Debiao He

According to our database1, Debiao He authored at least 173 papers between 2009 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Secure Key Agreement and Key Protection for Mobile Device User Authentication.
IEEE Trans. Information Forensics and Security, 2019

Improved secure fuzzy auditing protocol for cloud data storage.
Soft Comput., 2019

Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices.
IEEE Systems Journal, 2019

Anonymous and Efficient Message Authentication Scheme for Smart Grid.
Security and Communication Networks, 2019

Blockchain in healthcare applications: Research challenges and opportunities.
J. Network and Computer Applications, 2019

A survey on privacy protection in blockchain system.
J. Network and Computer Applications, 2019

Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019

BBARS: Blockchain-Based Anonymous Rewarding Scheme for V2G Networks.
IEEE Internet of Things Journal, 2019

Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks.
Int. J. Found. Comput. Sci., 2019

Parking Management: A Blockchain-Based Privacy-Preserving System.
IEEE Consumer Electronics Magazine, 2019

Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things.
Annales des Télécommunications, 2019

Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT.
Wireless Communications and Mobile Computing, 2018

Efficient Identity-Based Encryption Scheme with Equality Test in Smart City.
T-SUSC, 2018

Privacy-preserving auditing scheme for shared data in public clouds.
The Journal of Supercomputing, 2018

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
IEEE Trans. Industrial Informatics, 2018

Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things.
IEEE Trans. Industrial Informatics, 2018

Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems.
IEEE Trans. Industrial Informatics, 2018

A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommunication Systems, 2018

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Sec. Comput., 2018

An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage.
Soft Comput., 2018

Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps.
Soft Comput., 2018

Attribute-based fuzzy identity access control in multicloud computing environments.
Soft Comput., 2018

Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
Soft Comput., 2018

On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices.
IEEE Systems Journal, 2018

Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks.
IEEE Systems Journal, 2018

Efficient Privacy-Aware Authentication Scheme for Mobile Cloud Computing Services.
IEEE Systems Journal, 2018

A General Architecture for Multiserver Authentication Key Agreement with Provable Security.
Security and Communication Networks, 2018

New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment.
Security and Communication Networks, 2018

An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System.
Security and Communication Networks, 2018

Signature-based three-factor authenticated key exchange for internet of things applications.
Multimedia Tools Appl., 2018

Efficient and secure searchable encryption protocol for cloud-based Internet of Things.
J. Parallel Distrib. Comput., 2018

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0.
J. Network and Computer Applications, 2018

Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
IEEE Internet of Things Journal, 2018

An efficient and secure 3-factor user-authentication protocol for multiserver environment.
Int. J. Communication Systems, 2018

Efficient revocable ID-based encryption with cloud revocation server.
Int. J. Communication Systems, 2018

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptology ePrint Archive, 2018

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.
Future Generation Comp. Syst., 2018

Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment.
Future Generation Comp. Syst., 2018

Taxonomy and analysis of security protocols for Internet of Things.
Future Generation Comp. Syst., 2018

A general compiler for password-authenticated group key exchange protocol in the standard model.
Discrete Applied Mathematics, 2018

Security and Privacy for the Internet of Drones: Challenges and Solutions.
IEEE Communications Magazine, 2018

Certificateless searchable public key encryption scheme for mobile healthcare system.
Computers & Electrical Engineering, 2018

An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment.
Ad Hoc Networks, 2018

Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks.
IEEE Access, 2018

A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.
IEEE Access, 2018

IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies.
IEEE Access, 2018

2017
Advances and Challenges in Convergent Communication Networks.
Wireless Personal Communications, 2017

Insecurity of a Pairing-Free Certificateless Ring Signcryption Scheme.
Wireless Personal Communications, 2017

Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography.
Wireless Communications and Mobile Computing, 2017

Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries.
IEEE Trans. Smart Grid, 2017

A secure and efficient public auditing scheme using RSA algorithm for cloud storage.
The Journal of Supercomputing, 2017

Security analysis of a publicly verifiable data possession scheme for remote storage.
The Journal of Supercomputing, 2017

Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Information Forensics and Security, 2017

Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing.
Soft Comput., 2017

Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017

Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017

Anonymous Authentication for Wireless Body Area Networks With Provable Security.
IEEE Systems Journal, 2017

Secure public data auditing scheme for cloud storage in smart city.
Personal and Ubiquitous Computing, 2017

Cryptanalysis of an identity-based public auditing protocol for cloud storage.
Frontiers of IT & EE, 2017

