Research Article

An Anonymous and Efficient ECC-Based Authentication Scheme for SIP

Table 2

Authentication and key agreement.