A secure authentication scheme for session initiation protocol based on elliptic curve cryptography

SA Chaudhry, K Mahmood, H Naqvi… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
In 2014, Tu et al. proposed an authentication scheme for session initiation protocol. Very
soon Farash realized that Tu et al.'s scheme can not resist server forgery attack, then Farash …

A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography

SA Chaudhry, K Mahmood, H Naqvi, M Sher - 2015 IEEE International … - infona.pl
In 2014, Tu et al. proposed an authentication scheme for session initiation protocol. Very
soon Farash realized that Tu et al.'s scheme can not resist server forgery attack, then Farash …

A secure authentication scheme for session initiation protocol based on elliptic curve cryptography

SA Chaudhry, K Mahmood, H Naqvi… - 15th IEEE International …, 2015 - ksascholar.dri.sa
In 2014, Tu et al. proposed an authentication scheme for session initiation protocol. Very
soon Farash realized that Tu et al.'s scheme can not resist server forgery attack, then Farash …

A Secure Authentication Scheme for Session Initiation Protocol Based on Elliptic Curve Cryptography

SA Chaudhry, K Mahmood, H Naqvi… - 2015 IEEE International …, 2015 - computer.org
In 2014, Tu et al. proposed an authentication scheme for session initiation protocol. Very
soon Farash realized that Tu et al.'s scheme can not resist server forgery attack, then Farash …

[PDF][PDF] A secure authentication scheme for session initiation protocol based on elliptic curve cryptography

SA Chaudhry, K Mahmood, H Naqvi, M Sher - researchgate.net
In 2014, Tu et al. proposed an authen-tication scheme for session initiation protocol. Very
soon Farash realized that Tu et al.'s scheme can not resist server forgery attack, then Farash …

[PDF][PDF] A secure authentication scheme for session initiation protocol based on elliptic curve cryptography

SA Chaudhry, K Mahmood, H Naqvi, M Sher - researchgate.net
In 2014, Tu et al. proposed an authen-tication scheme for session initiation protocol. Very
soon Farash realized that Tu et al.'s scheme can not resist server forgery attack, then Farash …