Follow
Ding Wang(汪 定)
Ding Wang(汪 定)
College of Cyber Science, Nankai University, Tianjin 300350, China
Verified email at nankai.edu.cn - Homepage
Title
Cited by
Cited by
Year
Two birds with one stone: Two-factor authentication with security beyond conventional bound
D Wang, P Wang
IEEE transactions on dependable and secure computing 15 (4), 708-722, 2018
5652018
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment
D Wang, D He, P Wang, CH Chu
IEEE Transactions on Dependable and Secure Computing 12 (4), 428-442, 2014
4702014
Robust biometrics-based authentication scheme for multiserver environment
D He, D Wang
IEEE Systerms Journal 9 (3), 816-823, 2015
4662015
Zipf’s law in passwords
D Wang, H Cheng, P Wang, X Huang, G Jian
IEEE Transactions on Information Forensics and Security 12 (11), 2776-2791, 2017
4652017
Targeted Online Password Guessing: An Underestimated Threat
D Wang, Z Zhang, P Wang, J Yan, X Huang
ACM CCS 2016, 1-13, 2016
4092016
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
D Wang, W Li, P Wang
IEEE Transactions on Industrial Informatics 14 (9), 4081-4092, 2018
2512018
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions
D Wang, P Wang
Computer Networks 73, 41-57, 2014
2142014
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices
S Qiu, D Wang, G Xu, S Kumari
IEEE Transactions on Dependable and Secure Computing 19 (2), 1338-1351, 2020
2062020
Security flaws in two improved remote user authentication schemes using smart cards
CG Ma, D Wang, SD Zhao
International Journal of Communication Systems 27 (10), 2215-2227, 2014
1852014
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks
D Wang, P Wang
Ad Hoc Networks 20, 1-15, 2014
1752014
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity
D Wang, N Wang, P Wang, S Qing
Information Sciences 321, 162-178, 2015
1662015
Understanding node capture attacks in user authentication schemes for wireless sensor networks
C Wang, D Wang, Y Tu, G Xu, H Wang
IEEE Transactions on Dependable and Secure Computing 19 (1), 507-523, 2020
1312020
On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices
D Wang, H Cheng, D He, P Wang
IEEE Systems Journal 12 (1), 916-925, 2016
1252016
Offline dictionary attack on password authentication schemes using smart cards
D Wang, P Wang
Information Security: 16th International Conference, ISC 2013, Dallas, Texas …, 2015
1212015
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices,
Q Wang, D Wang*, C Cheng, D He
IEEE Transactions on Dependable and Secure Computing, 1-17, 2021
1132021
A Security Analysis of Honeywords
D Wang, H Cheng, P Wang, J Yan, X Huang
NDSS 2018, 1-15, 2018
107*2018
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes
D Wang, Q Gu, H Cheng, P Wang
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
1072016
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars
D Wang, D He, H Cheng, P Wang
Proc. of the 46th IEEE/IFIP International Conference on Dependable Systems …, 2016
1032016
Birthday, name and bifacial-security: understanding passwords of Chinese web users
D Wang, P Wang, D He, Y Tian
28th USENIX security symposium (USENIX security 19), 1537-1555, 2019
942019
Efficient Privacy-Preserving User Authentication Scheme with Forward Secrecy for Industry 4.0
DH Chenyu Wang, Ding Wang*, Guoai Xu
SCIENCE CHINA: Information Sciences 65 (1), 112301:1-17, 2022
892022
The system can't perform the operation now. Try again later.
Articles 1–20