Quantum2FA: Efficient quantum-resistant two-factor authentication scheme for mobile devices Q Wang, D Wang, C Cheng, D He IEEE Transactions on Dependable and Secure Computing 20 (1), 193-208, 2021 | 118 | 2021 |
Understanding failures in security proofs of multi-factor authentication for mobile devices Q Wang, D Wang IEEE Transactions on Information Forensics and Security 18, 597-612, 2022 | 48 | 2022 |
Understanding security failures of anonymous authentication schemes for cloud environments M Xu, D Wang, Q Wang, Q Jia Journal of Systems Architecture 118, 102206, 2021 | 14 | 2021 |
Analysis and improvement of a NTRU-based handover authentication scheme Q Wang, C Cheng, L Zuo IEEE Communications Letters 23 (10), 1692-1695, 2019 | 6 | 2019 |
Revisiting a multifactor authentication scheme in industrial IoT D Wang, S Hong, Q Wang Security and Communication Networks 2021 (1), 9995832, 2021 | 4 | 2021 |
Analysis and enhancement of a lattice-based data outsourcing scheme with public integrity verification Q Wang, C Cheng, R Xu, J Ding, Z Liu IEEE Transactions on Services Computing 15 (4), 2226-2231, 2020 | 4 | 2020 |