Security analysis and enhancements of an improved authentication for session initiation protocol with provable security.
Mohammad Sabzinejad FarashPublished in: Peer-to-Peer Netw. Appl. (2016)
Keyphrases
- security analysis
- security requirements
- authentication protocol
- high security
- user authentication
- mutual authentication
- security properties
- security model
- elliptic curve cryptography
- smart card
- public key
- private key
- encryption scheme
- session initiation protocol
- authentication scheme
- encryption algorithm
- security mechanisms
- security policies
- information security
- public key cryptography
- end to end
- similarity search
- image quality