-
2
-
-
84879687830
-
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
-
Arshad R, Ikram N (2011) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl. doi:10.1007/s11042-011-0787-0
-
(2011)
Multimed Tools Appl
-
-
Arshad, R.1
Ikram, N.2
-
3
-
-
0003470642
-
Security architecture for the Internet protocol
-
Atkinson R. Security architecture for the Internet protocol, RFC 1825
-
(1825)
RFC
-
-
Atkinson, R.1
-
7
-
-
84929834218
-
EC Cryptography
-
Certicom Research Standard for efficient cryptography, SEC 1, 2000: EC Cryptography. Ver. 1.0
-
(2000)
Ver
, vol.1
, pp. 0
-
-
-
8
-
-
84863985527
-
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography, Published online in Wiley Online Library wileyonlinelibrary.com
-
Debiao H, Jianhua C, Yitao C (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography, Published online in Wiley Online Library wileyonlinelibrary.com. Security Comm Netw. doi:10.1002/sec.506
-
(2012)
Security Comm Netw
-
-
Debiao, H.1
Jianhua, C.2
Yitao, C.3
-
11
-
-
0003365506
-
HTTP authentication: basic and digest access authentication
-
Franks J, Hallam-Baker P, Hostetler J, Lawrence S, Leach P, Luotonen A, Stewart L (1999) HTTP authentication: basic and digest access authentication, IETF RFC2617
-
(1999)
IETF RFC2617
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
Stewart, L.7
-
12
-
-
84881472647
-
Survey of security vulnerabilities in session initiation protocol
-
Geneiatakis D, Dagiuklas T, Kambourakis G, Lambrinoudakis C, Gritzalis S, Ehlert S (2006) Survey of security vulnerabilities in session initiation protocol. IEEE Commun Surv Tutorials 8(3):68–81
-
(2006)
IEEE Commun Surv Tutorials
, vol.8
, Issue.3
, pp. 68-81
-
-
Geneiatakis, D.1
Dagiuklas, T.2
Kambourakis, G.3
Lambrinoudakis, C.4
Gritzalis, S.5
Ehlert, S.6
-
13
-
-
84878306534
-
Cryptanalysis of Arshad et al.’s ECC-based mutual authentication scheme for session initiation protocol
-
Hongbin T, Xinsong L (2012) Cryptanalysis of Arshad et al.’s ECC-based mutual authentication scheme for session initiation protocol. Multimed Tools Appl. doi:10.1007/s11042-012-1001-8
-
(2012)
Multimed Tools Appl
-
-
Hongbin, T.1
Xinsong, L.2
-
14
-
-
33847747356
-
A new efficient authentication scheme for session initiation protocol
-
Huang H, Wei W, Brown G (2006) A new efficient authentication scheme for session initiation protocol. Proceedings of JCIS 06
-
(2006)
Proceedings of JCIS
, pp. 06
-
-
Huang, H.1
Wei, W.2
Brown, G.3
-
16
-
-
79960335425
-
Security enhancement in MANET authentication by checking the CRL status of servers
-
Irshad A, Noshairwan W, Shafiq M, Khurram S, Irshad E, Usman M (2008) Security enhancement in MANET authentication by checking the CRL status of servers. Int J Adv Sci Technol 1:91–98
-
(2008)
Int J Adv Sci Technol
, vol.1
, pp. 91-98
-
-
Irshad, A.1
Noshairwan, W.2
Shafiq, M.3
Khurram, S.4
Irshad, E.5
Usman, M.6
-
17
-
-
73549097525
-
Off-line password-guessing attack to Yang’s and Huang’s authentication schemes for session initiation ptorocol. Proceedings of INC
-
Jo H, Lee Y, Kim M, Kim S, Won D (2009) Off-line password-guessing attack to Yang’s and Huang’s authentication schemes for session initiation ptorocol. Proceedings of INC, IMS and IDC, pp 618–621
-
(2009)
IMS and IDC
, pp. 618-621
-
-
Jo, H.1
Lee, Y.2
Kim, M.3
Kim, S.4
Won, D.5
-
18
-
-
25544447732
-
Remote denial of service attacks and countermeasures. Department of Electrical Engineering, Princeton University
-
Karig D, Lee R (2001) Remote denial of service attacks and countermeasures. Department of Electrical Engineering, Princeton University, Technical Report CE-L2001-002
-
(2001)
Technical Report CE-L2001-002
-
-
Karig, D.1
Lee, R.2
-
19
-
-
0003068282
-
Security architecture for the Internet protocol
-
Kent S, Atkinson R (1998) Security architecture for the Internet protocol, RFC 2401
-
(1998)
RFC
, pp. 2401
-
-
Kent, S.1
Atkinson, R.2
-
20
-
-
0026963441
-
A note on efficient zero-knowledge proofs and arguments. In: Proc. 24th Annual ACM Symposium on Theory of Computing, Victoria BC
-
Kilian J (1992) A note on efficient zero-knowledge proofs and arguments. In: Proc. 24th Annual ACM Symposium on Theory of Computing, Victoria BC, pp 723–732
-
(1992)
pp 723–732
-
-
Kilian, J.1
-
21
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48:203–209
-
(1987)
Math Comput
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
22
-
-
76349090342
-
On security of an efficient nonce based authentication scheme for SIP
-
Lee CC (2009) On security of an efficient nonce based authentication scheme for SIP. Int J Netw Secur 3:201–203
-
(2009)
Int J Netw Secur
, vol.3
