-
1
-
-
0037984544
-
-
Rosenberg J, Schulzrinne H, Camarillo G, Johnston A, Peterson J, Sparks R, Handley M, Schooler E,. SIP: session initiation protocol. RFC 3261, June 2002.
-
(2002)
SIP: Session Initiation Protocol. RFC 3261
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
2
-
-
84865329284
-
The impact of TLS on sip server performance: Measurement and modeling [J]
-
Shen C, Nahum E, Schulzrinne H, Wright P,. The impact of TLS on sip server performance: measurement and modeling [J]. IEEE/ACM Transactions on Networking 2012; 20 (4): 1217-1230.
-
(2012)
IEEE/ACM Transactions on Networking
, vol.20
, Issue.4
, pp. 1217-1230
-
-
Shen, C.1
Nahum, E.2
Schulzrinne, H.3
Wright, P.4
-
3
-
-
84860882480
-
A comprehensive survey of voice over IP security research[J]
-
Keromytis AD,. A comprehensive survey of voice over IP security research[J]. IEEE Communications Surveys & Tutorials 2012; 14 (2): 514-537.
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.14
, Issue.2
, pp. 514-537
-
-
Keromytis, A.D.1
-
4
-
-
0013194031
-
-
Franks J, Hallam-Baker PM, Hostetler JL, Lawrence SD, Leach PJ, Luotonen A, Stewart LC,. HTTP authentication: basic and digest access authentication. Internet RFC2617, June 1999.
-
(1999)
HTTP Authentication: Basic and Digest Access Authentication. Internet RFC2617
-
-
Franks, J.1
Hallam-Baker, P.M.2
Hostetler, J.L.3
Lawrence, S.D.4
Leach, P.J.5
Luotonen, A.6
Stewart, L.C.7
-
5
-
-
84901189762
-
A survey of SIP authentication and key agreement schemes
-
Kilinc H,., Yanik T,. A survey of SIP authentication and key agreement schemes. IEEE Communications Surveys & Tutorials 2013; DOI: 10.1109/SURV.2013.091513.00050.
-
(2013)
IEEE Communications Surveys & Tutorials
-
-
Kilinc, H.1
Yanik, T.2
-
6
-
-
24344457092
-
Secure authentication scheme for session initiation protocol
-
Yang C, Wang R, Liu W,. Secure authentication scheme for session initiation protocol. Computers& security 2005; 24: 381-386.
-
(2005)
Computers& Security
, vol.24
, pp. 381-386
-
-
Yang, C.1
Wang, R.2
Liu, W.3
-
7
-
-
55749113850
-
A new provably secure authentication and key agreement protocol for SIP using ECC
-
Wu L, Zhang Y, Wang F,. A new provably secure authentication and key agreement protocol for SIP using ECC. Computer Standards & Interfaces 2009; 31: 286-291.
-
(2009)
Computer Standards & Interfaces
, vol.31
, pp. 286-291
-
-
Wu, L.1
Zhang, Y.2
Wang, F.3
-
8
-
-
77955431593
-
A secure and efficient SIP authentication scheme for converged VoIP networks
-
Yoon EJ, Yoo KY, Kim KY, Hong C, Jo YS, Chen HH,. A secure and efficient SIP authentication scheme for converged VoIP networks. Computer Communications 2010; 33: 1674-1681.
-
(2010)
Computer Communications
, vol.33
, pp. 1674-1681
-
-
Yoon, E.J.1
Yoo, K.Y.2
Kim, K.Y.3
Hong, C.4
Jo, Y.S.5
Chen, H.H.6
-
9
-
-
78651063942
-
Efficient nonce-based authentication scheme for session initiation protocol
-
Tsai JL,. Efficient nonce-based authentication scheme for session initiation protocol. International Journal of Network Security 2009; 9: 12-16.
-
(2009)
International Journal of Network Security
, vol.9
, pp. 12-16
-
-
Tsai, J.L.1
-
10
-
-
77952524229
-
Robust mutual authentication with a key agreement scheme for the session initiation protocol
-
Yoon E, Shin Y, Jeon I, Yoo K,. Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Technical Review 2010b; 27: 203-213.
-
(2010)
IETE Technical Review
, vol.27
, pp. 203-213
-
-
Yoon, E.1
Shin, Y.2
Jeon, I.3
Yoo, K.4
-
11
-
-
84855301449
-
A new authenticated key agreement for session initiation protocol
-
Xie Q,. A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems 2012; 25: 47-54.
