-
1
-
-
0003240332
-
SIP: Session initiation protocol
-
ROSENBERG J., SCHULZRINNE H., CAMARILLO G., JOHNSTON A., PETERSON J., SPARKS R., HANDLEY M., SCHOOLER E., SIP: session initiation protocol, RFC 3261, 2002.
-
(2002)
RFC
, pp. 3261
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
2
-
-
0003365506
-
HTTP authentication: Basic and digest access authentication
-
FRANKS J., HALLAM-BAKER P., HOSTETLER J., LAWRENCE S., LEACH P., LUOTONEN A., STEWART L., HTTP authentication: basic and digest access authentication, Internet RFC2617, 1999.
-
(1999)
Internet RFC2617
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
Stewart, L.7
-
3
-
-
24344457092
-
Secure authentication scheme for session initiation protocol
-
DOI 10.1016/j.cose.2004.10.007, PII S0167404804002640
-
YANG C., WANG R., LIU W., Secure authentication scheme for session initiation protocol, Computers and security, 2005, Vol. 24, pp. 381-386. (Pubitemid 41252265)
-
(2005)
Computers and Security
, vol.24
, Issue.5
, pp. 381-386
-
-
Yang, C.-C.1
Wang, R.-C.2
Liu, W.-T.3
-
4
-
-
33847747356
-
A new efficient authentication scheme for session initiation protocol
-
HUANG H., WEI W., BROWN G., A new efficient authentication scheme for session initiation protocol, Proceedings of JCIS 06, 2006, pp. 180-182.
-
(2006)
Proceedings of JCIS 06
, pp. 180-182
-
-
Huang, H.1
Wei, W.2
Brown, G.3
-
5
-
-
84855322473
-
Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol
-
JO H., LEE Y., KIM M., KIM S., WON D., Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol, Proceedings of INC 09, 2009, pp. 618-621.
-
(2009)
Proceedings of INC 09
, pp. 618-621
-
-
Jo, H.1
Lee, Y.2
Kim, M.3
Kim, S.4
Won, D.5
-
6
-
-
55749103384
-
SIP authentication scheme using ECDH
-
DURLANIK A., SOGUKPINAR I., SIP authentication scheme using ECDH, World Enformatika Society Transaction on Engineering Computing and Technology, 2005, Vol. 8, pp. 350-353.
-
(2005)
World Enformatika Society Transaction on Engineering Computing and Technology
, vol.8
, pp. 350-353
-
-
Durlanik, A.1
Sogukpinar, I.2
-
7
-
-
84968503742
-
Elliptic curve cryptosystems
-
KOBLITZ N., Elliptic curve cryptosystems, Mathematics of Computation, 1987, Vol. 48, pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
8
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
MILLER V., Uses of elliptic curves in cryptography, Advances in Cryptology CRYPTO'85, 1985, pp. 417-426.
-
(1985)
Advances in Cryptology CRYPTO'85
, pp. 417-426
-
-
Miller, V.1
-
9
-
-
55749113850
-
A new provably secure authentication and key agreement protocol for SIP using ECC
-
WU L., ZHANG Y., WANG F., A new provably secure authentication and key agreement protocol for SIP using ECC, Computer Standards and Interfaces, 2009, Vol. 31, pp. 286-291.
-
(2009)
Computer Standards and Interfaces
, vol.31
, pp. 286-291
-
-
Wu, L.1
Zhang, Y.2
Wang, F.3
-
10
-
-
35048860626
-
Analysis of key-exchange protocols and their use for building secure channels
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
CANETTI R., KRAWCZYK H., Analysis of key-exchange protocols and their use for building secure channels, Proceedings of EUROCRYPT 2001, 2001, pp. 453-474. (Pubitemid 33275848)
-
(2001)
Proceedings of EUROCRYPT 2001
, Issue.2045
, pp. 453-474
-
-
Canetti, R.1
Krawczyk, H.2
-
11
-
-
77955431593
-
A secure and efficient SIP authentication scheme for converged VoIP networks
-
YOON E., YOO K., A secure and efficient SIP authentication scheme for converged VoIP networks, Computer Communications, 2010, Vol. 33, pp. 1674-1681.
