Cryptanalysis of Arshad et al.’s ECC-based mutual authentication scheme for session initiation protocol
暂无分享,去创建一个
[1] Hu Jin,et al. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012 .
[2] Wei-Kuan Shih,et al. A Secured Authentication Protocol for SIP Using Elliptic Curves Cryptography , 2010, FGIT-FGCN.
[3] Yong-Nyuo Shin,et al. Robust Mutual Authentication with a Key Agreement Scheme for the Session Initiation Protocol , 2010 .
[4] Cheng-Chi Lee,et al. A New Authentication Scheme for Session Initiation Protocol , 2009, J. Digit. Inf. Manag..
[5] Costas Lambrinoudakis,et al. Survey of security vulnerabilities in session initiation protocol , 2006, IEEE Communications Surveys & Tutorials.
[6] Rui Zhang,et al. A More Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.
[7] Qi Xie. A new authenticated key agreement for session initiation protocol , 2012, Int. J. Commun. Syst..
[8] Nassar Ikram,et al. Elliptic curve cryptography based mutual authentication scheme for session initiation protocol , 2011, Multimedia Tools and Applications.
[9] Luca Veltri,et al. SIP security issues: the SIP authentication procedure and its processing load , 2002 .
[10] Ibrahim Sogukpinar,et al. SIP Authentication Scheme using ECDH , 2007 .
[11] Hartmut König,et al. Cryptanalysis of a SIP Authentication Scheme , 2011, Communications and Multimedia Security.
[12] Eun-Jun Yoon,et al. A New Authentication Scheme for Session Initiation Protocol , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.
[13] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[14] Chun-Li Lin,et al. A password authentication scheme with secure password updating , 2003, Comput. Secur..
[15] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[16] Chou Chen Yang,et al. Secure authentication scheme for session initiation protocol , 2005, Comput. Secur..
[17] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[18] Jia Lun Tsai. Efficient Nonce-based Authentication Scheme for Session Initiation Protocol , 2009, Int. J. Netw. Secur..
[19] Eun-Jun Yoon,et al. A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves , 2010, 2010 Fourth International Conference on Network and System Security.
[20] Jianhua Chen,et al. An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security , 2012, Inf. Fusion.
[21] Eun-Jun Yoon,et al. Cryptanalysis of DS-SIP Authentication Scheme Using ECDH , 2009, 2009 International Conference on New Trends in Information and Service Science.
[22] Giovanni Maria Sacco,et al. Timestamps in key distribution protocols , 1981, CACM.
[23] Zhang Rui,et al. A More Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of medical systems.