Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
by
Ch, Shehzad Ashraf
, Sher, Muhammad
, Eid Rehman
, Ghani, Anwar
, Hassan, Mahmood Ul
, Irshad, Azeem
in
Agreements
/ Analysis
/ Authentication
/ Authentication protocols
/ Computer Communication Networks
/ Computer Science
/ Cryptography
/ Data Structures and Information Theory
/ Denial of service attacks
/ Digital signatures
/ Exchanging
/ Internet Protocol
/ Internet telephony
/ IP (Internet Protocol)
/ Messages
/ Multimedia Information Systems
/ Network security
/ Servers
/ Smart cards
/ Special Purpose and Application-Based Systems
/ Studies
/ Voice
2015
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
by
Ch, Shehzad Ashraf
, Sher, Muhammad
, Eid Rehman
, Ghani, Anwar
, Hassan, Mahmood Ul
, Irshad, Azeem
in
Agreements
/ Analysis
/ Authentication
/ Authentication protocols
/ Computer Communication Networks
/ Computer Science
/ Cryptography
/ Data Structures and Information Theory
/ Denial of service attacks
/ Digital signatures
/ Exchanging
/ Internet Protocol
/ Internet telephony
/ IP (Internet Protocol)
/ Messages
/ Multimedia Information Systems
/ Network security
/ Servers
/ Smart cards
/ Special Purpose and Application-Based Systems
/ Studies
/ Voice
2015
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
by
Ch, Shehzad Ashraf
, Sher, Muhammad
, Eid Rehman
, Ghani, Anwar
, Hassan, Mahmood Ul
, Irshad, Azeem
in
Agreements
/ Analysis
/ Authentication
/ Authentication protocols
/ Computer Communication Networks
/ Computer Science
/ Cryptography
/ Data Structures and Information Theory
/ Denial of service attacks
/ Digital signatures
/ Exchanging
/ Internet Protocol
/ Internet telephony
/ IP (Internet Protocol)
/ Messages
/ Multimedia Information Systems
/ Network security
/ Servers
/ Smart cards
/ Special Purpose and Application-Based Systems
/ Studies
/ Voice
2015
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
Journal Article
A single round-trip SIP authentication scheme for Voice over Internet Protocol using smart card
2015
Request Book From Autostore
and Choose the Collection Method
Overview
The Session Initiation Protocol (SIP) has revolutionized the way of controlling Voice over Internet Protocol (VoIP) based communication sessions over an open channel. The SIP protocol is insecure for being an open text-based protocol inherently. Different solutions have been presented in the last decade to secure the protocol. Recently, Zhang et al. authentication protocol has been proposed with a sound feature that authenticates the users without any password-verifier database using smart card. However, the scheme has a few limitations and can be made more secure and optimized regarding cost of exchanged messages, with a few modifications. Our proposed key-agreement protocol makes a use of two server secrets for robustness and is also capable of authenticating the involved parties in a single round-trip of exchanged messages. The server can now authenticate the user on the request message received, rather than the response received upon sending the challenge message, saving another round-trip of exchanged messages and hence escapes a possible denial of service attack.
Publisher
Springer US,Springer Nature B.V
This website uses cookies to ensure you get the best experience on our website.