{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:24:38Z","timestamp":1742927078430,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813368347"},{"type":"electronic","value":"9789813368354"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-33-6835-4_15","type":"book-chapter","created":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T09:20:32Z","timestamp":1612430432000},"page":"225-234","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The Impact of Elliptic Curves Name Selection to Session Initiation Protocol Server"],"prefix":"10.1007","author":[{"family":"Ali Abdulrazzaq K.","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Awos Kh.","family":"Ali","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Supriyanto","family":"Praptodiyono","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,2,5]]},"reference":[{"key":"15_CR1","unstructured":"Johnston, A.B.: SIP: Understanding the Session Initiation Protocol. RFC 5631, RFC Editor. https:\/\/tools.ietf.org\/html\/rfc5631 (2015)"},{"key":"15_CR2","unstructured":"Rosenberg, J., et al.: SIP: Session Initiation Protocol. RFC 3261, RFC Editor. https:\/\/tools.ietf.org\/html\/rfc3261 (2002)"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1109\/TNET.2011.2180922","volume":"20","author":"C Shen","year":"2012","unstructured":"Shen, C., Nahum, E., Schulzrinne, H., Wright, C.P.: The impact of TLS on SIP server performance: measurement and modeling. IEEE\/ACM Trans. Netw. 20, 1217\u20131230 (2012)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"15_CR4","unstructured":"Oppliger, R.: SSL and TLS: Theory and Practice. Artech House (2016)"},{"key":"15_CR5","doi-asserted-by":"publisher","first-page":"1622","DOI":"10.1109\/TC.2017.2771535","volume":"67","author":"A Faz-Hern\u00e1ndez","year":"2017","unstructured":"Faz-Hern\u00e1ndez, A., L\u00f3pez, J., Ochoa-Jim\u00e9nez, E., Rodr\u00edguez-Henr\u00edquez, F.: A faster software implementation of the supersingular isogeny Diffie-Hellman key exchange protocol. IEEE Trans. Comput. 67, 1622\u20131636 (2017)","journal-title":"IEEE Trans. Comput."},{"key":"15_CR6","first-page":"237","volume":"14","author":"Z Liu","year":"2016","unstructured":"Liu, Z., Huang, X., Hu, Z., Khan, M.K., Seo, H., Zhou, L.: On emerging family of elliptic curves to secure internet of things: ECC comes of age. IEEE Trans. Dependable Secure Comput. 14, 237\u2013248 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"15_CR7","unstructured":"Ring, J., Choo, K., Foo, E., Looi, M.: A new authentication mechanism and key agreement protocol for SIP using identity-based cryptography. In: Asia Pacific Information Technology Security Conference (AusCERT), pp. 57\u201372. University of Queensland, Australia (2006)"},{"key":"15_CR8","unstructured":"Kaji, T., Hoshino, K., Fujishiro, T., Takata, O., Yato, A., Takeuchi, K., Tezuka, S.: TLS handshake method based on SIP. In: Proceedings of the International Multiconference on Computer Science and Information Technology, pp. 467\u2013475 (2006)"},{"key":"15_CR9","first-page":"262","volume":"28","author":"M Elhoseny","year":"2016","unstructured":"Elhoseny, M., Elminir, H., Riad, A., Yuan, X.: A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption. J. King Saud Univ. Comput. Inf. Sci. 28, 262\u2013275 (2016)","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Singh, S.R., Khan, A.K., Singh, S.R.: Performance evaluation of RSA and elliptic curve cryptography. In: 2nd International Conference on Contemporary Computing and Informatics (IC3I), pp. 302\u2013306. IEEE Press, India (2016)","DOI":"10.1109\/IC3I.2016.7917979"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Zinzindohoue, J.K., Bartzia, E.I., Bhargavan, K.: June. A verified extensible library of elliptic curves. In: 29th Computer Security Foundations Symposium (CSF), pp. 296\u2013309. IEEE Press, USA (2016)","DOI":"10.1109\/CSF.2016.28"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s13389-017-0163-8","volume":"8","author":"T Oliveira","year":"2018","unstructured":"Oliveira, T., L\u00f3pez, J., Rodr\u00edguez-Henr\u00edquez, F.J.: The Montgomery ladder on binary elliptic curves. Cryptogr. Eng. 8, 241\u2013258 (2018)","journal-title":"Cryptogr. Eng."