Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Enhanced Authenticated Key Agreement for Session Initiation Protocol

In 2012, Xie proposed an authentication scheme based on Elliptic Curve Cryptography (ECC) for Session Initiation Protocol (SIP). However, this paper demonstrates that the Xie's scheme is vulnerable to impersonation at-tack by which an active adversary can easily forge the server's identity. Based on this attack, we also show that the Xie's scheme is also defenceless to off-line password guessin...

متن کامل

A New Authentication and Key Exchange Protocol for Session Initiation Protocol Using Smart Card

In today′s communications over Internet Protocol (IP), Session Initiation Protocol (SIP) is using establish, modify and terminate the sessions multimedia among participants. Authentication is the most security service required for SIP. Authentication HTTP Digest is the original authentication protocol proposed for SIP. However, this protocol is demonstrated insecure against different attacks. T...

متن کامل

An Efficient Authenticated Key Agreement Protocol Based on Chaotic Maps with Privacy Protection using Smart Card

Key agreement is a crucial cryptographic primitive for building secure communication channels between two parties in a network. In the research literature a typical protocol aims for key secrecy and mutual authentication. However, there are many important practical scenarios where privacy protection is more desirable, especially for social network environment. Nowadays, social network environme...

متن کامل

Efficient Two-Factor Authentication Protocol Using Password and Smart Card

Two-factor authentication using password and smart card could reduce the risk than the use of a password alone. Recently, Chen et al. proposed a two-factor remote user authentication protocol using password and smart card and provide the criteria of authentication protocols. They claimed their protocol is secure against certain known attacks. In this paper, the authors showed that Chen et al.’s...

متن کامل

Improving the Lee-lee’s Password Based Authenticated Key Agreement Protocol

Password based authenticated key agreement protocols have been the most widely used methods for user authentication, since it allows people to choose and remember their own passwords without any assistant device. Password based authenticated key agreement protocols, however, are vulnerable to password guessing attacks since users usually choose easy-to-remember passwords. Recently, Lee and Lee ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Communication Systems

سال: 2013

ISSN: 1074-5351

DOI: 10.1002/dac.2499