{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T04:39:24Z","timestamp":1723264764795},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,5,19]],"date-time":"2015-05-19T00:00:00Z","timestamp":1431993600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61121061"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005089","name":"Beijing Municipal Natural Science Foundation","doi-asserted-by":"publisher","award":["4142016"],"id":[{"id":"10.13039\/501100005089","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Asia Foresight Program under NSFC Grant","award":["61411146001"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2016,3]]},"DOI":"10.1007\/s12083-015-0363-x","type":"journal-article","created":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T02:05:37Z","timestamp":1431914737000},"page":"449-459","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A secure and efficient mutual authentication scheme for session initiation protocol"],"prefix":"10.1007","volume":"9","author":[{"given":"Yanrong","family":"Lu","sequence":"first","affiliation":[]},{"given":"Lixiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Haipeng","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yixian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,19]]},"reference":[{"issue":"6","key":"363_CR1","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MNET.2002.1081764","volume":"16","author":"L Veltri","year":"2002","unstructured":"Veltri L, Salsano S, Papalilo D (2002) SIP security issues: the SIP authentication procedure and its processing load. IEEE Netw 16(6):38\u201344","journal-title":"IEEE Netw"},{"key":"363_CR2","doi-asserted-by":"crossref","unstructured":"Arkko J, Torvinen V, Camarillo G, Niemi A, Haukka T (2002) Security mechanism agreement for SIP sessions. IETF Internet Draft, Jun","DOI":"10.17487\/rfc3329"},{"key":"363_CR3","unstructured":"Thomas M (2001) SIP Security Requirements. IETF Internet Draft, Work In Progress Nov"},{"key":"363_CR4","first-page":"2015","volume":"2015","author":"Y Lu","year":"2015","unstructured":"Lu Y, Li L, Yang Y (2015) Robust and efficient authentication scheme for session initiation protocol. Math Probl Eng 2015:2015. doi: 10.1155\/2015\/894549 . Article ID 894549, 9","journal-title":"Math Probl Eng"},{"key":"363_CR5","doi-asserted-by":"crossref","unstructured":"Franks J, Hallam-Baker P, Hostetler J, Lawrence S, Leach P, Luotonen A. (1999) HTTP Authentication: Basic and digest access authentication. IETF RFC:2617","DOI":"10.17487\/rfc2617"},{"key":"363_CR6","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.cose.2004.10.007","volume":"24","author":"C Yang","year":"2005","unstructured":"Yang C, Wang R, Liu W (2005) Secure authentication scheme for session initiation protocol. Comput Secur 24:381\u2013386","journal-title":"Comput Secur"},{"key":"363_CR7","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1145\/358722.358740","volume":"24","author":"D Denning","year":"1981","unstructured":"Denning D, Sacco G (1981) Timestamps in key distribution systems. Commun ACM 24:533\u2013536","journal-title":"Commun ACM"},{"issue":"12","key":"363_CR8","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1002\/sec.506","volume":"5","author":"D He","year":"2012","unstructured":"He D, Chen J, Chen Y (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur Commun Netw 5(12):1423\u20131429","journal-title":"Secur Commun Netw"},{"key":"363_CR9","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48:417\u2013426","journal-title":"Math Comput"},{"key":"363_CR10","doi-asserted-by":"crossref","first-page":"372","DOI":"10.1016\/j.comcom.2009.10.005","volume":"33","author":"Y Liao","year":"2010","unstructured":"Liao Y, Wang S (2010) A new secure password authenticated key agreement scheme for SIP using self-certified public keys on elliptic curves. Comput Commun 33:372\u2013380","journal-title":"Comput Commun"},{"key":"363_CR11","unstructured":"Menezes A J (1997) Handbook of applied cryptography, CRC Press Inc, Vanstone, SA"},{"key":"363_CR12","first-page":"417","volume-title":"Use of elliptic curves in cryptography. Advances in Cryptology-Crypto\u201985: Proceedings","author":"VS Miller","year":"1986","unstructured":"Miller VS (1986) Use of elliptic curves in cryptography. Advances in Cryptology-Crypto\u201985: Proceedings. Springer Berlin, Heidelberg, p 417"},{"key":"363_CR13","first-page":"350","volume":"8","author":"A Durlanik","year":"2005","unstructured":"Durlanik A, Sogukpinar I (2005) SIP authentication scheme using ECDH. World Enform Socity Trans. Engineering Comput Technol 8:350\u2013353","journal-title":"World Enform Socity Trans. Engineering Comput Technol"},{"key":"363_CR14","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.csi.2008.01.002","volume":"31","author":"L Wu","year":"2009","unstructured":"Wu L, Zhang Y, Wang F (2009) A new provably secure authentication and key agreement protocol for SIP using ECC. Comput Stand Interfaces 31:286\u2013291","journal-title":"Comput Stand Interfaces"},{"key":"363_CR15","doi-asserted-by":"crossref","first-page":"1674","DOI":"10.1016\/j.comcom.2010.03.026","volume":"33","author":"EJ Yoon","year":"2010","unstructured":"Yoon EJ, Yoo KY, Kim C, Hong YS, Jo M, Chen HH (2010) A secure and efficient SIP authentication scheme for converged VoIP networks. Comput Commun 33:1674\u20131681","journal-title":"Comput Commun"},{"key":"363_CR16","doi-asserted-by":"crossref","unstructured":"Gokhroo MK, Jaidhar CD, Tomar AS (2011) Cryptanalysis of SIP secure and efficient authentication scheme. Proceedings ICCSN","DOI":"10.1109\/ICCSN.2011.6014057"},{"key":"363_CR17","unstructured":"Pu Q (2010) Weaknesses of SIP authentication scheme for converged VoIP networks. IACR Cryptol ePrint Arch"},{"issue":"3","key":"363_CR18","first-page":"312","volume":"8","author":"J Tsai","year":"2009","unstructured":"Tsai J (2009) Efficient nonce-based authentication scheme for session initiation protocol. Int J Netw Secur 8 (3):312\u2013316","journal-title":"Int J Netw Secur"},{"issue":"2","key":"363_CR19","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s11042-011-0787-0","volume":"66","author":"R Arshad","year":"2013","unstructured":"Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initiation protocol. Multimed Tools Appl 66(2):165\u2013178","journal-title":"Multimed Tools Appl"},{"key":"363_CR20","first-page":"46","volume":"119","author":"TH Chen","year":"2010","unstructured":"Chen T H, Yeh H L, Liu P C, Hsiang H C, Shih W K (2010) A secured authentication protocol for SIP using elliptic curves cryptography. CN CCIS 119:46\u201355","journal-title":"CN CCIS"},{"issue":"1","key":"363_CR21","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/S0167-4048(03)00114-7","volume":"22","author":"C Lin","year":"2003","unstructured":"Lin C, Hwang T (2003) A password authentication scheme with secure password updating. Comput Secur 22(1):68\u201372","journal-title":"Comput Secur"},{"key":"363_CR22","doi-asserted-by":"crossref","unstructured":"Yoon E J, Yoo K Y (2009) Cryptanalysis of DS-SIP authentication scheme using ECDH. International Conference on New Trends in Information and Service Science","DOI":"10.1109\/NISS.2009.137"},{"issue":"1","key":"363_CR23","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1002\/dac.1286","volume":"25","author":"Q Xie","year":"2012","unstructured":"Xie Q (2012) A new authenticated key agreement for session initiation protocol. Int J Commun Syst 25(1):47\u201354","journal-title":"Int J Commun Syst"},{"issue":"4","key":"363_CR24","first-page":"333","volume":"42","author":"MS Farash","year":"2013","unstructured":"Farash M S, Attari M A (2013) An enhanced authenticated key agreement for session initiation protocol. Inf Technol Control 42(4):333\u2013342","journal-title":"Inf Technol Control"},{"key":"363_CR25","doi-asserted-by":"crossref","unstructured":"Zhang Z, Qi Q, Kumar N, Chilamkurti N, Jeong H Y (2014) A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography, Multimedia Tools Applied","DOI":"10.1007\/s11042-014-1885-6"},{"key":"363_CR26","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1016\/S1363-4127(97)81331-3","volume":"12","author":"SA Vanstone","year":"1997","unstructured":"Vanstone S A (1997) Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments. Inf Secur Tech Rep 12:78\u201387","journal-title":"Inf Secur Tech Rep"},{"issue":"2","key":"363_CR27","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1007\/s10623-005-6344-y","volume":"38","author":"DR