A survey of SIP authentication and key agreement schemes

HH Kilinc, T Yanik - IEEE communications surveys & tutorials, 2013 - ieeexplore.ieee.org
We present a survey of authentication and key agreement schemes that are proposed for the
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …

Key management for beyond 5G mobile small cells: A survey

M De Ree, G Mantas, A Radwan, S Mumtaz… - IEEE …, 2019 - ieeexplore.ieee.org
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …

jPBC: Java pairing based cryptography

A De Caro, V Iovino - 2011 IEEE symposium on computers and …, 2011 - ieeexplore.ieee.org
It has been recently discovered that some cyclic groups that could be used in Cryptography
admit a special bilinear pairing map that introduces extra structure to the group. Bilinear …

Multipurpose identity-based signcryption: A swiss army knife for identity-based cryptography

X Boyen - Annual international cryptology conference, 2003 - Springer
Identity-Based (IB) cryptography is a rapidly emerging approach to public-key cryptography
that does not require principals to pre-compute key pairs and obtain certificates for their …

Improved identity-based signcryption

L Chen, J Malone-Lee - International workshop on public key cryptography, 2005 - Springer
Identity-based cryptography is form of public-key cryptography that does not require users to
pre-compute key pairs and obtain certificates for their public keys. Instead, public keys can …

A new identity based signcryption scheme from pairings

B Libert, JJ Quisquater - Proceedings 2003 IEEE Information …, 2003 - ieeexplore.ieee.org
We present a new identity based scheme using pairings over elliptic curves. It combines the
functionalities of signature and encryption and is provably secure in the random oracle …

[PDF][PDF] On the implementation of pairing-based cryptosystems

B Lynn - 2007 - crypto.stanford.edu
Pairing-based cryptography has become a highly active research area. We define bilinear
maps, or pairings, and show how they give rise to cryptosystems with new functionality …

Secret handshakes from pairing-based key agreements

D Balfanz, G Durfee, N Shankar… - 2003 Symposium on …, 2003 - ieeexplore.ieee.org
Consider a CIA agent who wants to authenticate herself to a server but does not want to
reveal her CIA credentials unless the server is a genuine CIA outlet. Consider also that the …

[SÁCH][B] Security in wireless ad hoc and sensor networks

E Cayirci, C Rong - 2008 - books.google.com
This book provides an in-depth guide to security in wireless ad hoc and sensor networks
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals …

Threshold and identity-based key management and authentication for wireless ad hoc networks

H Deng, A Mukherjee… - … Conference on Information …, 2004 - ieeexplore.ieee.org
As various applications of wireless ad hoc network have been proposed, security has
become one of the big research challenges and is receiving increasing attention. In this …