-
1
-
-
0036870280
-
SIP security issues: the SIP authentication procedure and its processing load
-
Veltri L, Salsano S, Papalilo D (2002) SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw 16(6):38–44
-
(2002)
IEEE Netw
, vol.16
, Issue.6
, pp. 38-44
-
-
Veltri, L.1
Salsano, S.2
Papalilo, D.3
-
2
-
-
84957444419
-
-
Camarillo G, Niemi A, Haukka T: Security mechanism agreement for SIP sessions. IETF Internet Draft, Ju
-
Arkko J, Torvinen V, Camarillo G, Niemi A, Haukka T (2002) Security mechanism agreement for SIP sessions. IETF Internet Draft, Jun
-
(2002)
Torvinen
, vol.V
-
-
Arkko, J.1
-
3
-
-
84957444420
-
-
Thomas M (2001) SIP Security Requirements. IETF Internet Draft, Work In Progress No
-
Thomas M (2001) SIP Security Requirements. IETF Internet Draft, Work In Progress Nov
-
-
-
-
4
-
-
84928473734
-
Robust and efficient authentication scheme for session initiation protocol
-
Article ID 894549
-
Lu Y, Li L, Yang Y (2015) Robust and efficient authentication scheme for session initiation protocol. Math Probl Eng 2015:2015. doi:10.1155/2015/894549. Article ID 894549, 9
-
(2015)
Math Probl Eng
, vol.2015
, pp. 2015
-
-
Lu, Y.1
Li, L.2
Yang, Y.3
-
5
-
-
0003365506
-
HTTP Authentication: Basic and digest access authentication
-
Franks J, Hallam-Baker P, Hostetler J, Lawrence S, Leach P, Luotonen A. (1999) HTTP Authentication: Basic and digest access authentication. IETF RFC:2617
-
(1999)
IETF RFC
, pp. 2617
-
-
Franks, J.1
Hallam-Baker, P.2
Hostetler, J.3
Lawrence, S.4
Leach, P.5
Luotonen, A.6
-
6
-
-
24344457092
-
Secure authentication scheme for session initiation protocol
-
Yang C, Wang R, Liu W (2005) Secure authentication scheme for session initiation protocol. Comput Secur 24:381–386
-
(2005)
Comput Secur
, vol.24
, pp. 381-386
-
-
Yang, C.1
Wang, R.2
Liu, W.3
-
7
-
-
84976665942
-
Timestamps in key distribution systems
-
Denning D, Sacco G (1981) Timestamps in key distribution systems. Commun ACM 24:533–536
-
(1981)
Commun ACM
, vol.24
, pp. 533-536
-
-
Denning, D.1
Sacco, G.2
-
8
-
-
84863985527
-
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
-
He D, Chen J, Chen Y (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur Commun Netw 5(12):1423–1429
-
(2012)
Secur Commun Netw
, vol.5
, Issue.12
, pp. 1423-1429
-
-
He, D.1
Chen, J.2
Chen, Y.3
-
9
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48:417–426
-
(1987)
Math Comput
, vol.48
, pp. 417-426
-
-
Koblitz, N.1
-
10
-
-
74149091306
-
A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves
-
Liao Y, Wang S (2010) A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Comput Commun 33:372–380
-
(2010)
Comput Commun
, vol.33
, pp. 372-380
-
-
Liao, Y.1
Wang, S.2
-
14
-
-
55749113850
-
A new provably secure authentication and key agreement protocol for SIP using ECC
-
Wu L, Zhang Y, Wang F (2009) A new provably secure authentication and key agreement protocol for SIP using ECC. Comput Stand Interfaces 31:286–291
-
(2009)
Comput Stand Interfaces
, vol.31
, pp. 286-291
-
-
Wu, L.1
Zhang, Y.2
Wang, F.3
-
15
-
-
77955431593
-
A secure and efficient SIP authentication scheme for converged VoIP networks
-
Yoon EJ, Yoo KY, Kim C, Hong YS, Jo M, Chen HH (2010) A secure and efficient SIP authentication scheme for converged VoIP networks. Comput Commun 33:1674–1681
-
(2010)
Comput Commun
, vol.33
, pp. 1674-1681
-
-
Yoon, E.J.1
Yoo, K.Y.2
Kim, C.3
Hong, Y.S.4
Jo, M.5
Chen, H.H.6
-
16
-
-
84957444421
-
-
Cryptanalysis of SIP secure and efficient authentication scheme, Proceedings ICCS
-
Gokhroo MK, Jaidhar CD, Tomar AS (2011) Cryptanalysis of SIP secure and efficient authentication scheme. Proceedings ICCSN
-
(2011)
Tomar AS
-
-
Gokhroo, M.K.1
Jaidhar, C.D.2
-
17
-
-
84901344152
-
Weaknesses of SIP authentication scheme for converged VoIP networks
-
Pu Q (2010) Weaknesses of SIP authentication scheme for converged VoIP networks. IACR Cryptol ePrint Arch
-
(2010)
IACR Cryptol ePrint Arch
-
-
Pu, Q.1
-
18
-
-
70349751143
-
Efficient nonce-based authentication scheme for session initiation protocol
-
Tsai J (2009) Efficient nonce-based authentication scheme for session initiation protocol. Int J Netw Secur 8 (3):312–316
-
(2009)
Int J Netw Secur
, vol.8
, Issue.3
, pp. 312-316
-
-
Tsai, J.1
-
19
-
-
84879687830
-
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
-
Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66(2):165–178
-
(2013)
Multimed Tools Appl
, vol.66
, Issue.2
, pp. 165-178
-
-
Arshad, R.1
Ikram, N.2
-
20
-
-
78651081750
-
A secured authentication protocol for SIP using elliptic curves cryptography
-
Chen T H, Yeh H L, Liu P C, Hsiang H C, Shih W K (2010) A secured authentication protocol for SIP using elliptic curves cryptography. CN CCIS 119:46–55
