Seguir
Qiying Dong (董奇颖)
Qiying Dong (董奇颖)
Dirección de correo verificada de mail.nankai.edu.cn
Título
Citado por
Citado por
Año
How to Attack and Generate Honeywords
D Wang, Y Zou, Q Dong, Y Song, X Huang
Proceedings of the 43rd IEEE Symposium on Security and Privacy (IEEE S&P …, 2022
352022
No single silver bullet: Measuring the accuracy of password strength meters
D Wang, X Shan, Q Dong, Y Shen, C Jia
32nd USENIX Security Symposium (USENIX Security 23), 947-964, 2023
132023
Security analysis on “anonymous authentication scheme for smart home environment with provable security”
M Xu, Q Dong, M Zhou, C Wang, Y Liu
Wireless Communications and Mobile Computing 2020 (1), 8838363, 2020
82020
RLS-PSM: A Robust and Accurate Password Strength Meter Based on Reuse, Leet and Separation
Q Dong, C Jia, F Duan, D Wang
IEEE Transactions on Information Forensics and Security 16 (DOI: 10.1109 …, 2021
72021
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information
Q Dong, D Wang, Y Shen, C Jia
International Conference on Security and Privacy in Communication Systems …, 2022
42022
口令Zipf分布对相关安全协议的影响分析
董奇颖, 单轩, 贾春福
计算机科学 47 (11), 42-47, 2020
2020
Impact of Zipf's Law on Password-related Security Protocols
Q Dong, X Shan, C Jia
Computer Science 47 (11), 42-47, 2020
2020
“讲一练二考三”在信息安全数学基础中的实践
董奇颖, 高敏芬, 贾春福
计算机教育, 59-62, 2017
2017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–8