C. C. Yang, R. C. Wang, and W. T. Liu, Secure authentication scheme for session initiation protocol, Computers & Security, vol.24, issue.5, pp.381-386, 2005.
DOI : 10.1016/j.cose.2004.10.007

A. Durlanik and I. , Sogukpinar: SIP Authentication Scheme Using ECDH, World Informatika Society Transaction on Engineering Computing and Technology, vol.8, pp.350-353, 2005.

L. Wu, Y. Zhang, and F. Wang, A new provably secure authentication and key agreement protocol for SIP using ECC, Computer Standards & Interfaces, vol.31, issue.2, pp.286-291, 2009.
DOI : 10.1016/j.csi.2008.01.002

R. Canetti and H. Krawczyk, Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels, Proc. Eurocrypt 2001, pp.453-474, 2001.
DOI : 10.1007/3-540-44987-6_28

E. J. Yoon, K. Y. Yoo, C. Kim, Y. S. Hong, M. Jo et al., A secure and efficient SIP authentication scheme for converged VoIP networks, Computer Communications, vol.33, issue.14, pp.1674-1681, 2010.
DOI : 10.1016/j.comcom.2010.03.026

D. Hankerson, A. Menezes, and S. , Vanstone: Guide to Elliptic Curve Cryptography, 2003.

S. Bellovin and M. Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992.
DOI : 10.1109/RISP.1992.213269

URL : http://academiccommons.columbia.edu/download/fedora_content/download/ac:127104/CONTENT/neke.pdf

C. Research, SEC 2: Recommended Elliptic Curve Domain Parameters. http://www.secg.org/collateral/sec2_final.pdf 14, IEEE P1363, vol.2, 2008.