default search action
Debiao He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j349]Xiuyuan Chen, Chao Lin, Wei Wu, Debiao He:
A General Blockchain-Based Automatic Audit Scheme For Proofs Of Retrievability. Comput. J. 67(6): 2219-2229 (2024) - [j348]Mengqi Feng, Chao Lin, Wei Wu, Debiao He:
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size. Comput. Stand. Interfaces 87: 103763 (2024) - [j347]Guocheng Zhu, Debiao He, Haoyang An, Min Luo, Cong Peng:
The governance technology for blockchain systems: a survey. Frontiers Comput. Sci. 18(2): 182813 (2024) - [j346]Zhihong Deng, Taotao Li, Chunming Tang, Debiao He, Zibin Zheng:
PSSC: Practical and Secure Sidechain Construction for Heterogeneous Blockchains Orienting IoT. IEEE Internet Things J. 11(3): 4600-4613 (2024) - [j345]Fengqun Wang, Jie Cui, Qingyang Zhang, Debiao He, Chengjie Gu, Hong Zhong:
Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things. IEEE Internet Things J. 11(8): 14115-14126 (2024) - [j344]Jie Cui, Yihu Zhu, Hong Zhong, Qingyang Zhang, Chengjie Gu, Debiao He:
Efficient Blockchain-Based Mutual Authentication and Session Key Agreement for Cross-Domain IIoT. IEEE Internet Things J. 11(9): 16325-16338 (2024) - [j343]Yulin Liu, Debiao He, Zijian Bao, Min Luo, Cong Peng:
PEACS: A Privacy-Enhancing and Accountable Car Sharing System. IEEE Internet Things J. 11(9): 16422-16435 (2024) - [j342]Hongyi Qiao, Cong Peng, Qi Feng, Min Luo, Debiao He:
Ciphertext Range Query Scheme Against Agent Transfer and Permission Extension Attacks for Cloud Computing. IEEE Internet Things J. 11(10): 17975-17988 (2024) - [j341]Qi Xie, Zixuan Ding, Qingyun Xie, Xiao Tan, Debiao He, Wen Tang:
Blockchain-Based Traffic Accident Handling Protocol Without Third Party for VANETs. IEEE Internet Things J. 11(19): 31068-31079 (2024) - [j340]Chunyang Fan, Jie Cui, Hong Zhong, Irina Bolodurina, Debiao He:
MM-SDVN: Efficient Mobility Management Scheme for Optimal Network Handover in Software-Defined Vehicular Network. IEEE Internet Things J. 11(19): 32089-32104 (2024) - [j339]Quanrun Li, Debiao He, Yitao Chen, Jiaming Wen, Zhichao Yang:
An efficient quantum-resistant undeniable signature protocol for the E-voting system. J. Inf. Secur. Appl. 81: 103714 (2024) - [j338]Chenkai Zeng, Debiao He, Qi Feng, Cong Peng, Min Luo:
The implementation of polynomial multiplication for lattice-based cryptography: A survey. J. Inf. Secur. Appl. 83: 103782 (2024) - [j337]Zhichao Yang, Debiao He, Rongmao Chen, Shixiong Wang, Jianqiao Xu:
Post-quantum identity-based traitor tracing. J. Inf. Secur. Appl. 85: 103870 (2024) - [j336]Xin Chen, Debiao He, Cong Peng, Min Luo, Xinyi Huang:
A Secure and Effective Hierarchical Identity-Based Signature Scheme for ADS-B Systems. IEEE Trans. Aerosp. Electron. Syst. 60(4): 5157-5168 (2024) - [j335]Qi Feng, Debiao He, Jian Shen, Min Luo, Kim-Kwang Raymond Choo:
PpNNT: Multiparty Privacy-Preserving Neural Network Training System. IEEE Trans. Artif. Intell. 5(1): 370-383 (2024) - [j334]Haoyang An, Debiao He, Cong Peng, Min Luo, Lianhai Wang:
Efficient Certificateless Online/Offline Signcryption Scheme Without Bilinear Pairing for Smart Home Consumer Electronics. IEEE Trans. Consumer Electron. 70(1): 4005-4015 (2024) - [j333]Yutian Chen, Cong Peng, Yu Dai, Min Luo, Debiao He:
Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 522-544 (2024) - [j332]Fengqun Wang, Jie Cui, Qingyang Zhang, Debiao He, Chengjie Gu, Hong Zhong:
Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things. IEEE Trans. Dependable Secur. Comput. 21(4): 1587-1604 (2024) - [j331]Jie Cui, Yatao Li, Qingyang Zhang, Hong Zhong, Chengjie Gu, Debiao He:
DSChain: A Blockchain System for Complete Lifecycle Security of Data in Internet of Things. IEEE Trans. Dependable Secur. Comput. 21(4): 3977-3993 (2024) - [j330]Runqing Xu, Debiao He, Min Luo, Cong Peng, Xiangyong Zeng:
Optimizing Dilithium Implementation with AVX2/-512. ACM Trans. Embed. Comput. Syst. 23(6): 98:1-98:30 (2024) - [j329]Ruonan Wang, Min Luo, Qi Feng, Cong Peng, Debiao He:
Multi-Party Privacy-Preserving Faster R-CNN Framework for Object Detection. IEEE Trans. Emerg. Top. Comput. Intell. 8(1): 956-967 (2024) - [j328]Ningbin Yang, Chunming Tang, Debiao He:
A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and Performance. IEEE Trans. Inf. Forensics Secur. 19: 251-264 (2024) - [j327]Xiaohu Wang, Chao Lin, Xinyi Huang, Debiao He:
Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks. IEEE Trans. Inf. Forensics Secur. 19: 2438-2453 (2024) - [j326]Fengqun Wang, Jie Cui, Qingyang Zhang, Debiao He, Hong Zhong:
Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 19: 3892-3905 (2024) - [j325]Mengxue Yang, Huaqun Wang, Debiao He:
Puncturable Attribute-Based Encryption From Lattices for Classified Document Sharing. IEEE Trans. Inf. Forensics Secur. 19: 4028-4042 (2024) - [j324]Guoyu Yang, Chang Chen, Qi Chen, Jianan Jiang, Jin Li, Debiao He:
Sweeper: Breaking the Validity-Latency Tradeoff in Asynchronous Common Subset. IEEE Trans. Inf. Forensics Secur. 19: 4534-4546 (2024) - [j323]Lang Pu, Chao Lin, Jingjing Gu, Xinyi Huang, Debiao He:
Generic Construction of Conditional Privacy-Preserving Certificateless Signatures With Efficient Instantiations for VANETs. IEEE Trans. Inf. Forensics Secur. 19: 5449-5463 (2024) - [j322]Lijuan Huo, Libing Wu, Zhuangzhuang Zhang, Chunshuo Li, Debiao He, Jing Wang:
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 5725-5737 (2024) - [j321]Yumeng Xie, Qing Fan, Chuan Zhang, Tong Wu, Yuao Zhou, Debiao He, Liehuang Zhu:
Accountable and Secure Threshold EdDSA Signature and Its Applications. IEEE Trans. Inf. Forensics Secur. 19: 7033-7046 (2024) - [j320]Jing Zhang, Ruonan Ying, Jie Cui, Hong Zhong, Irina Bolodurina, Debiao He:
Secure and Efficient User-Centric V2C Communication for Intelligent Cyber-Physical Transportation System. IEEE Trans. Inf. Forensics Secur. 19: 7674-7689 (2024) - [j319]Yujie Song, Yue Cao, Chaklam Cheong, Debiao He, Kim-Kwang Raymond Choo, Juan Wang:
CAT: A Consensus-Adaptive Trust Management Based on the Group Decision Making in IoVs. IEEE Trans. Inf. Forensics Secur. 19: 7730-7743 (2024) - [j318]Qingyang Zhang, Xiaolong Zhou, Hong Zhong, Jie Cui, Jiaxin Li, Debiao He:
Device-Side Lightweight Mutual Authentication and Key Agreement Scheme Based on Chameleon Hashing for Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 19: 7895-7907 (2024) - [j317]Parhat Abla, Taotao Li, Debiao He, Huawei Huang, Songsen Yu, Yan Zhang:
Fair and Privacy-Preserved Data Trading Protocol by Exploiting Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 9012-9025 (2024) - [j316]Chenkai Zeng, Debiao He, Qi Feng, Xiaolin Yang, Qingcai Luo:
SecureGPT: A Framework for Multi-Party Privacy-Preserving Transformer Inference in GPT. IEEE Trans. Inf. Forensics Secur. 19: 9480-9493 (2024) - [j315]Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, Debiao He:
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences. IEEE Trans. Inf. Theory 70(7): 5376-5391 (2024) - [j314]Yun Shen, Jie Cui, Hong Zhong, Jing Zhang, Irina Bolodurina, Debiao He:
A Two-Layer Dynamic ECU Group Management Scheme for In-Vehicle CAN Bus. IEEE Trans. Intell. Transp. Syst. 25(8): 10431-10445 (2024) - [j313]Zijian Bao, Debiao He, Huaqun Wang, Min Luo, Cong Peng:
BAP: A Blockchain-Assisted Privacy-Preserving Authentication Protocol With User-Controlled Data Linkability for VANETs. IEEE Trans. Intell. Veh. 9(2): 4206-4220 (2024) - [j312]Hong Qin, Debiao He, Qi Feng, Muhammad Khurram Khan, Min Luo, Kim-Kwang Raymond Choo:
Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey. IEEE Trans. Knowl. Data Eng. 36(5): 1919-1934 (2024) - [j311]Jing Zhang, Yue Jiang, Jie Cui, Debiao He, Irina Bolodurina, Hong Zhong:
DBCPA: Dual Blockchain-Assisted Conditional Privacy-Preserving Authentication Framework and Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Mob. Comput. 23(2): 1127-1141 (2024) - [j310]Lu Wei, Jie Cui, Hong Zhong, Irina Bolodurina, Chengjie Gu, Debiao He:
A Decentralized Authenticated Key Agreement Scheme Based on Smart Contract for Securing Vehicular Ad-Hoc Networks. IEEE Trans. Mob. Comput. 23(5): 4318-4333 (2024) - [j309]Jing Zhang, Xinzhong Liu, Jie Cui, Hong Zhong, Lu Wei, Irina Bolodurina, Debiao He:
CBDDS: Secure and Revocable Cache-Based Distributed Data Sharing for Vehicular Networks. IEEE Trans. Mob. Comput. 23(6): 6579-6591 (2024) - [j308]Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang:
Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT. IEEE Trans. Netw. Sci. Eng. 11(1): 404-415 (2024) - [j307]Jie Cui, Xinzhong Liu, Hong Zhong, Jing Zhang, Lu Wei, Irina Bolodurina, Debiao He:
A Practical and Provably Secure Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue. IEEE Trans. Netw. Sci. Eng. 11(2): 1454-1468 (2024) - [j306]Jie Cui, Meng Li, Haozhe Chen, Chunyang Fan, Jing Zhang, Hong Zhong, Irina Bolodurina, Debiao He:
LISP-MM: Efficient LISP-Based Mobility Management in Software Defined Vehicular Networks. IEEE Trans. Netw. Sci. Eng. 11(3): 3222-3236 (2024) - [j305]Huaqun Wang, Zhiguo Wan, Debiao He, Jia Yu:
Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security. IEEE Trans. Serv. Comput. 17(3): 1227-1238 (2024) - [j304]Ningbin Yang, Chunming Tang, Zehui Xiong, Debiao He:
RCME: A Reputation Incentive Committee Consensus-Based for Matchmaking Encryption in IoT Healthcare. IEEE Trans. Serv. Comput. 17(5): 2790-2806 (2024) - [j303]Jiaming Wen, Lu Bai, Zhichao Yang, Huanguo Zhang, Houzhen Wang, Debiao He:
LaRRS: Lattice-Based Revocable Ring Signature and Its Application for VANETs. IEEE Trans. Veh. Technol. 73(1): 739-753 (2024) - [j302]Yang Liu, Debiao He, Min Luo, Huaqun Wang, Qin Liu:
ATRC: An Anonymous Traceable and Revocable Credential System Using Blockchain for VANETs. IEEE Trans. Veh. Technol. 73(2): 2482-2494 (2024) - [j301]Mengjie Zhou, Xiaotong Zhou, Wei Wu, Debiao He:
LPDB: Lightweight Policy-Driven Blockchain With Batch Verification for Rail Transit Systems. IEEE Trans. Veh. Technol. 73(4): 5100-5112 (2024) - [j300]Chunyang Fan, Jie Cui, Hulin Jin, Hong Zhong, Irina Bolodurina, Debiao He:
Auto-Updating Intrusion Detection System for Vehicular Network: A Deep Learning Approach Based on Cloud-Edge-Vehicle Collaboration. IEEE Trans. Veh. Technol. 73(10): 15372-15384 (2024) - [c30]Ningbin Yang, Chunming Tang, Zehui Xiong, Qian Chen, Jiawen Kang, Debiao He:
SG-FCB: A Stackelberg Game-Driven Fair Committee-Based Blockchain Consensus Protocol. ICDCS 2024: 403-414 - [c29]Zihan Liu, Chao Lin, Debiao He, Xinyi Huang, Lang Pu:
Universal and Trustless Large-Value Payments in Cryptocurrencies. ICDCS 2024: 415-426 - [c28]Long Teng, Qi Feng, Wei Zhao, Min Luo, Debiao He:
Secure Federated Distillation Framework for Encrypted Traffic Classification. ISPEC 2024: 1-19 - [c27]Hong Qin, Debiao He, Qi Feng, Xiaolin Yang, Qingcai Luo:
Outsourced and Robust Multi-party Computation with Identifying Malicious Behavior and Application to Machine Learning. ISPEC 2024: 310-328 - [c26]Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang:
Parameter-Hiding Order-Revealing Encryption Without Pairings. Public Key Cryptography (4) 2024: 227-256 - [i36]Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, Debiao He:
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences. CoRR abs/2404.16313 (2024) - [i35]Qi Feng, Kang Yang, Kaiyi Zhang, Xiao Wang, Yu Yu, Xiang Xie, Debiao He:
Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication. IACR Cryptol. ePrint Arch. 2024: 358 (2024) - [i34]Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang:
Parameter-Hiding Order-Revealing Encryption without Pairings. IACR Cryptol. ePrint Arch. 2024: 434 (2024) - [i33]Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, Debiao He:
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences. IACR Cryptol. ePrint Arch. 2024: 632 (2024) - [i32]Yijian Zhang, Jie Chen, Debiao He, Yuqing Zhang:
Bounded Collusion-Resistant Registered Functional Encryption for Circuits. IACR Cryptol. ePrint Arch. 2024: 1572 (2024) - [i31]Yu Dai, Debiao He, Dmitrii I. Koshelev, Cong Peng, Zhijian Yang:
Revisiting subgroup membership testing on pairing-friendly curves via the Tate pairing. IACR Cryptol. ePrint Arch. 2024: 1790 (2024) - 2023
- [j299]Hong Zhong, Chengdong Gu, Qingyang Zhang, Jie Cui, Chengjie Gu, Debiao He:
Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things. Ad Hoc Networks 144: 103137 (2023) - [j298]Xiuyuan Chen, Chao Lin, Wei Wu, Jianting Ning, Junzuo Lai, Debiao He:
Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions. IEEE Commun. Mag. 61(8): 130-136 (2023) - [j297]Shujiang Xu, Jinrong Zhong, Lianhai Wang, Debiao He, Shuhui Zhang, Wei Shao:
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth. Connect. Sci. 35(1) (2023) - [j296]Xin Chen, Debiao He, Muhammad Khurram Khan, Min Luo, Cong Peng:
A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things. IEEE Internet Things J. 10(10): 9136-9147 (2023) - [j295]Yunru Zhang, Debiao He, Pandi Vijayakumar, Min Luo, Xinyi Huang:
SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things. IEEE Internet Things J. 10(11): 9716-9726 (2023) - [j294]Lang Pu, Chao Lin, Biwen Chen, Debiao He:
User-Friendly Public-Key Authenticated Encryption With Keyword Search for Industrial Internet of Things. IEEE Internet Things J. 10(15): 13544-13555 (2023) - [j293]Ningbin Yang, Chunming Tang, Debiao He:
Blockchain-Assisted Secure Data Sharing Protocol With a Dynamic Multiuser Keyword Search in IIoT. IEEE Internet Things J. 10(17): 15749-15760 (2023) - [j292]Zijian Bao, Debiao He, Huaqun Wang, Min Luo, Cong Peng:
A Group Signature Scheme With Selective Linkability and Traceability for Blockchain-Based Data Sharing Systems in E-Health Services. IEEE Internet Things J. 10(23): 21115-21128 (2023) - [j291]Haoyang An, Debiao He, Zijian Bao, Cong Peng, Qin Liu:
An identity-based dynamic group signature scheme for reputation evaluation systems. J. Syst. Archit. 139: 102875 (2023) - [j290]Quanrun Li, Debiao He, Haifeng Liu, Xiaoying Jia, Zhichao Yang:
MCPAP: A MSIS-based conditional privacy-preserving authentication protocol for smart grids. J. Syst. Archit. 143: 102960 (2023) - [j289]Zhuangzhuang Zhang, Libing WL, Debiao He, Jianxin Li, Shuqin Cao, Xianfeng Wu:
Communication-Efficient and Byzantine-Robust Federated Learning for Mobile Edge Computing Networks. IEEE Netw. 37(4): 112-119 (2023) - [j288]Zijian Bao, Debiao He, Cong Peng, Min Luo, Kim-Kwang Raymond Choo:
An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System. IEEE Open J. Comput. Soc. 4: 231-242 (2023) - [j287]Xinjie Zhu, Debiao He, Zijian Bao, Cong Peng, Min Luo:
Two-Party Adaptor Signature Scheme Based on IEEE P1363 Identity-Based Signature. IEEE Open J. Commun. Soc. 4: 2717-2728 (2023) - [j286]Qing Fan, Debiao He, Jianhua Chen, Cong Peng, Lianhai Wang:
Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks. IEEE Syst. J. 17(2): 2101-2112 (2023) - [j285]Qi Feng, Debiao He, Min Luo, Xinyi Huang, Kim-Kwang Raymond Choo:
EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things. IEEE Trans. Computers 72(9): 2482-2495 (2023) - [j284]Zijian Bao, Debiao He, Wei Wei, Cong Peng, Xinyi Huang:
LedgerMaze: An Efficient Privacy-Preserving Noninteractive Zero-Knowledge Scheme Over Account-Model Blockchain. IEEE Trans. Computers 72(12): 3489-3502 (2023) - [j283]Changhai Ou, Debiao He, Kexin Qiao, Shihui Zheng, Siew-Kei Lam, Fan Zhang:
CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4505-4517 (2023) - [j282]Zhichao Yang, Debiao He, Longjiang Qu, Qing Ye:
An Efficient Identity-Based Encryption With Equality Test in Cloud Computing. IEEE Trans. Cloud Comput. 11(3): 2983-2992 (2023) - [j281]Qingxuan Wang, Ding Wang, Chi Cheng, Debiao He:
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices. IEEE Trans. Dependable Secur. Comput. 20(1): 193-208 (2023) - [j280]Chao Lin, Xinyi Huang, Debiao He:
EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs. IEEE Trans. Dependable Secur. Comput. 20(3): 1818-1832 (2023) - [j279]Zhichao Yang, Debiao He, Longjiang Qu, Jianqiao Xu:
On the Security of a Lattice-Based Multi-Stage Secret Sharing Scheme. IEEE Trans. Dependable Secur. Comput. 20(5): 4441-4442 (2023) - [j278]Chao Lin, Xinyi Huang, Jianting Ning, Debiao He:
ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain. IEEE Trans. Dependable Secur. Comput. 20(6): 4536-4550 (2023) - [j277]Xinyi Hu, Debiao He, Min Luo, Cong Peng, Qi Feng, Xinyi Huang:
High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU. ACM Trans. Embed. Comput. Syst. 22(2): 25:1-25:35 (2023) - [j276]Douwei Lei, Debiao He, Cong Peng, Min Luo, Zhe Liu, Xinyi Huang:
Faster Implementation of Ideal Lattice-Based Cryptography Using AVX512. ACM Trans. Embed. Comput. Syst. 22(5): 83:1-83:18 (2023) - [j275]Qingyang Zhang, Jing Wu, Hong Zhong, Debiao He, Jie Cui:
Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 18: 233-247 (2023) - [j274]Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang:
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services. IEEE Trans. Inf. Forensics Secur. 18: 290-303 (2023) - [j273]Qi Feng, Kang Yang, Mimi Ma, Debiao He:
Efficient Multi-Party EdDSA Signature With Identifiable Aborts and its Applications to Blockchain. IEEE Trans. Inf. Forensics Secur. 18: 1937-1950 (2023) - [j272]Yongli Tang, Yuanhong Li, Qing Ye, Debiao He:
Lattice-Based Group Signatures With Time-Bound Keys via Redactable Signatures. IEEE Trans. Inf. Forensics Secur. 18: 2696-2708 (2023) - [j271]Yang Liu, Debiao He, Qi Feng, Min Luo, Kim-Kwang Raymond Choo:
PERCE: A Permissioned Redactable Credentials Scheme for a Period of Membership. IEEE Trans. Inf. Forensics Secur. 18: 3132-3142 (2023) - [j270]Biwen Chen, Tao Xiang, Debiao He, Hongwei Li, Kim-Kwang Raymond Choo:
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records. IEEE Trans. Inf. Forensics Secur. 18: 3171-3184 (2023) - [j269]Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT. IEEE Trans. Inf. Forensics Secur. 18: 4640-4651 (2023) - [j268]Jing Zhang, Shuangshuang Su, Hong Zhong, Jie Cui, Debiao He:
Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs. IEEE Trans. Inf. Forensics Secur. 18: 4830-4842 (2023) - [j267]Ningbin Yang, Chunming Tang, Quan Zhou, Debiao He:
Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption. IEEE Trans. Inf. Forensics Secur. 18: 5186-5199 (2023) - [j266]Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang:
Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments. IEEE Trans. Inf. Forensics Secur. 18: 5345-5358 (2023) - [j265]Zijian Bao, Debiao He, Muhammad Khurram Khan, Min Luo, Qi Xie:
PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(2): 1524-1534 (2023) - [j264]Xi Xie, Sihem Mesnager, Nian Li, Debiao He, Xiangyong Zeng:
On the Niho Type Locally-APN Power Functions and Their Boomerang Spectrum. IEEE Trans. Inf. Theory 69(6): 4056-4064 (2023) - [j263]Zhiyan Xu, Debiao He, Pandi Vijayakumar, Brij B. Gupta, Jian Shen:
Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs. IEEE J. Biomed. Health Informatics 27(5): 2334-2344 (2023) - [j262]Yulin Liu, Debiao He, Zijian Bao, Huaqun Wang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks. IEEE Trans. Intell. Veh. 8(4): 2998-3011 (2023) - [j261]Jie Cui, Nan Liu, Qingyang Zhang, Debiao He, Chengjie Gu, Hong Zhong:
Efficient and Anonymous Cross-Domain Authentication for IIoT Based on Blockchain. IEEE Trans. Netw. Sci. Eng. 10(2): 899-910 (2023) - [j260]Tao Ye, Min Luo, Yi Yang, Kim-Kwang Raymond Choo, Debiao He:
A Survey on Redactable Blockchain: Challenges and Opportunities. IEEE Trans. Netw. Sci. Eng. 10(3): 1669-1683 (2023) - [j259]Jing Wang, Debiao He, Aniello Castiglione, Brij B. Gupta, Marimuthu Karuppiah, Libing Wu:
PCNNCEC: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration. IEEE Trans. Netw. Sci. Eng. 10(5): 2906-2923 (2023) - [j258]Jing Zhang, Huixia Fang, Hong Zhong, Jie Cui, Debiao He:
Blockchain-Assisted Privacy-Preserving Traffic Route Management Scheme for Fog-Based Vehicular Ad-Hoc Networks. IEEE Trans. Netw. Serv. Manag. 20(3): 2854-2868 (2023) - [j257]Jie Cui, Hu Sun, Hong Zhong, Jing Zhang, Lu Wei, Irina Bolodurina, Debiao He:
Collaborative Intrusion Detection System for SDVN: A Fairness Federated Deep Learning Approach. IEEE Trans. Parallel Distributed Syst. 34(9): 2512-2528 (2023) - [j256]Qingyang Zhang, Zhiming Zhang, Jie Cui, Hong Zhong, Yang Li, Chengjie Gu, Debiao He:
Efficient Blockchain-Based Data Integrity Auditing for Multi-Copy in Decentralized Storage. IEEE Trans. Parallel Distributed Syst. 34(12): 3162-3173 (2023) - [j255]Pengfei Wu, Jianting Ning, Wu Luo, Xinyi Huang, Debiao He:
Exploring Dynamic Task Loading in SGX-Based Distributed Computing. IEEE Trans. Serv. Comput. 16(1): 288-301 (2023) - [j254]Chao Lin, Xinyi Huang, Debiao He:
Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation. IEEE Trans. Serv. Comput. 16(5): 3294-3304 (2023) - [j253]Peng Jiang, Fuchun Guo, Willy Susilo, Chao Lin, Jiaxi Hu, Zhen Zhao, Liehuang Zhu, Debiao He:
EthereumX: Improving Signature Security With Randomness Preprocessing Module. IEEE Trans. Serv. Comput. 16(5): 3318-3331 (2023) - [j252]Xiaotong Zhou, Debiao He, Muhammad Khurram Khan, Wei Wu, Kim-Kwang Raymond Choo:
An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs. IEEE Trans. Veh. Technol. 72(1): 81-92 (2023) - [j251]Biwen Chen, Tao Xiang, Xiaoguo Li, Mingwu Zhang, Debiao He:
Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles. IEEE Trans. Veh. Technol. 72(6): 7844-7856 (2023) - [j250]Jie Cui, Yaning Chen, Hong Zhong, Debiao He, Lu Wei, Irina Bolodurina, Lu Liu:
Lightweight Encryption and Authentication for Controller Area Network of Autonomous Vehicles. IEEE Trans. Veh. Technol. 72(11): 14756-14770 (2023) - [j249]Qi Xie, Zixuan Ding, Wen Tang, Debiao He, Xiao Tan:
Provable Secure and Lightweight Blockchain-Based V2I Handover Authentication and V2V Broadcast Protocol for VANETs. IEEE Trans. Veh. Technol. 72(12): 15200-15212 (2023) - [j248]Biwen Chen, Zhongming Wang, Tao Xiang, Jiyun Yang, Debiao He, Kim-Kwang Raymond Choo:
BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs. Veh. Commun. 41: 100602 (2023) - [c25]Hongyi Qiao, Cong Peng, Min Luo, Po Wu, Debiao He:
Power Grid Encrypted Data Range Filtering Scheme Based on Order-revealing Encryption. ISPA/BDCloud/SocialCom/SustainCom 2023: 715-723 - [c24]Sijia Liu, Min Luo, Cong Peng, Debiao He:
Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM. ICICS 2023: 35-50 - [c23]Hong Qin, Debiao He, Qi Feng, Min Luo:
Secure CNN Training and Inference based on Multi-key Fully Homomorphic Encryption. ICPADS 2023: 370-377 - [c22]Weihan Huang, Min Luo, Cong Peng, Debiao He:
FleS: A Compact and Parameter-Flexible Supersingular Isogeny Based Public Key Encryption Scheme. ProvSec 2023: 290-308 - [c21]Wei Wei, Min Luo, Zijian Bao, Cong Peng, Debiao He:
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant. SAC 2023: 169-188 - [i30]Swati Rawal, Sahadeo Padhye, Debiao He:
Lattice Based Signatures with Additional Functionalities. IACR Cryptol. ePrint Arch. 2023: 1882 (2023) - [i29]Yu Dai, Debiao He, Cong Peng, Zhijian Yang, Chang-an Zhao:
Revisiting Pairing-friendly Curves with Embedding Degrees 10 and 14. IACR Cryptol. ePrint Arch. 2023: 1958 (2023) - 2022
- [j247]Swati Rawal, Sahadeo Padhye, Debiao He:
Lattice-based undeniable signature scheme. Ann. des Télécommunications 77(3-4): 119-126 (2022) - [j246]Chenyu Wang, Ding Wang, Guoai Xu, Debiao He:
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Sci. China Inf. Sci. 65(1) (2022) - [j245]Jianchang Lai, Xinyi Huang, Debiao He, Wei Wu:
Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9. Comput. J. 65(7): 1692-1701 (2022) - [j244]Wenying Zheng, Bing Chen, Debiao He:
An adaptive access control scheme based on trust degrees for edge computing. Comput. Stand. Interfaces 82: 103640 (2022) - [j243]Jun Huang, Debiao He, Mohammad S. Obaidat, Pandi Vijayakumar, Min Luo, Kim-Kwang Raymond Choo:
The Application of the Blockchain Technology in Voting Systems: A Review. ACM Comput. Surv. 54(3): 60:1-60:28 (2022) - [j242]Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar, Huaqun Wang, Kim-Kwang Raymond Choo:
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. ACM Comput. Surv. 54(8): 160:1-160:36 (2022) - [j241]Na Gai, Kaiping Xue, Bin Zhu, Jiayu Yang, Jianqing Liu, Debiao He:
An efficient data aggregation scheme with local differential privacy in smart grid. Digit. Commun. Networks 8(3): 333-342 (2022) - [j240]Yi Yang, Debiao He, Huaqun Wang, Lu Zhou:
An efficient blockchain-based batch verification scheme for vehicular ad hoc networks. Trans. Emerg. Telecommun. Technol. 33(5) (2022) - [j239]Mingxi Liu, Kuan Fan, Neeraj Kumar, Debiao He, Wenbo Shi:
Hash-balanced binary tree-based public auditing in vehicular edge computing and networks. Int. J. Commun. Syst. 35(12) (2022) - [j238]Cong Peng, Min Luo, Huaqun Wang, Muhammad Khurram Khan, Debiao He:
An Efficient Privacy-Preserving Aggregation Scheme for Multidimensional Data in IoT. IEEE Internet Things J. 9(1): 589-600 (2022) - [j237]Cong Peng, Min Luo, Pandi Vijayakumar, Debiao He, Omar Said, Amr Tolba:
Multifunctional and Multidimensional Secure Data Aggregation Scheme in WSNs. IEEE Internet Things J. 9(4): 2657-2668 (2022) - [j236]Xu Yang, Xuechao Yang, Xun Yi, Ibrahim Khalil, Xiaotong Zhou, Debiao He, Xinyi Huang, Surya Nepal:
Blockchain-Based Secure and Lightweight Authentication for Internet of Things. IEEE Internet Things J. 9(5): 3321-3332 (2022) - [j235]Xiaoying Jia, Min Luo, Kim-Kwang Raymond Choo, Li Li, Debiao He:
A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing. IEEE Internet Things J. 9(12): 10108-10120 (2022) - [j234]Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT. IEEE Internet Things J. 9(16): 15138-15149 (2022) - [j233]Xiaoying Jia, Min Luo, Huaqun Wang, Jian Shen, Debiao He:
A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things. IEEE Internet Things J. 9(21): 21838-21850 (2022) - [j232]Jing Wang, Libing Wu, Huaqun Wang, Kim-Kwang Raymond Choo, Lianhai Wang, Debiao He:
A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles. IEEE Internet Things J. 9(23): 24398-24416 (2022) - [j231]Runqing Xu, Zejun Xiang, Da Lin, Shasha Zhang, Debiao He, Xiangyong Zeng:
High-throughput block cipher implementations with SIMD. J. Inf. Secur. Appl. 70: 103333 (2022) - [j230]Yifan Wang, Xiaoying Jia, Yongbo Xia, Muhammad Khurram Khan, Debiao He:
A blockchain-based conditional privacy-preserving authentication scheme for edge computing services. J. Inf. Secur. Appl. 70: 103334 (2022) - [j229]Chao Lin, Min Luo, Xinyi Huang, Kim-Kwang Raymond Choo, Debiao He:
An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof. IEEE Syst. J. 16(1): 1592-1601 (2022) - [j228]Songsong Zhang, Xie Yong, Min Luo, Debiao He, Kim-Kwang Raymond Choo:
DssP: Efficient Dual-Server Secret Sharing Protocol Based on Password Authentication for Cloud Storage Services. IEEE Syst. J. 16(2): 2172-2182 (2022) - [j227]Quanrun Li, Min Luo, Chingfang Hsu, Lianhai Wang, Debiao He:
A Quantum Secure and Noninteractive Identity-Based Aggregate Signature Protocol From Lattices. IEEE Syst. J. 16(3): 4816-4826 (2022) - [j226]Qin Liu, Yunlian Liu, Min Luo, Debiao He, Huaqun Wang, Kim-Kwang Raymond Choo:
The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities. IEEE Syst. J. 16(4): 5741-5752 (2022) - [j225]Biwen Chen, Libing Wu, Sherali Zeadally, Debiao He:
Dual-Server Public-Key Authenticated Encryption with Keyword Search. IEEE Trans. Cloud Comput. 10(1): 322-333 (2022) - [j224]Tianqi Zhou, Jian Shen, Debiao He, Pandi Vijayakumar, Neeraj Kumar:
Human-in-the-Loop-Aided Privacy-Preserving Scheme for Smart Healthcare. IEEE Trans. Emerg. Top. Comput. Intell. 6(1): 6-15 (2022) - [j223]Yi Yang, Debiao He, Pandi Vijayakumar, Brij B. Gupta, Qi Xie:
An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System. IEEE Trans. Green Commun. Netw. 6(3): 1520-1531 (2022) - [j222]Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Synchronized Provable Data Possession Based on Blockchain for Digital Twin. IEEE Trans. Inf. Forensics Secur. 17: 472-485 (2022) - [j221]Qing Fan, Jianhua Chen, Mohammad Shojafar, Saru Kumari, Debiao He:
SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things. IEEE Trans. Ind. Informatics 18(9): 6424-6434 (2022) - [j220]Jun Huang, Debiao He, Yitao Chen, Muhammad Khurram Khan, Min Luo:
A Blockchain-Based Self-Tallying Voting Protocol With Maximum Voter Privacy. IEEE Trans. Netw. Sci. Eng. 9(5): 3808-3820 (2022) - [j219]Zhuangzhuang Zhang, Libing Wu, Debiao He, Qian Wang, Dan Wu, Xiaochuan Shi, Chao Ma:
G-VCFL: Grouped Verifiable Chained Privacy-Preserving Federated Learning. IEEE Trans. Netw. Serv. Manag. 19(4): 4219-4231 (2022) - [j218]Quanrun Li, Debiao He, Zhichao Yang, Qi Xie, Kim-Kwang Raymond Choo:
Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network. IEEE Trans. Veh. Technol. 71(4): 4336-4347 (2022) - [j217]Xiaotong Zhou, Min Luo, Pandi Vijayakumar, Cong Peng, Debiao He:
Efficient Certificateless Conditional Privacy-Preserving Authentication for VANETs. IEEE Trans. Veh. Technol. 71(7): 7863-7875 (2022) - [c20]Zijian Bao, Debiao He, Yulin Liu, Cong Peng, Qi Feng, Min Luo:
Quartet: A Logarithmic Size Linkable Ring Signature Scheme from DualRing. CSS 2022: 56-70 - [c19]Yang Liu, Qi Feng, Cong Peng, Min Luo, Debiao He:
Asymmetric Secure Multi-party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. EISA 2022: 1-20 - [c18]Da Feng, Fucai Zhou, Debiao He, Mengna Guo, Qiyu Wu:
Secure Distributed Outsourcing of Large-scale Linear Systems. ICDCS 2022: 1110-1121 - [e2]Jiageng Chen, Debiao He, Rongxing Lu:
Emerging Information Security and Applications - Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings. Communications in Computer and Information Science 1641, Springer 2022, ISBN 978-3-031-23097-4 [contents] - [i28]Xi Xie, Sihem Mesnager, Nian Li, Debiao He, Xiangyong Zeng:
On the Niho type locally-APN power functions and their boomerang spectrum. CoRR abs/2208.02626 (2022) - 2021
- [j216]Honghan Ji, Hongjie Zhang, Lisong Shao, Debiao He, Min Luo:
An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud. Connect. Sci. 33(4): 1094-1115 (2021) - [j215]Chao Lin, Debiao He, Hongjie Zhang, Lisong Shao, Xinyi Huang:
Privacy-Enhancing Decentralized Anonymous Credential in Smart Grids. Comput. Stand. Interfaces 75: 103505 (2021) - [j214]Weizhi Meng, Daniel Xiapu Luo, Chunhua Su, Debiao He, Marios Anagnostopoulos, Qian Chen:
Editorial for special issue on "security and privacy protection in the era of IoT devices". Digit. Commun. Networks 7(2): 245-246 (2021) - [j213]Zhiyan Xu, Min Luo, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Debiao He:
Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios. IEEE Commun. Lett. 25(4): 1074-1078 (2021) - [j212]Jing Wang, Libing Wu, Huaqun Wang, Kim-Kwang Raymond Choo, Debiao He:
An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things. IEEE Internet Things J. 8(1): 458-473 (2021) - [j211]Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things. IEEE Internet Things J. 8(10): 8387-8398 (2021) - [j210]Cong Peng, Min Luo, Li Li, Kim-Kwang Raymond Choo, Debiao He:
Efficient Certificateless Online/Offline Signature Scheme for Wireless Body Area Networks. IEEE Internet Things J. 8(18): 14287-14298 (2021) - [j209]Biwen Chen, Tao Xiang, Mimi Ma, Debiao He, Xiaofeng Liao:
CL-ME: Efficient Certificateless Matchmaking Encryption for Internet of Things. IEEE Internet Things J. 8(19): 15010-15023 (2021) - [j208]Huaqun Wang, Debiao He, Kim-Kwang Raymond Choo, Xi Chen:
Blockchain-based multi-party proof of assets with privacy preservation. Inf. Sci. 547: 609-621 (2021) - [j207]Huaqun Wang, Debiao He, Jia Yu, Neal N. Xiong, Bin Wu:
RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks. J. Parallel Distributed Comput. 152: 1-10 (2021) - [j206]Yudi Zhang, Debiao He, Mohammad S. Obaidat, Pandi Vijayakumar, Kuei-Fang Hsiao:
Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System. IEEE J. Sel. Areas Commun. 39(2): 384-395 (2021) - [j205]Zijian Bao, Min Luo, Huaqun Wang, Kim-Kwang Raymond Choo, Debiao He:
Blockchain-Based Secure Communication for Space Information Networks. IEEE Netw. 35(4): 50-57 (2021) - [j204]Ruonan Wang, Min Luo, Yihong Wen, Lianhai Wang, Kim-Kwang Raymond Choo, Debiao He:
The Applications of Blockchain in Artificial Intelligence. Secur. Commun. Networks 2021: 6126247:1-6126247:16 (2021) - [j203]Jiabin Bao, Debiao He, Min Luo, Kim-Kwang Raymond Choo:
A Survey of Blockchain Applications in the Energy Sector. IEEE Syst. J. 15(3): 3370-3381 (2021) - [j202]Chao Lin, Debiao He, Xinyi Huang, Xiang Xie, Kim-Kwang Raymond Choo:
PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications. IEEE Syst. J. 15(3): 4367-4378 (2021) - [j201]Shunli Ma, Yi Deng, Debiao He, Jiang Zhang, Xiang Xie:
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain. IEEE Trans. Dependable Secur. Comput. 18(2): 641-651 (2021) - [j200]Kun He, Jing Chen, Quan Yuan, Shouling Ji, Debiao He, Ruiying Du:
Dynamic Group-Oriented Provable Data Possession in the Cloud. IEEE Trans. Dependable Secur. Comput. 18(3): 1394-1408 (2021) - [j199]Huaqun Wang, Qihua Wang, Debiao He:
Blockchain-Based Private Provable Data Possession. IEEE Trans. Dependable Secur. Comput. 18(5): 2379-2389 (2021) - [j198]Biwen Chen, Libing Wu, Neeraj Kumar, Kim-Kwang Raymond Choo, Debiao He:
Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data. IEEE Trans. Emerg. Top. Comput. 9(4): 1753-1764 (2021) - [j197]Chao Lin, Debiao He, Xinyi Huang, Kim-Kwang Raymond Choo:
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 16: 3241-3253 (2021) - [j196]Wenying Zheng, Chin-Feng Lai, Debiao He, Neeraj Kumar, Bing Chen:
Secure Storage Auditing With Efficient Key Updates for Cognitive Industrial IoT Environment. IEEE Trans. Ind. Informatics 17(6): 4238-4247 (2021) - [j195]Fushan Wei, Sherali Zeadally, Pandi Vijayakumar, Neeraj Kumar, Debiao He:
An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 22(7): 3939-3951 (2021) - [j194]Chao Lin, Debiao He, Xinyi Huang, Neeraj Kumar, Kim-Kwang Raymond Choo:
BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 22(12): 7408-7420 (2021) - [j193]Biwen Chen, Debiao He, Neeraj Kumar, Huaqun Wang, Kim-Kwang Raymond Choo:
A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems. IEEE Trans. Netw. Sci. Eng. 8(3): 2048-2059 (2021) - [j192]Cong Peng, Jianhua Chen, Pandi Vijayakumar, Neeraj Kumar, Debiao He:
Efficient Distributed Decryption Scheme for IoT Gateway-based Applications. ACM Trans. Internet Techn. 21(1): 19:1-19:23 (2021) - [j191]Chao Lin, Debiao He, Sherali Zeadally, Xinyi Huang, Zhe Liu:
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities. ACM Trans. Internet Techn. 21(2): 40:1-40:21 (2021) - [j190]Cong Peng, Debiao He, Jianhua Chen, Neeraj Kumar, Muhammad Khurram Khan:
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System. ACM Trans. Internet Techn. 21(3): 61:1-61:24 (2021) - [j189]Jing Wang, Libing Wu, Sherali Zeadally, Muhammad Khurram Khan, Debiao He:
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid. ACM Trans. Sens. Networks 17(3): 25:1-25:25 (2021) - [j188]Zhen Zhou, Debiao He, Zhe Liu, Min Luo, Kim-Kwang Raymond Choo:
A Software/Hardware Co-Design of Crystals-Dilithium Signature Scheme. ACM Trans. Reconfigurable Technol. Syst. 14(2): 11:1-11:21 (2021) - [j187]Huaqun Wang, Debiao He, Anmin Fu, Qi Li, Qihua Wang:
Provable Data Possession with Outsourced Data Transfer. IEEE Trans. Serv. Comput. 14(6): 1929-1939 (2021) - [j186]Homero Toral-Cruz, Debiao He, Albena Dimitrova Mihovska, Kim-Kwang Raymond Choo, Muhammad Khurram Khan:
Reliable and Secure e-Health Networks. Wirel. Pers. Commun. 117(1): 1-6 (2021) - [c17]Huijie Yang, Tianqi Zhou, Chen Wang, Debiao He:
A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework. ISPEC 2021: 374-391 - [i27]Changhai Ou, Debiao He, Zhu Wang, Kexin Qiao, Shihui Zheng, Siew-Kei Lam:
CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2021: 1582 (2021) - 2020
- [j185]Biwen Chen, Libing Wu, Li Li, Kim-Kwang Raymond Choo, Debiao He:
A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing. IEEE Access 8: 28009-28020 (2020) - [j184]Yong Wang, Biwen Chen, Lei Li, Qiang Ma, Huicong Li, Debiao He:
Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid. IEEE Access 8: 40704-40713 (2020) - [j183]Debiao He, Gerhard P. Hancke, Arcangelo Castiglione, Weizhi Meng:
Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov). Comput. Electr. Eng. 87: 106860 (2020) - [j182]Chao Lin, Debiao He, Sherali Zeadally, Neeraj Kumar, Kim-Kwang Raymond Choo:
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system. Sci. China Inf. Sci. 63(3) (2020) - [j181]Yunru Zhang, Debiao He, Li Li, Biwen Chen:
A lightweight authentication and key agreement scheme for Internet of Drones. Comput. Commun. 154: 455-464 (2020) - [j180]Shuyun Shi, Debiao He, Li Li, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey. Comput. Secur. 97: 101966 (2020) - [j179]Yudi Zhang, Debiao He, Mingwu Zhang, Kim-Kwang Raymond Choo:
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm. Frontiers Comput. Sci. 14(3): 143803 (2020) - [j178]Huaqun Wang, Debiao He, Yimu Ji:
Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography. Future Gener. Comput. Syst. 107: 854-862 (2020) - [j177]Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo, Jing Wang:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IEICE Trans. Inf. Syst. 103-D(2): 188-195 (2020) - [j176]Qi Feng, Debiao He, Zhe Liu, Ding Wang, Kim-Kwang Raymond Choo:
Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme. IET Inf. Secur. 14(4): 443-451 (2020) - [j175]Qi Feng, Debiao He, Huaqun Wang, Ding Wang, Xinyi Huang:
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography. IET Inf. Secur. 14(6): 724-732 (2020) - [j174]Chao Lin, Debiao He, Neeraj Kumar, Xinyi Huang, Pandi Vijayakumar, Kim-Kwang Raymond Choo:
HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes. IEEE Internet Things J. 7(2): 818-829 (2020) - [j173]Cong Peng, Jianhua Chen, Mohammad S. Obaidat, Pandi Vijayakumar, Debiao He:
Efficient and Provably Secure Multireceiver Signcryption Scheme for Multicast Communication in Edge Computing. IEEE Internet Things J. 7(7): 6056-6068 (2020) - [j172]Girraj Kumar Verma, B. B. Singh, Neeraj Kumar, Mohammad S. Obaidat, Debiao He, Harendra Singh:
An efficient and provable certificate-based proxy signature scheme for IIoT environment. Inf. Sci. 518: 142-156 (2020) - [j171]Chao Lin, Debiao He, Xinyi Huang, Xiang Xie, Kim-Kwang Raymond Choo:
Blockchain-based system for secure outsourcing of bilinear pairings. Inf. Sci. 527: 590-601 (2020) - [j170]Mimi Ma, Debiao He, Shuqin Fan, Dengguo Feng:
Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare. J. Inf. Secur. Appl. 50 (2020) - [j169]Zhiyan Xu, Debiao He, Huaqun Wang, Pandi Vijayakumar, Kim-Kwang Raymond Choo:
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems. J. Inf. Secur. Appl. 51: 102453 (2020) - [j168]Cong Peng, Jianhua Chen, Lu Zhou, Kim-Kwang Raymond Choo, Debiao He:
CsiIBS: A post-quantum identity-based signature scheme based on isogenies. J. Inf. Secur. Appl. 54: 102504 (2020) - [j167]Zhiyan Xu, Debiao He, Pandi Vijayakumar, Kim-Kwang Raymond Choo, Li Li:
Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems. J. Medical Syst. 44(5): 92 (2020) - [j166]Yang Liu, Debiao He, Mohammad S. Obaidat, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Blockchain-based identity management systems: A review. J. Netw. Comput. Appl. 166: 102731 (2020) - [j165]Zhiyan Xu, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo:
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs. Secur. Commun. Networks 2020: 5276813:1-5276813:12 (2020) - [j164]Xiaoying Jia, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo:
A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing. IEEE Syst. J. 14(1): 560-571 (2020) - [j163]Girraj Kumar Verma, B. B. Singh, Neeraj Kumar, Debiao He:
CB-PS: An Efficient Short-Certificate-Based Proxy Signature Scheme for UAVs. IEEE Syst. J. 14(1): 621-632 (2020) - [j162]Qi Feng, Debiao He, Huaqun Wang, Neeraj Kumar, Kim-Kwang Raymond Choo:
White-Box Implementation of Shamir's Identity-Based Signature Scheme. IEEE Syst. J. 14(2): 1820-1829 (2020) - [j161]Yudi Zhang, Debiao He, Yumei Li, Mingwu Zhang, Kim-Kwang Raymond Choo:
Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks. IEEE Syst. J. 14(4): 5320-5328 (2020) - [j160]Debiao He, Yudi Zhang, Ding Wang, Kim-Kwang Raymond Choo:
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IEEE Trans. Dependable Secur. Comput. 17(5): 1124-1132 (2020) - [j159]Huaqun Wang, Debiao He, Zhe Liu, Rui Guo:
Blockchain-Based Anonymous Reporting Scheme With Anonymous Rewarding. IEEE Trans. Engineering Management 67(4): 1514-1524 (2020) - [j158]Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain. IEEE Trans. Inf. Forensics Secur. 15: 2440-2452 (2020) - [j157]Yunxia Han, Chunxiang Xu, Debiao He, Kefei Chen:
On the Security of a Key Agreement and Key Protection Scheme. IEEE Trans. Inf. Forensics Secur. 15: 3293-3294 (2020) - [j156]Qi Feng, Debiao He, Zhe Liu, Huaqun Wang, Kim-Kwang Raymond Choo:
SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing. IEEE Trans. Inf. Forensics Secur. 15: 3709-3721 (2020) - [j155]Jing Wang, Libing Wu, Kim-Kwang Raymond Choo, Debiao He:
Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure. IEEE Trans. Ind. Informatics 16(3): 1984-1992 (2020) - [j154]Qi Feng, Debiao He, Sherali Zeadally, Kaitai Liang:
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks. IEEE Trans. Ind. Informatics 16(6): 4146-4155 (2020) - [j153]Huaqun Wang, Debiao He, Jinguang Han:
VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud. IEEE Trans. Serv. Comput. 13(3): 572-583 (2020) - [j152]Jian Shen, Dengzhi Liu, Debiao He, Xinyi Huang, Yang Xiang:
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing. IEEE Trans. Sustain. Comput. 5(2): 161-173 (2020) - [j151]Biwen Chen, Libing Wu, Huaqun Wang, Lu Zhou, Debiao He:
A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks. IEEE Trans. Veh. Technol. 69(6): 5813-5825 (2020) - [c16]Yudi Zhang, Debiao He, Fangguo Zhang, Xinyi Huang, Dawei Li:
An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm. Inscrypt 2020: 368-384 - [c15]Na Gai, Kaiping Xue, Peixuan He, Bin Zhu, Jianqing Liu, Debiao He:
An Efficient Data Aggregation Scheme with Local Differential Privacy in Smart Grid. MSN 2020: 73-80 - [c14]Shunli Ma, Yi Deng, Mengqiu Bai, Debiao He, Jiang Zhang, Xiang Xie:
A Practical NIZK Argument for Confidential Transactions over Account-Model Blockchain. ProvSec 2020: 234-253 - [c13]Yunru Zhang, Min Luo, Kim-Kwang Raymond Choo, Li Li, Debiao He:
Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature Algorithm. SocialSec 2020: 3-19 - [c12]Qi Feng, Debiao He, Min Luo, Zengxiang Li, Kim-Kwang Raymond Choo:
Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency. TrustCom 2020: 137-147
2010 – 2019
- 2019
- [j150]Libing Wu, Yubo Zhang, Mimi Ma, Neeraj Kumar, Debiao He:
Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things. Ann. des Télécommunications 74(7-8): 423-434 (2019) - [j149]Jiaxi Hu, Debiao He, Qinglan Zhao, Kim-Kwang Raymond Choo:
Parking Management: A Blockchain-Based Privacy-Preserving System. IEEE Consumer Electron. Mag. 8(4): 45-49 (2019) - [j148]Libing Wu, Yubo Zhang, Kim-Kwang Raymond Choo, Debiao He:
Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks. Int. J. Found. Comput. Sci. 30(4): 647-664 (2019) - [j147]Huaqun Wang, Qihua Wang, Debiao He, Qi Li, Zhe Liu:
BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks. IEEE Internet Things J. 6(2): 3676-3687 (2019) - [j146]Mimi Ma, Debiao He, Huaqun Wang, Neeraj Kumar, Kim-Kwang Raymond Choo:
An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks. IEEE Internet Things J. 6(5): 8065-8075 (2019) - [j145]Huaqun Wang, Debiao He, Jia Yu:
Privacy-preserving incentive and rewarding scheme for crowd computing in social media. Inf. Sci. 470: 15-27 (2019) - [j144]Cong Peng, Jianhua Chen, Sherali Zeadally, Debiao He:
Isogeny-Based Cryptography: A Promising Post-Quantum Technique. IT Prof. 21(6): 27-32 (2019) - [j143]Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, Neeraj Kumar:
A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126: 45-58 (2019) - [j142]Thomas McGhin, Kim-Kwang Raymond Choo, Charles Zhechao Liu, Debiao He:
Blockchain in healthcare applications: Research challenges and opportunities. J. Netw. Comput. Appl. 135: 62-75 (2019) - [j141]Libing Wu, Jing Wang, Sherali Zeadally, Debiao He:
Anonymous and Efficient Message Authentication Scheme for Smart Grid. Secur. Commun. Networks 2019: 4836016:1-4836016:12 (2019) - [j140]Quanrun Li, Ching-Fang Hsu, Kim-Kwang Raymond Choo, Debiao He:
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks. Secur. Commun. Networks 2019: 7871067:1-7871067:13 (2019) - [j139]Qi Feng, Debiao He, Sherali Zeadally, Neeraj Kumar, Kaitai Liang:
Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices. IEEE Syst. J. 13(3): 2775-2785 (2019) - [j138]Jindan Zhang, Baocang Wang, Debiao He, Xu An Wang:
Improved secure fuzzy auditing protocol for cloud data storage. Soft Comput. 23(10): 3411-3422 (2019) - [j137]Jian Shen, Tianqi Zhou, Debiao He, Yuexin Zhang, Xingming Sun, Yang Xiang:
Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 16(6): 996-1010 (2019) - [j136]Libing Wu, Jing Wang, Kim-Kwang Raymond Choo, Debiao He:
Secure Key Agreement and Key Protection for Mobile Device User Authentication. IEEE Trans. Inf. Forensics Secur. 14(2): 319-330 (2019) - [j135]Huaqun Wang, Debiao He, Jia Yu, Zhiwei Wang:
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession. IEEE Trans. Serv. Comput. 12(5): 824-835 (2019) - [j134]Xinghua Li, Yunwei Wang, Pandi Vijayakumar, Debiao He, Neeraj Kumar, Jianfeng Ma:
Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network. IEEE Trans. Veh. Technol. 68(11): 11309-11322 (2019) - [j133]Xiaoying Jia, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo:
Authenticated key agreement scheme for fog-driven IoT healthcare system. Wirel. Networks 25(8): 4737-4750 (2019) - [c11]Jiaxi Hu, Zhiqiang Xu, Debiao He, Sherali Zeadally, Kim-Kwang Raymond Choo:
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps. CSS (1) 2019: 186-202 - [c10]Ding Wang, Ping Wang, Debiao He, Yuan Tian:
Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users. USENIX Security Symposium 2019: 1537-1555 - [e1]Keke Gai, Kim-Kwang Raymond Choo, Debiao He, Sheng Wen:
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, BSCI 2019, Auckland, New Zealand, July 8, 2019. ACM 2019, ISBN 978-1-4503-6786-8 [contents] - 2018
- [j132]Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems. IEEE Access 6: 28203-28212 (2018) - [j131]Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally:
Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks. IEEE Access 6: 40128-40136 (2018) - [j130]Debiao He, Kim-Kwang Raymond Choo, Neeraj Kumar, Aniello Castiglione:
IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies. IEEE Access 6: 72033-72036 (2018) - [j129]Xiaoying Jia, Debiao He, Qin Liu, Kim-Kwang Raymond Choo:
An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment. Ad Hoc Networks 71: 78-87 (2018) - [j128]Mimi Ma, Debiao He, Muhammad Khurram Khan, Jianhua Chen:
Certificateless searchable public key encryption scheme for mobile healthcare system. Comput. Electr. Eng. 65: 413-424 (2018) - [j127]Chao Lin, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Alexey V. Vinel, Xinyi Huang:
Security and Privacy for the Internet of Drones: Challenges and Solutions. IEEE Commun. Mag. 56(1): 64-69 (2018) - [j126]Fushan Wei, Neeraj Kumar, Debiao He, Sang-Soo Yeo:
A general compiler for password-authenticated group key exchange protocol in the standard model. Discret. Appl. Math. 241: 78-86 (2018) - [j125]Huaqun Wang, Debiao He, Yanfei Sun, Neeraj Kumar, Kim-Kwang Raymond Choo:
PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds. Future Gener. Comput. Syst. 79: 262-270 (2018) - [j124]Qi Feng, Debiao He, Sherali Zeadally, Huaqun Wang:
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Gener. Comput. Syst. 84: 239-251 (2018) - [j123]Ashok Kumar Das, Sherali Zeadally, Debiao He:
Taxonomy and analysis of security protocols for Internet of Things. Future Gener. Comput. Syst. 89: 110-125 (2018) - [j122]Xiaoying Jia, Neeraj Kumar, Kim-Kwang Raymond Choo, Debiao He:
Efficient revocable ID-based encryption with cloud revocation server. Int. J. Commun. Syst. 31(1) (2018) - [j121]Min Luo, Aiying Sun, Debiao He, Xiaohong Li:
An efficient and secure 3-factor user-authentication protocol for multiserver environment. Int. J. Commun. Syst. 31(14) (2018) - [j120]Yudi Zhang, Debiao He, Sherali Zeadally, Ding Wang, Kim-Kwang Raymond Choo:
Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks. IEEE Internet Things J. 5(6): 5271-5280 (2018) - [j119]Chao Lin, Debiao He, Xinyi Huang, Kim-Kwang Raymond Choo, Athanasios V. Vasilakos:
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Appl. 116: 42-52 (2018) - [j118]Libing Wu, Biwen Chen, Kim-Kwang Raymond Choo, Debiao He:
Efficient and secure searchable encryption protocol for cloud-based Internet of Things. J. Parallel Distributed Comput. 111: 152-161 (2018) - [j117]Xiaoying Jia, Debiao He, Li Li, Kim-Kwang Raymond Choo:
Signature-based three-factor authenticated key exchange for internet of things applications. Multim. Tools Appl. 77(14): 18355-18382 (2018) - [j116]Yunru Zhang, Min Luo, Kim-Kwang Raymond Choo, Debiao He:
A General Architecture for Multiserver Authentication Key Agreement with Provable Security. Secur. Commun. Networks 2018: 2462901:1-2462901:9 (2018) - [j115]Libing Wu, Zhiyan Xu, Debiao He, Xianmin Wang:
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment. Secur. Commun. Networks 2018: 2595273:1-2595273:13 (2018) - [j114]Li Li, Siqin Zhou, Kim-Kwang Raymond Choo, Xiaohong Li, Debiao He:
An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System. Secur. Commun. Networks 2018: 7524102:1-7524102:11 (2018) - [j113]Debiao He, Sherali Zeadally, Libing Wu:
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks. IEEE Syst. J. 12(1): 64-73 (2018) - [j112]Ding Wang, Haibo Cheng, Debiao He, Ping Wang:
On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices. IEEE Syst. J. 12(1): 916-925 (2018) - [j111]Debiao He, Neeraj Kumar, Muhammad Khurram Khan, Lina Wang, Jian Shen:
Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services. IEEE Syst. J. 12(2): 1621-1631 (2018) - [j110]Jing Li, Xiong Li, Licheng Wang, Debiao He, Haseeb Ahmad, Xinxin Niu:
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput. 22(3): 707-714 (2018) - [j109]Hao Wang, Debiao He, Jian Shen, Zhihua Zheng, Xiaoyan Yang, Man Ho Au:
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps. Soft Comput. 22(7): 2267-2274 (2018) - [j108]Wenmin Li, Qiaoyan Wen, Xuelei Li, Debiao He:
Attribute-based fuzzy identity access control in multicloud computing environments. Soft Comput. 22(12): 4071-4082 (2018) - [j107]Libing Wu, Biwen Chen, Sherali Zeadally, Debiao He:
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Comput. 22(23): 7685-7696 (2018) - [j106]Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo, Alexey V. Vinel:
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network. IEEE Trans. Dependable Secur. Comput. 15(4): 633-645 (2018) - [j105]Vanga Odelu, Sherali Zeadally, Ashok Kumar Das, Mohammad Wazid, Debiao He:
A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks. Telecommun. Syst. 69(4): 431-445 (2018) - [j104]Mimi Ma, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Jianhua Chen:
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(2): 759-767 (2018) - [j103]Debiao He, Neeraj Kumar, Sherali Zeadally, Huaqun Wang:
Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems. IEEE Trans. Ind. Informatics 14(3): 1232-1241 (2018) - [j102]Debiao He, Mimi Ma, Sherali Zeadally, Neeraj Kumar, Kaitai Liang:
Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(8): 3618-3627 (2018) - [j101]Libing Wu, Jing Wang, Sherali Zeadally, Debiao He:
Privacy-preserving auditing scheme for shared data in public clouds. J. Supercomput. 74(11): 6156-6183 (2018) - [j100]Libing Wu, Yubo Zhang, Kim-Kwang Raymond Choo, Debiao He:
Efficient Identity-Based Encryption Scheme with Equality Test in Smart City. IEEE Trans. Sustain. Comput. 3(1): 44-55 (2018) - [j99]Yunru Zhang, Debiao He, Kim-Kwang Raymond Choo:
BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT. Wirel. Commun. Mob. Comput. 2018: 2783658:1-2783658:9 (2018) - [i26]Zijian Bao, Wenbo Shi, Debiao He, Kim-Kwang Raymond Choo:
IoTChain: A Three-Tier Blockchain-based IoT Security Architecture. CoRR abs/1806.02008 (2018) - [i25]Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IACR Cryptol. ePrint Arch. 2018: 814 (2018) - 2017
- [j98]Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li:
Efficient Revocable ID-Based Signature With Cloud Revocation Server. IEEE Access 5: 2945-2954 (2017) - [j97]Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He:
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks. IEEE Access 5: 3376-3392 (2017) - [j96]Min Luo, Xiaotong Zhou, Li Li, Kim-Kwang Raymond Choo, Debiao He:
Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols. IEEE Access 5: 8017-8024 (2017) - [j95]Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo:
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud. Appl. Math. Comput. 314: 31-43 (2017) - [j94]Debiao He, Kim-Kwang Raymond Choo, Neeraj Kumar:
Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies. Comput. Electr. Eng. 63: 157-159 (2017) - [j93]Debiao He, Ding Wang, Qi Xie, Kefei Chen:
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation. Sci. China Inf. Sci. 60(5): 52104 (2017) - [j92]Debiao He, Sherali Zeadally, Libing Wu, Huaqun Wang:
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography. Comput. Networks 128: 154-163 (2017) - [j91]Libing Wu, Yubo Zhang, Kim-Kwang Raymond Choo, Debiao He:
Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener. Comput. Syst. 73: 22-31 (2017) - [j90]Huaqun Wang, Debiao He, Shibing Zhang:
Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid. IET Inf. Secur. 11(3): 131-138 (2017) - [j89]Yi-Ning Liu, Qi Zhong, Liang Chang, Zhe Xia, Debiao He, Chi Cheng:
A secure data backup scheme using multi-factor authentication. IET Inf. Secur. 11(5): 250-255 (2017) - [j88]Min Luo, Yunru Zhang, Muhammad Khurram Khan, Debiao He:
An efficient chaos-based 2-party key agreement protocol with provable security. Int. J. Commun. Syst. 30(14) (2017) - [j87]Min Luo, Yunru Zhang, Muhammad Khurram Khan, Debiao He:
A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography. Int. J. Commun. Syst. 30(16) (2017) - [j86]Qi Jiang, Neeraj Kumar, Jianfeng Ma, Jian Shen, Debiao He, Naveen K. Chilamkurti:
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. Int. J. Netw. Manag. 27(3) (2017) - [j85]Debiao He, Huaqun Wang, Jianhong Zhang, Lina Wang:
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage. Inf. Sci. 375: 48-53 (2017) - [j84]Jiageng Chen, Debiao He, Chunhua Su, Zhe Xia:
Special issue on Secure Computation on Encrypted Data. J. Inf. Secur. Appl. 34: 205-206 (2017) - [j83]Libing Wu, Jing Wang, Kim-Kwang Raymond Choo, Yuangang Li, Debiao He:
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network. J. Inf. Secur. Appl. 37: 112-121 (2017) - [j82]Jian Shen, Dengzhi Liu, Qi Liu, Debiao He, Xingming Sun:
An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City. J. Inf. Sci. Eng. 33(4): 923-938 (2017) - [j81]Libing Wu, Jing Wang, Debiao He, Muhammad Khurram Khan:
Cryptanalysis of an identity-based public auditing protocol for cloud storage. Frontiers Inf. Technol. Electron. Eng. 18(12): 1972-1977 (2017) - [j80]Libing Wu, Jing Wang, Neeraj Kumar, Debiao He:
Secure public data auditing scheme for cloud storage in smart city. Pers. Ubiquitous Comput. 21(5): 949-962 (2017) - [j79]Debiao He, Sherali Zeadally, Neeraj Kumar, Jong-Hyouk Lee:
Anonymous Authentication for Wireless Body Area Networks With Provable Security. IEEE Syst. J. 11(4): 2590-2601 (2017) - [j78]Jie Xu, Qiaoyan Wen, Wenmin Li, Jian Shen, Debiao He:
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing. Soft Comput. 21(18): 5265-5279 (2017) - [j77]Debiao He, Huaqun Wang, Lina Wang, Jian Shen, Xianzhao Yang:
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices. Soft Comput. 21(22): 6801-6810 (2017) - [j76]Hao Wang, Debiao He, Jian Shen, Zhihua Zheng, Chuan Zhao, Minghao Zhao:
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput. 21(24): 7325-7335 (2017) - [j75]Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Wei Wu:
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System. IEEE Trans. Inf. Forensics Secur. 12(2): 454-464 (2017) - [j74]Zhiyan Xu, Libing Wu, Debiao He, Muhammad Khurram Khan:
Security analysis of a publicly verifiable data possession scheme for remote storage. J. Supercomput. 73(11): 4923-4930 (2017) - [j73]Zhiyan Xu, Libing Wu, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, Debiao He:
A secure and efficient public auditing scheme using RSA algorithm for cloud storage. J. Supercomput. 73(12): 5285-5309 (2017) - [j72]Debiao He, Neeraj Kumar, Sherali Zeadally, Alexey V. Vinel, Laurence T. Yang:
Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries. IEEE Trans. Smart Grid 8(5): 2411-2419 (2017) - [j71]Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu:
Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography. Wirel. Commun. Mob. Comput. 2017 (2017) - [j70]Homero Toral-Cruz, Albena Dimitrova Mihovska, Piotr Gaj, Debiao He, Julio Cesar Ramírez Pacheco, Miroslav Voznák, Izabella Lokshina:
Advances and Challenges in Convergent Communication Networks. Wirel. Pers. Commun. 96(4): 4919-4927 (2017) - [j69]Han Shen, Jianhua Chen, Debiao He, Jian Shen:
Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme. Wirel. Pers. Commun. 96(4): 5635-5641 (2017) - [c9]Zhiqiang Xu, Debiao He, Xinyi Huang:
Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments. ICICS 2017: 595-605 - [i24]Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen:
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error. IACR Cryptol. ePrint Arch. 2017: 360 (2017) - [i23]Shunli Ma, Yi Deng, Debiao He, Jiang Zhang, Xiang Xie:
An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain. IACR Cryptol. ePrint Arch. 2017: 1239 (2017) - 2016
- [j68]Debiao He, Neeraj Kumar, Han Shen, Jong-Hyouk Lee:
One-to-many authentication for access control in mobile pay-TV systems. Sci. China Inf. Sci. 59(5): 052108:1-052108:14 (2016) - [j67]Debiao He, Huaqun Wang, Muhammad Khurram Khan, Lina Wang:
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography. IET Commun. 10(14): 1795-1802 (2016) - [j66]Hao Wang, Zhihua Zheng, Lei Wu, Debiao He:
New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems. J. High Speed Networks 22(2): 153-167 (2016) - [j65]Han Shen, Jianhua Chen, Jian Shen, Debiao He:
Cryptanalysis of a certificateless aggregate signature scheme with efficient verification. Secur. Commun. Networks 9(13): 2217-2221 (2016) - [j64]Lina Wang, Weijie Liu, Neeraj Kumar, Debiao He, Cheng Tan, Debin Gao:
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm. Secur. Commun. Networks 9(16): 3543-3557 (2016) - [j63]Shungan Zhou, Ruiying Du, Jing Chen, Debiao He, Hua Deng:
ESDR: an efficient and secure data repairing paradigm in cloud storage. Secur. Commun. Networks 9(16): 3646-3657 (2016) - [j62]Huaqun Wang, Debiao He, Shaohua Tang:
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud. IEEE Trans. Inf. Forensics Secur. 11(6): 1165-1176 (2016) - [j61]Debiao He, Sherali Zeadally, Neeraj Kumar, Wei Wu:
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. IEEE Trans. Inf. Forensics Secur. 11(9): 2052-2064 (2016) - [j60]Min Luo, Jingyin Zhang, Debiao He, Jian Shen:
Security analysis of a user registration approach. J. Supercomput. 72(3): 900-903 (2016) - [j59]Han Shen, Neeraj Kumar, Debiao He, Jian Shen, Naveen K. Chilamkurti:
A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem. J. Supercomput. 72(9): 3588-3600 (2016) - [j58]Qi Jiang, Muhammad Khurram Khan, Xiang Lu, Jianfeng Ma, Debiao He:
A privacy preserving three-factor authentication protocol for e-Health clouds. J. Supercomput. 72(10): 3826-3849 (2016) - [j57]Debiao He, Neeraj Kumar, Jong-Hyouk Lee:
Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wirel. Networks 22(2): 491-502 (2016) - [c8]Zhe Xia, Xiaoyun Yang, Min Xiao, Debiao He:
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry. ACISP (2) 2016: 73-86 - [c7]Jing Li, Xiong Li, Licheng Wang, Debiao He, Xinxin Niu:
Oblivious Transfer Protocols Based on Group Factoring Problem. BWCCA 2016: 885-892 - [c6]Ding Wang, Debiao He, Haibo Cheng, Ping Wang:
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars. DSN 2016: 595-606 - 2015
- [j56]Debiao He, Yuanyuan Zhang, Jianhua Chen:
Robust Biometric-Based User Authentication Scheme for Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 25(3-4): 309-321 (2015) - [j55]Debiao He, Mingwu Zhang, Baowen Xu:
Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model. Comput. J. 58(10): 2507-2508 (2015) - [j54]Debiao He, Sherali Zeadally:
Authentication protocol for an ambient assisted living system. IEEE Commun. Mag. 53(1): 71-77 (2015) - [j53]Debiao He, Muhammad Khurram Khan, Neeraj Kumar:
A new handover authentication protocol based on bilinear pairing functions for wireless networks. Int. J. Ad Hoc Ubiquitous Comput. 18(1/2): 67-74 (2015) - [j52]Wenxia Zhu, Jianhua Chen, Debiao He:
Enhanced authentication protocol for session initiation protocol using smart card. Int. J. Electron. Secur. Digit. Forensics 7(4): 330-342 (2015) - [j51]Debiao He, Sherali Zeadally:
An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography. IEEE Internet Things J. 2(1): 72-83 (2015) - [j50]Debiao He, Neeraj Kumar, Naveen K. Chilamkurti:
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Inf. Sci. 321: 263-277 (2015) - [j49]Han Shen, Chongzhi Gao, Debiao He, Libing Wu:
New biometrics-based authentication scheme for multi-server environment in critical systems. J. Ambient Intell. Humaniz. Comput. 6(6): 825-834 (2015) - [j48]Debiao He, Neeraj Kumar, Jianhua Chen, Cheng-Chi Lee, Naveen K. Chilamkurti, Seng-Soo Yeo:
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multim. Syst. 21(1): 49-60 (2015) - [j47]Ou Ruan, Neeraj Kumar, Debiao He, Jong-Hyouk Lee:
Efficient provably secure password-based explicit authenticated key agreement. Pervasive Mob. Comput. 24: 50-60 (2015) - [j46]Debiao He, Ding Wang:
Robust Biometrics-Based Authentication Scheme for Multiserver Environment. IEEE Syst. J. 9(3): 816-823 (2015) - [j45]Debiao He, Neeraj Kumar, Jong-Hyouk Lee:
Secure pseudonym-based near field communication protocol for the consumer internet of things. IEEE Trans. Consumer Electron. 61(1): 56-62 (2015) - [j44]Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu:
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment. IEEE Trans. Dependable Secur. Comput. 12(4): 428-442 (2015) - [j43]Debiao He, Sherali Zeadally, Baowen Xu, Xinyi Huang:
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 10(12): 2681-2691 (2015) - [j42]Baojun Huang, Muhammad Khurram Khan, Libing Wu, Fahad T. Bin Muhaya, Debiao He:
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography. Wirel. Pers. Commun. 85(1): 225-240 (2015) - [c5]Huaqun Wang, Debiao He:
Proxy Provable Data Possession with General Access Structure in Public Clouds. Inscrypt 2015: 283-300 - 2014
- [j41]Wenbo Shi, Debiao He, Shuhua Wu:
Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card. Int. J. Inf. Commun. Technol. 6(1): 39-48 (2014) - [j40]Debiao He, Muhammad Khurram Khan, Shuhua Wu:
On the Security of a RSA-based Certificateless Signature Scheme. Int. J. Netw. Secur. 16(1): 78-80 (2014) - [j39]Debiao He, Yuanyuan Zhang, Jianhua Chen:
Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol. Int. J. Netw. Secur. 16(5): 393-396 (2014) - [j38]Debiao He, Miaomiao Tian, Jianhua Chen:
Insecurity of an efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 268: 458-462 (2014) - [j37]Hang Tu, Han Shen, Debiao He, Jianhua Chen:
Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol. Inf. Technol. Control. 43(1): 57-63 (2014) - [j36]Namita Tiwari, Sahadeo Padhye, Debiao He:
Provably Secure Proxy Multi-Signature Scheme Based on ECC. Inf. Technol. Control. 43(2): 199-204 (2014) - [j35]Debiao He, Neeraj Kumar, Naveen K. Chilamkurti, Jong-Hyouk Lee:
Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol. J. Medical Syst. 38(10): 116 (2014) - [j34]Debiao He, Neeraj Kumar, Jong-Hyouk Lee, R. Simon Sherratt:
Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans. Consumer Electron. 60(1): 30-37 (2014) - [j33]Hang Tu, Neeraj Kumar, Debiao He, Jongsung Kim, Changhoon Lee:
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks. J. Supercomput. 70(1): 224-235 (2014) - [j32]Debiao He, Yuanyuan Zhang, Jianhua Chen:
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks. Wirel. Pers. Commun. 74(2): 229-243 (2014) - [i22]Ding Wang, Ping Wang, Debiao He:
Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment. IACR Cryptol. ePrint Arch. 2014: 135 (2014) - 2013
- [j31]Namita Tiwari, Sahadeo Padhye, Debiao He:
Efficient ID-based multiproxy multisignature without bilinear maps in ROM. Ann. des Télécommunications 68(3-4): 231-237 (2013) - [j30]Debiao He, Jianhua Chen:
An efficient certificateless designated verifier signature scheme. Int. Arab J. Inf. Technol. 10(4): 389-396 (2013) - [j29]Debiao He, Hao Hu:
Cryptanalysis of a Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environments. IEICE Trans. Inf. Syst. 96-D(1): 138-140 (2013) - [j28]Debiao He, Baojun Huang, Jianhua Chen:
New certificateless short signature scheme. IET Inf. Secur. 7(2) (2013) - [j27]Debiao He, Muhammad Khurram Khan:
Cryptanalysis of a key agreement protocol based on chaotic Hash. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 172-177 (2013) - [j26]Debiao He, Jianhua Chen, Wenbo Shi, Muhammad Khurram Khan:
On the security of an authentication scheme for multi-server architecture. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 288-296 (2013) - [j25]Debiao He, Weijing Zhao, Shuhua Wu:
Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards. Int. J. Netw. Secur. 15(5): 350-356 (2013) - [j24]Debiao He, Ding Wang, Shuhua Wu:
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards. Inf. Technol. Control. 42(2): 105-112 (2013) - [j23]Debiao He, Yitao Chen, Jianhua Chen:
An efficient certificateless proxy signature scheme without pairing. Math. Comput. Model. 57(9-10): 2510-2518 (2013) - [j22]Debiao He, Neeraj Kumar, Muhammad Khurram Khan, Jong-Hyouk Lee:
Anonymous two-factor authentication for consumer roaming service in global mobility networks. IEEE Trans. Consumer Electron. 59(4): 811-817 (2013) - [j21]Debiao He, Shuhua Wu:
Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment. Wirel. Pers. Commun. 70(1): 323-329 (2013) - [c4]Debiao He, Neeraj Kumar, Naveen K. Chilamkurti:
A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. ISWPC 2013: 1-6 - [c3]Muhammad Khurram Khan, Debiao He:
Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard". TrustCom/ISPA/IUCC 2013: 1708-1710 - 2012
- [j20]Debiao He:
An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings. Ad Hoc Networks 10(6): 1009-1016 (2012) - [j19]Debiao He, Sahadeo Padhye, Jianhua Chen:
An efficient certificateless two-party authenticated key agreement protocol. Comput. Math. Appl. 64(6): 1914-1926 (2012) - [j18]Debiao He, Hao Hu:
Cryptanalysis of a Smartcard-Based User Authentication Scheme for Multi-Server Environments. IEICE Trans. Commun. 95-B(9): 3052-3054 (2012) - [j17]Debiao He, Jianhua Chen, Jin Hu:
A pairing-free certificateless authenticated key agreement protocol. Int. J. Commun. Syst. 25(2): 221-230 (2012) - [j16]Debiao He, Jianhua Chen, Rui Zhang:
An efficient and provably-secure certificateless signature scheme without bilinear pairings. Int. J. Commun. Syst. 25(11): 1432-1442 (2012) - [j15]Debiao He, Yin Huang:
Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environment. Int. J. Electron. Secur. Digit. Forensics 4(1): 43-53 (2012) - [j14]Debiao He, Jianhua Chen:
Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing. Int. J. Electron. Secur. Digit. Forensics 4(4): 244-251 (2012) - [j13]Debiao He, Jianhua Chen, Jin Hu:
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security. Inf. Fusion 13(3): 223-230 (2012) - [j12]Shuhua Wu, Qiong Pu, Shengbao Wang, Debiao He:
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol. Inf. Sci. 215: 83-96 (2012) - [j11]Debiao He, Jianhua Chen, Rui Zhang:
A More Secure Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 36(3): 1989-1995 (2012) - [j10]Debiao He, Shuhua Wu, Jianhua Chen:
Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'. Math. Comput. Model. 55(3-4): 1661-1664 (2012) - [j9]Muhammad Khurram Khan, Debiao He:
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography. Secur. Commun. Networks 5(11): 1260-1266 (2012) - [j8]Debiao He, Jianhua Chen, Yitao Chen:
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography. Secur. Commun. Networks 5(12): 1423-1429 (2012) - [c2]Muhammad Khurram Khan, Debiao He:
Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol". ICDKE 2012: 243-249 - [i21]Debiao He:
Robust biometric-based user authentication scheme for wireless sensor networks. IACR Cryptol. ePrint Arch. 2012: 203 (2012) - [i20]Debiao He:
Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2012: 312 (2012) - [i19]Debiao He, Miaomiao Tian:
A note on 'An efficient certificateless aggregate signature with constant pairing computations'. IACR Cryptol. ePrint Arch. 2012: 445 (2012) - 2011
- [j7]Debiao He, Jianhua Chen, Jin Hu:
An ID-based proxy signature schemes without bilinear pairings. Ann. des Télécommunications 66(11-12): 657-662 (2011) - [j6]Debiao He, Jianhua Chen, Rui Zhang:
An efficient identity-based blind signature scheme without bilinear pairings. Comput. Electr. Eng. 37(4): 444-450 (2011) - [j5]Debiao He, Jianhua Chen, Jin Hu:
An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves. Int. J. Comput. Commun. Control 6(2): 258-265 (2011) - [j4]Debiao He, Jianhua Chen, Jin Hu:
Weaknesses of a Remote User Password Authentication Scheme Using Smart Card. Int. J. Netw. Secur. 13(1): 58-60 (2011) - [j3]Debiao He, Yitao Chen, Jianhua Chen, Rui Zhang, Weiwei Han:
A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Math. Comput. Model. 54(11-12): 3143-3152 (2011) - [i18]Debiao He, Yitao Chen:
An efficient certificateless authenticated key agreement protocol without bilinear pairings. CoRR abs/1106.3898 (2011) - [i17]Debiao He:
Weakness in a Mutual Authentication Scheme for Session Initiation Protocol using Elliptic Curve Cryptography. CoRR abs/1108.4076 (2011) - [i16]Debiao He, Jianhua Chen, Jin Hu:
Identity-based Digital Signature Scheme Without Bilinear Pairings. IACR Cryptol. ePrint Arch. 2011: 79 (2011) - [i15]Debiao He, Jin Hu:
An efficient certificateless two-party authenticated key agreement scheme from pairings. IACR Cryptol. ePrint Arch. 2011: 112 (2011) - [i14]Debiao He:
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. IACR Cryptol. ePrint Arch. 2011: 234 (2011) - [i13]Debiao He:
Cryptanalysis of a key agreement protocol based on chaotic Hash. IACR Cryptol. ePrint Arch. 2011: 333 (2011) - [i12]Debiao He:
Security flaws in a biometrics-based multi-server authentication with key agreement scheme. IACR Cryptol. ePrint Arch. 2011: 365 (2011) - [i11]Debiao He:
Comments on a password authentication and update scheme based on elliptic curve cryptography. IACR Cryptol. ePrint Arch. 2011: 411 (2011) - [i10]Debiao He, Sahadeo Padhye:
A Pairing-free Certificateless Authenticated Key Agreement Protocol in the eCK Model. IACR Cryptol. ePrint Arch. 2011: 478 (2011) - 2010
- [j2]Debiao He, Jianhua Chen, Rui Zhang:
Weaknesses of a dynamic ID-based remote user authentication scheme. Int. J. Electron. Secur. Digit. Forensics 3(4): 355-362 (2010) - [j1]Debiao He, Jianhua Chen, Jin Hu:
Cryptanalysis of a Simple Three-party Key Exchange Protocol. Informatica (Slovenia) 34(3): 337-339 (2010) - [i9]Debiao He, Jianhua Chen, Jin Hu:
Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol. CoRR abs/1001.2945 (2010) - [i8]Debiao He, Jianhua Chen, Jin Hu:
A Random Number Generator Based on Isogenies Operations. IACR Cryptol. ePrint Arch. 2010: 94 (2010) - [i7]Debiao He, Jianhua Chen, Jin Hu:
Cryptanalysis of a DoS-resistant ID-based password authentication. IACR Cryptol. ePrint Arch. 2010: 181 (2010) - [i6]Debiao He, Jianhua Chen, Jin Hu:
Weaknesses of a dynamic ID-based remote user authentication scheme. IACR Cryptol. ePrint Arch. 2010: 240 (2010) - [i5]Debiao He, Jianhua Chen, Jin Hu:
Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card. IACR Cryptol. ePrint Arch. 2010: 291 (2010) - [i4]Debiao He, Jianhua Chen, Jin Hu:
On security of a remote user authentication scheme without using smart cards. IACR Cryptol. ePrint Arch. 2010: 306 (2010) - [i3]Debiao He, Jianhua Chen, Jin Hu:
Weaknesses of a dynamic ID-based remote user authentication scheme. IACR Cryptol. ePrint Arch. 2010: 314 (2010) - [i2]Debiao He, Jianhua Chen, Jin Hu:
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices. IACR Cryptol. ePrint Arch. 2010: 606 (2010) - [i1]Debiao He, Jianhua Chen, Rui Zhang:
Efficient and provably-secure certificateless signature scheme without bilinear pairings. IACR Cryptol. ePrint Arch. 2010: 632 (2010)
2000 – 2009
- 2009
- [c1]Debiao He, Jianhua Chen, Zhjin Hu:
Fast Algorithm for Computing the Minimal Polynomials of Gaussian Periods. ISCID (1) 2009: 166-169
Coauthor Index
aka: Irina Bolodurina
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint