Session details: Card-based Protocol, Implementation, and Authentication for IoT
Abstract
Recommendations
ID-Based Non-interactive Deniable Authentication Protocol
IAS '09: Proceedings of the 2009 Fifth International Conference on Information Assurance and Security - Volume 01Non-interactive deniable authentication protocol is vulnerable to the receiver key-compromise impersonation attack, which are owing to the reason that the authentication message is computed from the receiver’s private and some other public values. ...
An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol
SIN '16: Proceedings of the 9th International Conference on Security of Information and NetworksA two-factor authenticated key-agreement scheme for session initiation protocol emerged as a best remedy to overcome the ascribed limitations of the password-based authentication scheme. Recently, Lu et al. proposed an anonymous two-factor authenticated ...
Elliptic curve cryptography based mutual authentication scheme for session initiation protocol
The Session Initiation Protocol (SIP) is the most widely used signaling protocol for controlling communication on the internet, establishing, maintaining, and terminating the sessions. The services that are enabled by SIP are equally applicable in the ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In

Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Section
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0