关注
Debiao He (何德彪)
Debiao He (何德彪)
在 whu.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
D He, S Zeadally, B Xu, X Huang
IEEE Transactions on Information Forensics and Security 10 (12), 2681-2691, 2015
6752015
A survey on privacy protection in blockchain system
Q Feng, D He, S Zeadally, MK Khan, N Kumar
Journal of Network and Computer Applications 126, 45-58, 2019
5942019
Blockchain in healthcare applications: Research challenges and opportunities
T McGhin, KKR Choo, CZ Liu, D He
Journal of Network and Computer Applications 135, 62-75, 2019
5802019
Anonymous authentication for wireless body area networks with provable security
D He, S Zeadally, N Kumar, JH Lee
IEEE Systems Journal 11 (4), 2590-2601, 2017
4302017
Robust biometrics-based authentication scheme for multiserver environment
D He, D Wang
IEEE Systems Journal 9 (3), 816-823, 2015
4232015
Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
D Wang, D He, P Wang, CH Chu
IEEE Transactions on Dependable and Secure Computing 12 (4), 428-442, 2015
3992015
An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography
D He, S Zeadally
IEEE internet of things journal 2 (1), 72-83, 2014
3612014
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0
C Lin, D He, X Huang, KKR Choo, AV Vasilakos
Journal of Network and Computer Applications 116, 42-52, 2018
3382018
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo
Multimedia Systems 21, 49-60, 2015
3192015
A more secure authentication scheme for telecare medicine information systems
H Debiao, C Jianhua, Z Rui
Journal of medical systems 36, 1989-1995, 2012
2862012
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
Q Jiang, S Zeadally, J Ma, D He
IEEE Access 5, 3376-3392, 2017
2782017
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D He, N Kumar, N Chilamkurti
Information Sciences 321, 263-277, 2015
2652015
Security and Privacy for the Internet of Drones: Challenges and Solutions
C Lin, D He, N Kumar, KKR Choo, A Vinel, X Huang
IEEE Communications Magazine 56 (1), 64-69, 2018
2542018
Certificateless public auditing scheme for cloud-assisted wireless body area networks
D He, S Zeadally, L Wu
IEEE Systems Journal 12 (1), 64-73, 2018
2502018
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey
S Shi, D He, L Li, N Kumar, MK Khan, KKR Choo
Computers & security 97, 101966, 2020
2442020
Block design-based key agreement for group data sharing in cloud computing
J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang
IEEE Transactions on Dependable and Secure Computing 16 (6), 996-1010, 2017
2412017
Authentication protocol for an ambient assisted living system
D He, S Zeadally
IEEE Communications Magazine 53 (1), 71-77, 2015
2302015
An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security
H Debiao, C Jianhua, H Jin
Information Fusion 13 (3), 223-230, 2012
2292012
Certificateless searchable public key encryption scheme for industrial internet of things
M Ma, D He, N Kumar, KKR Choo, J Chen
IEEE Transactions on Industrial Informatics 14 (2), 759-767, 2017
2182017
A privacy preserving three-factor authentication protocol for e-Health clouds
Q Jiang, MK Khan, X Lu, J Ma, D He
The Journal of Supercomputing 72, 3826-3849, 2016
2052016
系统目前无法执行此操作,请稍后再试。
文章 1–20