메뉴 건너뛰기




Volumn 16, Issue 4, 2013, Pages 324-335

An improved authentication protocol for session initiation protocol using smart card and elliptic curve cryptography

Author keywords

Authenticated key agreement; Elliptic curve; Session initiation protocol

Indexed keywords


EID: 84901331673     PISSN: 14538245     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (21)
  • 3
    • 24344457092 scopus 로고    scopus 로고
    • Secure authentication scheme for session initiation protocol
    • DOI 10.1016/j.cose.2004.10.007, PII S0167404804002640
    • YANG C., WANG R., LIU W., Secure authentication scheme for session initiation protocol, Computers and security, 2005, Vol. 24, pp. 381-386. (Pubitemid 41252265)
    • (2005) Computers and Security , vol.24 , Issue.5 , pp. 381-386
    • Yang, C.-C.1    Wang, R.-C.2    Liu, W.-T.3
  • 4
    • 33847747356 scopus 로고    scopus 로고
    • A new efficient authentication scheme for session initiation protocol
    • HUANG H., WEI W., BROWN G., A new efficient authentication scheme for session initiation protocol, Proceedings of JCIS 06, 2006, pp. 180-182.
    • (2006) Proceedings of JCIS 06 , pp. 180-182
    • Huang, H.1    Wei, W.2    Brown, G.3
  • 5
    • 84855322473 scopus 로고    scopus 로고
    • Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol
    • JO H., LEE Y., KIM M., KIM S., WON D., Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol, Proceedings of INC 09, 2009, pp. 618-621.
    • (2009) Proceedings of INC 09 , pp. 618-621
    • Jo, H.1    Lee, Y.2    Kim, M.3    Kim, S.4    Won, D.5
  • 7
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • KOBLITZ N., Elliptic curve cryptosystems, Mathematics of Computation, 1987, Vol. 48, pp. 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 8
    • 85015402934 scopus 로고
    • Uses of elliptic curves in cryptography
    • MILLER V., Uses of elliptic curves in cryptography, Advances in Cryptology CRYPTO'85, 1985, pp. 417-426.
    • (1985) Advances in Cryptology CRYPTO'85 , pp. 417-426
    • Miller, V.1
  • 9
    • 55749113850 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement protocol for SIP using ECC
    • WU L., ZHANG Y., WANG F., A new provably secure authentication and key agreement protocol for SIP using ECC, Computer Standards and Interfaces, 2009, Vol. 31, pp. 286-291.
    • (2009) Computer Standards and Interfaces , vol.31 , pp. 286-291
    • Wu, L.1    Zhang, Y.2    Wang, F.3
  • 10
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
    • CANETTI R., KRAWCZYK H., Analysis of key-exchange protocols and their use for building secure channels, Proceedings of EUROCRYPT 2001, 2001, pp. 453-474. (Pubitemid 33275848)
    • (2001) Proceedings of EUROCRYPT 2001 , Issue.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 11
    • 77955431593 scopus 로고    scopus 로고
    • A secure and efficient SIP authentication scheme for converged VoIP networks
    • YOON E., YOO K., A secure and efficient SIP authentication scheme for converged VoIP networks, Computer Communications, 2010, Vol. 33, pp. 1674-1681.
    • (2010) Computer Communications , vol.33 , pp. 1674-1681
    • Yoon, E.1    Yoo, K.2
  • 12
    • 84901344152 scopus 로고    scopus 로고
    • Weaknesses of SIP authentication scheme for converged VoIP networks
    • PU Q., Weaknesses of SIP authentication scheme for converged VoIP networks, IACR Cryptology ePrint Archive, 2010, 464.
    • (2010) IACR Cryptology EPrint Archive , pp. 464
    • Pu, Q.1
  • 13
    • 80053146852 scopus 로고    scopus 로고
    • Cryptanalysis of SIP secure and efficient authentication scheme
    • GOKHROO M., JAIDHAR C., TOMAR A., Cryptanalysis of SIP secure and efficient authentication scheme, Proceedings of ICCSN 2011, 2011, pp. 308-310.
    • (2011) Proceedings of ICCSN 2011 , pp. 308-310
    • Gokhroo, M.1    Jaidhar, C.2    Tomar, A.3
  • 14
    • 78651063942 scopus 로고    scopus 로고
    • Efficient nonce-based authentication scheme for session initiation protocol
    • TSAI J., Efficient nonce-based authentication scheme for session initiation protocol, International Journal of Network Security, 2009, Vol. 9, pp. 12-16.
    • (2009) International Journal of Network Security , vol.9 , pp. 12-16
    • Tsai, J.1
  • 15
    • 77952524229 scopus 로고    scopus 로고
    • Robust mutual authentication with a key agreement scheme for the session initiation protocol
    • YOON E., SHIN Y., JEON I., YOO K., Robust mutual authentication with a key agreement scheme for the session initiation protocol, IETE Technical Review, 2010, Vol. 27, pp. 203-213.
    • (2010) IETE Technical Review , vol.27 , pp. 203-213
    • Yoon, E.1    Shin, Y.2    Jeon, I.3    Yoo, K.4
  • 16
    • 84879687830 scopus 로고    scopus 로고
    • Elliptic curve cryptography based mutual authentication scheme for session initation protocol
    • ARSHAD R., IKRAM N., Elliptic curve cryptography based mutual authentication scheme for session initation protocol, Multimedia Tools and Applications, 2013, Vol. 66(2), pp. 165-178.
    • (2013) Multimedia Tools and Applications , vol.66 , Issue.2 , pp. 165-178
    • Arshad, R.1    Ikram, N.2
  • 17
    • 84855301449 scopus 로고    scopus 로고
    • A new authenticated key agreement for session initiation protocol
    • XIE Q., A new authenticated key agreement for session initiation protocol, International Journal of Communication Systems, 2012, Vol. 25, pp. 47-54.
    • (2012) International Journal of Communication Systems , vol.25 , pp. 47-54
    • Xie, Q.1
  • 18
    • 84863985527 scopus 로고    scopus 로고
    • A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    • HE D., CHEN J., CHEN Y., A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography, Security and Communication Networks, 2012, Vol. 5(12), pp. 1423-1429.
    • (2012) Security and Communication Networks , vol.5 , Issue.12 , pp. 1423-1429
    • He, D.1    Chen, J.2    Chen, Y.3
  • 19
    • 84911957404 scopus 로고    scopus 로고
    • Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card
    • DOI: 10.1002/dac.2499
    • ZHANG L., TANG S., CAI Z., Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card, Internal Journal of Communication Systems, 2013, DOI: 10.1002/dac.2499
    • (2013) Internal Journal of Communication Systems
    • Zhang, L.1    Tang, S.2    Cai, Z.3
  • 20
    • 80051571433 scopus 로고    scopus 로고
    • An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security
    • HE D., CHEN J., HU J., An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security, Information Fusion, 2012 Vol. 13(3), pp. 223-230.
    • (2012) Information Fusion , vol.13 , Issue.3 , pp. 223-230
    • He, D.1    Chen, J.2    Hu, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.