An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City.
J. Inf. Sci. Eng., 2017

An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network.
J. Inf. Sec. Appl., 2017

Special issue on Secure Computation on Encrypted Data.
J. Inf. Sec. Appl., 2017

Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017

A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. Journal of Network Management, 2017

A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography.
Int. J. Communication Systems, 2017

An efficient chaos-based 2-party key agreement protocol with provable security.
Int. J. Communication Systems, 2017

Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid.
IET Information Security, 2017

A secure data backup scheme using multi-factor authentication.
IET Information Security, 2017

Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error.
IACR Cryptology ePrint Archive, 2017

An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain.
IACR Cryptology ePrint Archive, 2017

Efficient and secure identity-based encryption scheme with equality test in cloud computing.
Future Generation Comp. Syst., 2017

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography.
Computer Networks, 2017

Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
SCIENCE CHINA Information Sciences, 2017

Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies.
Computers & Electrical Engineering, 2017

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Applied Mathematics and Computation, 2017

Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols.
IEEE Access, 2017

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks.
IEEE Access, 2017

Efficient Revocable ID-Based Signature With Cloud Revocation Server.
IEEE Access, 2017

Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Privacy-preserving data aggregation scheme against internal attackers in smart grids.
Wireless Networks, 2016

A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem.
The Journal of Supercomputing, 2016

Security analysis of a user registration approach.
The Journal of Supercomputing, 2016

A privacy preserving three-factor authentication protocol for e-Health clouds.
The Journal of Supercomputing, 2016

Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.
IEEE Trans. Information Forensics and Security, 2016

Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.
IEEE Trans. Information Forensics and Security, 2016

ESDR: an efficient and secure data repairing paradigm in cloud storage.
Security and Communication Networks, 2016

A novel covert channel detection method in cloud based on XSRM and improved event association algorithm.
Security and Communication Networks, 2016

Cryptanalysis of a certificateless aggregate signature scheme with efficient verification.
Security and Communication Networks, 2016

New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems.
J. High Speed Networks, 2016

Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Communications, 2016

One-to-many authentication for access control in mobile pay-TV systems.
SCIENCE CHINA Information Sciences, 2016

fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Oblivious Transfer Protocols Based on Group Factoring Problem.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography.
Wireless Personal Communications, 2015

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Information Forensics and Security, 2015

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment.
IEEE Trans. Dependable Sec. Comput., 2015

Secure pseudonym-based near field communication protocol for the consumer internet of things.
IEEE Trans. Consumer Electronics, 2015

Robust Biometrics-Based Authentication Scheme for Multiserver Environment.
IEEE Systems Journal, 2015

Efficient provably secure password-based explicit authenticated key agreement.
Pervasive and Mobile Computing, 2015

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks.
Multimedia Syst., 2015

New biometrics-based authentication scheme for multi-server environment in critical systems.
J. Ambient Intelligence and Humanized Computing, 2015

A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks.
Inf. Sci., 2015

An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography.
IEEE Internet of Things Journal, 2015

Enhanced authentication protocol for session initiation protocol using smart card.
IJESDF, 2015

A new handover authentication protocol based on bilinear pairing functions for wireless networks.
IJAHUC, 2015

Authentication protocol for an ambient assisted living system.
IEEE Communications Magazine, 2015

Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model.
Comput. J., 2015

Robust Biometric-Based User Authentication Scheme for Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2015

Proxy Provable Data Possession with General Access Structure in Public Clouds.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks.
Wireless Personal Communications, 2014

An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks.
The Journal of Supercomputing, 2014

Enhanced three-factor security protocol for consumer USB mass storage devices.
IEEE Trans. Consumer Electronics, 2014

Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol.
J. Medical Systems, 2014

Provably Secure Proxy Multi-Signature Scheme Based on ECC.
ITC, 2014

Insecurity of an efficient certificateless aggregate signature with constant pairing computations.
Inf. Sci., 2014

Cryptanalysis of a Three-party Password-based Authenticated Key Exchange Protocol.
I. J. Network Security, 2014

On the Security of a RSA-based Certificateless Signature Scheme.
I. J. Network Security, 2014

Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card.
IJICT, 2014

Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment.
IACR Cryptology ePrint Archive, 2014

2013
Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment.
Wireless Personal Communications, 2013

Anonymous two-factor authentication for consumer roaming service in global mobility networks.
IEEE Trans. Consumer Electronics, 2013