-
(2010)
Computer Communications
, vol.33
, pp. 1674-1681
-
-
Yoon, E.1
Yoo, K.2
-
12
-
-
84901344152
-
Weaknesses of SIP authentication scheme for converged VoIP networks
-
PU Q., Weaknesses of SIP authentication scheme for converged VoIP networks, IACR Cryptology ePrint Archive, 2010, 464.
-
(2010)
IACR Cryptology EPrint Archive
, pp. 464
-
-
Pu, Q.1
-
13
-
-
80053146852
-
Cryptanalysis of SIP secure and efficient authentication scheme
-
GOKHROO M., JAIDHAR C., TOMAR A., Cryptanalysis of SIP secure and efficient authentication scheme, Proceedings of ICCSN 2011, 2011, pp. 308-310.
-
(2011)
Proceedings of ICCSN 2011
, pp. 308-310
-
-
Gokhroo, M.1
Jaidhar, C.2
Tomar, A.3
-
14
-
-
78651063942
-
Efficient nonce-based authentication scheme for session initiation protocol
-
TSAI J., Efficient nonce-based authentication scheme for session initiation protocol, International Journal of Network Security, 2009, Vol. 9, pp. 12-16.
-
(2009)
International Journal of Network Security
, vol.9
, pp. 12-16
-
-
Tsai, J.1
-
15
-
-
77952524229
-
Robust mutual authentication with a key agreement scheme for the session initiation protocol
-
YOON E., SHIN Y., JEON I., YOO K., Robust mutual authentication with a key agreement scheme for the session initiation protocol, IETE Technical Review, 2010, Vol. 27, pp. 203-213.
-
(2010)
IETE Technical Review
, vol.27
, pp. 203-213
-
-
Yoon, E.1
Shin, Y.2
Jeon, I.3
Yoo, K.4
-
16
-
-
84879687830
-
Elliptic curve cryptography based mutual authentication scheme for session initation protocol
-
ARSHAD R., IKRAM N., Elliptic curve cryptography based mutual authentication scheme for session initation protocol, Multimedia Tools and Applications, 2013, Vol. 66(2), pp. 165-178.
-
(2013)
Multimedia Tools and Applications
, vol.66
, Issue.2
, pp. 165-178
-
-
Arshad, R.1
Ikram, N.2
-
17
-
-
84855301449
-
A new authenticated key agreement for session initiation protocol
-
XIE Q., A new authenticated key agreement for session initiation protocol, International Journal of Communication Systems, 2012, Vol. 25, pp. 47-54.
-
(2012)
International Journal of Communication Systems
, vol.25
, pp. 47-54
-
-
Xie, Q.1
-
18
-
-
84863985527
-
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
-
HE D., CHEN J., CHEN Y., A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography, Security and Communication Networks, 2012, Vol. 5(12), pp. 1423-1429.
-
(2012)
Security and Communication Networks
, vol.5
, Issue.12
, pp. 1423-1429
-
-
He, D.1
Chen, J.2
Chen, Y.3
-
19
-
-
84911957404
-
Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card
-
DOI: 10.1002/dac.2499
-
ZHANG L., TANG S., CAI Z., Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card, Internal Journal of Communication Systems, 2013, DOI: 10.1002/dac.2499
-
(2013)
Internal Journal of Communication Systems
-
-
Zhang, L.1
Tang, S.2
Cai, Z.3
-
20
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
-
HE D., CHEN J., HU J., An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security, Information Fusion, 2012 Vol. 13(3), pp. 223-230.
-
(2012)
Information Fusion
, vol.13
, Issue.3
, pp. 223-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
21
-
-
84878543015
-
An efficient RSA-based remote user authentication scheme
-
SHI W., CHEN Y., An efficient RSA-based remote user authentication scheme, Romanian Journal of Information Science and Technology, Vol. 15(3), pp. 266-276.
-
Romanian Journal of Information Science and Technology
, vol.15
, Issue.3
, pp. 266-276
-
-
Shi, W.1
Chen, Y.2
|