Följ
Ding Wang(汪 定)
Ding Wang(汪 定)
College of Cyber Science, Nankai University, Tianjin 300350, China
Verifierad e-postadress på nankai.edu.cn - Startsida
Titel
Citeras av
Citeras av
År
Two birds with one stone: Two-factor authentication with security beyond conventional bound
D Wang, P Wang
IEEE transactions on dependable and secure computing 15 (4), 708-722, 2018
5402018
Robust biometrics-based authentication scheme for multiserver environment
D He, D Wang
IEEE Systerms Journal 9 (3), 816-823, 2015
4602015
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
D Wang, D He, P Wang, CH Chu
IEEE Transactions on Dependable and Secure Computing 12 (4), 428-442, 2014
4602014
Zipf’s law in passwords
D Wang, H Cheng, P Wang, X Huang, G Jian
IEEE Transactions on Information Forensics and Security 12 (11), 2776-2791, 2017
4422017
Targeted Online Password Guessing: An Underestimated Threat
D Wang, Z Zhang, P Wang, J Yan, X Huang
ACM CCS 2016, 1-13, 2016
3982016
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
D Wang, W Li, P Wang
IEEE Transactions on Industrial Informatics 14 (9), 4081-4092, 2018
2462018
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
D Wang, P Wang
Computer Networks 73, 41-57, 2014
2092014
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices
S Qiu, D Wang, G Xu, S Kumari
IEEE Transactions on Dependable and Secure Computing 19 (2), 1338-1351, 2020
1952020
Security flaws in two improved remote user authentication schemes using smart cards
CG Ma, D Wang, SD Zhao
International Journal of Communication Systems 27 (10), 2215-2227, 2014
1842014
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
D Wang, P Wang
Ad Hoc Networks 20, 1-15, 2014
1742014
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
D Wang, N Wang, P Wang, S Qing
Information Sciences 321, 162-178, 2015
1642015
On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices
D Wang, H Cheng, D He, P Wang
IEEE Systems Journal 12 (1), 916-925, 2016
1252016
Understanding node capture attacks in user authentication schemes for wireless sensor networks
C Wang, D Wang, Y Tu, G Xu, H Wang
IEEE Transactions on Dependable and Secure Computing 19 (1), 507-523, 2020
1242020
Offline dictionary attack on password authentication schemes using smart cards
D Wang, P Wang
Information Security: 16th International Conference, ISC 2013, Dallas, Texas …, 2015
1202015
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
D Wang, Q Gu, H Cheng, P Wang
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
1052016
A Security Analysis of Honeywords
D Wang, H Cheng, P Wang, J Yan, X Huang
NDSS 2018, 1-15, 2018
102*2018
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars
D Wang, D He, H Cheng, P Wang
Proc. of the 46th IEEE/IFIP International Conference on Dependable Systems …, 2016
1002016
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices,
Q Wang, D Wang*, C Cheng, D He
IEEE Transactions on Dependable and Secure Computing, 1-17, 2021
932021
Birthday, name and bifacial-security: understanding passwords of Chinese web users
D Wang, P Wang, D He, Y Tian
28th USENIX security symposium (USENIX security 19), 1537-1555, 2019
882019
Efficient Privacy-Preserving User Authentication Scheme with Forward Secrecy for Industry 4.0
DH Chenyu Wang, Ding Wang*, Guoai Xu
SCIENCE CHINA: Information Sciences 65 (1), 112301:1-17, 2022
852022
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20