Research Article

Robust and Efficient Authentication Scheme for Session Initiation Protocol

Table 2

Registration and authentication phase of our scheme.


Registration (1) Generate  (3) Compute
= . = ,
= .
.

Authentication (1) Generate (2) Compute
= , = ,
= , = ,
= , = ,
= ,,
= .Generate  
= ,
(3) = , = ,
= , = ,
, = .
(4) =
= .
= =