{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T02:08:00Z","timestamp":1774577280248,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2014,2,1]],"date-time":"2014-02-01T00:00:00Z","timestamp":1391212800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1007\/s12083-014-0248-4","type":"journal-article","created":{"date-parts":[[2014,1,31]],"date-time":"2014-01-31T20:08:12Z","timestamp":1391198892000},"page":"903-910","source":"Crossref","is-referenced-by-count":72,"title":["An improved authentication protocol for session initiation protocol using smart card"],"prefix":"10.1007","volume":"8","author":[{"given":"Hang","family":"Tu","sequence":"first","affiliation":[]},{"given":"Neeraj","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Naveen","family":"Chilamkurti","sequence":"additional","affiliation":[]},{"given":"Seungmin","family":"Rho","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,2,1]]},"reference":[{"key":"248_CR1","doi-asserted-by":"crossref","unstructured":"Franks J, Hallam-Baker PM, Hostetler JL, Lawrence SD, Leach PJ, Luotonen A, Stewart LC (1999) HTTP authentication: basic and digest access authentication. Internet RFC2617","DOI":"10.17487\/rfc2617"},{"key":"248_CR2","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.cose.2004.10.007","volume":"24","author":"C Yang","year":"2005","unstructured":"Yang C, Wang R, Liu W (2005) Secure authentication scheme for session initiation protocol. Comput Secur 24:381\u2013386","journal-title":"Comput Secur"},{"key":"248_CR3","doi-asserted-by":"crossref","unstructured":"Huang H, Wei W, Brown G (2006) A new efficient authentication scheme for session initiation protocol. Proc JCIS(06)","DOI":"10.2991\/jcis.2006.222"},{"key":"248_CR4","doi-asserted-by":"crossref","unstructured":"Jo H, Lee Y, Kim M, Kim S, Won D (2009) Off-line password-guessing attack to Yang\u2019s and Huang\u2019s authentication schemes for session initiation protocol. Proc INC, IMS IDC 618\u2013621","DOI":"10.1109\/NCM.2009.251"},{"key":"248_CR5","first-page":"350","volume":"8","author":"A Durlanik","year":"2005","unstructured":"Durlanik A, Sogukpinar I (2005) SIP authentication scheme using ECDH. World Enformatika Soc Trans Eng Comput Technol 8:350\u2013353","journal-title":"World Enformatika Soc Trans Eng Comput Technol"},{"key":"248_CR6","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1016\/j.csi.2008.01.002","volume":"31","author":"L Wu","year":"2009","unstructured":"Wu L, Zhang Y, Wang F (2009) A new provably secure authentication and key agreement protocol for SIP using ECC. Comput Stand Interfaces 31:286\u2013291","journal-title":"Comput Stand Interfaces"},{"key":"248_CR7","doi-asserted-by":"crossref","first-page":"1674","DOI":"10.1016\/j.comcom.2010.03.026","volume":"33","author":"EJ Yoon","year":"2010","unstructured":"Yoon EJ, Yoo KY et al (2010) A secure and efficient SIP authentication scheme for converged VoIP networks. Comput Commun 33:1674\u20131681","journal-title":"Comput Commun"},{"key":"248_CR8","unstructured":"Pu Q (2010) Weaknesses of SIP authentication scheme for converged VoIP networks. IACR Cryptol ePrint Arch 2010(464)"},{"key":"248_CR9","first-page":"308","volume":"2011","author":"MK Gokhroo","year":"2011","unstructured":"Gokhroo MK, Jaidhar CD (2011) Tomar AS cryptanalysis of SIP secure and efficient authentication scheme. Proc ICCSN 2011:308\u2013310","journal-title":"Proc ICCSN"},{"key":"248_CR10","first-page":"12","volume":"9","author":"JL Tsai","year":"2009","unstructured":"Tsai JL (2009) Efficient nonce-based authentication scheme for session initiation protocol. Int J Netw Secur 9:12\u201316","journal-title":"Int J Netw Secur"},{"key":"248_CR11","doi-asserted-by":"crossref","first-page":"203","DOI":"10.4103\/0256-4602.62780","volume":"27","author":"E Yoon","year":"2010","unstructured":"Yoon E, Shin Y, Jeon I, Yoo K (2010) Robust mutual authentication with a key agreement scheme for the session initiation