-
1
-
-
84879687830
-
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
-
Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66(2):165–178
-
(2013)
Multimed Tools Appl
, vol.66
, Issue.2
, pp. 165-178
-
-
Arshad, R.1
Ikram, N.2
-
3
-
-
84890424682
-
An enhanced authenticated key agreement for session initiation protocol
-
Farash MS, Attari MA (2013) An enhanced authenticated key agreement for session initiation protocol. Inform Technol Control 42(4):333–342
-
(2013)
Inform Technol Control
, vol.42
, Issue.4
, pp. 333-342
-
-
Farash, M.S.1
Attari, M.A.2
-
4
-
-
84872116385
-
Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication
-
Frank M, Biedert R, Ma E, Martinovic I, Song D (2013) Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans Inf Forensic Secur 8(1):136–148
-
(2013)
IEEE Trans Inf Forensic Secur
, vol.8
, Issue.1
, pp. 136-148
-
-
Frank, M.1
Biedert, R.2
Ma, E.3
Martinovic, I.4
Song, D.5
-
5
-
-
0003365506
-
HTTP authentication: basic and digest access authentication
-
Franks J, Hallam-Baker PM, Hostetler JL, Lawrence SD, Leach PJ, Luotonen A, Stewart LC (1999) HTTP authentication: basic and digest access authentication. IETF RFC 2617
-
(1999)
IETF RFC
, pp. 2617
-
-
Franks, J.1
Hallam-Baker, P.M.2
Hostetler, J.L.3
Lawrence, S.D.4
Leach, P.J.5
Luotonen, A.6
Stewart, L.C.7
-
6
-
-
84881472647
-
Survey of security vulnerabilities in session initial protocol
-
Geneiatakis D, Dagiuklas T, Kambourakis G, Lambrinoudakis C, Gritzalis S, Ehlert S, Sisalem D (2006) Survey of security vulnerabilities in session initial protocol. IEEE Commun Surv Tutor 8(3):68–81
-
(2006)
IEEE Commun Surv Tutor
, vol.8
, Issue.3
, pp. 68-81
-
-
Geneiatakis, D.1
Dagiuklas, T.2
Kambourakis, G.3
Lambrinoudakis, C.4
Gritzalis, S.5
Ehlert, S.6
Sisalem, D.7
-
8
-
-
84881192601
-
Group authentication
-
Harn L (2013) Group authentication. IEEE Trans Comput 62(9):1893–1898
-
(2013)
IEEE Trans Comput
, vol.62
, Issue.9
, pp. 1893-1898
-
-
Harn, L.1
-
9
-
-
84863985527
-
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
-
He D, Chen J, Chen Y (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur Commun Netw 5(12):1423–1429
-
(2012)
Secur Commun Netw
, vol.5
, Issue.12
, pp. 1423-1429
-
-
He, D.1
Chen, J.2
Chen, Y.3
-
10
-
-
80051571433
-
An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
-
He D, Chen J, Hu J (2012) An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf Fusion 13(3):223–230
-
(2012)
Inf Fusion
, vol.13
, Issue.3
, pp. 223-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
11
-
-
84929842561
-
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
-
Irshad A, Sher M, Rehman E, Ashraf Ch S, Hassan MU, Ghani A (2013) A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card. Multimed Tools Appl. doi:10.1007/s11042-013-1807-z
-
(2013)
Multimed Tools Appl
-
-
Irshad, A.1
Sher, M.2
Rehman, E.3
Ashraf Ch, S.4
Hassan, M.U.5
Ghani, A.6
-
12
-
-
84904860928
-
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
-
Irshad A, Sher M, Faisal MS, Ghani A, Hassan MU, Ashraf Ch S (2014) A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme. Secur Commun Netw 7:1210–1218
-
(2014)
Secur Commun Netw
, vol.7
, pp. 1210-1218
-
-
Irshad, A.1
Sher, M.2
Faisal, M.S.3
Ghani, A.4
Hassan, M.U.5
Ashraf Ch, S.6
-
13
-
-
84925354738
-
Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al
-
Jiang Q, Ma J, Tian Y (2014) Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al. Int J Commun Syst. doi:10.1002/dac.2767
-
(2014)
Int J Commun Syst
-
-
Jiang, Q.1
Ma, J.2
Tian, Y.3
-
14
-
-
84901189762
-
A survey of SIP authentication and key agreement schemes
-
Kilinc HH, Yanik T (2014) A survey of SIP authentication and key agreement schemes. IEEE Commun Surv Tutor 16(2):1005–1023
-
(2014)
IEEE Commun Surv Tutor
, vol.16
, Issue.2
, pp. 1005-1023
-
-
Kilinc, H.H.1
Yanik, T.2
-
16
-
-
0000474763
-
Differential power analysis. Advances in Cryptology
-
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. Advances in Cryptology, CRYPTO’991999; 1666:788–797
-
(1999)
CRYPTO’991999
, vol.1666
, pp. 788-797
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
17
-
-
0142007776
-
Cryptanalysis of a variant of Peyravian-Zunic’s password authentication scheme
-
Ku WC, Chen CM, Lee HL (2003) Cryptanalysis of a variant of Peyravian-Zunic’s password authentication scheme. IEICE Trans Commun E86-B(5):1682–1684
-
(2003)
IEICE Trans Commun
, vol.E86-B
, Issue.5
, pp. 1682-1684
-
-
Ku, W.C.1
Chen, C.M.2
Lee, H.L.3
-
18
-
-
84876307417
-
A new certificateless authenticated key agreement protocol for SIP with different KGCs
-
Li X, Zhang Y, Zhang G (2013) A new certificateless authenticated key agreement protocol for SIP with different KGCs. Secur Commun Netw 6:631–643
-
(2013)
Secur Commun Netw
, vol.6
, pp. 631-643
-
-
Li, X.1
Zhang, Y.2
Zhang, G.3
-
19
-
-
80053590707
-
Cryptanalysis of a SIP authentication scheme
-
Ghent, Belgium
-
Liu FW, Koenig H (2011) Cryptanalysis of a SIP authentication scheme. In: 12th IFIP TC6/TC11 International Conference, CMS 2011, Ghent, Belgium, pp 134–143
-
(2011)
12th IFIP TC6/TC11 International Conference, CMS
, vol.2011
, pp. 134-143
-
-
Liu, F.W.1
Koenig, H.2
-
20
-
-
80455155201
-
Zero-knowledge authentication protocol based on alternative mode in RFID systems
-
Liu H, Ning H (2011) Zero-knowledge authentication protocol based on alternative mode in RFID systems. IEEE Sensors J 11(12):3235–3245
-
(2011)
IEEE Sensors J
, vol.11
, Issue.12
, pp. 3235-3245
-
-
Liu, H.1
Ning, H.2
-
21
-
-
84953641819
-
-
Lynn B. Pairing-based cryptography library
-
Lynn B. Pairing-based cryptography library, available at http://crypto.stanford.edu/pbc/
-
-
-
-
22
-
-
84911988880
-
Security flaws in two improved remote user authentication schemes using smart cards
-
Ma CG, Wang D, Zhao SD (2012) Security flaws in two improved remote user authentication schemes using smart cards. Int J Commun Syst. doi:10.1002/dac.2468
-
(2012)
Int J Commun Syst
-
-
Ma, C.G.1
Wang, D.2
Zhao, S.D.3
-
23
-
-
0036566408
-
Examining smart-card security under the threat of power analysis attacks
-
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541–552
-
(2002)
IEEE Trans Comput
, vol.51
, Issue.5
, pp. 541-552
-
-
Messerges, T.S.1
Dabbish, E.A.2
Sloan, R.H.3
-
24
-
-
84867860941
-
Secure communication of medical information using mobile agents
-
Nikooghadam M, Zakerolhosseini A (2012) Secure communication of medical information using mobile agents. J Med Syst 36(6):3839–3850
-
(2012)
J Med Syst
, vol.36
, Issue.6
, pp. 3839-3850
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
-
25
-
-
77956061440
-
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
-
Nikooghadam M, Zakerolhosseini A, Moghaddam ME (2010) Efficient utilization of elliptic curve cryptosystem for hierarchical access control. J Syst Softw 83(10):1917–1929
-
(2010)
J Syst Softw
, vol.83
, Issue.10
, pp. 1917-1929
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
Moghaddam, M.E.3
-
26
-
-
84874300958
-
Secure SIP authentication scheme supporting lawful interception
-
Pu Q, Wang J, Wu S (2013) Secure SIP authentication scheme supporting lawful interception. Secur Commun Netw 6:340–350
-
(2013)
Secur Commun Netw
, vol.6
, pp. 340-350
-
-
Pu, Q.1
Wang, J.2
Wu, S.3
-
27
-
-
0003240332
-
SIP: session initiation protocol
-
Rosenberg J, Schulzrinne H, Camarillo G, Johnston A, Peterson J, Sparks R (2002) SIP: session initiation protocol. IETF RFC3261
-
(2002)
IETF RFC3261
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
-
28
-
-
0036870280
-
SIP security issues: the SIP authentication procedure and its processing load
-
Salsano S, Veltri L, Papalilo D (2002) SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw 16:38–44
-
(2002)
IEEE Netw
, vol.16
, pp. 38-44
-
-
Salsano, S.1
Veltri, L.2
Papalilo, D.3
-
29
-
-
33750013256
-
Denial of service attacks targeting a Sip VoIP infrastructure: stack scenarios and prevention mechanisms
-
Sisalem D, Kuthan J, Ehlert S (2006) Denial of service attacks targeting a Sip VoIP infrastructure: stack scenarios and prevention mechanisms. IEEE Netw 20(5):26–31
-
(2006)
IEEE Netw
, vol.20
, Issue.5
, pp. 26-31
-
-
Sisalem, D.1
Kuthan, J.2
Ehlert, S.3
-
30
-
-
84947768665
-
-
Wiley, Chichester
-
Sisalem D, Floroiu J, Kuthan J, Abend U, Schulzrinne H (2009) SIP security. Wiley, Chichester
-
(2009)
SIP security
-
-
Sisalem, D.1
Floroiu, J.2
Kuthan, J.3
Abend, U.4
Schulzrinne, H.5
-
32
-
-
84878306534
-
Cryptanalysis of Arshad et al’.s ECC-based mutual authentication scheme for session initiation protocol
-
Tang H, Liu X (2013) Cryptanalysis of Arshad et al’.s ECC-based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 65(3):321–333
-
(2013)
Multimed Tools Appl
, vol.65
, Issue.3
, pp. 321-333
-
-
Tang, H.1
Liu, X.2
-
33
-
-
70349751143
-
Efficient nonce-based authentication scheme for session initiation protocol
-
Tsai JL (2009) Efficient nonce-based authentication scheme for session initiation protocol. Int J Netw Secur 8(3):312–316
-
(2009)
Int J Netw Secur
, vol.8
, Issue.3
, pp. 312-316
-
-
Tsai, J.L.1
-
34
-
-
84938740758
-
An improved authentication protocol for session initiation protocol using smart card
-
Tu H, Kumar N, Chilamkurti N, Rho S (2014) An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Netw Appl. doi:10.1007/s12083-014-0248-4
-
(2014)
Peer-to-Peer Netw Appl
-
-
Tu, H.1
Kumar, N.2
Chilamkurti, N.3
Rho, S.4
-
35
-
-
0043135196
-
Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments
-
