Research Article

An Anonymous and Efficient ECC-Based Authentication Scheme for SIP

Figure 6

Comparison of security attributes.