-
1
-
-
0037984544
-
-
RFC 3261, June
-
Rosenberg, J., Schulzrinne, H., Camarillo, G.: 'SIP: session initiation protocol'. RFC 3261, June 2002
-
(2002)
'SIP: session initiation protocol'
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
-
2
-
-
79960900018
-
'A dependable privacy protection for end-to-end VoIP via elliptic-curve Diffie-Hellan and dynamic key changes'
-
Wang, C.-H., Liu, Y.-S.: 'A dependable privacy protection for end-to-end VoIP via elliptic-curve Diffie-Hellan and dynamic key changes', J. Netw. Comput. Appl., 2011, 34, pp. 1545-1556
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, pp. 1545-1556
-
-
Wang, C.-H.1
Liu, Y.-S.2
-
3
-
-
24344457092
-
'Secure authentication scheme for session initiation protocol'
-
Yang, C., Wang, R., Liu, W.: 'Secure authentication scheme for session initiation protocol', Comput. Secur., 2005, 24, pp. 381-386
-
(2005)
Comput. Secur.
, vol.24
, pp. 381-386
-
-
Yang, C.1
Wang, R.2
Liu, W.3
-
4
-
-
33847747356
-
'A new efficient authentication scheme for session initiation protocol'
-
Kaohsiung, Taiwan, ROC, October
-
Huang, H., Wei, W., Brown, G.: 'A new efficient authentication scheme for session initiation protocol'. Proc. JCIS 06, Kaohsiung, Taiwan, ROC, October 2006
-
(2006)
Proc. JCIS 06
-
-
Huang, H.1
Wei, W.2
Brown, G.3
-
5
-
-
73549097525
-
'Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol'
-
Jo, H., Lee, Y., Kim, M., Kim, S.,Won, D.: 'Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol'. Proc. INC, IMS and IDC, Seoul, Korea, August 2009, pp. 618-621
-
(2009)
Proc. INC, IMS and IDC, Seoul, Korea, August
, pp. 618-621
-
-
Jo, H.1
Lee, Y.2
Kim, M.3
Kim, S.4
Won, D.5
-
6
-
-
44549088249
-
'A new authentication mechanism and key agreement protocol for sip using identity-based cryptography'
-
Australia, May
-
Ring, J., Choo, K.-K.R., Foo, E., Looi, M.: 'A new authentication mechanism and key agreement protocol for sip using identity-based cryptography'. Proc. AusCERT R&D Stream, Gold Coast, Australia, May 2006, pp. 61-72
-
(2006)
Proc. AusCERT R&D Stream, Gold Coast
, pp. 61-72
-
-
Ring, J.1
Choo, K.-K.2
Foo, E.3
Looi, M.4
-
7
-
-
44549086712
-
'A new provable secure authentication and key agreement mechanism for SIP using certificate less public key cryptography'
-
Wang, F., Zhang, Y.: 'A new provable secure authentication and key agreement mechanism for SIP using certificate less public key cryptography', Comput. Commun., 2008, 31, pp. 2142-2149
-
(2008)
Comput. Commun.
, vol.31
, pp. 2142-2149
-
-
Wang, F.1
Zhang, Y.2
-
8
-
-
55749113850
-
'A new provably secure authentication and key agreement protocol for SIP using ECC'
-
Wu, L., Zhang, Y.,Wang, F.: 'A new provably secure authentication and key agreement protocol for SIP using ECC', Comput. Stand. Interf., 2009, 31, pp. 286-291
-
(2009)
Comput. Stand. Interf.
, vol.31
, pp. 286-291
-
-
Wu, L.1
Zhang, Y.2
Wang, F.3
-
9
-
-
0000112683
-
'Elliptic curve cryptosystems'
-
Koblitz, N.: 'Elliptic curve cryptosystems', Math. Comput., 1978, 48, pp. 203-209
-
(1978)
Math. Comput.
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
10
-
-
77953567600
-
'A workload characterization of elliptic curve cryptography methods in embedded environment'
-
Branovic, I., Giorgi, R., Martinelli, E.: 'A workload characterization of elliptic curve cryptography methods in embedded environment', ACM SIGARCH Comput. Archit. News, 2004, 32, pp. 27-34
-
(2004)
ACM SIGARCH Comput. Archit. News
, vol.32
, pp. 27-34
-
-
Branovic, I.1
Giorgi, R.2
Martinelli, E.3
-
11
-
-
74149091306
-
'A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves'
-
Liao, Y.-P., Wang, S.-S.: 'A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves', Comput. Commun., 2010, 33, pp. 372-380
-
(2010)
Comput. Commun.
