关注
chenyu wang
chenyu wang
在 bupt.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Understanding node capture attacks in user authentication schemes for wireless sensor networks
C Wang, D Wang, Y Tu, G Xu, H Wang
IEEE Transactions on Dependable and Secure Computing 19 (1), 507-523, 2020
1452020
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
C Wang, D Wang, G Xu, D He
Science China Information Sciences 65 (1), 112301, 2022
932022
An enhanced three-factor user authentication scheme using elliptic curve cryptosystem for wireless sensor networks
C Wang, G Xu, J Sun
Sensors 17 (12), 2946, 2017
782017
Efficient multi-factor user authentication protocol with forward secrecy for real-time data access in WSNs
D Wang, P Wang, C Wang
ACM Transactions on Cyber-Physical Systems 4 (3), 1-26, 2020
742020
Secure and lightweight user authentication scheme for cloud-assisted internet of things
C Wang, D Wang, Y Duan, X Tao
IEEE Transactions on Information Forensics and Security 18, 2961-2976, 2023
442023
A robust two-factor user authentication scheme-based ECC for smart home in IoT
S Zou, Q Cao, C Wang, Z Huang, G Xu
IEEE Systems Journal 16 (3), 4938-4949, 2021
422021
Cryptanalysis of Three Password‐Based Remote User Authentication Schemes with Non‐Tamper‐Resistant Smart Card
C Wang, G Xu
Security and Communication Networks 2017 (1), 1619741, 2017
342017
A lightweight password‐based authentication protocol using smart card
C Wang, D Wang, G Xu, Y Guo
International Journal of Communication Systems 30 (16), e3336, 2017
332017
A provably secure biometrics‐based authentication scheme for multiserver environment
F Wang, G Xu, C Wang, J Peng
Security and Communication Networks 2019 (1), 2838615, 2019
312019
A Secure and Anonymous Two‐Factor Authentication Protocol in Multiserver Environment
C Wang, G Xu, W Li
Security and Communication Networks 2018 (1), 9062675, 2018
252018
A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations
J Yuan, J Yang, C Wang, X Jia, FW Fu, G Xu
Information Sciences 592, 36-49, 2022
222022
An enhanced user authentication protocol based on elliptic curve cryptosystem in cloud computing environment
C Wang, K Ding, B Li, Y Zhao, G Xu, Y Guo, P Wang
Wireless Communications and Mobile Computing 2018 (1), 3048697, 2018
192018
Oblivious Transfer via Lossy Encryption from Lattice‐Based Cryptography
Z Li, C Xiang, C Wang
Wireless Communications and Mobile Computing 2018 (1), 5973285, 2018
162018
Bit-level automotive controller area network message reverse framework based on linear regression
Z Bi, G Xu, G Xu, C Wang, S Zhang
Sensors 22 (3), 981, 2022
132022
A new approach to security analysis of smart home authentication systems
M Zhang, C Wang, J Wang, S Tian, Y Li
Fundamenta Informaticae 157 (1-2), 153-165, 2018
122018
Anonymous authentication protocol based on physical unclonable function and elliptic curve cryptography for smart grid
H Ma, C Wang, G Xu, Q Cao, G Xu, L Duan
IEEE Systems Journal, 2023
102023
Efficient ECC-based conditional privacy-preserving aggregation signature scheme in V2V
S Yu, Q Cao, C Wang, G Xu, H Ma, Y Zhu, Y Peng, Y Jia
IEEE Transactions on Vehicular Technology 72 (11), 15028-15039, 2023
82023
A novel model for voice command fingerprinting using deep learning
J Mao, C Wang, Y Guo, G Xu, S Cao, X Zhang, Z Bi
Journal of Information Security and Applications 65, 103085, 2022
82022
Security analysis on “anonymous authentication scheme for smart home environment with provable security”
M Xu, Q Dong, M Zhou, C Wang, Y Liu
Wireless Communications and Mobile Computing 2020 (1), 8838363, 2020
82020
Demystifying the underground ecosystem of account registration bots
Y Gao, G Xu, L Li, X Luo, C Wang, Y Sui
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
32022
系统目前无法执行此操作,请稍后再试。
文章 1–20