An efficient certificateless proxy signature scheme without pairing.
Mathematical and Computer Modelling, 2013

Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards.
ITC, 2013

Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards.
I. J. Network Security, 2013

Cryptanalysis of a key agreement protocol based on chaotic Hash.
IJESDF, 2013

On the security of an authentication scheme for multi-server architecture.
IJESDF, 2013

New certificateless short signature scheme.
IET Information Security, 2013

Cryptanalysis of a Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environments.
IEICE Transactions, 2013

An efficient certificateless designated verifier signature scheme.
Int. Arab J. Inf. Technol., 2013

Efficient ID-based multiproxy multisignature without bilinear maps in ROM.
Annales des Télécommunications, 2013

Cryptanalysis of "An Improved Remote Password Authentication Scheme with Smartcard".
Proceedings of the 12th IEEE International Conference on Trust, 2013

A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks.
Proceedings of the International Symposium on Wireless and pervasive Computing, 2013

2012
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography.
Security and Communication Networks, 2012

A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography.
Security and Communication Networks, 2012

Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'.
Mathematical and Computer Modelling, 2012

A More Secure Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Systems, 2012

Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci., 2012

An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security.
Information Fusion, 2012

Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environment.
IJESDF, 2012

Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing.
IJESDF, 2012

An efficient and provably-secure certificateless signature scheme without bilinear pairings.
Int. J. Communication Systems, 2012

A pairing-free certificateless authenticated key agreement protocol.
Int. J. Communication Systems, 2012

Cryptanalysis of a Smartcard-Based User Authentication Scheme for Multi-Server Environments.
IEICE Transactions, 2012

A note on 'An efficient certificateless aggregate signature with constant pairing computations'.
IACR Cryptology ePrint Archive, 2012

Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol.
IACR Cryptology ePrint Archive, 2012

Robust biometric-based user authentication scheme for wireless sensor networks.
IACR Cryptology ePrint Archive, 2012

An efficient certificateless two-party authenticated key agreement protocol.
Computers & Mathematics with Applications, 2012

An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings.
Ad Hoc Networks, 2012

Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol".
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

2011
A new two-round certificateless authenticated key agreement protocol without bilinear pairings.
Mathematical and Computer Modelling, 2011

Weaknesses of a Remote User Password Authentication Scheme Using Smart Card.
I. J. Network Security, 2011

A Pairing-free Certificateless Authenticated Key Agreement Protocol in the eCK Model.
IACR Cryptology ePrint Archive, 2011

An efficient certificateless two-party authenticated key agreement scheme from pairings.
IACR Cryptology ePrint Archive, 2011

Identity-based Digital Signature Scheme Without Bilinear Pairings.
IACR Cryptology ePrint Archive, 2011

Comments on a password authentication and update scheme based on elliptic curve cryptography.
IACR Cryptology ePrint Archive, 2011

Security flaws in a biometrics-based multi-server authentication with key agreement scheme.
IACR Cryptology ePrint Archive, 2011

Cryptanalysis of a key agreement protocol based on chaotic Hash.
IACR Cryptology ePrint Archive, 2011

Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards.
IACR Cryptology ePrint Archive, 2011

An efficient identity-based blind signature scheme without bilinear pairings.
Computers & Electrical Engineering, 2011

An ID-based proxy signature schemes without bilinear pairings.
Annales des Télécommunications, 2011

2010
Cryptanalysis of a Simple Three-party Key Exchange Protocol.
Informatica (Slovenia), 2010

Weaknesses of a dynamic ID-based remote user authentication scheme.
IJESDF, 2010

Efficient and provably-secure certificateless signature scheme without bilinear pairings.
IACR Cryptology ePrint Archive, 2010

Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices.
IACR Cryptology ePrint Archive, 2010

Weaknesses of a dynamic ID-based remote user authentication scheme.
IACR Cryptology ePrint Archive, 2010

On security of a remote user authentication scheme without using smart cards.
IACR Cryptology ePrint Archive, 2010

Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card.
IACR Cryptology ePrint Archive, 2010

Weaknesses of a dynamic ID-based remote user authentication scheme.
IACR Cryptology ePrint Archive, 2010

Cryptanalysis of a DoS-resistant ID-based password authentication.
IACR Cryptology ePrint Archive, 2010

A Random Number Generator Based on Isogenies Operations.
IACR Cryptology ePrint Archive, 2010

2009
Fast Algorithm for Computing the Minimal Polynomials of Gaussian Periods.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009


  Loading...