[1]ROSENBERG J, SCHULZRINNE H, CAMARILLO G, et al. IETF RFC3261, SIP: session initiation protocol [S]. IETF, 2002.
[2]THOMAS M. IETF Internet Draft, draftthomas-sip-sec-reg-00.txt, SIP security requirements[S]. IETF, 2001.
[3]SALSANO S, VELTRI L, PAPALILO D. SIP security issues: the SIP authentication procedure and its processing load[J]. IEEE Network, 2002, 16(6): 38-44.
[4]GENEIATAKIS D, DAGIUKLAS T, KAMBOURAKIS G, et al. Survey of security vulnerabilities in session initiation protocol[J]. IEEE Communication Surveys and Tutorials, 2006, 8(3): 68-81.
[5]YOON E-J,YOO K-Y.Cryptanalysis of DS-SIP authentication scheme using ECDH[C]// NISS'09: International Conference on New Trends in Information and Service Science.Piscataway:IEEE,2009:642-647.
[6]YOON E-J, YOO K-Y. A new authentication scheme for session initiation protocol[C]// CISIS'09: International Conference on Complex, Intelligent and Software Intensive Systems. Piscataway: IEEE, 2009: 549-554
[7]ARSHAD R, IKRAM N. Elliptic curve cryptography based mutual authentication scheme for session initiation protocol[C]// Multimedia Tools and Applications. Berlin: Springer-Verlag, 2011: 1-14.
[8]YANG C C, WANG R C, LIU W T. Secure authentication scheme for session initiation protocol[J]. Computers and Security, 2005, 24(5): 381-386.
[9]DIFFIE W,HELLMAN M E.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654.
[10]DENNING D, SACCO G. Timestamps in key distribution systems[J]. Communications of the ACM, 1981, 24(8): 533-535.
[11]DURLANIK A, SOGUKPINAR I. SIP authentication scheme using ECDH[J]. World Enformatika Society Transaction on Engineering Computing and Technology, 2005, 8: 350-353.
[12]TSAI J L. Efficient nonce-based authentication scheme for session initiation protocol [J]. International Journal of Network Security, 2009, 9(1): 12-16.
[13]WU LIUFEI,ZHANG YUQING,WANG FENGJIAO.A new provably secure authentication and key agreement protocol for SIP using ECC[J].Computer Standard and Interfaces,2009,31(2):286-291.
[14]YOON E-J, YOO K-Y. A three-factor authenticated key agreement scheme for SIP on elliptic curves [C]// NSS '10: 4th International Conference on Network and System Security. Piscataway: IEEE, 2010: 334-339.
[15]KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(177): 203-209.
[16]MENEZES A J, van OORSCHOT P C, VANSTONE S A. Handbook of applied cryptography[M]. New York: CRC Press, 1997. |