{"id":"https://openalex.org/W3109455708","doi":"https://doi.org/10.1155/2020/8886585","title":"An Anonymous and Efficient ECC-Based Authentication Scheme for SIP","display_name":"An Anonymous and Efficient ECC-Based Authentication Scheme for SIP","publication_year":2020,"publication_date":"2020-11-21","ids":{"openalex":"https://openalex.org/W3109455708","doi":"https://doi.org/10.1155/2020/8886585","mag":"3109455708"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8886585","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8886585","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2020/8886585.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2020/8886585.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102957035","display_name":"Yousheng Zhou","orcid":"https://orcid.org/0000-0003-4116-6608"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yousheng Zhou","raw_affiliation_strings":["College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China","School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China","institution_ids":["https://openalex.org/I10535382"]},{"raw_affiliation_string":"School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing 400065, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101977007","display_name":"Xinyun Chen","orcid":"https://orcid.org/0000-0003-4414-0964"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinyun Chen","raw_affiliation_strings":["College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing 400065, China","institution_ids":["https://openalex.org/I10535382"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5102957035"],"corresponding_institution_ids":["https://openalex.org/I10535382"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":0.1618,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56256092,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9908999800682068,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8305535316467285},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.609200656414032},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5904510617256165},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5723138451576233},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5669023990631104},{"id":"https://openalex.org/keywords/session-initiation-protocol","display_name":"Session Initiation Protocol","score":0.48263320326805115},{"id":"https://openalex.org/keywords/reflection-attack","display_name":"Reflection attack","score":0.47571641206741333},{"id":"https://openalex.org/keywords/authentication-protocol","display_name":"Authentication protocol","score":0.469056636095047},{"id":"https://openalex.org/keywords/mutual-authentication","display_name":"Mutual authentication","score":0.4509640336036682},{"id":"https://openalex.org/keywords/session-key","display_name":"Session key","score":0.4500315189361572},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.43526121973991394},{"id":"https://openalex.org/keywords/elliptic-curve-cryptography","display_name":"Elliptic curve cryptography","score":0.42878058552742004},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.39962559938430786},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.23706620931625366},{"id":"https://openalex.org/keywords/data-authentication-algorithm","display_name":"Data Authentication Algorithm","score":0.2125629186630249},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.15617439150810242},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.11960262060165405}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8305535316467285},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.609200656414032},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5904510617256165},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5723138451576233},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5669023990631104},{"id":"https://openalex.org/C41878487","wikidata":"https://www.wikidata.org/wiki/Q191018","display_name":"Session Initiation Protocol","level":3,"score":0.48263320326805115},{"id":"https://openalex.org/C91069110","wikidata":"https://www.wikidata.org/wiki/Q1919060","display_name":"Reflection attack","level":5,"score":0.47571641206741333},{"id":"https://openalex.org/C21564112","wikidata":"https://www.wikidata.org/wiki/Q4825885","display_name":"Authentication protocol","level":3,"score":0.469056636095047},{"id":"https://openalex.org/C2781221063","wikidata":"https://www.wikidata.org/wiki/Q6944186","display_name":"Mutual authentication","level":3,"score":0.4509640336036682},{"id":"https://openalex.org/C191197275","wikidata":"https://www.wikidata.org/wiki/Q1755775","display_name":"Session key","level":3,"score":0.4500315189361572},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.43526121973991394},{"id":"https://openalex.org/C167615521","wikidata":"https://www.wikidata.org/wiki/Q1048911","display_name":"Elliptic curve cryptography","level":4,"score":0.42878058552742004},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.39962559938430786},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.23706620931625366},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.2125629186630249},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.15617439150810242},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.11960262060165405},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/8886585","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8886585","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2020/8886585.