Seguir
Ding Wang(汪 定)
Ding Wang(汪 定)
College of Cyber Science, Nankai University, Tianjin 300350, China
Dirección de correo verificada de nankai.edu.cn - Página principal
Título
Citado por
Citado por
Año
Two birds with one stone: Two-factor authentication with security beyond conventional bound
D Wang, P Wang
IEEE transactions on dependable and secure computing 15 (4), 708-722, 2018
6232018
Zipf’s law in passwords
D Wang, H Cheng, P Wang, X Huang, G Jian
IEEE Transactions on Information Forensics and Security 12 (11), 2776-2791, 2017
5292017
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
D Wang, D He, P Wang, CH Chu
IEEE Transactions on Dependable and Secure Computing 12 (4), 428-442, 2014
5002014
Robust biometrics-based authentication scheme for multiserver environment
D He, D Wang
IEEE Systerms Journal 9 (3), 816-823, 2015
4742015
Targeted Online Password Guessing: An Underestimated Threat
D Wang, Z Zhang, P Wang, J Yan, X Huang
ACM CCS 2016, 1-13, 2016
4522016
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
D Wang, W Li, P Wang
IEEE Transactions on Industrial Informatics 14 (9), 4081-4092, 2018
2732018
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
D Wang, P Wang
Computer Networks 73, 41-57, 2014
2332014
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices
S Qiu, D Wang, G Xu, S Kumari
IEEE Transactions on Dependable and Secure Computing 19 (2), 1338-1351, 2020
2292020
Security flaws in two improved remote user authentication schemes using smart cards
CG Ma, D Wang, SD Zhao
International Journal of Communication Systems 27 (10), 2215-2227, 2014
1912014
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
D Wang, P Wang
Ad Hoc Networks 20, 1-15, 2014
1812014
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
D Wang, N Wang, P Wang, S Qing
Information Sciences 321, 162-178, 2015
1722015
Understanding node capture attacks in user authentication schemes for wireless sensor networks
C Wang, D Wang, Y Tu, G Xu, H Wang
IEEE Transactions on Dependable and Secure Computing 19 (1), 507-523, 2020
1582020
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices
Q Wang, D Wang, C Cheng, D He
IEEE Transactions on Dependable and Secure Computing 20 (1), 193-208, 2023
1482023
On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices
D Wang, H Cheng, D He, P Wang
IEEE Systems Journal 12 (1), 916-925, 2016
1302016
Offline dictionary attack on password authentication schemes using smart cards
D Wang, P Wang
Information Security: 16th International Conference, ISC 2013, Dallas, Texas …, 2015
1222015
Birthday, name and bifacial-security: understanding passwords of Chinese web users
D Wang, P Wang, D He, Y Tian
28th USENIX security symposium (USENIX security 19), 1537-1555, 2019
1192019
A Security Analysis of Honeywords
D Wang, H Cheng, P Wang, J Yan, X Huang
NDSS 2018, 1-15, 2018
114*2018
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
D Wang, Q Gu, H Cheng, P Wang
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
1102016
Efficient Privacy-Preserving User Authentication Scheme with Forward Secrecy for Industry 4.0
DH Chenyu Wang, Ding Wang*, Guoai Xu
SCIENCE CHINA: Information Sciences 65 (1), 112301:1-17, 2022
1042022
Understanding Human-Chosen PINs: Characteristics, Distribution and Security
D Wang, Q Gu, X Huang, W Ping
Proc. of the 12th ACM ASIA Conference on Computer and Communications …, 2017
1032017
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20