[HTML][HTML] A robust mutual authentication with a key agreement scheme for session initiation protocol

CM Chen, B Xiang, KH Wang, KH Yeh, TY Wu - Applied Sciences, 2018 - mdpi.com
Session initiation protocol (SIP) is the most widely used application layer control protocol for
creating, modifying, and terminating session processes. Many authentication schemes have …

A robust mutual authentication with a key agreement scheme for session initiation protocol

CM Chen, B Xiang, KH Wang, KH Yeh… - Applied Sciences …, 2018 - scholar.nycu.edu.tw
Session initiation protocol (SIP) is the most widely used application layer control protocol for
creating, modifying, and terminating session processes. Many authentication schemes have …

A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol

C Chien-Ming, B Xiang, W King-Hang… - Applied …, 2018 - search.proquest.com
Session initiation protocol (SIP) is the most widely used application layer control protocol for
creating, modifying, and terminating session processes. Many authentication schemes have …

A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol

CM Chen, B Xiang, KH Wang, KH Yeh, TY Wu - 2018 - agris.fao.org
Session initiation protocol (SIP) is the most widely used application layer control protocol for
creating, modifying, and terminating session processes. Many authentication schemes have …

A Robust Mutual Authentication with a Key Agreement Scheme for Session Initiation Protocol.

CM Chen, B Xiang, KH Wang… - … Sciences (2076-3417 …, 2018 - search.ebscohost.com
Session initiation protocol (SIP) is the most widely used application layer control protocol for
creating, modifying, and terminating session processes. Many authentication schemes have …

A robust mutual authentication with a key agreement scheme for session initiation protocol

CM Chen, B Xiang, KH Wang, KH Yeh… - Applied Sciences …, 2018 - repository.ust.hk
Session initiation protocol (SIP) is the most widely used application layer control protocol for
creating, modifying, and terminating session processes. Many authentication schemes have …