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:04376fde4a584675a06f484f5002be64","is_oa":true,"landing_page_url":"https://doaj.org/article/04376fde4a584675a06f484f5002be64","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/8886585","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8886585","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2020/8886585.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5799999833106995,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1004351454","display_name":null,"funder_award_id":"CX2018122","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G164004852","display_name":null,"funder_award_id":"CX2018122","funder_id":"https://openalex.org/F4320323172","funder_display_name":"Natural Science Foundation of Chongqing"},{"id":"https://openalex.org/G2012268979","display_name":null,"funder_award_id":"cstc2020jcyj-msxmX0343","funder_id":"https://openalex.org/F4320323172","funder_display_name":"Natural Science Foundation of Chongqing"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2702356746","display_name":null,"funder_award_id":"61702","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3151624230","display_name":null,"funder_award_id":"6187205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4235192953","display_name":null,"funder_award_id":"61702067","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6058138561","display_name":null,"funder_award_id":", No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6600626235","display_name":null,"funder_award_id":"61872051","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6903931017","display_name":null,"funder_award_id":"cstc2020jcyj-msxmX0343","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8458856211","display_name":null,"funder_award_id":"61702067","funder_id":"https://openalex.org/F4320323172","funder_display_name":"Natural Science Foundation of Chongqing"},{"id":"https://openalex.org/G8681466026","display_name":null,"funder_award_id":"201812","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8883118294","display_name":null,"funder_award_id":"61872051","funder_id":"https://openalex.org/F4320323172","funder_display_name":"Natural Science Foundation of Chongqing"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320323172","display_name":"Natural Science Foundation of Chongqing","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3109455708.pdf","grobid_xml":"https://content.openalex.org/works/W3109455708.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1542829256","https://openalex.org/W1550483590","https://openalex.org/W1754939103","https://openalex.org/W1973245847","https://openalex.org/W1980823548","https://openalex.org/W1995718361","https://openalex.org/W2001788001","https://openalex.org/W2007488200","https://openalex.org/W2010122144","https://openalex.org/W2026130590","https://openalex.org/W2035099839","https://openalex.org/W2048755632","https://openalex.org/W2054223125","https://openalex.org/W2129277957","https://openalex.org/W2193060290","https://openalex.org/W2514873781","https://openalex.org/W2541107254","https://openalex.org/W2589783599","https://openalex.org/W4242138061","https://openalex.org/W6652202029"],"related_works":["https://openalex.org/W2559950795","https://openalex.org/W141692544","https://openalex.org/W2350408382","https://openalex.org/W2799836388","https://openalex.org/W2339018681","https://openalex.org/W2540993346","https://openalex.org/W3034223808","https://openalex.org/W2377475461","https://openalex.org/W2352353578","https://openalex.org/W2978473185"],"abstract_inverted_index":{"Session":[0],"initiation":[1],"protocol":[2,8],"(SIP),":[3],"a":[4,144],"widely":[5],"used":[6],"signal":[7],"for":[9,37,46,149],"controlling":[10],"multimedia":[11],"communication":[12],"sessions,":[13],"is":[14,119,129],"under":[15],"numerous":[16],"attacks":[17,165],"when":[18],"performing":[19],"the":[20,24,169],"authentication":[21,30],"steps":[22],"between":[23],"user":[25],"and":[26,53,74,95,116,124,153,166],"server.":[27],"So":[28],"secure":[29],"schemes":[31,45,56],"are":[32],"needed":[33],"to":[34,104,132],"be":[35],"presented":[36],"SIP.":[38,150],"Recently,":[39],"Arshad":[40,67,115],"et":[41,63,68,93,126],"al.":[42,64,94],"advanced":[43,90],"novel":[44,145],"SIP":[47],"using":[48],"elliptic":[49],"curve":[50],"cryptography":[51],"(ECC)":[52],"claimed":[54],"their":[55,99,140],"can":[57,101,161],"resist":[58,72,162],"various":[59,163],"attacks.":[60,107],"However,":[61],"Lu":[62,92,125],"found":[65],"that":[66,98,114,157],"al.\u2019s":[69,127],"scheme":[70,88,100,118,128,148,160],"cannot":[71,80],"trace":[73],"key-compromise":[75],"impersonation":[76,122,133],"attacks;":[77],"hence,":[78],"it":[79],"provide":[81],"proper":[82],"mutual":[83],"authentication.":[84],"Meanwhile,":[85],"an":[86],"enhanced":[87],"was":[89],"by":[91],"they":[96],"stated":[97],"stand":[102],"up":[103],"possible":[105],"known":[106,164],"Nevertheless,":[108],"in":[109,168],"this":[110],"paper,":[111],"we":[112,142],"conclude":[113],"Nikooghadam\u2019s":[117],"insecure":[120],"against":[121],"attack":[123],"still":[130],"vulnerable":[131],"attack.":[134],"To":[135],"overcome":[136],"these":[137],"weaknesses":[138],"of":[139],"schemes,":[141],"present":[143],"anonymous":[146],"ECC-based":[147],"Security":[151],"analysis":[152,155],"performance":[154],"show":[156],"our":[158],"proposed":[159],"efficient":[167],"meantime.":[170]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
