Ding Wang (汪 定)
Ding Wang (汪 定)
College of Cyber Science, Nankai University, Tianjin 300350, China
Email verificata su pku.edu.cn - Home page
Titolo
Citata da
Citata da
Anno
Robust biometrics-based authentication scheme for multiserver environment
D He, D Wang
IEEE SYSTEMS JOURNAL 9 (3), 816-823, 2015
3352015
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu
IEEE Transactions on Dependable and Secure Computing 12 (4), 428-442, 2015
298*2015
Two birds with one stone: Two-factor authentication with security beyond conventional bound
D Wang, P Wang
IEEE transactions on dependable and secure computing 15 (4), 708-722, 2018
2152018
Targeted Online Password Guessing: An Underestimated Threat
D Wang, Z Zhang, P Wang, J Yan, X Huang
ACM CCS 2016, 1-13, 2016
1902016
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
D Wang, P Wang
Computer Networks 73, 41-57, 2014
1582014
Zipf’s law in passwords
D Wang, H Cheng, P Wang, X Huang, G Jian
IEEE Transactions on Information Forensics and Security 12 (11), 2776-2791, 2017
1532017
Security flaws in two improved remote user authentication schemes using smart cards
CG Ma, D Wang, SD Zhao
International Journal of Communication Systems 27 (10), 2215-2227, 2014
1452014
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
D Wang, P Wang
Ad Hoc Networks 20, 1-15, 2014
1342014
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
D Wang, N Wang, P Wang, S Qing
Information Sciences 321, 162-178, 2015
1162015
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
D Wang, W Li, P Wang
IEEE Transactions on Industrial Informatics 14 (9), 4081-4092, 2018
782018
Offline dictionary attack on password authentication schemes using smart cards
D Wang, P Wang
Information security, 221-237, 2015
782015
On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices
D Wang, H Cheng, D He, P Wang
IEEE Systems Journal 12 (1), 916-925, 2016
732016
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
D Wang, Q Gu, H Cheng, P Wang
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
552016
Cryptanalysis of a remote user authentication scheme for mobile client–server environment based on ECC
D Wang, CG Ma
Information Fusion 14 (4), 498-503, 2013
502013
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars
D Wang, D He, H Cheng, P Wang
Proc. of the 46th IEEE/IFIP International Conference on Dependable Systems …, 2016
492016
Robust smart card based password authentication scheme against smart card security breach
D Wang, C Ma, P Wang, Z Chen
Cryptology ePrint Archive 439 (2012), 1-35, 2012
492012
The emperor’s new password creation policies
D Wang, P Wang
European Symposium on Research in Computer Security, 456-477, 2015
472015
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
D Wang, C Ma, P Wu
IFIP Annual Conference on Data and Applications Security and Privacy, 114-121, 2012
462012
On the implications of Zipf’s law in passwords
D Wang, P Wang
European Symposium on Research in Computer Security, 111-131, 2016
432016
Cryptanalysis and security enhancement of a remote user authentication scheme using smart cards
W Ding
The Journal of China Universities of Posts and Telecommunications 19 (5 …, 2012
362012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20