References
- J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley & E. Schooler. (2002). SIP: Session Initiation Protocol. RFC 3261.
- T. Robles, R. Ortiz & J. Salvachja. (2003). Porting the session initiation protocol to IPv6. IEEE Internet Computing, 7(3), 43-50. https://doi.org/10.1109/MIC.2003.1200300
- C. Shen, F. Shen, Z. Wu & J. Luo. (2009). Application of session initiation protocol to networked sensor interfaces. Computer Standards & Interfaces, 31(2), 454-457. https://doi.org/10.1016/j.csi.2008.05.006
- E. Y. Ha. (2014). A Scalable Management Method for Asterisk-based Internet Telephony System. Journal of Digital Convergence, 12(8), 235-242. https://doi.org/10.14400/JDC.2014.12.8.235
- H. U. Kim, H. J. Kim, J. H. Kang & M. S. Jun. (2016). A Study on Analysis and Countermeasure of Security Threat in NFC. Journal of Digital Convergence, 14(12), 183-191. https://doi.org/10.14400/JDC.2016.14.12.183
- H. Kim & S. W. Lee. (2010). Modified Authenticated Key Exchange Protocol for SIP using ECC. Journal of Security Engineering, 7(4), 279-286.
- J. Franks, P. Hallam-Baker, J. Hostetler, S. Lawrence, P. Leach, A. Luotonen & L. Stewart. (1999). HTTP Authentication: Basic and Digest Access Authentication. RFC 2617.
- H. Tu, N. Kumar, N. Chilamkurti & S. Rho. (2015). An Improved Authentication Protocol for Session Initiation Protocol using Smart Card. Peer-to-peer Network and Application, 8(5), 903-910. https://doi.org/10.1007/s12083-014-0248-4
- M. S. Farash. (2016). Security Analysis and Enhancements of An Improved Authentication for Session Initiation Protocol with Provable Security. Peer-to-peer Network and Application, 9, 82-91. https://doi.org/10.1007/s12083-014-0315-x
- S. A. Chaudhry, H. Naqvi, M. Sher, M. S. Farash & M. U. Hassan. (2017). An Improved and Provably Secure Privacy Preserving Authentication Protocol for SIP. Peer-to-peer Network and Application, 10, 1-15. https://doi.org/10.1007/s12083-015-0400-9
- S. Qiu, G. Xu, H. Ahmad & Y. Guo. (2018). An Enhanced Password Authentication Scheme for Session Initiation Protocol with Perfect Forward Secrecy. Plos One, 13(3), e0194072. https://doi.org/10.1371/journal.pone.0194072
- S. Y. Jung & J. Kwak. (2013). Smart Card and Dynamic ID Based Electric Vehicle User Authentication Scheme. Journal of Digital Convergence, 11(7), 141-148. https://doi.org/10.14400/JDPM.2013.11.7.141
- H. W. Choi, S. Kim & M. Ryoo. (2019). Cryptanalysis and Solution on Secure Communication Scheme for Healthcare System using Wearable Devices. Journal of Digital Convergence, 17(2), 187-194. https://doi.org/10.14400/JDC.2019.17.2.187
- B. Blanchet. (2001). An efficient cryptographic protocol verifier based on prolog rules. Proc. of the 14th IEEE workshop on Computer Security Foundations, 82-96.
- D. Wang & P. Wang. (2016). Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound. IEEE Transactions on Dependable and Secure Computing, 15(4), 708-722. https://doi.org/10.1109/tdsc.2016.2605087