Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,322 papers from all fields of science
Search
Sign In
Create Free Account
Mutual authentication
Known as:
Mutual
, Mutually authenticated
, Two-way authentication
Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time, being a default mode of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
32 relations
Anti-phishing software
Authentication and Key Agreement (protocol)
Authentication protocol
CRAM-MD5
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Large scale wireless sensor networks with multi-level dynamic key management scheme
O. K. Sahingoz
Journal of systems architecture
2013
Corpus ID: 39578521
Highly Cited
2012
Highly Cited
2012
Security improvement on an anonymous key agreement protocol based on chaotic maps
Kaiping Xue
,
P. Hong
2012
Corpus ID: 62596927
Highly Cited
2011
Highly Cited
2011
A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks
Chun-Ta Li
,
M. Hwang
Information Sciences
2011
Corpus ID: 11133949
Highly Cited
2011
Highly Cited
2011
Security enhancement on an improvement on two remote user authentication schemes using smart cards
Tien-Ho Chen
,
Han-Cheng Hsiang
,
W. Shih
Future generations computer systems
2011
Corpus ID: 36570629
2008
2008
A Secure Remote User Authentication Scheme with Smart Cards
Manoj Kumar
IACR Cryptology ePrint Archive
2008
Corpus ID: 8998539
Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret…
Expand
Highly Cited
2006
Highly Cited
2006
An efficient and complete remote user authentication scheme using smart cards
H. Liaw
,
Jiann-Fu Lin
,
Wei-Chen Wu
Mathematical and computer modelling
2006
Corpus ID: 32935158
Review
2006
Review
2006
Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions
Sen Xu
,
Chin-Tser Huang
International Symposium on Wireless Communication…
2006
Corpus ID: 12695083
Without physical boundaries, a wireless network faces many more vulnerabilities than a wired network does. IEEE 802.16 provides a…
Expand
Highly Cited
2005
Highly Cited
2005
Improvement of Chien et al.'s remote user authentication scheme using smart cards
Sung-Woon Lee
,
Hyun-Sung Kim
,
K. Yoo
Comput. Stand. Interfaces
2005
Corpus ID: 26738179
Highly Cited
2004
Highly Cited
2004
Further improvement of an efficient password based remote user authentication scheme using smart cards
Eunjun Yoon
,
Eun-Kyung Ryu
,
K. Yoo
IEEE transactions on consumer electronics
2004
Corpus ID: 19764251
Recently, Ku-Chen proposed an improvement to Chien et al.'s scheme to prevent from some weaknesses. However, the improved scheme…
Expand
1995
1995
Two Attacks on Neuman-Stubblebine Authentication Protocols
T. Hwang
,
N. Lee
,
Chuan-Ming Li
,
Ming-Yung Ko
,
Yung-Hsiang Chen
Information Processing Letters
1995
Corpus ID: 36906643
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE