Research Article
Robust and Efficient Authentication Scheme for Session Initiation Protocol
Table 2
Registration and authentication phase of our scheme.
| | | | |
| Registration | (1) Generate | | (3) Compute | = . | | = , | | | | = . | | | . |
| Authentication | (1) Generate | | (2) Compute | = , | | = , | | = , | | = , | | = , | | = , | | = , | | , | | = . | Generate | | | | = , | | (3) = , | | = , | | = , | | = , | | , | | = . | | | (4) = | | = . | | | | | | | | | = = | |
|
|