H., Lee, Y., Kim, M., Kim, S.,Won, D.: 'Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol'. Proc. INC, IMS and IDC, Seoul, Korea, August 2009, pp. 618-621
    • (2009) Proc. INC, IMS and IDC, Seoul, Korea, August , pp. 618-621
    • Jo, H.1    Lee, Y.2    Kim, M.3    Kim, S.4    Won, D.5
  • 6
    • 44549088249 scopus 로고    scopus 로고
    • 'A new authentication mechanism and key agreement protocol for sip using identity-based cryptography'
    • Australia, May
    • Ring, J., Choo, K.-K.R., Foo, E., Looi, M.: 'A new authentication mechanism and key agreement protocol for sip using identity-based cryptography'. Proc. AusCERT R&D Stream, Gold Coast, Australia, May 2006, pp. 61-72
    • (2006) Proc. AusCERT R&D Stream, Gold Coast , pp. 61-72
    • Ring, J.1    Choo, K.-K.2    Foo, E.3    Looi, M.4
  • 7
    • 44549086712 scopus 로고    scopus 로고
    • 'A new provable secure authentication and key agreement mechanism for SIP using certificate less public key cryptography'
    • Wang, F., Zhang, Y.: 'A new provable secure authentication and key agreement mechanism for SIP using certificate less public key cryptography', Comput. Commun., 2008, 31, pp. 2142-2149
    • (2008) Comput. Commun. , vol.31 , pp. 2142-2149
    • Wang, F.1    Zhang, Y.2
  • 8
    • 55749113850 scopus 로고    scopus 로고
    • 'A new provably secure authentication and key agreement protocol for SIP using ECC'
    • Wu, L., Zhang, Y.,Wang, F.: 'A new provably secure authentication and key agreement protocol for SIP using ECC', Comput. Stand. Interf., 2009, 31, pp. 286-291
    • (2009) Comput. Stand. Interf. , vol.31 , pp. 286-291
    • Wu, L.1    Zhang, Y.2    Wang, F.3
  • 9
    • 0000112683 scopus 로고
    • 'Elliptic curve cryptosystems'
    • Koblitz, N.: 'Elliptic curve cryptosystems', Math. Comput., 1978, 48, pp. 203-209
    • (1978) Math. Comput. , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 10
    • 77953567600 scopus 로고    scopus 로고
    • 'A workload characterization of elliptic curve cryptography methods in embedded environment'
    • Branovic, I., Giorgi, R., Martinelli, E.: 'A workload characterization of elliptic curve cryptography methods in embedded environment', ACM SIGARCH Comput. Archit. News, 2004, 32, pp. 27-34
    • (2004) ACM SIGARCH Comput. Archit. News , vol.32 , pp. 27-34
    • Branovic, I.1    Giorgi, R.2    Martinelli, E.3
  • 11
    • 74149091306 scopus 로고    scopus 로고
    • 'A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves'
    • Liao, Y.-P., Wang, S.-S.: 'A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves', Comput. Commun., 2010, 33, pp. 372-380
    • (2010) Comput. Commun. , vol.33 , pp. 372-380
    • Liao, Y.-P.1    Wang, S.-S.2
  • 12
    • 79961144812 scopus 로고    scopus 로고
    • 'A pairing-free identity-based authenticated key agreement mechanism for SIP'
    • Guilin China, May
    • Ni, L., Chen, G., Li, J.: 'A pairing-free identity-based authenticated key agreement mechanism for SIP'. Proc. ICNCIS2011, Guilin China, May 2011, pp. 209-217
    • (2011) Proc. ICNCIS2011 , pp. 209-217
    • Ni, L.1    Chen, G.2    Li, J.3
  • 13
    • 77955431593 scopus 로고    scopus 로고
    • 'A secure and efficient SIP authentication scheme for converged VoIP networks'
    • Yoon, E.J., Yoo, K.Y.: 'A secure and efficient SIP authentication scheme for converged VoIP networks', Comput. Commun., 2010, 33, pp. 1674-1681
    • (2010) Comput. Commun. , vol.33 , pp. 1674-1681
    • Yoon, E.J.1    Yoo, K.Y.2
  • 15
    • 80053146852 scopus 로고    scopus 로고
    • 'Cryptanalysis of SIP secure and efficient authentication scheme'
    • Xian, China, May
    • Gokhroo, M.K., Jaidhar, C.D., Tomar, A.S.: 'Cryptanalysis of SIP secure and efficient authentication scheme'. Proc. ICCSN 2011, Xian, China, May 2011, pp. 308-310
    • (2011) Proc. ICCSN 2011 , pp. 308-310
    • Gokhroo, M.K.1    Jaidhar, C.D.2    Tomar, A.S.3
  • 16
    • 78651063942 scopus 로고    scopus 로고
    • 'Efficient nonce-based authentication scheme for session initiation protocol'
    • Tsai, J.L.: 'Efficient nonce-based authentication scheme for session initiation protocol', Int. J. Netw. Secur., 2009, 9, pp. 12-16
    • (2009) Int. J. Netw. Secur. , vol.9 , pp. 12-16
    • Tsai, J.L.1
  • 17
    • 77952524229 scopus 로고    scopus 로고
    • 'Robust mutual authentication with a key agreement scheme for the session initiation protocol'
    • Yoon, E., Shin, Y., Jeon, I., Yoo, K.: 'Robust mutual authentication with a key agreement scheme for the session initiation protocol', IETE Tech. Rev., 2010, 27, pp. 203-213
    • (2010) IETE Tech. Rev. , vol.27 , pp. 203-213
    • Yoon, E.1    Shin, Y.2    Jeon, I.3    Yoo, K.4
  • 18
    • 84855301449 scopus 로고    scopus 로고
    • 'A new authenticated key agreement for session initiation protocol'
    • Xie, Q.: 'A new authenticated key agreement for session initiation protocol', Int. J. Commun. Syst., 2012, 25, pp. 47-54
    • (2012) Int. J. Commun. Syst. , vol.25 , pp. 47-54
    • Xie, Q.1
  • 19
    • 84879687830 scopus 로고    scopus 로고
    • 'Elliptic curve cryptography based mutual authentication scheme for session initiation protocol'
    • doi: 10.1007/s11042-011-0787-0
    • Arshad, R., Ikram, N.: 'Elliptic curve cryptography based mutual authentication scheme for session initiation protocol', Multim. Tools Appl., 2013, 66, (2), pp. 165-178, doi: 10.1007/s11042-011-0787-0
    • (2013) Multim. Tools Appl. , vol.66 , Issue.2 , pp. 165-178
    • Arshad, R.1    Ikram, N.2
  • 20
    • 84863985527 scopus 로고    scopus 로고
    • 'A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography'
    • doi:10.1002/sec.506
    • He, D., Chen, J., Chen, Y.: 'A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography', Secur. Commun. Netw., 2012, 5, (12), pp. 1423-1429, doi:10.1002/sec.506
    • (2012) Secur. Commun. Netw. , vol.5 , Issue.12 , pp. 1423-1429
    • He, D.1    Chen, J.2    Chen, Y.3
  • 21
    • 54949140749 scopus 로고    scopus 로고
    • 'A secure authentication scheme with anonymity for wireless communications'
    • Wu, C.C., Lee,W.B., Tsaur,W.J.: 'A secure authentication scheme with anonymity for wireless communications', IEEE Commun. Lett., 2008, 12, (10), pp. 722-723
    • (2008) IEEE Commun. Lett. , vol.12 , Issue.10 , pp. 722-723
    • Wu, C.C.1    Lee, W.B.2    Tsaur, W.J.3
  • 22


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.