Research Article
Robust and Efficient Authentication Scheme for Session Initiation Protocol
Table 3
Comparison of security attributes.
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
: providing anonymity and untraceable; : providing mutual authentication; : providing perfect forward secrecy; : known session key security; : resist insider attack; : resist replay attack; : resist key-compromise impersonation attack; : resist offline password guessing attack. |