, vol.33
, pp. 372-380
-
-
Liao, Y.-P.1
Wang, S.-S.2
-
12
-
-
79961144812
-
'A pairing-free identity-based authenticated key agreement mechanism for SIP'
-
Guilin China, May
-
Ni, L., Chen, G., Li, J.: 'A pairing-free identity-based authenticated key agreement mechanism for SIP'. Proc. ICNCIS2011, Guilin China, May 2011, pp. 209-217
-
(2011)
Proc. ICNCIS2011
, pp. 209-217
-
-
Ni, L.1
Chen, G.2
Li, J.3
-
13
-
-
77955431593
-
'A secure and efficient SIP authentication scheme for converged VoIP networks'
-
Yoon, E.J., Yoo, K.Y.: 'A secure and efficient SIP authentication scheme for converged VoIP networks', Comput. Commun., 2010, 33, pp. 1674-1681
-
(2010)
Comput. Commun.
, vol.33
, pp. 1674-1681
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
15
-
-
80053146852
-
'Cryptanalysis of SIP secure and efficient authentication scheme'
-
Xian, China, May
-
Gokhroo, M.K., Jaidhar, C.D., Tomar, A.S.: 'Cryptanalysis of SIP secure and efficient authentication scheme'. Proc. ICCSN 2011, Xian, China, May 2011, pp. 308-310
-
(2011)
Proc. ICCSN 2011
, pp. 308-310
-
-
Gokhroo, M.K.1
Jaidhar, C.D.2
Tomar, A.S.3
-
16
-
-
78651063942
-
'Efficient nonce-based authentication scheme for session initiation protocol'
-
Tsai, J.L.: 'Efficient nonce-based authentication scheme for session initiation protocol', Int. J. Netw. Secur., 2009, 9, pp. 12-16
-
(2009)
Int. J. Netw. Secur.
, vol.9
, pp. 12-16
-
-
Tsai, J.L.1
-
17
-
-
77952524229
-
'Robust mutual authentication with a key agreement scheme for the session initiation protocol'
-
Yoon, E., Shin, Y., Jeon, I., Yoo, K.: 'Robust mutual authentication with a key agreement scheme for the session initiation protocol', IETE Tech. Rev., 2010, 27, pp. 203-213
-
(2010)
IETE Tech. Rev.
, vol.27
, pp. 203-213
-
-
Yoon, E.1
Shin, Y.2
Jeon, I.3
Yoo, K.4
-
18
-
-
84855301449
-
'A new authenticated key agreement for session initiation protocol'
-
Xie, Q.: 'A new authenticated key agreement for session initiation protocol', Int. J. Commun. Syst., 2012, 25, pp. 47-54
-
(2012)
Int. J. Commun. Syst.
, vol.25
, pp. 47-54
-
-
Xie, Q.1
-
19
-
-
84879687830
-
'Elliptic curve cryptography based mutual authentication scheme for session initiation protocol'
-
doi: 10.1007/s11042-011-0787-0
-
Arshad, R., Ikram, N.: 'Elliptic curve cryptography based mutual authentication scheme for session initiation protocol', Multim. Tools Appl., 2013, 66, (2), pp. 165-178, doi: 10.1007/s11042-011-0787-0
-
(2013)
Multim. Tools Appl.
, vol.66
, Issue.2
, pp. 165-178
-
-
Arshad, R.1
Ikram, N.2
-
20
-
-
84863985527
-
'A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography'
-
doi:10.1002/sec.506
-
He, D., Chen, J., Chen, Y.: 'A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography', Secur. Commun. Netw., 2012, 5, (12), pp. 1423-1429, doi:10.1002/sec.506
-
(2012)
Secur. Commun. Netw.
, vol.5
, Issue.12
, pp. 1423-1429
-
-
He, D.1
Chen, J.2
Chen, Y.3
-
21
-
-
54949140749
-
'A secure authentication scheme with anonymity for wireless communications'
-
Wu, C.C., Lee,W.B., Tsaur,W.J.: 'A secure authentication scheme with anonymity for wireless communications', IEEE Commun. Lett., 2008, 12, (10), pp. 722-723
-
(2008)
IEEE Commun. Lett.
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
22
-
-
33845442809
-
'An implementation of AES algorithm with the multiple spaces random key pre-distribution scheme on MOTE-KIT 5040'
-
Taichun, Taiwan, ROC, June
-
Duh, D.R., Lin, T.C., Tung, C.H., Chan, S.J.: 'An implementation of AES algorithm with the multiple spaces random key pre-distribution scheme on MOTE-KIT 5040'. Proc. IEEE Int. Conf. Sensor Networks, Ubiquitous, and Trustworthy Computing, Taichun, Taiwan, ROC, June 2006, pp. 64-71
-
(2006)
Proc. IEEE Int. Conf. Sensor Networks, Ubiquitous, and Trustworthy Computing
, pp. 64-71
-
-
Duh, D.R.1
Lin, T.C.2
Tung, C.H.3
Chan, S.J.4
|