Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 413-419.doi: 10.11896/JsJkx.191100216
• Information Security • Previous Articles Next Articles
MO Tian-qing1 and HE Yong-mei2
CLC Number:
[1] DONG Q,LUO G M,ZHU L.Research on SIP based key distribution method of private mobile communication system.Command Control &Simulation.http://kns.cnki.net/kcms/detail/32.1759.TJ.20191218.1203.004.html.2019.12. [2] PAN W B.The Security Research of Core Network Protocol Based on Voip.BeiJing: BeiJing University of Posts and Telecommunicatons,2018. [3] SI D F,HAN X H,LONG Q,et al.A Survey on the Core Technique and Research Development in SIP Standard.Journal of Software,2005,16(2):239-249. [4] GUO Z H,LIU B C.Research and design of improved SIP-based authentication mechanism.Study on Optical Communications,2013,180(6):8-11. [5] JIANG H,PAN W J,HU R L.Design of SIP AuthenticationScheme Based on Ring Signature.Computer Technology and Development,2016,26(3):140-143. [6] ZHANG ZX,FANG B X,ZHANG H L,et al.Safe comunicated model of SIP network based on improved SIP protocol.Journal on Communication,2007,28(12):39-46. [7] WEI Z M,FENG J C.Study on Security Authentication Mechanism for SIP.Computer Science,2008,35(11):95-97. [8] LIU J M,GAO L J,LU G Y.Voip authentication and encryptionsystem based on SIP.Journal of Xi’an University of Posts and Telecommunications,2016,21(4):14-18. [9] CAO Y.SIP Authentication Key Agreement Protocol Based on ECDLP.Computer Systems & Applications,2016,25(3):225-228. [10] WEN Y Y,LUO M,ZHAO H.Research and implementation of a signcryption-based security mechanism in VoIP network.Journal on Communication,2010,31(4):8-15. [11] LI X W.Research on Provably Secure Authenticated KeyAgreement Protocol.Xi’an: Xidian University,2013. [12] NI L.Research on Some Issues in Authenticated Key Agreement Protocols.Shanghai: Shanghai Jiao Tong University,2012. [13] SHU J.Design and Analysis of Authenticated Key ExchangeProtocols.Chengdu: University of Electronic Science and Technology of China,2010. [14] SUN H Y.Authenticated Key Agreement Protocol and ITS Applications.BeiJing: BeiJing University of Posts and Telecommunicatons,2014. [15] ZHOU Y W,YANG B,ZHANG W Z.An Improved Two-party Authenticated Certificateless Key Agreement Protocol.Chinese Journal of Computers,2017,40(5):1181-1190. |
[1] | ZHANG Qi-wen, WANG Zhi-qiang and ZHANG Yi-qian. Trust Collection Consensus Algorithm Based on Gossip Protocol [J]. Computer Science, 2020, 47(6A): 391-394. |
[2] | REN Yi. Design of Network Multi-server SIP Information Encryption System Based on Block Chain and Artificial Intelligence [J]. Computer Science, 2020, 47(6A): 634-638. |
[3] | ZHANG Su-mei and ZHANG Bo-tao. Evaluation Model Construction Method Based on Quantum Dissipative Particle Swarm Optimization [J]. Computer Science, 2020, 47(6A): 84-88. |
[4] | YAN Hui, ZHU Bo-jing, WAN Wen, ZHONG Yin, David A YUNE. HPIC-LBM Method Based Simulation of Large Temporal-Spatial Scale 3D Turbulent Magnetic Reconnection on Supercomputer [J]. Computer Science, 2019, 46(8): 89-94. |
[5] | ZHANG Shi-jiang, CHAI Jing, CHEN Ze-hua and HE Hai-wu. Byzantine Consensus Algorithm Based on Gossip Protocol [J]. Computer Science, 2018, 45(2): 20-24. |
[6] | LIN Wang and TIAN Hong-xian. Implementation and Protocol Analysis of Embedded VoIP Voice Terminal Based on SIP [J]. Computer Science, 2016, 43(6): 86-90. |
[7] | CHEN Bin, MA Da-wei, YIN Cai-hua and JIANG Xue-yin. Research on Wireless Networks Mobility Management and OPNET Simulation Based on SIP [J]. Computer Science, 2015, 42(Z11): 289-291. |
[8] | ZHANG En, SUN Quan-dang and LIU Ya-peng. Collusion-free Rational Multi-secret Sharing Scheme [J]. Computer Science, 2015, 42(10): 164-169. |
[9] | LIU Jing,YE Xin-ming and MA Yuan-fei. Verification and Analysis of SIP Protocol Based on Timed Colored Petri Nets [J]. Computer Science, 2014, 41(7): 122-129. |
[10] | ZHANG Guo-yin,LI Jun,WANG Xiang-hui and XU Guo-kun. Improved Gossip Algorithm Based on Mobile P2P Networks [J]. Computer Science, 2013, 40(9): 103-105. |
[11] | . Novel Identity Based Broadcast Signcryption Scheme [J]. Computer Science, 2013, 40(2): 124-128. |
[12] | ZHOU Cai-xue and WANG Fei-peng. Improved Certificateless Signcryption Scheme without Pairing [J]. Computer Science, 2013, 40(10): 139-143. |
[13] | DAI Xiao-dong , CHEN Wen-xing. Research of the Mixed Softswitching Based on SIP and H.248 Protocol [J]. Computer Science, 2011, 38(Z10): 336-337. |
[14] | ZHAO Xiu-feng,XU Qiu-liang,WEI Da-Wei. Security Analysis Approaches for Group Key Agreement Protocols [J]. Computer Science, 2011, 38(6): 145-148. |
[15] | LI Wen-xiang,SHEN Yuan-ping,WU Jing,ZHU Han,YAN Jia-jun,ZHANG Xu. Reliable Route Selection Technique for SIP Calling Connection in Wireless Mesh Networks [J]. Computer Science, 2011, 38(4): 130-132. |
|