Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks

D Wang, W Li, P Wang - IEEE Transactions on Industrial …, 2018 - ieeexplore.ieee.org
Dozens of two-factor authentication schemes have been proposed to secure real-time data
access in industrial wireless sensor networks (WSNs). However, more often than not, the …

PROTECT: Efficient password-based threshold single-sign-on authentication for mobile users against perpetual leakage

Y Zhang, C Xu, H Li, K Yang, N Cheng… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Password-based single-sign-on authentication has been widely applied in mobile
environments. It enables an identity server to issue authentication tokens to mobile users …

Secure password-protected encryption key for deduplicated cloud storage systems

Y Zhang, C Xu, N Cheng, X Shen - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this article, we propose SPADE, an encrypted data deduplication scheme that resists
compromised key servers and frees users from the key management problem. Specifically …

On the economics of offline password cracking

J Blocki, B Harsha, S Zhou - 2018 IEEE Symposium on Security …, 2018 - ieeexplore.ieee.org
We develop an economic model of an offline password cracker which allows us to make
quantitative predictions about the fraction of accounts that a rational password attacker …

Security-enhanced electro-optic feedback phase chaotic system based on nonlinear coupling of two delayed interfering branches

C Wang, Y Ji, H Wang, L Bai - IEEE Photonics Journal, 2018 - ieeexplore.ieee.org
In this paper, a novel electro-optic feedback phase chaotic system based on nonlinear
coupling of two delayed interfering branches is proposed and analyzed by numerical …

Privsso: Practical single-sign-on authentication against subscription/access pattern leakage

G Gao, Y Zhang, Y Song, S Li - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Single-sign-on (SSO) authentication employs an identity provider (IdP) to provide users with
an efficient way to authenticate themselves with different service providers and has been …

Threshold pake with security against compromise of all servers

Y Gu, S Jarecki, P Kedzior, P Nazarian, J Xu - International Conference on …, 2025 - Springer
We revisit the notion of threshold Password-Authenticated Key Exchange (tPAKE), and we
extend it to augmented tPAKE (atPAKE), which protects password information even in the …

PriParkRec: Privacy-preserving decentralized parking recommendation service

Z Li, M Alazab, S Garg… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Insufficient parking space and traffic congestion are important usual suspects in our urban
life. Organisation and managing available parking spaces have raised a lot of awareness …

Hardening password-based credential databases

Y Song, C Xu, Y Zhang, S Li - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
We propose a protection mechanism for password-based credential databases maintained
by service providers against leakage, dubbed PCDL. In PCDL, each authentication …

Evaluation of password hashing schemes in open source web platforms

C Ntantogian, S Malliaros, C Xenakis - Computers & Security, 2019 - Elsevier
Nowadays, the majority of web platforms in the Internet originate either from CMS to easily
deploy websites or by web applications frameworks that allow developers to design and …