期刊文献+

一种轻量级的SIP协议身份验证机制的设计

On Design of a Lightweight Authentication Mechanism for SIP Protocol
下载PDF
导出
摘要 近年来,会话发起协议(SIP)越来越受欢迎。但是,在会话启动协议中存在许多安全问题。Yang等人提出了一种会话发起协议的安全认证方案。该认证方案是基于Diffie-Hellman算法,因此该认证方案的计算成本非常高。为了改善这一缺点,Durlanik等人也提出了一种使用ECDH的认证方案。ECDH算法计算成本较DH算法降低了不少,但认证方案的计算成本仍然很高。为此,提出了一种轻量级的身份认证方案,该认证方案的计算成本低于Yang等人和Durlanik等人的认证方案,且非常适用于物联网和嵌入式设备。
作者 余兵 YU Bing
出处 《普洱学院学报》 2023年第3期43-45,共3页 Journal of Pu'er University
  • 相关文献

参考文献1

二级参考文献14

  • 1Kocher P,Jaffe J,Jun B.Differential Power Analysis. Advances in Cryptology - CRYPTO ’99, 19th Annual International Cryptology Conference . 1999
  • 2Yi-Pin Liao,Shuenn-Shyang Wang.??A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves(J)Computer Communications . 2009 (3)
  • 3Liufei Wu,Yuqing Zhang,Fengjiao Wang.??A new provably secure authentication and key agreement protocol for SIP using ECC(J)Computer Standards & Interfaces . 2008 (2)
  • 4Eun-Jun Yoon,Kee-Young Yoo,Cheonshik Kim,You-Sik Hong,Minho Jo,Hsiao-Hwa Chen.??A secure and efficient SIP authentication scheme for converged VoIP networks(J)Computer Communications . 2010 (14)
  • 5Wen F T,Susilo W,Yang G M.Analysis and improvement on a biometric-based remote user authentication scheme using smart cards. Wireless Personal Communications . 2015
  • 6Lin H,Wen F T,Du C X.An improved anonymous multi-server authenticated key agreement scheme using smart cards and biometrics. Wireless Personal Communications . 2015
  • 7Sheikh Ziauddin,Matthew N. Dailey.??Robust iris verification for key management(J)Pattern Recognition Letters . 2010 (9)
  • 8Sergey Tulyakov,Faisal Farooq,Praveer Mansukhani,Venu Govindaraju.??Symmetric hash functions for secure fingerprint biometric systems(J)Pattern Recognition Letters . 2007 (16)
  • 9Alessandra Lumini,Loris Nanni.??An improved BioHashing for human authentication(J)Pattern Recognition . 2006 (3)
  • 10Chou-Chen Yang,Ren-Chiun Wang,Wei-Ting Liu.??Secure authentication scheme for session initiation protocol(J)Computers & Security . 2005 (5)

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部