-
(2010)
CN CCIS
, vol.119
, pp. 46-55
-
-
Chen, T.H.1
Yeh, H.L.2
Liu, P.C.3
Hsiang, H.C.4
Shih, W.K.5
-
21
-
-
0037282439
-
A password authentication scheme with secure password updating
-
Lin C, Hwang T (2003) A password authentication scheme with secure password updating. Comput Secur 22(1):68–72
-
(2003)
Comput Secur
, vol.22
, Issue.1
, pp. 68-72
-
-
Lin, C.1
Hwang, T.2
-
23
-
-
84855301449
-
A new authenticated key agreement for session initiation protocol
-
Xie Q (2012) A new authenticated key agreement for session initiation protocol. Int J Commun Syst 25(1):47–54
-
(2012)
Int J Commun Syst
, vol.25
, Issue.1
, pp. 47-54
-
-
Xie, Q.1
-
24
-
-
84890424682
-
An enhanced authenticated key agreement for session initiation protocol
-
Farash M S, Attari M A (2013) An enhanced authenticated key agreement for session initiation protocol. Inf Technol Control 42(4):333–342
-
(2013)
Inf Technol Control
, vol.42
, Issue.4
, pp. 333-342
-
-
Farash, M.S.1
Attari, M.A.2
-
25
-
-
85018102575
-
A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
-
Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong H Y (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography, Multimedia Tools Applied
-
(2014)
Multimedia Tools Applied
-
-
Zhang, Z.1
Qi, Q.2
Kumar, N.3
Chilamkurti, N.4
Jeong, H.Y.5
-
26
-
-
0043135196
-
Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments
-
Vanstone S A (1997) Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments. Inf Secur Tech Rep 12:78–87
-
(1997)
Inf Secur Tech Rep
, vol.12
, pp. 78-87
-
-
Vanstone, S.A.1
-
27
-
-
30744432873
-
Some Observations on the theory of cryptographic hash functions
-
Stinson DR (2006) Some Observations on the theory of cryptographic hash functions. Desi Codes Crypto 38(2):259–277
-
(2006)
Desi Codes Crypto
, vol.38
, Issue.2
, pp. 259-277
-
-
Stinson, D.R.1
-
29
-
-
1442292337
-
Protocols for authentication and key establishment
-
Boyd C, Mathuria A (2003) Protocols for authentication and key establishment. Springer
-
(2003)
Springer
-
-
Boyd, C.1
Mathuria, A.2
-
30
-
-
51849131973
-
On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Advances in Cryptology-CRYPTO 2008. Springer
-
Eisenbarth T, Kasper T, Moradi A, Paar C, Salmasizadeh M, Shalmani MTM (2008) On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Advances in Cryptology-CRYPTO 2008. Springer, pp 203–220
-
(2008)
pp 203–220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.T.M.6
-
31
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772
-
(1981)
Commun ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
32
-
-
0033350090
-
Password authentication schemes with smart cards
-
Yang W, Shieh SP (1999) Password authentication schemes with smart cards. Comput Secur 18(8):727–733
-
(1999)
Comput Secur
, vol.18
, Issue.8
, pp. 727-733
-
-
Yang, W.1
Shieh, S.P.2
-
33
-
-
84894255457
-
An enhanced access control scheme in wireless sensor networks
-
Chatterjee S, Das AK, Sing JK (2014) An enhanced access control scheme in wireless sensor networks. Ad Hoc Sensor Wireless Netw 21(1-2):121–149
-
(2014)
Ad Hoc Sensor Wireless Netw
, vol.21
, Issue.1-2
, pp. 121-149
-
-
Chatterjee, S.1
Das, A.K.2
Sing, J.K.3
-
34
-
-
84897055589
-
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
-
Odelu V, Das AK, Goswami A (2014) A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inform Sci 269(10):270–285
-
(2014)
Inform Sci
, vol.269
, Issue.10
, pp. 270-285
-
-
Odelu, V.1
Das, A.K.2
Goswami, A.3
-
36
-
-
84890128171
-
Robust smart card secured authentication scheme on SIP using elliptic curve cryptography
-
Yeh HL, Chen TH, Shih WK (2014) Robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Comput Stand Interfaces 36:397–402
-
(2014)
Comput Stand Interfaces
, vol.36
, pp. 397-402
-
-
Yeh, H.L.1
Chen, T.H.2
Shih, W.K.3
-
37
-
-
77952524229
-
Robust mutual authentication with a key agreement scheme for the session initiation protocol
-
Yoon EJ, Shin YN, Jeon IS, Yoo KY (2010) Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Tech Rev 27(3):203–213
-
(2010)
IETE Tech Rev
, vol.27
, Issue.3
, pp. 203-213
-
-
Yoon, E.J.1
Shin, Y.N.2
Jeon, I.S.3
Yoo, K.Y.4
-
38
-
-
84911977464
-
Efficient and flexible password authenticated key agreement for Voice over Internet protocol session initiation protocol using smart card
-
Zhang L, Tang S, Cai Z (2013), Efficient and flexible password authenticated key agreement for Voice over Internet protocol session initiation protocol using smart card. International Journal Communication System
-
(2013)
International Journal Communication System
-
-
Zhang, L.1
Tang, S.2
Cai, Z.3
|