메뉴 건너뛰기




Volumn 28, Issue 7, 2015, Pages 1340-1351

Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.

Author keywords

authentication; key agreement; malicious insider impersonation attack; password; session initiation protocol; smart card

Indexed keywords

HARDWARE SECURITY; INTERNET PROTOCOLS; MULTIMEDIA SERVICES; NETWORK SECURITY; PUBLIC KEY CRYPTOGRAPHY; SMART CARDS; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 84925354738     PISSN: 10745351     EISSN: 10991131     Source Type: Journal    
DOI: 10.1002/dac.2767     Document Type: Article
Times cited : (50)

References (27)
  • 2
    • 84865329284 scopus 로고    scopus 로고
    • The impact of TLS on sip server performance: Measurement and modeling [J]
    • Shen C, Nahum E, Schulzrinne H, Wright P,. The impact of TLS on sip server performance: measurement and modeling [J]. IEEE/ACM Transactions on Networking 2012; 20 (4): 1217-1230.
    • (2012) IEEE/ACM Transactions on Networking , vol.20 , Issue.4 , pp. 1217-1230
    • Shen, C.1    Nahum, E.2    Schulzrinne, H.3    Wright, P.4
  • 3
    • 84860882480 scopus 로고    scopus 로고
    • A comprehensive survey of voice over IP security research[J]
    • Keromytis AD,. A comprehensive survey of voice over IP security research[J]. IEEE Communications Surveys & Tutorials 2012; 14 (2): 514-537.
    • (2012) IEEE Communications Surveys & Tutorials , vol.14 , Issue.2 , pp. 514-537
    • Keromytis, A.D.1
  • 5
    • 84901189762 scopus 로고    scopus 로고
    • A survey of SIP authentication and key agreement schemes
    • Kilinc H,., Yanik T,. A survey of SIP authentication and key agreement schemes. IEEE Communications Surveys & Tutorials 2013; DOI: 10.1109/SURV.2013.091513.00050.
    • (2013) IEEE Communications Surveys & Tutorials
    • Kilinc, H.1    Yanik, T.2
  • 6
    • 24344457092 scopus 로고    scopus 로고
    • Secure authentication scheme for session initiation protocol
    • Yang C, Wang R, Liu W,. Secure authentication scheme for session initiation protocol. Computers& security 2005; 24: 381-386.
    • (2005) Computers& Security , vol.24 , pp. 381-386
    • Yang, C.1    Wang, R.2    Liu, W.3
  • 7
    • 55749113850 scopus 로고    scopus 로고
    • A new provably secure authentication and key agreement protocol for SIP using ECC
    • Wu L, Zhang Y, Wang F,. A new provably secure authentication and key agreement protocol for SIP using ECC. Computer Standards & Interfaces 2009; 31: 286-291.
    • (2009) Computer Standards & Interfaces , vol.31 , pp. 286-291
    • Wu, L.1    Zhang, Y.2    Wang, F.3
  • 9
    • 78651063942 scopus 로고    scopus 로고
    • Efficient nonce-based authentication scheme for session initiation protocol
    • Tsai JL,. Efficient nonce-based authentication scheme for session initiation protocol. International Journal of Network Security 2009; 9: 12-16.
    • (2009) International Journal of Network Security , vol.9 , pp. 12-16
    • Tsai, J.L.1
  • 10
    • 77952524229 scopus 로고    scopus 로고
    • Robust mutual authentication with a key agreement scheme for the session initiation protocol
    • Yoon E, Shin Y, Jeon I, Yoo K,. Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Technical Review 2010b; 27: 203-213.
    • (2010) IETE Technical Review , vol.27 , pp. 203-213
    • Yoon, E.1    Shin, Y.2    Jeon, I.3    Yoo, K.4
  • 11
    • 84855301449 scopus 로고    scopus 로고
    • A new authenticated key agreement for session initiation protocol
    • Xie Q,. A new authenticated key agreement for session initiation protocol. International Journal of Communication Systems 2012; 25: 47-54.
    • (2012) International Journal of Communication Systems , vol.25 , pp. 47-54
    • Xie, Q.1
  • 12
    • 84879687830 scopus 로고    scopus 로고
    • Elliptic curve cryptography based mutual authentication scheme for session initation protocol
    • Arshad R, Ikram N,. Elliptic curve cryptography based mutual authentication scheme for session initation protocol. Multimedia Tools and Applications 2011; DOI: 10.1007/s11042-011-0787-0.
    • (2011) Multimedia Tools and Applications
    • Arshad, R.1    Ikram, N.2
  • 13
    • 84863985527 scopus 로고    scopus 로고
    • A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
