Ding Wang (汪 定)
Ding Wang (汪 定)
College of Cyber Science, Nankai University, Tianjin 300350, China
Verified email at pku.edu.cn - Homepage
Title
Cited by
Cited by
Year
Robust biometrics-based authentication scheme for multiserver environment
D He, D Wang
IEEE SYSTEMS JOURNAL 9 (3), 816-823, 2015
3632015
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu
IEEE Transactions on Dependable and Secure Computing 12 (4), 428-442, 2015
330*2015
Two birds with one stone: Two-factor authentication with security beyond conventional bound
D Wang, P Wang
IEEE transactions on dependable and secure computing 15 (4), 708-722, 2018
2942018
Targeted Online Password Guessing: An Underestimated Threat
D Wang, Z Zhang, P Wang, J Yan, X Huang
ACM CCS 2016, 1-13, 2016
2302016
Zipf’s law in passwords
D Wang, H Cheng, P Wang, X Huang, G Jian
IEEE Transactions on Information Forensics and Security 12 (11), 2776-2791, 2017
2112017
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
D Wang, P Wang
Computer Networks 73, 41-57, 2014
1712014
Security flaws in two improved remote user authentication schemes using smart cards
CG Ma, D Wang, SD Zhao
International Journal of Communication Systems 27 (10), 2215-2227, 2014
1542014
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
D Wang, P Wang
Ad Hoc Networks 20, 1-15, 2014
1452014
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
D Wang, N Wang, P Wang, S Qing
Information Sciences 321, 162-178, 2015
1302015
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
D Wang, W Li, P Wang
IEEE Transactions on Industrial Informatics 14 (9), 4081-4092, 2018
1222018
On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices
D Wang, H Cheng, D He, P Wang
IEEE Systems Journal 12 (1), 916-925, 2016
852016
Offline dictionary attack on password authentication schemes using smart cards
D Wang, P Wang
Information security, 221-237, 2015
852015
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
D Wang, Q Gu, H Cheng, P Wang
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
702016
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars
D Wang, D He, H Cheng, P Wang
Proc. of the 46th IEEE/IFIP International Conference on Dependable Systems …, 2016
622016
Cryptanalysis of a remote user authentication scheme for mobile client–server environment based on ECC
D Wang, C Ma
Information Fusion 14 (4), 498-503, 2013
522013
Robust smart card based password authentication scheme against smart card security breach
D Wang, C Ma, P Wang, Z Chen
Cryptology ePrint Archive 439 (2012), 1-35, 2012
522012
The emperor’s new password creation policies
D Wang, P Wang
European Symposium on Research in Computer Security, 456-477, 2015
512015
Secure password-based remote user authentication scheme with non-tamper resistant smart cards
D Wang, C Ma, P Wu
IFIP Annual Conference on Data and Applications Security and Privacy, 114-121, 2012
492012
On the implications of Zipf’s law in passwords
D Wang, P Wang
European Symposium on Research in Computer Security, 111-131, 2016
482016
A Security Analysis of Honeywords
D Wang, H Cheng, P Wang, J Yan, X Huang
NDSS 2018, 1-16, 2018
372018
The system can't perform the operation now. Try again later.
Articles 1–20