A new remote user authentication scheme for e-health-care applications using steganography

MM Alhejazi, EM Al-Dahasi… - 2019 2nd International …, 2019 - ieeexplore.ieee.org
The internet is getting more popular these days and the applications that help human lives
are spreading across the world, one useful area to mention is healthcare, healthcare …

[PDF][PDF] NFC Communications-based Mutual Authentication Scheme for the Internet of Things.

Y Ma - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
Abstract The integration of Near Field Communication (NFC) into consumer electronics
devices has opened up opportunities for the internet of things applications such as …

[图书][B] An improved lightweight privacy preserving authentication scheme for SIP-Based-VoIP using smart card

SU Jan - 2017 - books.google.com
In the past few years, secure information sharing became very popular in the area of
immigration, military applications, healthcare, education, foreign affairs, etc. As secure …

An improved three-factor session initiation protocol using Chebyshev chaotic map

XY Guo, DZ Sun, Y Yang - IEEE Access, 2020 - ieeexplore.ieee.org
Session Initiation Protocol (SIP) is the most widely used signalling protocol for controlling
communication, establishing, maintaining, and terminating sessions on the Internet …

Cryptanalysis of Farash et al.'s SIP authentication protocol

M Azrour, Y Farhaoui… - International Journal of …, 2018 - inderscienceonline.com
Session initiation protocol (SIP) is the most popular signalling protocol used in order to
establish, maintain and terminate multimedia sessions between different participants …

An anonymous and secure authentication and key agreement scheme for session initiation protocol

H Lin, F Wen, C Du - Multimedia Tools and Applications, 2017 - Springer
Abstract In 2014, Arshad and Nikooghadam proposed an authentication and key agreement
scheme for SIP to conquer the existing defects in Irshad et al.'s scheme. They claimed that …

Classification of abnormal signaling sip dialogs through deep learning

D Pereira, R Oliveira, HS Kim - IEEE Access, 2021 - ieeexplore.ieee.org
Due to the high utilization of the Session Initiation Protocol (SIP) in the signaling of cellular
networks and voice over IP multimedia systems, the avoidance of security vulnerabilities in …

[PDF][PDF] An anonymous SIP authenticated key agreement protocol based on elliptic curve cryptography

Y Lu, D Zhao - management, 2022 - aimspress.com
Designing a secure authentication scheme for session initial protocol (SIP) over internet
protocol (VoIP) networks remains challenging. In this paper, we revisit the protocol of Zhang …

Robust and efficient authentication scheme for session initiation protocol

Y Lu, L Li, Y Yang - Mathematical problems in engineering, 2015 - Wiley Online Library
The session initiation protocol (SIP) is a powerful application‐layer protocol which is used as
a signaling one for establishing, modifying, and terminating sessions among participants …

[PDF][PDF] SIP authentication protocols based on elliptic curve cryptography: survey and comparison

M Azrour, M Ouanan, Y Farhaoui - Indonesian Journal of …, 2016 - researchgate.net
Abstract Session Initiation Protocol (SIP) is the most popular signaling protocol using in
order to establish, modify and terminate the session multimedia between different …