关注
Wenting Li
Wenting Li
Peking University; Beijing Institute of Graphic Communication
在 pku.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
D Wang, W Li, P Wang
IEEE Transactions on Industrial Informatics 14 (9), 4081-4092, 2018
2752018
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W Li, P Wang
Future Generation Computer Systems 101, 694-708, 2019
462019
Cryptanalysis and security enhancement of three authentication schemes in wireless sensor networks
W Li, B Li, Y Zhao, P Wang, F Wei
Wireless Communications and Mobile Computing 2018 (1), 8539674, 2018
362018
Practical threshold multi-factor authentication
W Li, H Cheng, P Wang, K Liang
IEEE transactions on information forensics and security 16, 3573-3588, 2021
272021
A Secure and Anonymous Two‐Factor Authentication Protocol in Multiserver Environment
C Wang, G Xu, W Li
Security and Communication Networks 2018 (1), 9062675, 2018
262018
Insider attacks against multi-factor authentication protocols for wireless sensor networks
李文婷, 汪定, 王平
Journal of Software 30 (8), 2375-2391, 2019
15*2019
Crytanalysis of three anonymous authentication schemes for multi-server environment
汪定, 李文婷, 王平
Journal of Software 29 (7), 1937-1952, 2017
15*2017
Probability model transforming encoders against encoding attacks
H Cheng, Z Zheng, W Li, P Wang, CH Chu
28th USENIX Security Symposium (USENIX Security 19), 1573-1590, 2019
142019
Incrementally updateable honey password vaults
H Cheng, W Li, P Wang, CH Chu, K Liang
30th USENIX Security Symposium (USENIX Security 21), 857-874, 2021
132021
Improved probabilistic context-free grammars for passwords using word extraction
H Cheng, W Li, P Wang, K Liang
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
82021
HPAKE: Honey password-authenticated key exchange for fast and safer online authentication
W Li, P Wang, K Liang
IEEE Transactions on Information Forensics and Security 18, 1596-1609, 2022
72022
Breaking three remote user authentication systems for mobile devices
W Li, Y Shen, P Wang
Journal of Signal Processing Systems 90, 1179-1190, 2018
62018
Breaking two remote user authentication systems for mobile devices
W Li, Q Gu, Y Zhao, P Wang
2017 ieee 3rd international conference on big data security on cloud …, 2017
42017
Secure chaotic maps-based authentication scheme for real-time data access In Internet of Things
W Li, H Cheng, P Wang
2019 International Conference on Cyber Security and Protection of Digital …, 2019
32019
Password Expiration Strategy: A Perspective of Ecological Memory
Y Zhao, W Li, Z Zhang, P Wang
2019 IEEE Fifth International Conference on Big Data Computing Service and …, 2019
32019
An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing
Z Zhang, H Cheng, W Li, P Wang
Proceedings of the 2023 9th International Conference on Computing and …, 2023
22023
Cryptanalysis of two chaotic maps-based authentication schemes in edge computing
W Li, P Wang
2019 6th IEEE International Conference on Cyber Security and Cloud Computing …, 2019
22019
Eavesdropper: a framework for detecting the location of the processed result in hadoop
C Dong, Q Shen, W Li, Y Yang, Z Wu, X Wan
Information and Communications Security: 17th International Conference …, 2016
12016
Reveal the Mathematical Structures of Honeyword Security Metrics
P Su, H Cheng, W Li, P Wang
arXiv preprint arXiv:2311.10960, 2023
2023
Improved Wordpcfg for Passwords with Maximum Probability Segmentation
W Li, J Yang, H Cheng, P Wang, K Liang
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
2023
系统目前无法执行此操作,请稍后再试。
文章 1–20