Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
An improved and provably secure privacy preserving authentication protocol for SIP
by
Farash, Mohammad Sabzinejad
, Sher, Muhammad
, Chaudhry, Shehzad Ashraf
, Naqvi, Husnain
, Hassan, Mahmood Ul
in
Authentication
/ Authentication protocols
/ Communications Engineering
/ Computer Communication Networks
/ Cryptography
/ Cybersecurity
/ Denial of service attacks
/ Engineering
/ Information Systems and Communication Service
/ Multimedia
/ Networks
/ Peer to peer computing
/ Privacy
/ Servers
/ Signal,Image and Speech Processing
/ Smart cards
/ Stopping
2017
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
An improved and provably secure privacy preserving authentication protocol for SIP
by
Farash, Mohammad Sabzinejad
, Sher, Muhammad
, Chaudhry, Shehzad Ashraf
, Naqvi, Husnain
, Hassan, Mahmood Ul
in
Authentication
/ Authentication protocols
/ Communications Engineering
/ Computer Communication Networks
/ Cryptography
/ Cybersecurity
/ Denial of service attacks
/ Engineering
/ Information Systems and Communication Service
/ Multimedia
/ Networks
/ Peer to peer computing
/ Privacy
/ Servers
/ Signal,Image and Speech Processing
/ Smart cards
/ Stopping
2017
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
An improved and provably secure privacy preserving authentication protocol for SIP
by
Farash, Mohammad Sabzinejad
, Sher, Muhammad
, Chaudhry, Shehzad Ashraf
, Naqvi, Husnain
, Hassan, Mahmood Ul
in
Authentication
/ Authentication protocols
/ Communications Engineering
/ Computer Communication Networks
/ Cryptography
/ Cybersecurity
/ Denial of service attacks
/ Engineering
/ Information Systems and Communication Service
/ Multimedia
/ Networks
/ Peer to peer computing
/ Privacy
/ Servers
/ Signal,Image and Speech Processing
/ Smart cards
/ Stopping
2017
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
An improved and provably secure privacy preserving authentication protocol for SIP
Journal Article
An improved and provably secure privacy preserving authentication protocol for SIP
2017
Request Book From Autostore
and Choose the Collection Method
Overview
Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any multimedia based application or IP-based telephony service that requires signaling. SIP supports HTTP digest based authentication, and is responsible for creating, maintaining and terminating sessions. To guarantee secure SIP based communication, a number of authentication schemes are proposed, typically most of these are based on smart card due to its temper resistance property. Recently Zhang et al. presented an authenticated key agreement scheme for SIP based on elliptic curve cryptography. However Tu et al. (Peer to Peer Netw. Appl 1–8,
2014
) finds their scheme to be insecure against user impersonation attack, furthermore they presented an improved scheme and claimed it to be secure against all known attacks. Very recently Farash (Peer to Peer Netw. Appl 1–10,
2014
) points out that Tu et al.’s scheme is vulnerable to server impersonation attack, Farash also proposed an improvement on Tu et al.’s scheme. However, our analysis in this paper shows that Tu et al.’s scheme is insecure against server impersonation attack. Further both Tu et al.’s scheme and Farash’s improvement do not protect user’s privacy and are vulnerable to replay and denial of services attacks. In order to cope with these limitations, we have proposed a privacy preserving improved authentication scheme based on ECC. The proposed scheme provides mutual authentication as well as resists all known attacks as mentioned by Tu et al. and Farash.
Publisher
Springer US,Springer Nature B.V
This website uses cookies to ensure you get the best experience on our website.