-
1
-
-
0003365506
-
HTTP authentication: basic and digest access authentication
-
Franks J, Hallam-Baker PM, Hostetler JL, Lawrence SD, Leach PJ, Luotonen A, Stewart LC (1999) HTTP authentication: basic and digest access authentication. Internet RFC2617
-
(1999)
Internet RFC2617
-
-
Franks, J.1
Hallam-Baker, P.M.2
Hostetler, J.L.3
Lawrence, S.D.4
Leach, P.J.5
Luotonen, A.6
Stewart, L.C.7
-
2
-
-
24344457092
-
Secure authentication scheme for session initiation protocol
-
Yang C, Wang R, Liu W (2005) Secure authentication scheme for session initiation protocol. Comput Secur 24:381–386
-
(2005)
Comput Secur
, vol.24
, pp. 381-386
-
-
Yang, C.1
Wang, R.2
Liu, W.3
-
3
-
-
33847747356
-
A new efficient authentication scheme for session initiation protocol
-
Huang H, Wei W, Brown G (2006) A new efficient authentication scheme for session initiation protocol. Proc JCIS(06)
-
(2006)
Proc JCIS(06)
-
-
Huang, H.1
Wei, W.2
Brown, G.3
-
4
-
-
73549097525
-
Off-line password-guessing attack to Yang’s and Huang’s authentication schemes for session initiation protocol. Proc INC
-
Jo H, Lee Y, Kim M, Kim S, Won D (2009) Off-line password-guessing attack to Yang’s and Huang’s authentication schemes for session initiation protocol. Proc INC, IMS IDC 618–621
-
(2009)
IMS IDC
, pp. 618-621
-
-
Jo, H.1
Lee, Y.2
Kim, M.3
Kim, S.4
Won, D.5
-
6
-
-
55749113850
-
A new provably secure authentication and key agreement protocol for SIP using ECC
-
Wu L, Zhang Y, Wang F (2009) A new provably secure authentication and key agreement protocol for SIP using ECC. Comput Stand Interfaces 31:286–291
-
(2009)
Comput Stand Interfaces
, vol.31
, pp. 286-291
-
-
Wu, L.1
Zhang, Y.2
Wang, F.3
-
7
-
-
77955431593
-
A secure and efficient SIP authentication scheme for converged VoIP networks
-
Yoon EJ, Yoo KY et al (2010) A secure and efficient SIP authentication scheme for converged VoIP networks. Comput Commun 33:1674–1681
-
(2010)
Comput Commun
, vol.33
, pp. 1674-1681
-
-
Yoon, E.J.1
Yoo, K.Y.2
-
8
-
-
84901344152
-
Weaknesses of SIP authentication scheme for converged VoIP networks
-
Pu Q (2010) Weaknesses of SIP authentication scheme for converged VoIP networks. IACR Cryptol ePrint Arch 2010(464)
-
(2010)
IACR Cryptol ePrint Arch
, vol.2010
, Issue.464
-
-
Pu, Q.1
-
9
-
-
80053146852
-
Tomar AS cryptanalysis of SIP secure and efficient authentication scheme
-
Gokhroo MK, Jaidhar CD (2011) Tomar AS cryptanalysis of SIP secure and efficient authentication scheme. Proc ICCSN 2011:308–310
-
(2011)
Proc ICCSN
, vol.2011
, pp. 308-310
-
-
Gokhroo, M.K.1
Jaidhar, C.D.2
-
10
-
-
78651063942
-
Efficient nonce-based authentication scheme for session initiation protocol
-
Tsai JL (2009) Efficient nonce-based authentication scheme for session initiation protocol. Int J Netw Secur 9:12–16
-
(2009)
Int J Netw Secur
, vol.9
, pp. 12-16
-
-
Tsai, J.L.1
-
11
-
-
77952524229
-
Robust mutual authentication with a key agreement scheme for the session initiation protocol
-
Yoon E, Shin Y, Jeon I, Yoo K (2010) Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Tech Rev 27:203–213
-
(2010)
IETE Tech Rev
, vol.27
, pp. 203-213
-
-
Yoon, E.1
Shin, Y.2
Jeon, I.3
Yoo, K.4
-
12
-
-
84855301449
-
A new authenticated key agreement for session initiation protocol
-
Xie Q (2012) A new authenticated key agreement for session initiation protocol. Int J Commun Syst 25:47–54
-
(2012)
Int J Commun Syst
, vol.25
, pp. 47-54
-
-
Xie, Q.1
-
13
-
-
84879687830
-
Elliptic curve cryptography based mutual authentication scheme for session initation protocol
-
Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initation protocol. Multimedia Tools Appl 66(2):165–178
-
(2013)
Multimedia Tools Appl
, vol.66
, Issue.2
, pp. 165-178
-
-
Arshad, R.1
Ikram, N.2
-
14
-
-
84863985527
-
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
-
He D, Chen J, Chen Y (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur Commun Networks 5(12):1423–1429
-
(2012)
Secur Commun Networks
, vol.5
, Issue.12
, pp. 1423-1429
-
-
He, D.1
Chen, J.2
Chen, Y.3
-
15
-
-
84911957404
-
Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card
-
Zhang L, Tang S, Cai Z (2013) Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card. Int J Commun Syst. doi:10.1002/dac.2499
-
(2013)
Int J Commun Syst
-
-
Zhang, L.1
Tang, S.2
Cai, Z.3
-
16
-
-
84939573910
-
Differential power analysis, Proceedings of Crypto ‘99, pp. 388–397
-
Kocher P, Jaffe J, Jun B (1999) Differential power analysis, Proceedings of Crypto ‘99, pp. 388–397, Springer-Verlag
-
(1999)
Springer-Verlag
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
17
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
-
(2002)
IEEE Trans Comput
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
18
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
-
He D, Chen J, Hu J (2012) An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inform Fusion 13(3):223–230
-
(2012)
Inform Fusion
, vol.13
, Issue.3
, pp. 223-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
19
-
-
84876151110
-
Security flaws in a smart card based authentication scheme for multi-server environment
-
He D, Wu S (2013) Security flaws in a smart card based authentication scheme for multi-server environment. Wirel Pers Commun 70(1):323–329
-
(2013)
Wirel Pers Commun
, vol.70
, Issue.1
, pp. 323-329
-
-
He, D.1
Wu, S.2
-
20
-
-
84876519348
-
Anonymous authentication scheme of trusted mobile terminal under mobile internet
-
Zhang D, Ma Z, Niu X (2013) Anonymous authentication scheme of trusted mobile terminal under mobile internet. J China Univ Posts Telecommun 20(1):58–65
-
(2013)
J China Univ Posts Telecommun
, vol.20
, Issue.1
, pp. 58-65
-
-
Zhang, D.1
Ma, Z.2
Niu, X.3
-
21
-
-
84878299380
-
Scalable and efficient mobile authentication scheme preserving user privacy
-
Pu Q, Wang J, Wu S (2013) Scalable and efficient mobile authentication scheme preserving user privacy. Int J Ad Hoc Ubiquit Comput 12(2):65–74
-
(2013)
Int J Ad Hoc Ubiquit Comput
, vol.12
, Issue.2
, pp. 65-74
-
-
Pu, Q.1
Wang, J.2
Wu, S.3
|