Ding Wang

According to our database1, Ding Wang authored at least 49 papers between 2012 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks.
IEEE Trans. Industrial Informatics, 2018

Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound.
IEEE Trans. Dependable Sec. Comput., 2018

On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices.
IEEE Systems Journal, 2018

User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs.
Security and Communication Networks, 2018

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptology ePrint Archive, 2018

A Security Analysis of Honeywords.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Zipf's Law in Passwords.
IEEE Trans. Information Forensics and Security, 2017

Toward single-server private information retrieval protocol via learning with errors.
J. Inf. Sec. Appl., 2017

Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
SCIENCE CHINA Information Sciences, 2017

Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program.
IEEE Access, 2017

Toward Proxy Re-encryption From Learning with Errors in the Exponent.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Understanding Human-Chosen PINs: Characteristics, Distribution and Security.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
On the Implications of Zipf's Law in Passwords.
Proceedings of the Computer Security - ESORICS 2016, 2016

fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Targeted Online Password Guessing: An Underestimated Threat.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment.
IEEE Trans. Dependable Sec. Comput., 2015

Robust Biometrics-Based Authentication Scheme for Multiserver Environment.
IEEE Systems Journal, 2015

Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity.
Inf. Sci., 2015

On the Usability of Two-Factor Authentication.
IACR Cryptology ePrint Archive, 2015

The Emperor's New Password Creation Policies.
IACR Cryptology ePrint Archive, 2015

The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Security flaws in two improved remote user authentication schemes using smart cards.
Int. J. Communication Systems, 2014

Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment.
IACR Cryptology ePrint Archive, 2014

Offline Dictionary Attack on Password Authentication Schemes using Smart Cards.
IACR Cryptology ePrint Archive, 2014

Zipf's Law in Passwords.
IACR Cryptology ePrint Archive, 2014

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions.
Computer Networks, 2014

Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks.
Ad Hoc Networks, 2014

Improved privacy-preserving authentication scheme for roaming service in mobile networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

On the Usability of Two-Factor Authentication.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Secure Password-based Remote User Authentication Scheme Against Smart Card Security Breach.
JNW, 2013

Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards.
ITC, 2013

Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC.
Information Fusion, 2013

Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards.
Proceedings of the Information Security, 16th International Conference, 2013

2012
Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture.
IACR Cryptology ePrint Archive, 2012

On the (in)security of some smart-card-based password authentication schemes for WSN.
IACR Cryptology ePrint Archive, 2012

Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem.
IACR Cryptology ePrint Archive, 2012

On the Security of an Improved Password Authentication Scheme Based on ECC.
IACR Cryptology ePrint Archive, 2012

A New Scheme with Secure Cookie against SSLStrip Attack.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Cryptanalysis of Two Dynamic ID-Based Remote User Authentication Schemes for Multi-server Architecture.
Proceedings of the Network and System Security - 6th International Conference, 2012

Breaking a Robust Remote User Authentication Scheme Using Smart Cards.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

Cookie-Proxy: A Scheme to Prevent SSLStrip Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

On the Security of an Improved Password Authentication Scheme Based on ECC.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme.
Proceedings of the Distributed Computing and Internet Technology, 2012

Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy.
Proceedings of the Web Technologies and Applications, 2012


  Loading...