论文、著作、专利
|
(1) Ying Wang, Xinguang Peng*, Jing Bian, Study on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information, Journal of Intelligent & Fuzzy Systems, 2015, 28(5):2225-2232. (SCI,IF=1.004)
(2) Ying Wang, Xinguang Peng, Jing Bian, A key agreement scheme for identity authentication based on multiple security factors, Computer Modelling & New Technologies, 2014, 18(12):184-192. (EI)
(3) Ying Wang, Xinguang Peng*, Cryptanalysis of two efficient password-based authentication schemes using smart cards, International Journal of Network Security, 2015, 17(6):728-735. (EI)
(4) Ying Wang, Xinguang Peng, Jing Bian. Computer crime forensics based on improved decision tree algorithm, Journal of Networks, 2014, 9(4): 1005-1011. (EI)
|