An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
Published 2014 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
Authors
Keywords
Session initiation protocol (SIP), Elliptic curve cryptosystem (ECC), Authentication, Key agreement, VoIP, Security
Journal
MULTIMEDIA TOOLS AND APPLICATIONS
Volume 75, Issue 1, Pages 181-197
Publisher
Springer Nature
Online
2014-09-27
DOI
10.1007/s11042-014-2282-x
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A Survey of SIP Authentication and Key Agreement Schemes
- (2013) H. Hakan Kilinc et al. IEEE Communications Surveys and Tutorials
- An Enhanced Authenticated Key Agreement for Session Initiation Protocol
- (2013) Mohammad Sabzinejad Farash et al. Information Technology and Control
- A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
- (2013) Azeem Irshad et al. Security and Communication Networks
- Group Authentication
- (2012) Lein Harn IEEE TRANSACTIONS ON COMPUTERS
- Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
- (2012) Mario Frank et al. IEEE Transactions on Information Forensics and Security
- Secure Communication of Medical Information Using Mobile Agents
- (2012) Morteza Nikooghadam et al. JOURNAL OF MEDICAL SYSTEMS
- Cryptanalysis of Arshad et al.’s ECC-based mutual authentication scheme for session initiation protocol
- (2012) Hongbin Tang et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Secure SIP authentication scheme supporting lawful interception
- (2012) Qiong Pu et al. Security and Communication Networks
- A new certificateless authenticated key agreement protocol for SIP with different KGCs
- (2012) Xiaowei Li et al. Security and Communication Networks
- A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
- (2012) Debiao He et al. Security and Communication Networks
- Practical authentication scheme for SIP
- (2012) Shuhua Wu et al. Peer-to-Peer Networking and Applications
- Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks
- (2011) Liang Zhou et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Zero-Knowledge Authentication Protocol Based on Alternative Mode in RFID Systems
- (2011) Hong Liu et al. IEEE SENSORS JOURNAL
- An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
- (2011) He Debiao et al. Information Fusion
- A new authenticated key agreement for session initiation protocol
- (2011) Qi Xie INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
- (2011) R. Arshad et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A secure and efficient SIP authentication scheme for converged VoIP networks
- (2010) Eun-Jun Yoon et al. COMPUTER COMMUNICATIONS
- Efficient utilization of elliptic curve cryptosystem for hierarchical access control
- (2010) Morteza Nikooghadam et al. JOURNAL OF SYSTEMS AND SOFTWARE
- A new provably secure authentication and key agreement protocol for SIP using ECC
- (2008) Liufei Wu et al. COMPUTER STANDARDS & INTERFACES
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreFind the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
Search