protocol. IETE Tech Rev 27:203\u2013213","journal-title":"IETE Tech Rev"},{"key":"248_CR12","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1002\/dac.1286","volume":"25","author":"Q Xie","year":"2012","unstructured":"Xie Q (2012) A new authenticated key agreement for session initiation protocol. Int J Commun Syst 25:47\u201354","journal-title":"Int J Commun Syst"},{"issue":"2","key":"248_CR13","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/s11042-011-0787-0","volume":"66","author":"R Arshad","year":"2013","unstructured":"Arshad R, Ikram N (2013) Elliptic curve cryptography based mutual authentication scheme for session initation protocol. Multimedia Tools Appl 66(2):165\u2013178","journal-title":"Multimedia Tools Appl"},{"issue":"12","key":"248_CR14","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1002\/sec.506","volume":"5","author":"D He","year":"2012","unstructured":"He D, Chen J, Chen Y (2012) A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur Commun Networks 5(12):1423\u20131429","journal-title":"Secur Commun Networks"},{"key":"248_CR15","author":"L Zhang","year":"2013","unstructured":"Zhang L, Tang S, Cai Z (2013) Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card. Int J Commun Syst. doi: 10.1002\/dac.2499","journal-title":"Int J Commun Syst"},{"key":"248_CR16","doi-asserted-by":"crossref","unstructured":"Kocher P, Jaffe J, Jun B (1999) Differential power analysis, Proceedings of Crypto \u201899, pp. 388\u2013397, Springer-Verlag","DOI":"10.1007\/3-540-48405-1_25"},{"issue":"5","key":"248_CR17","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1109\/TC.2002.1004593","volume":"51","author":"TS Messerges","year":"2002","unstructured":"Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comput 51(5):541\u2013552","journal-title":"IEEE Trans Comput"},{"issue":"3","key":"248_CR18","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.inffus.2011.01.001","volume":"13","author":"D He","year":"2012","unstructured":"He D, Chen J, Hu J (2012) An ID-based client authentication with key agreement protocol for mobile client\u2013server environment on ECC with provable security. Inform Fusion 13(3):223\u2013230","journal-title":"Inform Fusion"},{"issue":"1","key":"248_CR19","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/s11277-012-0696-1","volume":"70","author":"D He","year":"2013","unstructured":"He D, Wu S (2013) Security flaws in a smart card based authentication scheme for multi-server environment. Wirel Pers Commun 70(1):323\u2013329","journal-title":"Wirel Pers Commun"},{"issue":"1","key":"248_CR20","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/S1005-8885(13)60008-4","volume":"20","author":"D Zhang","year":"2013","unstructured":"Zhang D, Ma Z, Niu X (2013) Anonymous authentication scheme of trusted mobile terminal under mobile internet. J China Univ Posts Telecommun 20(1):58\u201365","journal-title":"J China Univ Posts Telecommun"},{"issue":"2","key":"248_CR21","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1504\/IJAHUC.2013.052345","volume":"12","author":"Q Pu","year":"2013","unstructured":"Pu Q, Wang J, Wu S (2013) Scalable and efficient mobile authentication scheme preserving user privacy. Int J Ad Hoc Ubiquit Comput 12(2):65\u201374","journal-title":"Int J Ad Hoc Ubiquit Comput"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0248-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-014-0248-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-014-0248-4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,7]],"date-time":"2019-08-07T05:38:05Z","timestamp":1565156285000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-014-0248-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2,1]]},"references-count":21,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,9]]}},"alternative-id":["248"],"URL":"https:\/\/doi.org\/10.1007\/s12083-014-0248-4","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,2,1]]}}}