},{"key":"15_CR13","first-page":"1","volume":"7","author":"A Najib","year":"2013","unstructured":"Najib, A.: kofahi: an empirical study to compare the performance of some symmetric and asymmetric ciphers. Int. J. Sec. Appl. 7, 1\u201316 (2013)","journal-title":"Int. J. Sec. Appl."},{"key":"15_CR14","unstructured":"Bogdan, A.: OpenSIPS the new breed of communication engine (2020). https:\/\/opensips.org\/. Accessed 8 Aug 2020"},{"key":"15_CR15","volume-title":"Building Telephony Systems with OpenSIPS","author":"FE Goncalves","year":"2016","unstructured":"Goncalves, F.E., Iancu, B.A.: Building Telephony Systems with OpenSIPS, 2nd edn. Packt Publishing Ltd., Birmingham, UK (2016)","edition":"2"},{"issue":"2","key":"15_CR16","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s13389-017-0152-y","volume":"7","author":"Y Yarom","year":"2017","unstructured":"Yarom, Y., Genkin, D., Heninger, N.: CacheBleed: a timing attack on OpenSSL constant-time RSA. J. Cryptogr. Eng. 7(2), 99\u2013112 (2017). https:\/\/doi.org\/10.1007\/s13389-017-0152-y","journal-title":"J. Cryptogr. Eng."},{"key":"15_CR17","first-page":"448","volume":"14","author":"AA Khudher","year":"2019","unstructured":"Khudher, A.A.: SIP aspects of IPv6 transitions: current issues and future directions. J. Eng. Sci. Technol. 14, 448\u2013463 (2019)","journal-title":"J. Eng. Sci. Technol."},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Khudher, A.A., Beng, L.Y., Ramadass, S.: A comparative study of direct and indirect static peering for inter-domain SIP calls. In: Proceedings International Conference RFID-Technologies Application, pp. 1\u20135. Johor Bahru, Malaysia (2013)","DOI":"10.1109\/RFID-TA.2013.6694541"},{"key":"15_CR19","doi-asserted-by":"crossref","unstructured":"Praptodiyono, S., Santoso, M.I., Firmansyah, T., Abdurrazaq, A., Hasbullah, I.H., Osman, A.: Enhancing IPsec performance in mobile IPv6 using elliptic curve cryptography. In: 6th International Conference on Electrical Engineering Computer Science and Informatics (EECSI), pp. 186\u2013191. IEEE, Bandung, Indonesia (2019)","DOI":"10.23919\/EECSI48112.2019.8976992"},{"key":"15_CR20","first-page":"174","volume":"10","author":"AA Khudher","year":"2015","unstructured":"Khudher, A.A., Ramadass, S.: I-TNT: phone number expansion and translation system for managing interconnectivity addressing in SIP peering. J. Eng. Sci. Technol. 10, 174\u2013183 (2015)","journal-title":"J. Eng. Sci. Technol."},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Rebahi, Y., Pallares, J.J., Minh, N.T., Ehlert, S., Kovacs, G., Sisalem, D.: Performance analysis of identity management in the Session Initiation Protocol (SIP). In: International Conference on Computer Systems and Applications, pp. 711\u2013717. IEEE, Doha, Qatar (2008)","DOI":"10.1109\/AICCSA.2008.4493606"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Kilinc, H.H., Allaberdiyev, Y., Yanik, T.: Performance evaluation of Id based authentication methods in the SIP protocol. In: 2009 International Conference on Application of Information and Communication Technologies, pp. 1\u20136. IEEE, Baku, Azerbaijan (2009)","DOI":"10.1109\/ICAICT.2009.5372605"}],"container-title":["Communications in Computer and Information Science","Advances in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-6835-4_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T01:56:08Z","timestamp":1619315768000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-33-6835-4_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789813368347","9789813368354"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-6835-4_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"5 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACeS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Penang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aces2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.aces.usm.my\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}