Wanpeng Li

Orcid: 0000-0002-6396-9578

According to our database1, Wanpeng Li authored at least 25 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator.
J. Ambient Intell. Humaniz. Comput., July, 2023

A Broadband Subliminal Channel in Signatures Without Sharing the Signing Key.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

From Manifest V2 to V3: A Study on the Discoverability of Chrome Extensions.
Proceedings of the Information Security - 26th International Conference, 2023

Research on Dynamic Scheduling Algorithm for Emergency Repair of Power Grid Disaster Relief Based on Improved Q-Learning.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023

2022
Study on the mud swimming motion of <i>Paramisgurnus dabryanus</i>.
Simul., 2022

2021
ICAS: Two-factor identity-concealed authentication scheme for remote-servers.
J. Syst. Archit., 2021

2020
Forecasting manufacturing industrial natural gas consumption of China using a novel time-delayed fractional grey model with multiple fractional order.
Comput. Appl. Math., 2020

User Access Privacy in OAuth 2.0 and OpenID Connect.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Evolutionary Algorithms in Web Security: Exploring Untapped Potential.
Proceedings of the 12th International Symposium on Communication Systems, 2020

2019
OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect.
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019

2018
Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect.
CoRR, 2018

Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations.
Proceedings of the Security Protocols XXVI, 2018

Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018

Mitigating CSRF attacks on OAuth 2.0 Systems.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking.
Proceedings of the Information Security - 21st International Conference, 2018

Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Improving the security of real world identity management systems.
PhD thesis, 2017

Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability.
Proceedings of the Advances in Information and Computer Security, 2017

2016
An ID-based Hierarchical Access Control Scheme with Constant Size Public Parameter.
Int. J. Netw. Secur., 2016

Analysing the Security of Google's Implementation of OpenID Connect.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2016

2015
Generating Unlinkable IPv6 Addresses.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Addressing Threats to Real-World Identity Management Systems.
Proceedings of the ISSE 2015, 2015

2014
Security Issues in OAuth 2.0 SSO Implementations.
Proceedings of the Information Security - 17th International Conference, 2014

2013
Threshold public key encryption scheme resilient against continual leakage without random oracles.
Frontiers Comput. Sci., 2013

New forward-secure signature schemes with untrusted update.
Frontiers Comput. Sci., 2013


  Loading...