Ding Wang

Orcid: 0000-0002-1667-2237

Affiliations:
  • Nankai University, College of Cyber Science, Tianjin, China
  • Peking University, School of Electronics Engineering and Computer Science, Beijing, China (PhD 2017)
  • Harbin Engineering University, College of Computer Science and Technology, China (former)


According to our database1, Ding Wang authored at least 99 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage.
IEEE Trans. Serv. Comput., 2024

Robust Multi-Factor Authentication for WSNs With Dynamic Password Recovery.
IEEE Trans. Inf. Forensics Secur., 2024

AB-PAKE: Achieving Fine-Grained Access Control and Flexible Authentication.
IEEE Trans. Inf. Forensics Secur., 2024

QPASE: Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2024

Deep Hashing Based Cancelable Multi-Biometric Template Protection.
IEEE Trans. Dependable Secur. Comput., 2024

PointerGuess: Targeted Password Guessing Model Using Pointer Mechanism.
Proceedings of the 33rd USENIX Security Symposium, 2024

Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
Proceedings of the 33rd USENIX Security Symposium, 2024

A Security Analysis of Honey Vaults.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Prob-Hashcat: Accelerating Probabilistic Password Guessing with Hashcat by Hundreds of Times.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

2023
Edge-Assisted Intelligent Device Authentication in Cyber-Physical Systems.
IEEE Internet Things J., February, 2023

Honeywords Generation Mechanism Based on Zero-Divisor Graph Sequences.
IEEE Trans. Serv. Comput., 2023

Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2023

Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023

New Observations on Zipf's Law in Passwords.
IEEE Trans. Inf. Forensics Secur., 2023

Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2023

Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords.
Proceedings of the 32nd USENIX Security Symposium, 2023

Password Guessing Using Random Forest.
Proceedings of the 32nd USENIX Security Symposium, 2023

No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Achieving One-Round Password-Based Authenticated Key Exchange over Lattices.
IEEE Trans. Serv. Comput., 2022

Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Practical and Provably Secure Three-Factor Authentication Protocol Based on Extended Chaotic-Maps for Mobile Lightweight Devices.
IEEE Trans. Dependable Secur. Comput., 2022

Quantum-Safe Round-Optimal Password Authentication for Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2022

Security Standards and Measures for Massive IoT in the 5G Era.
Mob. Networks Appl., 2022

Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key.
IACR Cryptol. ePrint Arch., 2022

Reliable Password Hardening Service with Opt-Out.
IACR Cryptol. ePrint Arch., 2022

Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0.
Sci. China Inf. Sci., 2022

Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.
Proceedings of the 31st USENIX Security Symposium, 2022

How to Attack and Generate Honeywords.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information.
Proceedings of the Security and Privacy in Communication Networks, 2022

UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

2021
RLS-PSM: A Robust and Accurate Password Strength Meter Based on Reuse, Leet and Separation.
IEEE Trans. Inf. Forensics Secur., 2021

Leakage Resilient Leveled $\mathsf {FHE}$FHE on Multiple Bits Message.
IEEE Trans. Big Data, 2021

Revisiting a Multifactor Authentication Scheme in Industrial IoT.
Secur. Commun. Networks, 2021

Understanding security failures of anonymous authentication schemes for cloud environments.
J. Syst. Archit., 2021

2020
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEEE Trans. Dependable Secur. Comput., 2020

Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs.
ACM Trans. Cyber Phys. Syst., 2020

Achieving Multi-Hop PRE via Branching Program.
IEEE Trans. Cloud Comput., 2020

Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography.
IET Inf. Secur., 2020

Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme.
IET Inf. Secur., 2020

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEICE Trans. Inf. Syst., 2020

Understanding security failures of multi-factor authentication schemes for multi-server environments.
Comput. Secur., 2020

2019
Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments.
Secur. Commun. Networks, 2019

Handshake between Fibonacci series and pure preferential attachment mechanism on a graph-model.
CoRR, 2019

Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users.
Proceedings of the 28th USENIX Security Symposium, 2019

A Typo-Tolerant Password Authentication Scheme with Targeted Error Correction.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

2018
Rethinking Authentication on Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

On the RCCA Security of Hybrid Signcryption for Internet of Things.
Wirel. Commun. Mob. Comput., 2018

Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2018

Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound.
IEEE Trans. Dependable Secur. Comput., 2018

On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices.
IEEE Syst. J., 2018

User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs.
Secur. Commun. Networks, 2018

Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
IEEE Internet Things J., 2018

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptol. ePrint Arch., 2018

A Security Analysis of Honeywords.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Revisiting Anonymous Two-Factor Authentication Schemes for Cloud Computing.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Two-Round PAKE Protocol over Lattices Without NIZK.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Zipf's Law in Passwords.
IEEE Trans. Inf. Forensics Secur., 2017

Toward single-server private information retrieval protocol via learning with errors.
J. Inf. Secur. Appl., 2017

A lightweight password-based authentication protocol using smart card.
Int. J. Commun. Syst., 2017

Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
Sci. China Inf. Sci., 2017

Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program.
IEEE Access, 2017

Toward Proxy Re-encryption From Learning with Errors in the Exponent.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Towards Fully Homomorphic Encryption From Gentry-Peikert-Vaikuntanathan Scheme.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Understanding Human-Chosen PINs: Characteristics, Distribution and Security.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
On the Implications of Zipf's Law in Passwords.
Proceedings of the Computer Security - ESORICS 2016, 2016

fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Targeted Online Password Guessing: An Underestimated Threat.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment.
IEEE Trans. Dependable Secur. Comput., 2015

Robust Biometrics-Based Authentication Scheme for Multiserver Environment.
IEEE Syst. J., 2015

Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity.
Inf. Sci., 2015

On the Usability of Two-Factor Authentication.
IACR Cryptol. ePrint Arch., 2015

The Emperor's New Password Creation Policies.
IACR Cryptol. ePrint Arch., 2015

The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Security flaws in two improved remote user authentication schemes using smart cards.
Int. J. Commun. Syst., 2014

Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment.
IACR Cryptol. ePrint Arch., 2014

Offline Dictionary Attack on Password Authentication Schemes using Smart Cards.
IACR Cryptol. ePrint Arch., 2014

Zipf's Law in Passwords.
IACR Cryptol. ePrint Arch., 2014

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions.
Comput. Networks, 2014

Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks.
Ad Hoc Networks, 2014

Improved privacy-preserving authentication scheme for roaming service in mobile networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

2013
Secure Password-based Remote User Authentication Scheme Against Smart Card Security Breach.
J. Networks, 2013

Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards.
Inf. Technol. Control., 2013

Cryptanalysis of a remote user authentication scheme for mobile client-server environment based on ECC.
Inf. Fusion, 2013

2012
Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture.
IACR Cryptol. ePrint Arch., 2012

On the (in)security of some smart-card-based password authentication schemes for WSN.
IACR Cryptol. ePrint Arch., 2012

Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem.
IACR Cryptol. ePrint Arch., 2012

On the Security of an Improved Password Authentication Scheme Based on ECC.
IACR Cryptol. ePrint Arch., 2012

A New Scheme with Secure Cookie against SSLStrip Attack.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Security Analysis of a Secure and Practical Dynamic Identity-Based Remote User Authentication Scheme.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Comments on an Advanced Dynamic ID-Based Authentication Scheme for Cloud Computing.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

Breaking a Robust Remote User Authentication Scheme Using Smart Cards.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

Cookie-Proxy: A Scheme to Prevent SSLStrip Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

On the Security of an Improved Password Authentication Scheme Based on ECC.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme.
Proceedings of the Distributed Computing and Internet Technology, 2012

Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

A New Dynamic ID-Based Remote User Authentication Scheme with Forward Secrecy.
Proceedings of the Web Technologies and Applications, 2012


  Loading...