A Survey Of Sip Authentication And Key Agreement Schemes

Our schema inherits the virtues of the schemas of Arshad and Nikooghadam and Lu et al., while addressing user and server identity attacks that could not satisfy their schemas. . . .