Login / Signup
Secure SIP authentication scheme supporting lawful interception.
Qiong Pu
Jian Wang
Shuhua Wu
Published in:
Secur. Commun. Networks (2013)
Keyphrases
</>
authentication scheme
user authentication
smart card
image encryption
secret key
elliptic curve cryptography
image authentication
security flaws
authentication protocol
public key
key management
mutual authentication
key agreement
real time
high dimensional