栏目分类
|
2014
1. Debiao He*, Miaomiao Tian, Jianhua Chen. Insecurity of an efficient certificateless aggregate signature with constant pairing computations, Information Sciences (SCI, CCF-B), vol. 268, pp. 458–462, 2014.
2. Debiao He*, Neeraj Kumar, Jong-Hyouk Lee. Enhanced three-factor security protocol for USB consumer storage devices, IEEE Transactions on Consumer Electronics (SCI), vol. 60, no. 1, pp. 30-37, 2014.
3. Debiao He*, Yuanyuan Zhang, Jianhua Chen. Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks, Wireless Personal Communications (SCI), vol. 74, no. 2, pp. 229-243, 2014.
4. Debiao He, Neeraj Kumar, Naveen Chilamkurti, Jong-Hyouk Lee. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol, Journal of Medical Systems (SCI), vol. 38, no. 10, 1-6, 2014.
5. Debiao He*, Muhammad Khurram Khan, Shuhua Wu. On the security of a RSA-based certificateless signature scheme, International Journal of Network Security (EI), vol. 16, no. 1, 50-52, 2014.
6. Debiao He*, Yuanyuan Zhang, Jianhua Chen. Cryptanalysis of a three-party password-based authenticated key exchange protocol, International Journal of Network Security (EI), vol. 16, no. 4, pp. 281-284, 2014.
|
Tel:186-7403-6424 Fax: Email:cpeng@whu.edu.cn (彭聪)