Follow
Wenting Li
Wenting Li
Verified email at pku.edu.cn
Title
Cited by
Cited by
Year
Measuring two-factor authentication schemes for real-time data access in industrial wireless sensor networks
D Wang, W Li, P Wang
IEEE Transactions on Industrial Informatics 14 (9), 4081-4092, 2018
2472018
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction
W Li, P Wang
Future Generation Computer Systems 101, 694-708, 2019
402019
Cryptanalysis and security enhancement of three authentication schemes in wireless sensor networks
W Li, B Li, Y Zhao, P Wang, F Wei
Wireless Communications and Mobile Computing 2018, 2018
332018
A secure and anonymous two-factor authentication protocol in multiserver environment
C Wang, G Xu, W Li
Security and Communication Networks 2018, 2018
242018
Practical threshold multi-factor authentication
W Li, H Cheng, P Wang, K Liang
IEEE transactions on information forensics and security 16, 3573-3588, 2021
182021
Crytanalysis of three anonymous authentication schemes for multi-server environment
汪定, 李文婷, 王平
Journal of Software 29 (7), 1937-1952, 2017
13*2017
Probability model transforming encoders against encoding attacks
H Cheng, Z Zheng, W Li, P Wang, CH Chu
28th USENIX Security Symposium (USENIX Security 19), 1573-1590, 2019
112019
Insider attacks against multi-factor authentication protocols for wireless sensor networks
李文婷, 汪定, 王平
Journal of Software 30 (8), 2375-2391, 2019
102019
Incrementally updateable honey password vaults
H Cheng, W Li, P Wang, CH Chu, K Liang
30th USENIX Security Symposium (USENIX Security 21), 857-874, 2021
82021
Improved probabilistic context-free grammars for passwords using word extraction
H Cheng, W Li, P Wang, K Liang
ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and …, 2021
62021
Breaking three remote user authentication systems for mobile devices
W Li, Y Shen, P Wang
Journal of Signal Processing Systems 90, 1179-1190, 2018
52018
HPAKE: Honey password-authenticated key exchange for fast and safer online authentication
W Li, P Wang, K Liang
IEEE transactions on information forensics and security 18, 1596-1609, 2022
42022
Breaking two remote user authentication systems for mobile devices
W Li, Q Gu, Y Zhao, P Wang
2017 ieee 3rd international conference on big data security on cloud …, 2017
42017
Secure chaotic maps-based authentication scheme for real-time data access In Internet of Things
W Li, H Cheng, P Wang
2019 International Conference on Cyber Security and Protection of Digital …, 2019
32019
Cryptanalysis of two chaotic maps-based authentication schemes in edge computing
W Li, P Wang
2019 6th IEEE International Conference on Cyber Security and Cloud Computing …, 2019
22019
Password Expiration Strategy: A Perspective of Ecological Memory
Y Zhao, W Li, Z Zhang, P Wang
2019 IEEE Fifth International Conference on Big Data Computing Service and …, 2019
22019
Eavesdropper: a framework for detecting the location of the processed result in hadoop
C Dong, Q Shen, W Li, Y Yang, Z Wu, X Wan
Information and Communications Security: 17th International Conference …, 2016
12016
Improved Wordpcfg for Passwords with Maximum Probability Segmentation
W Li, J Yang, H Cheng, P Wang, K Liang
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
2023
An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing
Z Zhang, H Cheng, W Li, P Wang
Proceedings of the 2023 9th International Conference on Computing and …, 2023
2023
SEYARN: Enhancing Security of YARN Clusters Based on Health Check Service
W Li, Q Shen, C Dong, Y Yang, Z Wu
Information Systems Security and Privacy: Second International Conference …, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20