Прати
Ding Wang(汪 定)
Ding Wang(汪 定)
College of Cyber Science, Nankai University, Tianjin 300350, China
Верификована је имејл адреса на nankai.edu.cn - Почетна страница
Наслов
Навело
Навело
Година
Two birds with one stone: Two-factor authentication with security beyond conventional bound
D Wang, P Wang
IEEE transactions on dependable and secure computing 15 (4), 708-722, 2018
6222018
Zipf’s law in passwords
D Wang, H Cheng, P Wang, X Huang, G Jian
IEEE Transactions on Information Forensics and Security 12 (11), 2776-2791, 2017
5252017
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
D Wang, D He, P Wang, CH Chu
IEEE Transactions on Dependable and Secure Computing 12 (4), 428-442, 2014
5002014
Robust biometrics-based authentication scheme for multiserver environment
D He, D Wang
IEEE Systerms Journal 9 (3), 816-823, 2015
4722015
Targeted Online Password Guessing: An Underestimated Threat
D Wang, Z Zhang, P Wang, J Yan, X Huang
ACM CCS 2016, 1-13, 2016
4452016
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
D Wang, W Li, P Wang
IEEE Transactions on Industrial Informatics 14 (9), 4081-4092, 2018
2722018
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
D Wang, P Wang
Computer Networks 73, 41-57, 2014
2332014
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices
S Qiu, D Wang, G Xu, S Kumari
IEEE Transactions on Dependable and Secure Computing 19 (2), 1338-1351, 2020
2262020
Security flaws in two improved remote user authentication schemes using smart cards
CG Ma, D Wang, SD Zhao
International Journal of Communication Systems 27 (10), 2215-2227, 2014
1912014
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
D Wang, P Wang
Ad Hoc Networks 20, 1-15, 2014
1812014
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
D Wang, N Wang, P Wang, S Qing
Information Sciences 321, 162-178, 2015
1722015
Understanding node capture attacks in user authentication schemes for wireless sensor networks
C Wang, D Wang, Y Tu, G Xu, H Wang
IEEE Transactions on Dependable and Secure Computing 19 (1), 507-523, 2020
1562020
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices
Q Wang, D Wang, C Cheng, D He
IEEE Transactions on Dependable and Secure Computing 20 (1), 193-208, 2023
1472023
On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices
D Wang, H Cheng, D He, P Wang
IEEE Systems Journal 12 (1), 916-925, 2016
1302016
Offline dictionary attack on password authentication schemes using smart cards
D Wang, P Wang
Information Security: 16th International Conference, ISC 2013, Dallas, Texas …, 2015
1212015
Birthday, name and bifacial-security: understanding passwords of Chinese web users
D Wang, P Wang, D He, Y Tian
28th USENIX security symposium (USENIX security 19), 1537-1555, 2019
1172019
A Security Analysis of Honeywords
D Wang, H Cheng, P Wang, J Yan, X Huang
NDSS 2018, 1-15, 2018
113*2018
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
D Wang, Q Gu, H Cheng, P Wang
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
1092016
Efficient Privacy-Preserving User Authentication Scheme with Forward Secrecy for Industry 4.0
DH Chenyu Wang, Ding Wang*, Guoai Xu
SCIENCE CHINA: Information Sciences 65 (1), 112301:1-17, 2022
1042022
Understanding Human-Chosen PINs: Characteristics, Distribution and Security
D Wang, Q Gu, X Huang, W Ping
Proc. of the 12th ACM ASIA Conference on Computer and Communications …, 2017
1022017
Систем тренутно не може да изврши ову радњу. Пробајте поново касније.
Чланци 1–20