栏目分类
|
2015
1. Debiao He, Sherali Zeadally, Baowen Xu, Xinyi Huang*, An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks, IEEE Transactions on Information Forensics & Security (SCI, CCF-A), vol. 10, no. 12, pp. 1681-2691, 2015.
2. Debiao He, Neeraj Kumar*, Naveen Chilamkurti. A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks, Information Sciences (SCI, CCF-B), vol. 321, pp. 263-277, 2015.
3. Debiao He, Sherali Zeadally*. Authentication protocol for ambient assisted living system, IEEE Communications Magazine (SCI), vol. 35, no. 1, pp. 71-77, 2015.
4. Debiao He*, Sherali Zeadally. An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography, IEEE Internet of Things Journal (SCI), vol. 2, no. 1, pp. 72-83, 2015.
5. Debiao He*, Neeraj Kumar, Jong-Hyouk Lee. Secure pseudonym-based near field communication protocol for the consumer internet of things, IEEE Transactions on Consumer Electronics (SCI), vol. 61, no. 1, 56-63, 2015.
6. Debiao He*, Ding Wang. Robust biometrics-based authentication scheme for multi-server environment, IEEE Systems Journal (SCI), vol. 9, no. 3, pp. 816-823, 2015.
7. Debiao He, Neeraj Kumar*, Jianhua Chen, et al. Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks, Multimedia Systems (SCI), vol. 21, no. 1, pp. 49-60, 2015.
8. Debiao He, Muhammad Khurram Khan, Neeraj Kumar*. A new handover authentication protocol based on bilinear pairing functions for wireless networks, International Journal of Ad Hoc and Ubiquitous Computing (SCI), vol. 18, no. 1-2, pp. 67-74, 2015.
9. Debiao He*, Yuanyuan Zhang, Jianhua Chen. Robust biometric-based user authentication scheme for wireless sensor networks, Ad Hoc & Sensor Wireless Networks (SCI), vol. 25, no. 3-4, pp. 309-321, 2015.
10. Debiao He*, Mingwu Zhang, Baowen Xu. Insecurity of an efficient identity-based proxy signature in the standard model, Computer Journal (SCI, CCF-B), vol. 58, no. 10, pp. 2507-2508, 2015.
11. Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu. Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment, IEEE Transactions on Dependable and Secure Computing (SCI, CCF-A), vol. 12, no. 4, pp. 428-442, 2015.
|
Tel:186-7403-6424 Fax: Email:cpeng@whu.edu.cn (彭聪)