Ping Wang

According to our database1, Ping Wang authored at least 30 papers between 2013 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks.
Wireless Communications and Mobile Computing, 2018

Model Based Energy Consumption Analysis of Wireless Cyber Physical Systems.
Signal Processing Systems, 2018

Breaking Three Remote user Authentication Systems for Mobile Devices.
Signal Processing Systems, 2018

Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks.
IEEE Trans. Industrial Informatics, 2018

Toward Energy-Awareness Smart Building: Discover the Fingerprint of Your Electrical Appliances.
IEEE Trans. Industrial Informatics, 2018

Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound.
IEEE Trans. Dependable Sec. Comput., 2018

On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices.
IEEE Systems Journal, 2018

An Alternative Method for Understanding User-Chosen Passwords.
Security and Communication Networks, 2018

Redundant Reader Elimination in Large-Scale Distributed RFID Networks.
IEEE Internet of Things Journal, 2018

A Security Analysis of Honeywords.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Zipf's Law in Passwords.
IEEE Trans. Information Forensics and Security, 2017

A Controller/Architecture Co-design Framework for Wireless Cyber-Physical Systems.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Understanding Human-Chosen PINs: Characteristics, Distribution and Security.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
On the Implications of Zipf's Law in Passwords.
Proceedings of the Computer Security - ESORICS 2016, 2016

fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Targeted Online Password Guessing: An Underestimated Threat.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment.
IEEE Trans. Dependable Sec. Comput., 2015

Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity.
Inf. Sci., 2015

On the Usability of Two-Factor Authentication.
IACR Cryptology ePrint Archive, 2015

The Emperor's New Password Creation Policies.
IACR Cryptology ePrint Archive, 2015

The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment.
IACR Cryptology ePrint Archive, 2014

Offline Dictionary Attack on Password Authentication Schemes using Smart Cards.
IACR Cryptology ePrint Archive, 2014

Zipf's Law in Passwords.
IACR Cryptology ePrint Archive, 2014

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions.
Computer Networks, 2014

Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks.
Ad Hoc Networks, 2014

Improved privacy-preserving authentication scheme for roaming service in mobile networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

On the Usability of Two-Factor Authentication.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards.
Proceedings of the Information Security, 16th International Conference, 2013


  Loading...