What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ding Wang
Google Scholar
ORCID:
0000-0002-1667-2237
32
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
HTOTP: Honey Time-Based One-Time Passwords.
Zixuan Ding
Ding Wang
2025
conf/uss
Password Guessing Using Large Language Models.
Yunkai Zou
Maoxiang An
Ding Wang
2024
journals/tifs
Robust Multi-Factor Authentication for WSNs With Dynamic Password Recovery.
Liufu Zhu
Ding Wang
2024
journals/tifs
QPASE: Quantum-Resistant Password-Authenticated Searchable Encryption for Cloud Storage.
Jingwei Jiang
Ding Wang
2024
journals/tifs
AB-PAKE: Achieving Fine-Grained Access Control and Flexible Authentication.
Mi Song
Ding Wang
2024
conf/uss
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
Jianghong Wei
Guohua Tian
Ding Wang
Fuchun Guo
Willy Susilo
Xiaofeng Chen
2024
conf/uss
PointerGuess: Targeted Password Guessing Model Using Pointer Mechanism.
Kedong Xiu
Ding Wang
2024
conf/sp
A Security Analysis of Honey Vaults.
Fei Duan
Ding Wang
Chunfu Jia
2023
journals/tifs
Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices.
Qingxuan Wang
Ding Wang
2023
journals/tifs
Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things.
Chenyu Wang
Ding Wang
Yihe Duan
Xiaofeng Tao
2023
journals/tifs
New Observations on Zipf's Law in Passwords.
Zhenduo Hou
Ding Wang
2023
conf/uss
No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters.
Ding Wang
Xuan Shan
Qiying Dong
Yaosheng Shen
Chunfu Jia
2023
conf/uss
Password Guessing Using Random Forest.
Ding Wang
Yunkai Zou
Zijian Zhang
Kedong Xiu
2023
conf/uss
Pass2Edit: A Multi-Step Generative Model for Guessing Edited Passwords.
Ding Wang
Yunkai Zou
Yuan-an Xiao
Siqi Ma
Xiaofeng Chen
2022
conf/uss
Birds of a Feather Flock Together: How Set Bias Helps to Deanonymize You via Revealed Intersection Sizes.
Xiaojie Guo
Ye Han
Zheli Liu
Ding Wang
Yan Jia
Jin Li
2022
conf/sec
UP-MLE: Efficient and Practical Updatable Block-Level Message-Locked Encryption Scheme Based on Update Properties.
Shaoqiang Wu
Chunfu Jia
Ding Wang
2022
conf/sp
How to Attack and Generate Honeywords.
Ding Wang
Yunkai Zou
Qiying Dong
Yuanming Song
Xinyi Huang
2022
conf/esorics
Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key.
Jingwei Jiang
Ding Wang
Guoyin Zhang
Zhiyuan Chen
2021
journals/tifs
RLS-PSM: A Robust and Accurate Password Strength Meter Based on Reuse, Leet and Separation.
Qiying Dong
Chunfu Jia
Fei Duan
Ding Wang
2020
journals/compsec
Understanding security failures of multi-factor authentication schemes for multi-server environments.
Ding Wang
Xizhe Zhang
Zijian Zhang
Ping Wang
2019
conf/uss
Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users.
Ding Wang
Ping Wang
Debiao He
Yuan Tian
2018
conf/ndss
A Security Analysis of Honeywords.
Ding Wang
Haibo Cheng
Ping Wang
Jeff Yan
Xinyi Huang
2018
conf/icics
Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment.
Ping Wang
Zijian Zhang
Ding Wang
2017
journals/istr
Toward single-server private information retrieval protocol via learning with errors.
Zengpeng Li
Chunguang Ma
Ding Wang
Gang Du
2017
journals/tifs
Zipf's Law in Passwords.
Ding Wang
Haibo Cheng
Ping Wang
Xinyi Huang
Gaopeng Jian
2017
conf/ccs
Understanding Human-Chosen PINs: Characteristics, Distribution and Security.
Ding Wang
Qianchen Gu
Xinyi Huang
Ping Wang
2016
conf/ccs
Targeted Online Password Guessing: An Underestimated Threat.
Ding Wang
Zijian Zhang
Ping Wang
Jeff Yan
Xinyi Huang
2016
conf/ccs
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes.
Ding Wang
Qianchen Gu
Haibo Cheng
Ping Wang
2016
conf/esorics
On the Implications of Zipf's Law in Passwords.
Ding Wang
Ping Wang
2016
conf/dsn
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars.
Ding Wang
Debiao He
Haibo Cheng
Ping Wang
2015
conf/esorics
The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing.
Ding Wang
Ping Wang
2012
conf/icics
Cookie-Proxy: A Scheme to Prevent SSLStrip Attack.
Sendong Zhao
Ding Wang
Sicheng Zhao
Wu Yang
Chunguang Ma
Coauthors
Chenyu Wang
(1)
Chunfu Jia
(4)
Chunguang Ma
(2)
Debiao He
(2)
Ding Wang
(32)
Fei Duan
(2)
Fuchun Guo
(1)
Gang Du
(1)
Gaopeng Jian
(1)
Guohua Tian
(1)
Guoyin Zhang
(1)
Haibo Cheng
(4)
Jeff Yan
(2)
Jianghong Wei
(1)
Jin Li
(1)
Jingwei Jiang
(2)
Kedong Xiu
(2)
Liufu Zhu
(1)
Maoxiang An
(1)
Mi Song
(1)
Ping Wang
(11)
Qianchen Gu
(2)
Qingxuan Wang
(1)
Qiying Dong
(3)
Sendong Zhao
(1)
Shaoqiang Wu
(1)
Sicheng Zhao
(1)
Siqi Ma
(1)
Willy Susilo
(1)
Wu Yang
(1)
Xiaofeng Chen
(2)
Xiaofeng Tao
(1)
Xiaojie Guo
(1)
Xinyi Huang
(5)
Xizhe Zhang
(1)
Xuan Shan
(1)
Yan Jia
(1)
Yaosheng Shen
(1)
Ye Han
(1)
Yihe Duan
(1)
Yuan Tian
(1)
Yuan-an Xiao
(1)
Yuanming Song
(1)
Yunkai Zou
(4)
Zengpeng Li
(1)
Zheli Liu
(1)
Zhenduo Hou
(1)
Zhiyuan Chen
(1)
Zijian Zhang
(4)
Zixuan Ding
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to