Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography
Authors
Keywords
Session initiation protocol, Authentication, Elliptic curve cryptography, Anonymity, Security
Journal
Journal of Ambient Intelligence and Humanized Computing
Volume 9, Issue 3, Pages 643-653
Publisher
Springer Nature
Online
2017-02-21
DOI
10.1007/s12652-017-0460-1
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks
- (2016) Chin-Chen Chang et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications
- (2016) Xiong Li et al. JOURNAL OF MEDICAL SYSTEMS
- A Multiserver Biometric Authentication Scheme for TMIS using Elliptic Curve Cryptography
- (2016) Shehzad Ashraf Chaudhry et al. JOURNAL OF MEDICAL SYSTEMS
- A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks
- (2016) Marimuthu Karuppiah et al. Security and Communication Networks
- A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks
- (2016) Fan Wu et al. Security and Communication Networks
- A provably secure anonymous authentication scheme for Session Initiation Protocol
- (2016) Shehzad Ashraf Chaudhry et al. Security and Communication Networks
- An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks
- (2016) Saru Kumari et al. Security and Communication Networks
- An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography
- (2016) Shehzad Ashraf Chaudhry et al. WIRELESS PERSONAL COMMUNICATIONS
- Efficient biometric and password based mutual authentication for consumer USB mass storage devices
- (2015) Debasis Giri et al. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
- Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
- (2015) Ding Wang et al. IEEE Transactions on Dependable and Secure Computing
- Comment on ‘Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications’
- (2015) Shehzad Ashraf Chaudhry IET Communications
- Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
- (2015) Ding Wang et al. INFORMATION SCIENCES
- A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
- (2015) Debiao He et al. INFORMATION SCIENCES
- An Improved and Secure Biometric Authentication Scheme for Telecare Medicine Information Systems Based on Elliptic Curve Cryptography
- (2015) Shehzad Ashraf Chaudhry et al. JOURNAL OF MEDICAL SYSTEMS
- Cryptanalysis and Improvement of an Improved Two Factor Authentication Protocol for Telecare Medical Information Systems
- (2015) Shehzad Ashraf Chaudhry et al. JOURNAL OF MEDICAL SYSTEMS
- Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy
- (2015) Qi Jiang et al. NONLINEAR DYNAMICS
- A secure and efficient mutual authentication scheme for session initiation protocol
- (2015) Yanrong Lu et al. Peer-to-Peer Networking and Applications
- Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
- (2014) Qi Jiang et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
- (2014) Zezhong Zhang et al. MULTIMEDIA TOOLS AND APPLICATIONS
- An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
- (2014) Hamed Arshad et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Security analysis and enhancements of an improved authentication for session initiation protocol with provable security
- (2014) Mohammad Sabzinejad Farash Peer-to-Peer Networking and Applications
- An improved authentication protocol for session initiation protocol using smart card
- (2014) Hang Tu et al. Peer-to-Peer Networking and Applications
- An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks
- (2014) Qi Jiang et al. Peer-to-Peer Networking and Applications
- A secure and robust temporal credential-based three-factor user authentication scheme for wireless sensor networks
- (2014) Ashok Kumar Das Peer-to-Peer Networking and Applications
- A Survey of SIP Authentication and Key Agreement Schemes
- (2013) H. Hakan Kilinc et al. IEEE Communications Surveys and Tutorials
- Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications
- (2013) Liping Zhang et al. IET Communications
- A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
- (2013) Vanga Odelu et al. INFORMATION SCIENCES
- Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
- (2013) Debiao He et al. MULTIMEDIA SYSTEMS
- A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
- (2013) Azeem Irshad et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Woven active-matrix display
- (2012) C. Zysset et al. IEEE TRANSACTIONS ON ELECTRON DEVICES
- Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
- (2012) Ashok Kumar Das et al. INFORMATION SCIENCES
- Security flaws in two improved remote user authentication schemes using smart cards
- (2012) Chun-Guang Ma et al. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
- (2012) Debiao He et al. Security and Communication Networks
- A new authenticated key agreement for session initiation protocol
- (2011) Qi Xie INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
- (2011) R. Arshad et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A Simple and Generic Construction of Authenticated Encryption with Associated Data
- (2010) Palash Sarkar ACM Transactions on Information and System Security
- A secure and efficient SIP authentication scheme for converged VoIP networks
- (2010) Eun-Jun Yoon et al. COMPUTER COMMUNICATIONS
- A new provably secure authentication and key agreement protocol for SIP using ECC
- (2008) Liufei Wu et al. COMPUTER STANDARDS & INTERFACES
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now