An enhanced privacy preserving remote user authentication scheme with provable security

SA Chaudhry, MS Farash, H Naqvi… - Security and …, 2015 - Wiley Online Library
Very recently, Kumari et al. proposed a symmetric key and smart card‐based remote user
password authentication scheme to enhance Chung et al.'s scheme. They claimed their …

An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography

SA Chaudhry, K Mahmood, H Naqvi… - Journal of Medical Systems, 2015 - Springer
Telecare medicine information system (TMIS) offers the patients convenient and expedite
healthcare services remotely anywhere. Patient security and privacy has emerged as key …

An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography

SA Ch, N Uddin, M Sher, A Ghani, H Naqvi… - Multimedia Tools and …, 2015 - Springer
The need for Lightweight cryptography is on the rise as transition has been made from wired
to wireless network. Wireless systems inherently are insecure and resource (power) …

Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol

H Arshad, M Nikooghadam - The Journal of Supercomputing, 2015 - Springer
Authentication is an important security requirement for session initiation protocol (SIP). The
conventional authentication method for SIP is HTTP Digest authentication which is insecure …

Robust and efficient authentication scheme for session initiation protocol

Y Lu, L Li, Y Yang - Mathematical problems in engineering, 2015 - Wiley Online Library
The session initiation protocol (SIP) is a powerful application‐layer protocol which is used as
a signaling one for establishing, modifying, and terminating sessions among participants …

[PDF][PDF] An improved authentication protocol for SIP-based VoIP

H Naqvi, SA Chaudhry, K Mahmood - 2015 - dspace.adu.ac.ae
The SIP being an application layer protocol for signaling has been considered as the most
ppropriate one for multimedia applications. In order to detect some collisions and replay …

A secure authentication scheme for session initiation protocol based on elliptic curve cryptography

SA Chaudhry, K Mahmood, H Naqvi… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
In 2014, Tu et al. proposed an authentication scheme for session initiation protocol. Very
soon Farash realized that Tu et al.'s scheme can not resist server forgery attack, then Farash …

An Improved Authentication Scheme for Electronic Payment Systems in Global Mobility Networks

M Heydari, SMS Sadough, SA Chaudhry… - … Technology and Control, 2015 - itc.ktu.lt
The use of e-payment system for electronic trade is on its way to make daily life more easy
and convenient‎.‎ Contrarily‎,‎ there are a number of security issues to be addressed‎,‎ user …