Two birds with one stone: Two-factor authentication with security beyond conventional bound D Wang, P Wang IEEE transactions on dependable and secure computing 15 (4), 708-722, 2018 | 553 | 2018 |
Anonymous two-factor authentication in distributed systems: Certain goals are beyond attainment D Wang, D He, P Wang, CH Chu IEEE Transactions on Dependable and Secure Computing 12 (4), 428-442, 2014 | 464 | 2014 |
Robust biometrics-based authentication scheme for multiserver environment D He, D Wang IEEE Systerms Journal 9 (3), 816-823, 2015 | 460 | 2015 |
Zipf’s law in passwords D Wang, H Cheng, P Wang, X Huang, G Jian IEEE Transactions on Information Forensics and Security 12 (11), 2776-2791, 2017 | 451 | 2017 |
Targeted Online Password Guessing: An Underestimated Threat D Wang, Z Zhang, P Wang, J Yan, X Huang ACM CCS 2016, 1-13, 2016 | 402 | 2016 |
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks D Wang, W Li, P Wang IEEE Transactions on Industrial Informatics 14 (9), 4081-4092, 2018 | 248 | 2018 |
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions D Wang, P Wang Computer Networks 73, 41-57, 2014 | 210 | 2014 |
Practical and provably secure three-factor authentication protocol based on extended chaotic-maps for mobile lightweight devices S Qiu, D Wang, G Xu, S Kumari IEEE Transactions on Dependable and Secure Computing 19 (2), 1338-1351, 2020 | 202 | 2020 |
Security flaws in two improved remote user authentication schemes using smart cards CG Ma, D Wang, SD Zhao International Journal of Communication Systems 27 (10), 2215-2227, 2014 | 184 | 2014 |
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks D Wang, P Wang Ad Hoc Networks 20, 1-15, 2014 | 174 | 2014 |
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity D Wang, N Wang, P Wang, S Qing Information Sciences 321, 162-178, 2015 | 166 | 2015 |
Understanding node capture attacks in user authentication schemes for wireless sensor networks C Wang, D Wang, Y Tu, G Xu, H Wang IEEE Transactions on Dependable and Secure Computing 19 (1), 507-523, 2020 | 126 | 2020 |
On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices D Wang, H Cheng, D He, P Wang IEEE Systems Journal 12 (1), 916-925, 2016 | 125 | 2016 |
Offline dictionary attack on password authentication schemes using smart cards D Wang, P Wang Information Security: 16th International Conference, ISC 2013, Dallas, Texas …, 2015 | 121 | 2015 |
A Security Analysis of Honeywords D Wang, H Cheng, P Wang, J Yan, X Huang NDSS 2018, 1-15, 2018 | 105* | 2018 |
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes D Wang, Q Gu, H Cheng, P Wang Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 105 | 2016 |
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars D Wang, D He, H Cheng, P Wang Proc. of the 46th IEEE/IFIP International Conference on Dependable Systems …, 2016 | 102 | 2016 |
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices, Q Wang, D Wang*, C Cheng, D He IEEE Transactions on Dependable and Secure Computing, 1-17, 2021 | 98 | 2021 |
Birthday, name and bifacial-security: understanding passwords of Chinese web users D Wang, P Wang, D He, Y Tian 28th USENIX security symposium (USENIX security 19), 1537-1555, 2019 | 91 | 2019 |
Efficient Privacy-Preserving User Authentication Scheme with Forward Secrecy for Industry 4.0 DH Chenyu Wang, Ding Wang*, Guoai Xu SCIENCE CHINA: Information Sciences 65 (1), 112301:1-17, 2022 | 86 | 2022 |