Stinson","year":"2006","unstructured":"Stinson DR (2006) Some Observations on the theory of cryptographic hash functions. Desi Codes Crypto 38(2):259\u2013277","journal-title":"Desi Codes Crypto"},{"key":"363_CR28","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M Burrow","year":"1990","unstructured":"Burrow M, Abadi M, Needham R (1990) A logic of authentication. ACM Trans Comput Syst 8:18\u201336","journal-title":"ACM Trans Comput Syst"},{"key":"363_CR29","doi-asserted-by":"crossref","unstructured":"Boyd C, Mathuria A (2003) Protocols for authentication and key establishment. Springer","DOI":"10.1007\/978-3-662-09527-0"},{"key":"363_CR30","doi-asserted-by":"crossref","unstructured":"Eisenbarth T, Kasper T, Moradi A, Paar C, Salmasizadeh M, Shalmani MTM (2008) On the power of power analysis in the real world: A complete break of the keeloq code hopping scheme. In: Advances in Cryptology-CRYPTO 2008. Springer, pp 203\u2013220","DOI":"10.1007\/978-3-540-85174-5_12"},{"issue":"11","key":"363_CR31","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770\u2013772","journal-title":"Commun ACM"},{"issue":"8","key":"363_CR32","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/S0167-4048(99)80136-9","volume":"18","author":"W Yang","year":"1999","unstructured":"Yang W, Shieh SP (1999) Password authentication schemes with smart cards. Comput Secur 18(8):727\u2013733","journal-title":"Comput Secur"},{"issue":"1-2","key":"363_CR33","first-page":"121","volume":"21","author":"S Chatterjee","year":"2014","unstructured":"Chatterjee S, Das AK, Sing JK (2014) An enhanced access control scheme in wireless sensor networks. Ad Hoc Sensor Wireless Netw 21(1-2):121\u2013149","journal-title":"Ad Hoc Sensor Wireless Netw"},{"issue":"10","key":"363_CR34","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1016\/j.ins.2013.10.022","volume":"269","author":"V Odelu","year":"2014","unstructured":"Odelu V, Das AK, Goswami A (2014) A secure effective key management scheme for dynamic access control in a large leaf class hierarchy. Inform Sci 269(10):270\u2013285","journal-title":"Inform Sci"},{"key":"363_CR35","doi-asserted-by":"crossref","unstructured":"Tu H, Kumar N, Chilamkurti N, Rho S (2014) An improved authentication protocol for session initiation protocol using smart card. Peer-to-Peer Network Applied","DOI":"10.1007\/s12083-014-0248-4"},{"key":"363_CR36","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/j.csi.2013.08.010","volume":"36","author":"HL Yeh","year":"2014","unstructured":"Yeh HL, Chen TH, Shih WK (2014) Robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Comput Stand Interfaces 36:397\u2013402","journal-title":"Comput Stand Interfaces"},{"issue":"3","key":"363_CR37","doi-asserted-by":"crossref","first-page":"203","DOI":"10.4103\/0256-4602.62780","volume":"27","author":"EJ Yoon","year":"2010","unstructured":"Yoon EJ, Shin YN, Jeon IS, Yoo KY (2010) Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Tech Rev 27(3):203\u2013213","journal-title":"IETE Tech Rev"},{"key":"363_CR38","doi-asserted-by":"crossref","unstructured":"Zhang L, Tang S, Cai Z (2013), Efficient and flexible password authenticated key agreement for Voice over Internet protocol session initiation protocol using smart card. International Journal Communication System","DOI":"10.1002\/dac.2499"},{"key":"363_CR39","doi-asserted-by":"crossref","unstructured":"Kilinc H, Yanik T (2013) A survey of SIP authentication and key agreement schemes. IEEE Communications Surveys & Tutorials. doi: 10.1109\/SURV.2013.091513.00050","DOI":"10.1109\/SURV.2013.091513.00050"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0363-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-015-0363-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-015-0363-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T06:35:18Z","timestamp":1566714918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-015-0363-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,19]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,3]]}},"alternative-id":["363"],"URL":"https:\/\/doi.org\/10.1007\/s12083-015-0363-x","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,19]]}}}