How to Attack and Generate Honeywords D Wang, Y Zou, Q Dong, Y Song, X Huang Proceedings of the 43rd IEEE Symposium on Security and Privacy (IEEE S&P …, 2022 | 35 | 2022 |
No single silver bullet: Measuring the accuracy of password strength meters D Wang, X Shan, Q Dong, Y Shen, C Jia 32nd USENIX Security Symposium (USENIX Security 23), 947-964, 2023 | 13 | 2023 |
Security analysis on “anonymous authentication scheme for smart home environment with provable security” M Xu, Q Dong, M Zhou, C Wang, Y Liu Wireless Communications and Mobile Computing 2020 (1), 8838363, 2020 | 8 | 2020 |
RLS-PSM: A Robust and Accurate Password Strength Meter Based on Reuse, Leet and Separation Q Dong, C Jia, F Duan, D Wang IEEE Transactions on Information Forensics and Security 16 (DOI: 10.1109 …, 2021 | 7 | 2021 |
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information Q Dong, D Wang, Y Shen, C Jia International Conference on Security and Privacy in Communication Systems …, 2022 | 4 | 2022 |
口令Zipf分布对相关安全协议的影响分析 董奇颖, 单轩, 贾春福 计算机科学 47 (11), 42-47, 2020 | | 2020 |
Impact of Zipf's Law on Password-related Security Protocols Q Dong, X Shan, C Jia Computer Science 47 (11), 42-47, 2020 | | 2020 |
“讲一练二考三”在信息安全数学基础中的实践 董奇颖, 高敏芬, 贾春福 计算机教育, 59-62, 2017 | | 2017 |