Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks D Wang, W Li, P Wang IEEE Transactions on Industrial Informatics 14 (9), 4081-4092, 2018 | 275 | 2018 |
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction W Li, P Wang Future Generation Computer Systems 101, 694-708, 2019 | 46 | 2019 |
Cryptanalysis and security enhancement of three authentication schemes in wireless sensor networks W Li, B Li, Y Zhao, P Wang, F Wei Wireless Communications and Mobile Computing 2018 (1), 8539674, 2018 | 36 | 2018 |
Practical threshold multi-factor authentication W Li, H Cheng, P Wang, K Liang IEEE transactions on information forensics and security 16, 3573-3588, 2021 | 27 | 2021 |
A Secure and Anonymous Two‐Factor Authentication Protocol in Multiserver Environment C Wang, G Xu, W Li Security and Communication Networks 2018 (1), 9062675, 2018 | 26 | 2018 |
Insider attacks against multi-factor authentication protocols for wireless sensor networks 李文婷, 汪定, 王平 Journal of Software 30 (8), 2375-2391, 2019 | 15* | 2019 |
Crytanalysis of three anonymous authentication schemes for multi-server environment 汪定, 李文婷, 王平 Journal of Software 29 (7), 1937-1952, 2017 | 15* | 2017 |
Probability model transforming encoders against encoding attacks H Cheng, Z Zheng, W Li, P Wang, CH Chu 28th USENIX Security Symposium (USENIX Security 19), 1573-1590, 2019 | 14 | 2019 |
Incrementally updateable honey password vaults H Cheng, W Li, P Wang, CH Chu, K Liang 30th USENIX Security Symposium (USENIX Security 21), 857-874, 2021 | 13 | 2021 |
Improved probabilistic context-free grammars for passwords using word extraction H Cheng, W Li, P Wang, K Liang ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021 | 8 | 2021 |
HPAKE: Honey password-authenticated key exchange for fast and safer online authentication W Li, P Wang, K Liang IEEE Transactions on Information Forensics and Security 18, 1596-1609, 2022 | 7 | 2022 |
Breaking three remote user authentication systems for mobile devices W Li, Y Shen, P Wang Journal of Signal Processing Systems 90, 1179-1190, 2018 | 6 | 2018 |
Breaking two remote user authentication systems for mobile devices W Li, Q Gu, Y Zhao, P Wang 2017 ieee 3rd international conference on big data security on cloud …, 2017 | 4 | 2017 |
Secure chaotic maps-based authentication scheme for real-time data access In Internet of Things W Li, H Cheng, P Wang 2019 International Conference on Cyber Security and Protection of Digital …, 2019 | 3 | 2019 |
Password Expiration Strategy: A Perspective of Ecological Memory Y Zhao, W Li, Z Zhang, P Wang 2019 IEEE Fifth International Conference on Big Data Computing Service and …, 2019 | 3 | 2019 |
An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing Z Zhang, H Cheng, W Li, P Wang Proceedings of the 2023 9th International Conference on Computing and …, 2023 | 2 | 2023 |
Cryptanalysis of two chaotic maps-based authentication schemes in edge computing W Li, P Wang 2019 6th IEEE International Conference on Cyber Security and Cloud Computing …, 2019 | 2 | 2019 |
Eavesdropper: a framework for detecting the location of the processed result in hadoop C Dong, Q Shen, W Li, Y Yang, Z Wu, X Wan Information and Communications Security: 17th International Conference …, 2016 | 1 | 2016 |
Reveal the Mathematical Structures of Honeyword Security Metrics P Su, H Cheng, W Li, P Wang arXiv preprint arXiv:2311.10960, 2023 | | 2023 |
Improved Wordpcfg for Passwords with Maximum Probability Segmentation W Li, J Yang, H Cheng, P Wang, K Liang ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023 | | 2023 |