Mutual authentication

Known as: Mutual, Mutually authenticated, Two-way authentication 
Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time, being a default mode of… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1971-2018
05010015019712018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2010
Highly Cited
2010
The promise of RFID technology has been evidently foreseeable due to the low cost and high convenience value of RFID tags… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In this paper, we propose an efficient biometric-based remote user authentication scheme using smart cards, in which the… (More)
  • figure 1
  • table 1
  • table 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Article history: Received 21 September 2006 Received in revised form 21 April 2008 Available online 15 May 2008 
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In this paper, we analyze the security vulnerabilities of EMAP, an efficient RFID mutual authentication protocol recently… (More)
  • table 1
  • table 3
  • table 2
  • table 4
  • table 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Low-cost Radio Frequency Identification (RFID) tags affixed to consumer items as smart labels are emerging as one of the most… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Radio frequency identification (RFID) is the latest technology to play an important role for object identification as a… (More)
  • figure 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Entity authentication and key distribution are central cryptographic problems in distributed computing|but up until now, they… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
1992
Highly Cited
1992
We discuss two-party mutual authentication protocols providing authenticated key exchange, focusing on those using asymmetric… (More)
Is this relevant?
Highly Cited
1987
Highly Cited
1987
This paper describes a protocol for efficient mutual authentication (via a mutually trusted third party) that assures both… (More)
  • figure 1
Is this relevant?