Understanding node capture attacks in user authentication schemes for wireless sensor networks C Wang, D Wang, Y Tu, G Xu, H Wang IEEE Transactions on Dependable and Secure Computing 19 (1), 507-523, 2020 | 145 | 2020 |
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0 C Wang, D Wang, G Xu, D He Science China Information Sciences 65 (1), 112301, 2022 | 93 | 2022 |
An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks C Wang, G Xu, J Sun Sensors 17 (12), 2946, 2017 | 78 | 2017 |
Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs D Wang, P Wang, C Wang ACM Transactions on Cyber-Physical Systems 4 (3), 1-26, 2020 | 74 | 2020 |
Secure and lightweight user authentication scheme for cloud-assisted internet of things C Wang, D Wang, Y Duan, X Tao IEEE Transactions on Information Forensics and Security 18, 2961-2976, 2023 | 44 | 2023 |
A robust two-factor user authentication scheme-based ECC for smart home in IoT S Zou, Q Cao, C Wang, Z Huang, G Xu IEEE Systems Journal 16 (3), 4938-4949, 2021 | 42 | 2021 |
Cryptanalysis of Three Password‐Based Remote User Authentication Schemes with Non‐Tamper‐Resistant Smart Card C Wang, G Xu Security and Communication Networks 2017 (1), 1619741, 2017 | 34 | 2017 |
A lightweight password‐based authentication protocol using smart card C Wang, D Wang, G Xu, Y Guo International Journal of Communication Systems 30 (16), e3336, 2017 | 33 | 2017 |
A provably secure biometrics‐based authentication scheme for multiserver environment F Wang, G Xu, C Wang, J Peng Security and Communication Networks 2019 (1), 2838615, 2019 | 31 | 2019 |
A Secure and Anonymous Two‐Factor Authentication Protocol in Multiserver Environment C Wang, G Xu, W Li Security and Communication Networks 2018 (1), 9062675, 2018 | 25 | 2018 |
A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations J Yuan, J Yang, C Wang, X Jia, FW Fu, G Xu Information Sciences 592, 36-49, 2022 | 22 | 2022 |
An enhanced user authentication protocol based on elliptic curve cryptosystem in cloud computing environment C Wang, K Ding, B Li, Y Zhao, G Xu, Y Guo, P Wang Wireless Communications and Mobile Computing 2018 (1), 3048697, 2018 | 19 | 2018 |
Oblivious Transfer via Lossy Encryption from Lattice‐Based Cryptography Z Li, C Xiang, C Wang Wireless Communications and Mobile Computing 2018 (1), 5973285, 2018 | 16 | 2018 |
Bit-level automotive controller area network message reverse framework based on linear regression Z Bi, G Xu, G Xu, C Wang, S Zhang Sensors 22 (3), 981, 2022 | 13 | 2022 |
A new approach to security analysis of smart home authentication systems M Zhang, C Wang, J Wang, S Tian, Y Li Fundamenta Informaticae 157 (1-2), 153-165, 2018 | 12 | 2018 |
Anonymous authentication protocol based on physical unclonable function and elliptic curve cryptography for smart grid H Ma, C Wang, G Xu, Q Cao, G Xu, L Duan IEEE Systems Journal, 2023 | 10 | 2023 |
Efficient ECC-based conditional privacy-preserving aggregation signature scheme in V2V S Yu, Q Cao, C Wang, G Xu, H Ma, Y Zhu, Y Peng, Y Jia IEEE Transactions on Vehicular Technology 72 (11), 15028-15039, 2023 | 8 | 2023 |
A novel model for voice command fingerprinting using deep learning J Mao, C Wang, Y Guo, G Xu, S Cao, X Zhang, Z Bi Journal of Information Security and Applications 65, 103085, 2022 | 8 | 2022 |
Security analysis on “anonymous authentication scheme for smart home environment with provable security” M Xu, Q Dong, M Zhou, C Wang, Y Liu Wireless Communications and Mobile Computing 2020 (1), 8838363, 2020 | 8 | 2020 |
Demystifying the underground ecosystem of account registration bots Y Gao, G Xu, L Li, X Luo, C Wang, Y Sui Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | 3 | 2022 |