    • He D, Chen J, Chen Y,. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Security and Communication Networks 2012; DOI: 10.1002/sec.506.
    • (2012) Security and Communication Networks
    • He, D.1    Chen, J.2    Chen, Y.3
  • 14
    • 84878306534 scopus 로고    scopus 로고
    • Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol
    • Tang H, Liu X,. Cryptanalysis of Arshad et al.'s ECC-based mutual authentication scheme for session initiation protocol. Multimedia Tools and Applications 2013; 65 (3): 321-333.
    • (2013) Multimedia Tools and Applications , vol.65 , Issue.3 , pp. 321-333
    • Tang, H.1    Liu, X.2
  • 17
    • 84911957404 scopus 로고    scopus 로고
    • Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card
    • Zhang L, Tang S, Cai Z,. Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card. International Journal of Communication Systems 2013; DOI: 10.1002/dac.2499.
    • (2013) International Journal of Communication Systems
    • Zhang, L.1    Tang, S.2    Cai, Z.3
  • 19
    • 84860659191 scopus 로고    scopus 로고
    • Mobile device integration of a fingerprint biometric remote authentication scheme
    • Chen CL, Lee CC, Hsu CY,. Mobile device integration of a fingerprint biometric remote authentication scheme. International Journal of Communication Systems 2012; 25 (5): 585-597.
    • (2012) International Journal of Communication Systems , vol.25 , Issue.5 , pp. 585-597
    • Chen, C.L.1    Lee, C.C.2    Hsu, C.Y.3
  • 20
    • 79959763451 scopus 로고    scopus 로고
    • Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture
    • Yeh KH, Lo NW, Li Y,. Cryptanalysis of Hsiang-Shih's authentication scheme for multi-server architecture. IJCS: International Journal of Communication Systems 2011; 24 (7): 829-836.
    • (2011) IJCS: International Journal of Communication Systems , vol.24 , Issue.7 , pp. 829-836
    • Yeh, K.H.1    Lo, N.W.2    Li, Y.3
  • 22
    • 84911988880 scopus 로고    scopus 로고
    • Security flaws in two improved remote user authentication schemes using smart cards
    • Ma C, Wang D, Zhao S-D,. Security flaws in two improved remote user authentication schemes using smart cards. International Journal of Communication Systems 2012; DOI: 10.1002/dac.2468.
    • (2012) International Journal of Communication Systems
    • Ma, C.1    Wang, D.2    Zhao, S.-D.3
  • 23
    • 84878975055 scopus 로고    scopus 로고
    • An enhanced authentication scheme with anonymity for roaming service in global mobility networks
    • Jiang Q, Ma J, Li G, Yang L,. An enhanced authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications 2013; 68 (4): 1477-1491.
    • (2013) Wireless Personal Communications , vol.68 , Issue.4 , pp. 1477-1491
    • Jiang, Q.1    Ma, J.2    Li, G.3    Yang, L.4
  • 24
    • 77955312905 scopus 로고    scopus 로고
    • Advanced smart card based password authentication protocol
    • Song R,. Advanced smart card based password authentication protocol. Computer Standards & Interfaces 2010; 32 (5): 321-325.
    • (2010) Computer Standards & Interfaces , vol.32 , Issue.5 , pp. 321-325
    • Song, R.1
  • 25
    • 84876151110 scopus 로고    scopus 로고
    • Security flaws in a smart card based authentication scheme for multi-server environment
    • He D, Wu S,. Security flaws in a smart card based authentication scheme for multi-server environment. Wireless Personal Communications 2013; 70 (1): 323-329.
    • (2013) Wireless Personal Communications , vol.70 , Issue.1 , pp. 323-329
    • He, D.1    Wu, S.2
  • 26
    • 0000474763 scopus 로고    scopus 로고
    • Differential power analysis. Advances in cryptology
    • Kocher P, Jaffe J, Jun B,. Differential power analysis. advances in cryptology. CRYPTO'99 1999; 1666: 788-797.
    • (1999) CRYPTO'99 , vol.1666 , pp. 788-797
    • Kocher, P.1    Jaffe, J.2    Jun, B.3
  • 27
    • 0036566408 scopus 로고    scopus 로고
    • Examining smart card security under the threat of power analysis attacks
    • Messerges TS, Dabbish EA, Sloan RH,. Examining smart card security under the threat of power analysis attacks. IEEE Transactions on Computers 2002; 51 (5): 541-552.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.5 , pp. 541-552
    • Messerges, T.S.1    Dabbish, E.A.2    Sloan, R.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.