Vanstone SA (1997) Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments. Inf Secur Tech Rep 12:78–87
-
(1997)
Inf Secur Tech Rep
, vol.12
, pp. 78-87
-
-
Vanstone, S.A.1
-
36
-
-
55749113850
-
A new provably secure authentication and key agreement protocol for SIP using ECC
-
Wu L, Zhang Y, Wang F (2009) A new provably secure authentication and key agreement protocol for SIP using ECC. Comput Stand Interfaces 31(2):286–291
-
(2009)
Comput Stand Interfaces
, vol.31
, Issue.2
, pp. 286-291
-
-
Wu, L.1
Zhang, Y.2
Wang, F.3
-
37
-
-
84872342509
-
Practical authentication scheme for SIP
-
Wu S, Pu Q, Kang F (2013) Practical authentication scheme for SIP. Peer-to-Peer Netw Appl 6(1):61–74
-
(2013)
Peer-to-Peer Netw Appl
, vol.6
, Issue.1
, pp. 61-74
-
-
Wu, S.1
Pu, Q.2
Kang, F.3
-
38
-
-
84901331673
-
An improved authentication protocol for session initiation protocol using smart card and elliptic curve cryptography
-
Wu K, Gong P, Wang J, Yan X, Li P (2013) An improved authentication protocol for session initiation protocol using smart card and elliptic curve cryptography. Rom J Inf Sci Technol 16(4):324–335
-
(2013)
Rom J Inf Sci Technol
, vol.16
, Issue.4
, pp. 324-335
-
-
Wu, K.1
Gong, P.2
Wang, J.3
Yan, X.4
Li, P.5
-
39
-
-
84855301449
-
A new authenticated key agreement for session initiation protocol
-
Xie Q (2012) A new authenticated key agreement for session initiation protocol. Int J Commun Syst 25(1):47–54
-
(2012)
Int J Commun Syst
, vol.25
, Issue.1
, pp. 47-54
-
-
Xie, Q.1
-
40
-
-
24344457092
-
Secure authentication scheme for session initiation protocol
-
Yang CC, Wang RC, Liu WT (2005) Secure authentication scheme for session initiation protocol. Comput Secur 24:381–386
-
(2005)
Comput Secur
, vol.24
, pp. 381-386
-
-
Yang, C.C.1
Wang, R.C.2
Liu, W.T.3
-
42
-
-
77955431593
-
A secure and efficient SIP authentication scheme for converged VoIP networks
-
Yoon EJ, Yoo KY, Kim C, Hong Y, Jo M, Chen H (2010) A secure and efficient SIP authentication scheme for converged VoIP networks. Comput Commun 33(14):1674–1681
-
(2010)
Comput Commun
, vol.33
, Issue.14
, pp. 1674-1681
-
-
Yoon, E.J.1
Yoo, K.Y.2
Kim, C.3
Hong, Y.4
Jo, M.5
Chen, H.6
-
43
-
-
84911957404
-
Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card
-
Zhang L, Tang S, Cai Z (2013) Efficient and flexible password authenticated key agreement for voice over internet protocol session initiation protocol using smart card. Int J Commun Syst. doi:10.1002/dac.2499
-
(2013)
Int J Commun Syst
-
-
Zhang, L.1
Tang, S.2
Cai, Z.3
-
44
-
-
84911945065
-
Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards
-
Zhang L, Tang S, Cai Z (2014) Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards. Secur Commun Netw. doi:10.1002/sec.951
-
(2014)
Secur Commun Netw
-
-
Zhang, L.1
Tang, S.2
Cai, Z.3
-
45
-
-
80051507362
-
Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks
-
Zhou L, Chao H-C, Vasilakos AV (2011) Joint forensics-scheduling strategy for delay-sensitive multimedia applications over heterogeneous networks. IEEE J Sel Areas Commun 29(7):1358–1367
-
(2011)
IEEE J Sel Areas Commun
, vol.29
, Issue.7
, pp. 1358-1367
-
-
Zhou, L.1
Chao, H.-C.2
Vasilakos, A.V.3
|