An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
出版年份 2014 全文链接
标题
An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC
作者
关键词
Session initiation protocol (SIP), Elliptic curve cryptosystem (ECC), Authentication, Key agreement, VoIP, Security
出版物
MULTIMEDIA TOOLS AND APPLICATIONS
Volume 75, Issue 1, Pages 181-197
出版商
Springer Nature
发表日期
2014-09-27
DOI
10.1007/s11042-014-2282-x
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- A Survey of SIP Authentication and Key Agreement Schemes
- (2013) H. Hakan Kilinc et al. IEEE Communications Surveys and Tutorials
- An Enhanced Authenticated Key Agreement for Session Initiation Protocol
- (2013) Mohammad Sabzinejad Farash et al. Information Technology and Control
- A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
- (2013) Azeem Irshad et al. Security and Communication Networks
- Group Authentication
- (2012) Lein Harn IEEE TRANSACTIONS ON COMPUTERS
- Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication
- (2012) Mario Frank et al. IEEE Transactions on Information Forensics and Security
- Secure Communication of Medical Information Using Mobile Agents
- (2012) Morteza Nikooghadam et al. JOURNAL OF MEDICAL SYSTEMS
- Cryptanalysis of Arshad et al.’s ECC-based mutual authentication scheme for session initiation protocol
- (2012) Hongbin Tang et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Secure SIP authentication scheme supporting lawful interception
- (2012) Qiong Pu et al. Security and Communication Networks
- A new certificateless authenticated key agreement protocol for SIP with different KGCs
- (2012) Xiaowei Li et al. Security and Communication Networks
- A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography
- (2012) Debiao He et al. Security and Communication Networks
- Practical authentication scheme for SIP
- (2012) Shuhua Wu et al. Peer-to-Peer Networking and Applications
- Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks
- (2011) Liang Zhou et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Zero-Knowledge Authentication Protocol Based on Alternative Mode in RFID Systems
- (2011) Hong Liu et al. IEEE SENSORS JOURNAL
- An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
- (2011) He Debiao et al. Information Fusion
- A new authenticated key agreement for session initiation protocol
- (2011) Qi Xie INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
- Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
- (2011) R. Arshad et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A secure and efficient SIP authentication scheme for converged VoIP networks
- (2010) Eun-Jun Yoon et al. COMPUTER COMMUNICATIONS
- Efficient utilization of elliptic curve cryptosystem for hierarchical access control
- (2010) Morteza Nikooghadam et al. JOURNAL OF SYSTEMS AND SOFTWARE
- A new provably secure authentication and key agreement protocol for SIP using ECC
- (2008) Liufei Wu et al. COMPUTER STANDARDS & INTERFACES
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started