Blockchain in healthcare applications: Research challenges and opportunities T McGhin, KKR Choo, CZ Liu, D He Journal of Network and Computer Applications 135, 62-75, 2019 | 879 | 2019 |
A survey on privacy protection in blockchain system Q Feng, D He, S Zeadally, MK Khan, N Kumar Journal of Network and Computer Applications 126, 45-58, 2019 | 844 | 2019 |
An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks D He, S Zeadally, B Xu, X Huang IEEE Transactions on Information Forensics and Security 10 (12), 2681-2691, 2015 | 827 | 2015 |
Anonymous authentication for wireless body area networks with provable security D He, S Zeadally, N Kumar, JH Lee IEEE Systems Journal 11 (4), 2590-2601, 2017 | 472 | 2017 |
Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment D Wang, D He, P Wang, CH Chu IEEE Transactions on Dependable and Secure Computing 12 (4), 428-442, 2015 | 470 | 2015 |
Robust biometrics-based authentication scheme for multiserver environment D He, D Wang IEEE Systems Journal 9 (3), 816-823, 2015 | 465 | 2015 |
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 C Lin, D He, X Huang, KKR Choo, AV Vasilakos Journal of Network and Computer Applications 116, 42-52, 2018 | 432 | 2018 |
An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography D He, S Zeadally IEEE internet of things journal 2 (1), 72-83, 2014 | 412 | 2014 |
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey S Shi, D He, L Li, N Kumar, MK Khan, KKR Choo Computers & security 97, 101966, 2020 | 400 | 2020 |
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo Multimedia Systems 21, 49-60, 2015 | 356 | 2015 |
Security and Privacy for the Internet of Drones: Challenges and Solutions C Lin, D He, N Kumar, KKR Choo, A Vinel, X Huang IEEE Communications Magazine 56 (1), 64-69, 2018 | 329 | 2018 |
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks Q Jiang, S Zeadally, J Ma, D He IEEE Access 5, 3376-3392, 2017 | 310 | 2017 |
A more secure authentication scheme for telecare medicine information systems H Debiao, C Jianhua, Z Rui Journal of medical systems 36, 1989-1995, 2012 | 307 | 2012 |
Block design-based key agreement for group data sharing in cloud computing J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang IEEE Transactions on Dependable and Secure Computing 16 (6), 996-1010, 2017 | 304 | 2017 |
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks D He, N Kumar, N Chilamkurti Information Sciences 321, 263-277, 2015 | 288 | 2015 |
Certificateless public auditing scheme for cloud-assisted wireless body area networks D He, S Zeadally, L Wu IEEE Systems Journal 12 (1), 64-73, 2018 | 283 | 2018 |
Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure J Wang, L Wu, KKR Choo, D He IEEE Transactions on Industrial Informatics 16 (3), 1984-1992, 2019 | 257 | 2019 |
Blockchain-based identity management systems: A review Y Liu, D He, MS Obaidat, N Kumar, MK Khan, KKR Choo Journal of network and computer applications 166, 102731, 2020 | 250 | 2020 |
Certificateless searchable public key encryption scheme for industrial internet of things M Ma, D He, N Kumar, KKR Choo, J Chen IEEE Transactions on Industrial Informatics 14 (2), 759-767, 2017 | 247 | 2017 |
Authentication protocol for an ambient assisted living system D He, S Zeadally IEEE Communications Magazine 53 (1), 71-77, 2015 | 243 | 2015 |