部分论文列表
[1]. Mimi Ma, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Jianhua Chen, Certificateless searchable public key encryption scheme for industrial internet of things, IEEE Transactions on Industrial Informatics, DOI: 10.1109/TII.2017.2703922, 2017.
[2]. Huaqun Wang, Debiao He, Jinguang Han, VOD-ADAC: Anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud, IEEE Transactions on Services Computing, DOI: 10.1109/TSC.2017.2687459, 2017.
[3]. Debiao He, Neeraj Kumar, Sherali Zeadally, Alexey Vinel, and Laurence T Yang, Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries, IEEE Transactions on Smart Grid, DOI:, 2016.
[4]. Debiao He, Neeraj Kumar, Muhammad Khurram Khan, Lina Wang, Jian, Shen, Efficient privacy-aware authentication scheme for mobile cloud computing services, IEEE Systems Journal, DOI: 10.1109/JSYST.2016.2633809, 2016.
[5]. Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo, Alexey Vinel, A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network, IEEE Transactions on Dependable and Secure Computing, DOI: 10.1109/TDSC.2016.2596286, 2016.
[6]. Debiao He, Sherali Zeadally, Neeraj Kumar, Jong-Hyouk Lee, Anonymous authentication for wireless body area networks with provable security, IEEE Systems Journal, DOI: 10.1109/JSYST.2016.2544805, 2016.
[7]. Debiao He, Sherali Zeadally, Libing Wu. Certificateless public auditing scheme for cloud-assisted wireless body area networks, IEEE Systems Journal, DOI: 10.1109/JSYST.2015.2428620, 2015.
[8]. Huaqun Wang, Debiao He, Jia Yu, Zhiwei Wang, Incentive and unconditionally anonymous identity-based public provable data possession, IEEE Transactions on Services Computing, DOI: 10.1109/TSC.2016.2633260, 2016.
[9]. Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Wei Wu, Efficient Hierarchical Identity-Based Signature with Batch Verification for Automatic Dependent Surveillance-Broadcast System, IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 454-464, 2017.
[10]. Debiao He, Sherali Zeadally, Neeraj Kumar, Wei Wu, Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures, IEEE Transactions on Information Forensics & Security, vol. 11, no. 9, pp. 2052-2064, 2016.
[11]. Huaqun Wang, Debiao He, Shaohua Tang, Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud, IEEE Transactions on Information Forensics & Security, vol. 11, no. 6, pp. 1165- 1176, 2016.
[12]. Debiao He, Sherali Zeadally, Baowen Xu, Xinyi Huang, An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks, IEEE Transactions on Information Forensics & Security, vol. 10, no. 12, pp. 1681-2691, 2015.
[13]. Debiao He, Sherali Zeadally. An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography, IEEE Internet of Things Journal , vol. 2, no. 1, pp. 72-83, 2015.
[14]. Debiao He, Ding Wang. Robust biometrics-based authentication scheme for multi-server environment, IEEE Systems Journal , vol. 9, no. 3, pp. 816-823, 2015.
[15]. Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu. Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment, IEEE Transactions on Dependable and Secure Computing, vol. 12, no. 4, pp. 428-442, 2015.
全部论文列表:
DBLP: http://dblp.uni-trier.de/pers/hd/h/He:Debiao
Google Scholar: https://scholar.google.ca/citations?user=-ykV7IQAAAAJ&hl=en