, pp. 201-203
-
-
Lee, C.C.1
-
23
-
-
79959688157
-
VoIP secure session assistance and call monitoring via building security gateway
-
Li J-S, Kao C-K, Tzeng J-J (2011) VoIP secure session assistance and call monitoring via building security gateway. Int J Commun Syst 24:837–851
-
(2011)
Int J Commun Syst
, vol.24
, pp. 837-851
-
-
Li, J.-S.1
Kao, C.-K.2
Tzeng, J.-J.3
-
24
-
-
34548135536
-
Off-line password guessing attack on an efficient key agreement protocol for secure authentication
-
Lu R, Cao Z (2006) Off-line password guessing attack on an efficient key agreement protocol for secure authentication. Int J Netw Secur 3(1):35–38
-
(2006)
Int J Netw Secur
, vol.3
, Issue.1
, pp. 35-38
-
-
Lu, R.1
Cao, Z.2
-
26
-
-
85015402934
-
Uses of elliptic curves in cryptography. In: Advances in cryptology CRYPTO’85, Lecture Notes in Computer Science, vol. 218. Springer-Verlag
-
Miller V (1986) Uses of elliptic curves in cryptography. In: Advances in cryptology CRYPTO’85, Lecture Notes in Computer Science, vol. 218. Springer-Verlag, pp 417–426
-
(1986)
pp 417–426
-
-
Miller, V.1
-
28
-
-
77950449367
-
Encryption and checksum specifications for Kerberos 5
-
Raeburn K (2005) Encryption and checksum specifications for Kerberos 5, RFC 3961
-
(2005)
RFC
, pp. 3961
-
-
Raeburn, K.1
-
30
-
-
0003240332
-
SIP: session initiation protocol
-
Rosenberg J, Schulzrinne H, Camarillo G, Johnston A, Peterson J, Sparks R, Handley M, Schooler E (2002) SIP: session initiation protocol, IETF RFC3261
-
(2002)
IETF RFC3261
-
-
-
32
-
-
77952508844
-
SIP security requirements. IETF internet draft (draftthomas-sipsec-reg-00.txt)
-
Thomas M (2001) SIP security requirements. IETF internet draft (draftthomas-sipsec-reg-00.txt), work in progress
-
(2001)
work
-
-
Thomas, M.1
-
33
-
-
70349751143
-
Efficient nonce-based authentication scheme for session initiation protocol
-
Tsai J (2009) Efficient nonce-based authentication scheme for session initiation protocol. Int J Netw Secur 8(3):312–316
-
(2009)
Int J Netw Secur
, vol.8
, Issue.3
, pp. 312-316
-
-
Tsai, J.1
-
34
-
-
0036870280
-
SIP security issues: the SIP authentication procedure and its processing load
-
Veltri L, Salsano S, Papalilo D (2002) SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw 16(6):38–44
-
(2002)
IEEE Netw
, vol.16
, Issue.6
, pp. 38-44
-
-
Veltri, L.1
Salsano, S.2
Papalilo, D.3
-
35
-
-
33746248709
-
A forward-secure user authentication scheme with smart cards
-
Wang B, Li ZQ (2006) A forward-secure user authentication scheme with smart cards. Int J Netw Secur 3(2):116–119
-
(2006)
Int J Netw Secur
, vol.3
, Issue.2
, pp. 116-119
-
-
Wang, B.1
Li, Z.Q.2
-
36
-
-
55749113850
-
A new provably secure authentication and key agreement protocol for SIP using ECC
-
Wu L, Zhang Y, Wang F (2009) A new provably secure authentication and key agreement protocol for SIP using ECC. Comput Stand Interfaces 31(2):286–291
-
(2009)
Comput Stand Interfaces
, vol.31
, Issue.2
, pp. 286-291
-
-
Wu, L.1
Zhang, Y.2
Wang, F.3
-
37
-
-
84855301449
-
A new authenticated key agreement for session initiation protocol
-
Xie Q (2011) A new authenticated key agreement for session initiation protocol. Int J Commun Syst. doi:10.1002/dac.1286
-
(2011)
Int J Commun Syst
-
-
Xie, Q.1
-
38
-
-
24344457092
-
Secure authentication scheme for session initiation protocol
-
Yang C, Wang R, Liu WT (2005) Secure authentication scheme for session initiation protocol. Comput Secur 4:381–386
-
(2005)
Comput Secur
, vol.4
, pp. 381-386
-
-
Yang, C.1
Wang, R.2
Liu, W.T.3
-
39
-
-
84929838479
-
-
Ylonen T, Lonvick C (2006) (Eds) The secure shell (SSH) Transport layer protocol, RFC 4253
-
Ylonen T, Lonvick C (2006) (Eds) The secure shell (SSH) Transport layer protocol, RFC 4253
-
-
-
-
40
-
-
77952524229
-
Robust mutual authentication with a key agreement scheme for the session initiation protocol
-
Yoon EJ, Koo KY (2010) Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Tech Rev 27(3):203–213
-
(2010)
IETE Tech Rev
, vol.27
, Issue.3
, pp. 203-213
-
-
Yoon, E.J.1
Koo, K.Y.2
-
41
-
-
84911977464
-
Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card
-
Zhang L, Tang S, Cai Z (2013) Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card. Int J Comm Syst
-
(2013)
Int J Comm Syst
-
-
Zhang, L.1
Tang, S.2
Cai, Z.3
-
42
-
-
80051507362
-
Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks
-
Zhou L, Chao H-C, Vasilakos A (Aug. 2011) Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE J Sel Areas Commun 29(7):1358–1367
-
(2011)
IEEE J Sel Areas Commun
, vol.29
, Issue.7
, pp. 1358-1367
-
-
Zhou, L.1
Chao, H.-C.2
Vasilakos, A.3
|