ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Secure authentication scheme for session initiation protocol
Computers & Security
◽
10.1016/j.cose.2004.10.007
◽
2005
◽
Vol 24
(5)
◽
pp. 381-386
◽
Cited By ~ 105
Author(s):
Chou-Chen Yang
◽
Ren-Chiun Wang
◽
Wei-Ting Liu
Keyword(s):
Session Initiation Protocol
◽
Authentication Scheme
◽
Secure Authentication
Download Full-text
Related Documents
Cited By
References
A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing
◽
10.1109/cit/iucc/dasc/picom.2015.290
◽
2015
◽
Cited By ~ 5
Author(s):
Shehzad Ashraf Chaudhry
◽
Khalid Mahmood
◽
Husnain Naqvi
◽
Muhammad Sher
Keyword(s):
Elliptic Curve
◽
Elliptic Curve Cryptography
◽
Session Initiation Protocol
◽
Authentication Scheme
◽
Secure Authentication
Download Full-text
A secure authentication scheme for session initiation protocol by using ECC on the basis of the Tang and Liu scheme
Security and Communication Networks
◽
10.1002/sec.834
◽
2013
◽
Vol 7
(8)
◽
pp. 1210-1218
◽
Cited By ~ 31
Author(s):
Azeem Irshad
◽
Muhammad Sher
◽
Muhammad Shahzad Faisal
◽
Anwer Ghani
◽
Mahmood Ul Hassan
◽
...
Keyword(s):
Session Initiation Protocol
◽
Authentication Scheme
◽
Secure Authentication
Download Full-text
A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography
Multimedia Tools and Applications
◽
10.1007/s11042-014-1885-6
◽
2014
◽
Vol 74
(10)
◽
pp. 3477-3488
◽
Cited By ~ 37
Author(s):
Zezhong Zhang
◽
Qingqing Qi
◽
Neeraj Kumar
◽
Naveen Chilamkurti
◽
Hwa-Young Jeong
Keyword(s):
Elliptic Curve
◽
Elliptic Curve Cryptography
◽
Session Initiation Protocol
◽
Authentication Scheme
◽
Secure Authentication
Download Full-text
SAS-SIP: A secure authentication scheme based on ECC and a fuzzy extractor for session initiation protocol
Cryptologia
◽
10.1080/01611194.2018.1548391
◽
2019
◽
Vol 43
(3)
◽
pp. 212-232
◽
Cited By ~ 4
Author(s):
Tanmoy Maitra
◽
Debasis Giri
◽
Ram N. Mohapatra
Keyword(s):
Session Initiation Protocol
◽
Authentication Scheme
◽
Fuzzy Extractor
◽
Secure Authentication
Download Full-text
A clogging resistant secure authentication scheme for fog computing services
Computer Networks
◽
10.1016/j.comnet.2020.107731
◽
2021
◽
Vol 185
◽
pp. 107731
Author(s):
Zeeshan Ali
◽
Shehzad Ashraf Chaudhry
◽
Khalid Mahmood
◽
Sahil Garg
◽
Zhihan Lv
◽
...
Keyword(s):
Fog Computing
◽
Authentication Scheme
◽
Computing Services
◽
Secure Authentication
Download Full-text
An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards
International Journal of Communication Systems
◽
10.1002/dac.2848
◽
2014
◽
Vol 29
(13)
◽
pp. 1956-1967
◽
Cited By ~ 21
Author(s):
Mohammad Sabzinejad Farash
◽
Mahmoud Ahmadian Attari
Keyword(s):
Session Initiation Protocol
◽
Smart Cards
◽
Authentication Scheme
◽
Password Based Authentication
Download Full-text
A secure authentication scheme based on SNR of optical fiber communication channel
Optical Fiber Technology
◽
10.1016/j.yofte.2021.102726
◽
2021
◽
Vol 67
◽
pp. 102726
Author(s):
Xiangqing Wang
◽
Yajie Li
◽
Haokun Song
◽
Kongni Zhu
◽
Jie Zhang
Keyword(s):
Optical Fiber
◽
Communication Channel
◽
Optical Fiber Communication
◽
Authentication Scheme
◽
Fiber Communication
◽
Secure Authentication
Download Full-text
Secure Authentication Scheme Using Dual Channels in Rogue Access Point Environments
Wireless Algorithms, Systems, and Applications - Lecture Notes in Computer Science
◽
10.1007/978-3-319-07782-6_50
◽
2014
◽
pp. 554-563
◽
Cited By ~ 1
Author(s):
Arwa Alrawais
◽
Abdulrahman Alhothaily
◽
Xiuzhen Cheng
Keyword(s):
Access Point
◽
Authentication Scheme
◽
Dual Channels
◽
Secure Authentication
◽
Rogue Access Point
Download Full-text
An Optimized and Secure Authentication Scheme for Vehicular Ad Hoc Networks
2018 IEEE International Conference on Communications (ICC)
◽
10.1109/icc.2018.8422101
◽
2018
◽
Cited By ~ 1
Author(s):
M. Rekik
◽
Mohammad S. Obaidat
◽
A. Makhlouf
◽
F. Zarai
Keyword(s):
Ad Hoc Networks
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Hoc Networks
◽
Secure Authentication
Download Full-text
On-siteDriverID: A secure authentication scheme based on Spanish eID cards for vehicular ad hoc networks
Future Generation Computer Systems
◽
10.1016/j.future.2016.04.024
◽
2016
◽
Vol 64
◽
pp. 50-60
◽
Cited By ~ 18
Author(s):
J. Sánchez-García
◽
J.M. García-Campos
◽
D.G. Reina
◽
S.L. Toral
◽
F. Barrero
Keyword(s):
Ad Hoc Networks
◽
Vehicular Ad Hoc Networks
◽
Ad Hoc
◽
Authentication Scheme
◽
Hoc Networks
◽
Secure Authentication
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close