QPASE: Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud Storage J Jiang, D Wang IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
Deep Hashing based Cancelable Multi-biometric Template Protection G Zhao, Q Jiang, D Wang, X Ma, X Li IEEE Transactions on Dependable and Secure Computing, 2023 | | 2023 |
Ferroelectric nitride semiconductors: Molecular beam epitaxy, properties, and emerging device applications P Wang, D Wang, S Yang, Z Mi Elsevier, 2023 | | 2023 |
QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage J Jiang, D Wang, G Zhang IEEE Transactions on Services Computing, 2023 | 2 | 2023 |
Honeywords generation mechanism based on zero-divisor graph sequences Y Tian, L Li, H Peng, D Wang, Y Yang IEEE Transactions on Services Computing, 2023 | | 2023 |
Secure and lightweight user authentication scheme for cloud-assisted internet of things C Wang, D Wang, Y Duan, X Tao IEEE Transactions on Information Forensics and Security, 2023 | 37 | 2023 |
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices Q Wang, D Wang, C Cheng, D He IEEE Transactions on Dependable and Secure Computing 20 (1), 193-208, 2023 | | 2023 |
No single silver bullet: Measuring the accuracy of password strength meters D Wang, X Shan, Q Dong, Y Shen, C Jia 32nd USENIX Security Symposium (USENIX Security 23), 947-964, 2023 | 6 | 2023 |
Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords D Wang, Y Zou, YA Xiao, S Ma, X Chen 32nd USENIX Security Symposium (USENIX Security 23), 983-1000, 2023 | 4 | 2023 |
Password guessing using random forest D Wang, Y Zou, Z Zhang, K Xiu 32nd USENIX Security Symposium (USENIX Security 23), 965-982, 2023 | 5 | 2023 |
Understanding failures in security proofs of multi-factor authentication for mobile devices Q Wang, D Wang IEEE Transactions on Information Forensics and Security 18, 597-612, 2022 | 46 | 2022 |
PII-PSM: A New Targeted Password Strength Meter Using Personally Identifiable Information Q Dong, D Wang, Y Shen, C Jia International Conference on Security and Privacy in Communication Systems …, 2022 | 1 | 2022 |
Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key J Jiang, D Wang, G Zhang, Z Chen European Symposium on Research in Computer Security, 295-316, 2022 | 10 | 2022 |
Reliable password hardening service with opt-out C Jia, S Wu, D Wang 2022 41st International Symposium on Reliable Distributed Systems (SRDS …, 2022 | 3 | 2022 |
Improving deep learning based password guessing models using pre-processing Y Wu, D Wang, Y Zou, Z Huang International Conference on Information and Communications Security, 163-183, 2022 | 3 | 2022 |
UP-MLE: efficient and practical updatable block-level message-locked encryption scheme based on update properties S Wu, C Jia, D Wang IFIP International Conference on ICT Systems Security and Privacy Protection …, 2022 | 1 | 2022 |
New Observations on Zipf’s Law in passwords Z Hou, D Wang IEEE Transactions on Information Forensics and Security 18, 517-532, 2022 | 8 | 2022 |
How to Attack and Generate Honeywords D Wang, Y Zou, Q Dong, Y Song, X Huang Proceedings of the 43rd IEEE Symposium on Security and Privacy (IEEE S&P …, 2022 | 29 | 2022 |
Edge-assisted Intelligent Device Authentication in Cyber-Physical Systems Y Lu, D Wang*, MS Obaidat, P Vijayakumar IEEE Internet of Things Journal, 1-14, 2022 | 31 | 2022 |
Provably secure two-round PAKE based on ciphertext standard language over lattices AQ YIN, G QU TZ Acta Electronica Sinica 50 (5), 1140-1149, 2022 | 2 | 2022 |