Interoperation Key Schema for Social Media Tools in IP Multimedia Subsystem
暂无分享,去创建一个
[1] Steven M. Bellovin,et al. Encrypted key exchange: password-based protocols secure against dictionary attacks , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Jari Arkko,et al. Security Mechanism Agreement for SIP Sessions , 2003 .
[3] Costas Lambrinoudakis,et al. Survey of security vulnerabilities in session initiation protocol , 2006, IEEE Communications Surveys & Tutorials.
[4] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[5] Chou Chen Yang,et al. Secure authentication scheme for session initiation protocol , 2005, Comput. Secur..
[6] Luca Veltri,et al. SIP security issues: the SIP authentication procedure and its processing load , 2002 .
[7] Ibrahim Sogukpinar,et al. SIP Authentication Scheme using ECDH , 2007 .
[8] David Pointcheval,et al. Simple Password-Based Encrypted Key Exchange Protocols , 2005, CT-RSA.
[9] Lawrence C. Stewart,et al. HTTP Authentication: Basic and Digest Access Authentication , 1999 .
[10] Jiann-Liang Chen,et al. Advanced Path-Migration Mechanism for Enhancing Signaling Efficiency in IP Multimedia Subsystem , 2012, KSII Trans. Internet Inf. Syst..
[11] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[12] Russell J. Clark,et al. Security issues with the IP multimedia subsystem (IMS) , 2007, MNCNA '07.
[13] David Pointcheval,et al. Interactive Diffie-Hellman Assumptions with Applications to Password-Based Authentication , 2005, Financial Cryptography.
[14] Sarvar Patel,et al. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.
[15] Mohsen Toorani,et al. A directly public verifiable signcryption scheme based on elliptic curves , 2009, 2009 IEEE Symposium on Computers and Communications.
[16] Mihir Bellare,et al. Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.
[17] Steven M. Bellovin,et al. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise , 1993, CCS '93.
[18] Hung-Min Sun,et al. EFFICIENT AUTHENTICATION AND KEY AGREEMENT PROCEDURE IN IP MULTIMEDIA SUBSYSTEM FOR UMTS , 2011 .
[19] Tibor Juhas. The use of elliptic curves in cryptography , 2007 .
[20] Hassan M. Elkamchouchi,et al. An efficient protocol for authenticated key agreement , 2011, 2011 28th National Radio Science Conference (NRSC).
[21] Mohamed Boucadair,et al. Enhancing the serviceability of IMS-based multimedia services: preventing core service failures , 2008, Int. J. Internet Protoc. Technol..
[22] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[23] Mark Handley,et al. SDP: Session Description Protocol , 1998, RFC.
[24] Chun-Li Lin,et al. A password authentication scheme with secure password updating , 2003, Comput. Secur..