-
(2012)
International Journal of Communication Systems
, vol.25
, pp. 47-54
-
-
Xie, Q.1
-
12
-
-
84879687830
-
Elliptic curve cryptography based mutual authentication scheme for session initation protocol
-
Arshad R, Ikram N,. Elliptic curve cryptography based mutual authentication scheme for session initation protocol. Multimedia Tools and Applications 2011; DOI: 10.1007/s11042-011-0787-0.
-
(2011)
Multimedia Tools and Applications
-
-
Arshad, R.1
Ikram, N.2
-
13
-
-
84863985527
-
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
-
He D, Chen J, Chen Y,. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks 2012; DOI: 10.1002/sec.506.
-
(2012)
Security and Communication Networks
-
-
He, D.1
Chen, J.2
Chen, Y.3
-
14
-
-
84878306534
-
Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol
-
Tang H, Liu X,. Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol. Multimedia Tools and Applications 2013; 65 (3): 321-333.
-
(2013)
Multimedia Tools and Applications
, vol.65
, Issue.3
, pp. 321-333
-
-
Tang, H.1
Liu, X.2
-
15
-
-
84904860928
-
A secure authentication scheme for session initiation protocol by using ECC on the basis of Tang and Liu scheme
-
Irshad A, Sher M, Faisal S, Ghani A, Ul Hassan M, Ashraf S,. A secure authentication scheme for session initiation protocol by using ECC on the basis of Tang and Liu scheme. Security and Communication Networks 2013; DOI: 10.1002/sec.834.
-
(2013)
Security and Communication Networks
-
-
Irshad, A.1
Sher, M.2
Faisal, S.3
Ghani, A.4
Ul Hassan, M.5
Ashraf, S.6
-
17
-
-
84911957404
-
Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card
-
Zhang L, Tang S, Cai Z,. Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card. International Journal of Communication Systems 2013; DOI: 10.1002/dac.2499.
-
(2013)
International Journal of Communication Systems
-
-
Zhang, L.1
Tang, S.2
Cai, Z.3
-
19
-
-
84860659191
-
Mobile device integration of a fingerprint biometric remote authentication scheme
-
Chen CL, Lee CC, Hsu CY,. Mobile device integration of a fingerprint biometric remote authentication scheme. International Journal of Communication Systems 2012; 25 (5): 585-597.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.5
, pp. 585-597
-
-
Chen, C.L.1
Lee, C.C.2
Hsu, C.Y.3
-
20
-
-
79959763451
-
Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture
-
Yeh KH, Lo NW, Li Y,. Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture. IJCS: International Journal of Communication Systems 2011; 24 (7): 829-836.
-
(2011)
IJCS: International Journal of Communication Systems
, vol.24
, Issue.7
, pp. 829-836
-
-
Yeh, K.H.1
Lo, N.W.2
Li, Y.3
-
23
-
-
84878975055
-
An enhanced authentication scheme with anonymity for roaming service in global mobility networks
-
Jiang Q, Ma J, Li G, Yang L,. An enhanced authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications 2013; 68 (4): 1477-1491.
-
(2013)
Wireless Personal Communications
, vol.68
, Issue.4
, pp. 1477-1491
-
-
Jiang, Q.1
Ma, J.2
Li, G.3
Yang, L.4
-
24
-
-
77955312905
-
Advanced smart card based password authentication protocol
-
Song R,. Advanced smart card based password authentication protocol. Computer Standards & Interfaces 2010; 32 (5): 321-325.
-
(2010)
Computer Standards & Interfaces
, vol.32
, Issue.5
, pp. 321-325
-
-
Song, R.1
-
25
-
-
84876151110
-
Security flaws in a smart card based authentication scheme for multi-server environment
-
He D, Wu S,. Security flaws in a smart card based authentication scheme for multi-server environment. Wireless Personal Communications 2013; 70 (1): 323-329.
-
(2013)
Wireless Personal Communications
, vol.70
, Issue.1
, pp. 323-329
-
-
He, D.1
Wu, S.2
-
26
-
-
0000474763
-
Differential power analysis. Advances in cryptology
-
Kocher P, Jaffe J, Jun B,. Differential power analysis. advances in cryptology. CRYPTO'99 1999; 1666: 788-797.
-
(1999)
CRYPTO'99
, vol.1666
, pp. 788-797
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
27
-
-
0036566408
-
Examining smart card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH,. Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51 (5): 541-552.
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
|