A lightweight message authentication scheme for smart grid communications in power sector

K Mahmood, SA Chaudhry, H Naqvi, T Shon… - Computers & Electrical …, 2016 - Elsevier
Abstract The Internet of Things (IoT) has plenty of applications including Smart Grid (SG). IoT
enables smooth and efficient utilization of SG. It is assumed as the prevalent illustration of …

Efficient privacy-aware authentication scheme for mobile cloud computing services

D He, N Kumar, MK Khan, L Wang… - IEEE Systems …, 2016 - ieeexplore.ieee.org
With the exponential increase of the mobile devices and the fast development of cloud
computing, a new computing paradigm called mobile cloud computing (MCC) is put forward …

A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography

SA Chaudhry, MS Farash, H Naqvi, M Sher - Electronic Commerce …, 2016 - Springer
The use of e-payment system for electronic trade is on its way to make daily life more easy
and convenient. Contrarily, there are a number of security issues to be addressed, user …

An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC

H Arshad, M Nikooghadam - Multimedia Tools and Applications, 2016 - Springer
The session initiation protocol (SIP) is a powerful and superior signaling protocol for the
voice over internet protocol (VoIP). Authentication is an important security requirement for …

A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card

D Mishra, AK Das, S Mukhopadhyay - Peer-to-peer networking and …, 2016 - Springer
Abstract The Session Initiation Protocol (SIP) is a signaling communications protocol, which
has been chosen for controlling multimedia communication in 3G mobile networks. The …

A secure biometric based multi-server authentication scheme for social multimedia networks

SA Chaudhry - Multimedia Tools and Applications, 2016 - Springer
Social networking is one of the major source of massive data. Such data is not only difficult
to store, manipulate and maintain but it's open access makes it security prone. Therefore …

Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography

MS Farash, S Kumari, M Bakhtiari - Multimedia Tools and Applications, 2016 - Springer
The session initiation protocol (SIP) has been receiving a lot of attention to provide security
in the Voice over IP (VoIP) in Internet and mobility management. Recently, Yeh et al …

An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks

L Zhang, S Tang, S Zhu - Journal of Network and Computer Applications, 2016 - Elsevier
Abstract Voice over Internet Protocol (VoIP) is spreading across the market rapidly due to its
characteristics such as low cost, flexibility implementation, versatility of new applications, etc …

Provably secure three‐factor authentication and key agreement scheme for session initiation protocol

S Challa, AK Das, S Kumari, V Odelu… - Security and …, 2016 - Wiley Online Library
Session initiation protocol (SIP) is a widely used authentication protocol for the Voice over IP
communications. Over the years, several protocols have been proposed in the literature to …

[PDF][PDF] SIP authentication protocols based on elliptic curve cryptography: survey and comparison

M Azrour, M Ouanan, Y Farhaoui - Indonesian Journal of …, 2016 - researchgate.net
Abstract Session Initiation Protocol (SIP) is the most popular signaling protocol using in
order to establish, modify and terminate the session multimedia between different …