栏目分类
|
2016
1. Debiao He, Sherali Zeadally, Neeraj Kumar, Wei Wu*, Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures, IEEE Transactions on Information Forensics & Security (SCI, CCF-A), vol. 11, no. 9, pp. 2052-2064, 2016.
2. Debiao He, Neeraj Kumar, Han Shen, Jong-Hyouk Lee*, One-to-many authentication for access control in mobile pay-TV systems, Science China-Information Sciences (SCI, CCF-B), vol. 59, no. 5, pp. 1–14, DOI: 10.1007/s11432-015-5469-5, 2016.
3. Debiao He, Neeraj Kumar, Jong-Hyouk Lee*. Privacy-preserving data aggregation scheme against internal attackers in smart grids, Wireless Networks (SCI, CCF-C), vol. 22, no. 2, pp. 491-502, 2016.
4. Debiao He*, Huaqun Wang, Muhammad Khurram Khan, Lina Wang, Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography, IET Communications (SCI, CCF-C), vol. 10, no. 14, pp. 1795–1802, 2016.
5. Ding Wang*, Debiao He, Haibo Cheng, Ping Wang, fuzzyPSM: A new password strength meter using fuzzy probabilistic context-free grammars, The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016) (CCF-B, 20.4%), pp. 595-606, 2016.
6. Huaqun Wang*, Debiao He, Shaohua Tang, Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud, IEEE Transactions on Information Forensics & Security (SCI, CCF-A), vol. 11, no. 6, pp. 1165- 1176, 2016.
7. Zhe Xia, Xiaoyun Yang, Min Xiao, Debiao He*, Provably secure threshold paillier encryption based on hyperplane geometry, The 21st Australasian Conference on Information Security and Privacy (ACISP2016), (CCF-C), pp. 1-10, 2016.
8. Qi Jiang, Muhammad Khurram Khan, Xiang Lu, Jianfeng Ma, Debiao He, A privacy preserving three-factor authentication protocol for e-Health clouds. The Journal of Supercomputing (SCI), 2016, 72(10): 3826-3849.
|
Tel:186-7403-6424 Fax: Email:cpeng@whu.edu.cn (彭聪)