Cryptanalysis of Farash et al.'s SIP authentication protocol
From MaRDI portal
Recommendations
- Robust and efficient authentication scheme for session initiation protocol
- An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
- Designing attacks on SIP call set-up
- A Robust and Efficient SIP Authentication Scheme
- Quantum authentication and key agreement scheme for SIP protocol
Cited in
(5)- A Robust and Efficient SIP Authentication Scheme
- A framework for protecting a SIP-based infrastructure against malformed message attacks
- Mean-set attack: cryptanalysis of Sibert et al. authentication protocol
- An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography
- Designing attacks on SIP call set-up
This page was built for publication: Cryptanalysis of Farash et al.'s SIP authentication protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2289535)