[1] |
ROSENBERGETAL J. SIP: Session Initiation Protocol[EB/OL]. (2022-07-06)[2024-04-01]. https://www.rfc-editor.org/rfc/rfc3261.
|
[2] |
OSAMA S, YOUNES. A Hybrid Deep Learning Model for Detecting DDoS Flooding Attacks in SIP-Based Systems[J]. Computer Networks, 2024, 240: 110-146.
|
[3] |
SANDHYA H S, WAYAN M, SELO S. Design and Implementation of Mobile Applications for Military Personnel Based on SIP (Session Initiation Protocol)[C]// IEEE. 2022 IEEE 12th Annual Computing and Communication Workshop(CCWC). New York: IEEE, 2022: 870-875.
|
[4] |
YE Tengan, HUI Qinli, YUE Zhang, et al. Evaluating SIP-Based VoIP Communication Quality and Network Security[EB/OL]. (2023-11-03)[2024-04-01]. https://doi.org/10.1117/12.3026308.
|
[5] |
ALI A, PASCAL L, ABDELHAFID A, et al. A Performance Evaluation of In-Memory Databases Operations in Session Initiation Protocol[J]. Network, 2022, 3(1): 1-14.
|
[6] |
HUANG Chaoyang, CHEN Jinmu. A SIP Identity Authentication Key Agreement Protocol Based on ECC[J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2023, 52(5): 747-755.
|
|
黄朝阳, 陈金木. 基于ECC的SIP身份认证密钥协商协议[J]. 电子科技大学学报, 2023, 52(5): 747-755.
|
[7] |
LU Yanrong, LI Lixiang, PENG Haipeng, et al. A Secure and Efficient Mutual Authentication Scheme for Session Initiation Protocol[J]. Peer-to-Peer Networking and Applications, 2016, 9(2): 449-459.
|
[8] |
KUMARI S, KARUPPIAH M, DAS A K, et al. Design of a Secure Anonymity-Preserving Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography[J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9(3): 643-653.
|
[9] |
ZHOU Yousheng, CHEN Xinyun. An Anonymous and Efficient ECC-Based Authentication Scheme for SIP[J]. Wireless Communications and Mobile Computing, 2020(11): 1-11.
|
[10] |
HASSAN U M, CHAUDHRY S A, IRSHAD A, et al. An Improved SIP Authenticated Key Agreement Based on Dongqing[J]. Wireless Personal Communications, 2020, 110(4): 2087-2107.
|
[11] |
MAHOR V K, PADMAVATHY R, CHATTERJEE S. Chebyshev Chaotic Map-Based Efficient Authentication Scheme for Secure Access of VoIP Services through SIP[J]. International Journal of Security and Networks, 2022, 17(1): 39-47.
|
[12] |
OSAMA Y, UMAR A. Securing Session Initiation Protocol[J]. Sensors, 2022, 22(23): 9103-9110.
|
[13] |
LU Yanrong, ZHAO Dawei. An Anonymous SIP Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography[J]. Mathematical Biosciences and Engineering, 2022, 19(1): 66-85.
doi: 10.3934/mbe.2022003
pmid: 34902980
|
[14] |
YAO Mengmeng, ZHU Zhengchao, LIU Mingda. An Improved Formal Analysis Method Based on Authentication Tests[J]. Netinfo Security, 2019, 19(1): 27-33.
|
|
姚萌萌, 朱正超, 刘明达. 一种改进的基于认证测试的形式化分析方法[J]. 信息网络安全, 2019, 19(1): 27-33.
|
[15] |
YAO Mengmeng, TANG Li, LING Yongxing, et al. Formal Analysis of Security Protocol Based on Strand Space[J]. Netinfo Security, 2020, 20(2): 30-36.
|
|
姚萌萌, 唐黎, 凌永兴, 等. 基于串空间的安全协议形式化分析研究[J]. 信息网络安全, 2020, 20(2): 30-36.
|
[16] |
WANG Jianhua, ZHANG Lan. A Formal Construction Attack Method for Detecting Type Defects[J]. Journal of Cryptologic Reseatch, 2021, 8(6): 1058-1073.
doi: 10.13868/j.cnki.jcr.000496
|
|
王建华, 张岚. 检测类型缺陷的形式化构造攻击方法[J]. 密码学报, 2021, 8(6): 1058-1073.
doi: 10.13868/j.cnki.jcr.000496
|
[17] |
GAO Shan. Formal Verification and Analysis of 5G AKA Protocol Using Mixed Strand Space Model[J]. Electronics, 2022, 11(4): 1333-1341.
|
[18] |
SHEN Yan, YAO Mengmeng. Research on Formal Analysis Based on Event of Group Key Agreement Protocol[J]. Netinfo Security, 2022, 20(5): 30-36.
|
|
沈延, 姚萌萌. 基于事件的群组密钥协商协议形式化分析研究[J]. 信息网络安全, 2022, 22(5): 30-36.
|
[19] |
ZHANG Lan, HE Liangsheng, YU Bin. A Class of Combination Verification and Authentication Method for Synchronous Key Update[J]. Journal of Electronics & Information Technology, 2023, 45(12): 4509-4518.
|
|
张岚, 何良生, 郁滨. 一类密钥同步更新的组合校验认证方法[J]. 电子与信息学报, 2023, 45(12): 4509-4518.
|
[20] |
YANG Fan, ESCOBAR S, MEADOWS C, et al. Strand Spaces with Choice via a Process Algebra Semantics[EB/OL]. (2019-04-22)[2024-04-06]. https://arxiv.org/abs/1904.09946.
|
[21] |
THAYER F J, HERZOG J C, GUTTMAN J D. Strand Space: Why is a Security Protocol Correct[C]// IEEE. IEEE Symposium on Security and Privacy. New York: IEEE, 1998: 160-171.
|
[22] |
THAYER F J, HERZOG J C, GUTTMAN J D. Strand Space: Proving Security Protocols Correct[J]. Journal of Computer Security, 1999, 7(2): 191-230.
|
[23] |
GUTTMAN J D, THAYER F J. Authentication Tests and the Structure of Bundles[J]. Theoretical Computer Science, 2002, 283(2): 333-380.
|