Ding Wang
Orcid: 0000-0002-1667-2237Affiliations:
- Nankai University, College of Cyber Science, Tianjin, China
- Peking University, School of Electronics Engineering and Computer Science, Beijing, China (PhD 2017)
- Harbin Engineering University, College of Computer Science and Technology, China (former)
According to our database1,
Ding Wang
authored at least 99 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
QPASE: Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Prob-Hashcat: Accelerating Probabilistic Password Guessing with Hashcat by Hundreds of Times.
Proceedings of the 27th International Symposium on Research in Attacks, 2024
2023
IEEE Internet Things J., February, 2023
IEEE Trans. Serv. Comput., 2023
Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2023
Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
2022
IEEE Trans. Serv. Comput., 2022
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2022
Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Mob. Networks Appl., 2022
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key.
IACR Cryptol. ePrint Arch., 2022
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0.
Sci. China Inf. Sci., 2022
Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information.
Proceedings of the Security and Privacy in Communication Networks, 2022
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties.
Proceedings of the ICT Systems Security and Privacy Protection, 2022
2021
RLS-PSM: A Robust and Accurate Password Strength Meter Based on Reuse, Leet and Separation.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Big Data, 2021
Secur. Commun. Networks, 2021
Understanding security failures of anonymous authentication schemes for cloud environments.
J. Syst. Archit., 2021
2020
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEEE Trans. Dependable Secur. Comput., 2020
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs.
ACM Trans. Cyber Phys. Syst., 2020
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography.
IET Inf. Secur., 2020
Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme.
IET Inf. Secur., 2020
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEICE Trans. Inf. Syst., 2020
Understanding security failures of multi-factor authentication schemes for multi-server environments.
Comput. Secur., 2020
2019
Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments.
Secur. Commun. Networks, 2019
Handshake between Fibonacci series and pure preferential attachment mechanism on a graph-model.
CoRR, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2018
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound.
IEEE Trans. Dependable Secur. Comput., 2018
On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices.
IEEE Syst. J., 2018
User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs.
Secur. Commun. Networks, 2018
Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
IEEE Internet Things J., 2018
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Toward single-server private information retrieval protocol via learning with errors.
J. Inf. Secur. Appl., 2017
Int. J. Commun. Syst., 2017
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
Sci. China Inf. Sci., 2017
Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program.
IEEE Access, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Proceedings of the Computer Security - ESORICS 2016, 2016
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment.
IEEE Trans. Dependable Secur. Comput., 2015
IEEE Syst. J., 2015
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity.
Inf. Sci., 2015
The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing.
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
Int. J. Commun. Syst., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions.
Comput. Networks, 2014
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks.
Ad Hoc Networks, 2014
Improved privacy-preserving authentication scheme for roaming service in mobile networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014
2013
Secure Password-based Remote User Authentication Scheme Against Smart Card Security Breach.
J. Networks, 2013
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards.
Inf. Technol. Control., 2013
Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC.
Inf. Fusion, 2013
2012
Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture.
IACR Cryptol. ePrint Arch., 2012
On the (in)security of some smart-card-based password authentication schemes for WSN.
IACR Cryptol. ePrint Arch., 2012
Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Web Information Systems and Mining - International Conference, 2012
Security Analysis of a Secure and Practical Dynamic Identity-Based Remote User Authentication Scheme.
Proceedings of the Web Information Systems and Mining - International Conference, 2012
Proceedings of the Web Information Systems and Mining - International Conference, 2012
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012
Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme.
Proceedings of the Distributed Computing and Internet Technology, 2012
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the Web Technologies and Applications, 2012