Perfect forward secrecy via an ECC-based authentication scheme for SIP in VoIP.
Mahdi NikooghadamHaleh AmintoosiPublished in: J. Supercomput. (2020)
Keyphrases
- authentication scheme
- security analysis
- elliptic curve cryptography
- mutual authentication
- key management
- smart card
- public key
- session initiation protocol
- user authentication
- secret key
- image encryption
- authentication protocol
- security requirements
- security properties
- elliptic curve
- key distribution
- security flaws
- quality of service
- ip multimedia subsystem
- ip networks
- voice over ip
- digital signature
- mobility management
- public key cryptography
- security protocols
- security services
- wireless sensor networks
- security model
- wireless networks