Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yaosheng Shen
@inproceedings{DBLP:conf/uss/0002SDSJ23, author = {Ding Wang and Xuan Shan and Qiying Dong and Yaosheng Shen and Chunfu Jia}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {No Single Silver Bullet: Measuring the Accuracy of Password Strength Meters}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {947--964}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/wang-ding-silver-bullet}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0002SDSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/DongWSJ22, author = {Qiying Dong and Ding Wang and Yaosheng Shen and Chunfu Jia}, editor = {Fengjun Li and Kaitai Liang and Zhiqiang Lin and Sokratis K. Katsikas}, title = {{PII-PSM:} {A} New Targeted Password Strength Meter Using Personally Identifiable Information}, booktitle = {Security and Privacy in Communication Networks - 18th {EAI} International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {462}, pages = {648--669}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25538-0\_34}, doi = {10.1007/978-3-031-25538-0\_34}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/DongWSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangLSSW19, author = {Ping Wang and Bin Li and Hongjin Shi and Yaosheng Shen and Ding Wang}, title = {Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2516963:1--2516963:13}, year = {2019}, url = {https://doi.org/10.1155/2019/2516963}, doi = {10.1155/2019/2516963}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangLSSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/LiSW18, author = {Wenting Li and Yaosheng Shen and Ping Wang}, title = {Breaking Three Remote user Authentication Systems for Mobile Devices}, journal = {J. Signal Process. Syst.}, volume = {90}, number = {8-9}, pages = {1179--1190}, year = {2018}, url = {https://doi.org/10.1007/s11265-017-1305-z}, doi = {10.1007/S11265-017-1305-Z}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vlsisp/LiSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShenW018, author = {Yaosheng Shen and Ding Wang and Ping Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Revisiting Anonymous Two-Factor Authentication Schemes for Cloud Computing}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {134--146}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_13}, doi = {10.1007/978-3-030-00009-7\_13}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ShenW018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.