Secure authentication scheme for session initiation protocol, Computers & Security, vol.24, issue.5, pp.381-386, 2005. ,
DOI : 10.1016/j.cose.2004.10.007
Sogukpinar: SIP Authentication Scheme Using ECDH, World Informatika Society Transaction on Engineering Computing and Technology, vol.8, pp.350-353, 2005. ,
A new provably secure authentication and key agreement protocol for SIP using ECC, Computer Standards & Interfaces, vol.31, issue.2, pp.286-291, 2009. ,
DOI : 10.1016/j.csi.2008.01.002
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, Proc. Eurocrypt 2001, pp.453-474, 2001. ,
DOI : 10.1007/3-540-44987-6_28
A secure and efficient SIP authentication scheme for converged VoIP networks, Computer Communications, vol.33, issue.14, pp.1674-1681, 2010. ,
DOI : 10.1016/j.comcom.2010.03.026
Vanstone: Guide to Elliptic Curve Cryptography, 2003. ,
Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992. ,
DOI : 10.1109/RISP.1992.213269
URL : http://academiccommons.columbia.edu/download/fedora_content/download/ac:127104/CONTENT/neke.pdf
SEC 2: Recommended Elliptic Curve Domain Parameters. http://www.secg.org/collateral/sec2_final.pdf 14, IEEE P1363, vol.2, 2008. ,