Research Article

An Anonymous and Efficient ECC-Based Authentication Scheme for SIP

Table 4

Authentication and key agreement.