A survey of SIP authentication and key agreement schemes

HH Kilinc, T Yanik - IEEE communications surveys & tutorials, 2013 - ieeexplore.ieee.org
We present a survey of authentication and key agreement schemes that are proposed for the
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …

Design of blockchain-based lightweight V2I handover authentication protocol for VANET

S Son, J Lee, Y Park, Y Park… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Connected vehicle means providing different services, such as advanced driver-assistance
systems (ADAS) from vehicles connected to the network. Vehicular ad-hoc networks …

A robust authentication protocol for wireless medical sensor networks using blockchain and physically unclonable functions

S Yu, Y Park - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Wireless medical sensor networks (WMSNs)-based medical systems are an emerging
paradigm of the Internet of Medical Things (IoMT) in which the patients and doctors can …

Provably secure authenticated key agreement scheme for smart grid

V Odelu, AK Das, M Wazid… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Due to the rapid development of wireless communication systems, authentication becomes
a key security component in smart grid environments. Authentication then plays an important …

SLAP-IoD: Secure and lightweight authentication protocol using physical unclonable functions for internet of drones in smart city environments

S Yu, AK Das, Y Park, P Lorenz - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
With the emergence of the concept of smart city and the increasing demands for a range of
drones, Internet of Drones (IoD) has achieved a variety of attention by providing multiple …

A performance evaluation of local descriptors

K Mikolajczyk, C Schmid - IEEE transactions on pattern …, 2005 - ieeexplore.ieee.org
In this paper, we compare the performance of descriptors computed for local interest
regions, as, for example, extracted by the Harris-Affine detector [Mikolajczyk, K and Schmid …

OPAQUE: an asymmetric PAKE protocol secure against pre-computation attacks

S Jarecki, H Krawczyk, J Xu - … 37th Annual International Conference on the …, 2018 - Springer
Abstract Password-Authenticated Key Exchange (PAKE) protocols allow two parties that
only share a password to establish a shared key in a way that is immune to offline attacks …

Authenticated key exchange secure against dictionary attacks

M Bellare, D Pointcheval, P Rogaway - … on the theory and applications of …, 2000 - Springer
Password-based protocols for authenticated key exchange (AKE) are designed to work
despite the use of passwords drawn from a space so small that an adversary might well …

A fuzzy vault scheme

A Juels, M Sudan - Designs, Codes and Cryptography, 2006 - Springer
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault.
A player Alice may place a secret value κ in a fuzzy vault and “lock” it using a set A of …

Password-based authenticated key exchange in the three-party setting

M Abdalla, PA Fouque, D Pointcheval - … on Theory and Practice in Public …, 2005 - Springer
Password-based authenticated key exchange are protocols which are designed to be
secure even when the secret key or password shared between two users is drawn from a …