首页
科研方向
实验室成员
实验室文化
学术活动
学术成果
区块链论文收集
新闻动态
栏目分类
当前位置: 主页 > 学术成果 > 学术论文 >
2017
1. Debiao He, Sherali Zeadally, Neeraj Kumar, Jong-Hyouk Lee*, Anonymous authentication for wireless body area networks with provable security, IEEE Systems Journal (SCI), vol. 11, no. 4, pp. 2590 – 2601, 2017.
2. Debiao He, Huaqun Wang, Jian Shen, Lina Wang, Xianzhao Yang*, Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices, Soft Computing (SCI, CCF-C), vol. 21, no. 22, pp. 6801-6810, 2017.
3. Debiao He, Max Kilger, Jing Wang, Kim-Kwang Raymond Choo, Sam Chadwick, The entanglement of blockchain, identity, risk management and big data, Thomson Reuters: The Answer Company (约稿), pp. 1-11, 2017.
4. Debiao He, Neeraj Kumar, Sherali Zeadally, Alexey Vinel, and Laurence T Yang, Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries, IEEE Transactions on Smart Grid (SCI), vol. 8, no. 5, pp. 2411-2419, 2017.
5. Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo*, Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, Applied Mathematics and Computation, vol. 314, no. 1, pp. 31–43, 2017.
6. Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo,  Wei Wu*, Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system, IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 454-464, 2017.
7. Debiao He, Huaqun Wang*, Jianhong Zhang, Lina Wang, Insecurity of an identity-based public auditing for the outsourced data in cloud storage, Information Sciences (SCI, CCF-B), 375, 48–53, 2017.
8. Debiao He*, Ding Wang, Qi Xie, Kefei Chen, Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation, Science China-Information Sciences (SCI, CCF-B), vol. 60, no. 5, pp. 1-17, 2017.
9. Debiao He*, Sherali Zeadally, Libing Wu, Huaqun Wang, Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography, Computer Networks (SCI, CCF-B), vol. 128, no. 9, pp. 154-163, 2017.
10. Debiao He, Sherali Zeadally, Hunqun Wang and Qin Liu*, Lightweight data aggregation scheme against internal attackers in smart grid using elliptic curve cryptography, Wireless Communications and Mobile Computing, vol. 2017, Article ID 3194845, pp. 1-11, 2017.
11. Wang Wang, Debiao He*, Jian Shen, Zhihua Zheng, Chuan Zhao, Minghao Zhao, Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing, Soft Computing (SCI), vol. 21, no. 24, pp. 7325–7335, 2017.
12. Libing Wu, Jing Wu, Neeraj Kumar, Debiao He*, Secure public data auditing scheme for cloud storage in smart city, Personal and Ubiquitous Computing(SCI), vol. 21, no.  5, pp. 949–962, 2017.
13. Min Luo, Yunru Zhang, Muhammad Khurram Khan, Debiao He*, A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography, International Journal of Communication Systems (SCI), vol. 30, no. 16. ArticleID: e3333, 2017.
14. Min Luo, Yunru Zhang, Muhammad Khurram Khan,  Debiao He*, An efficient chaos-based 2-party key agreement protocol with provable security, International Journal of Communication Systems (SCI), vol. 30, no. 14, ArticleID: e3288, 2017.
15. Wu Libing, Yubo Zhang, Yongjun Ren, Debiao He*, Efficient certificate-based signature scheme for electronic commerce security using bilinear pairing." Journal of Internet Technology(SCI), vol. 18, no. 5, pp. 1159-1166, 2017.
16. Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li, Efficient revocable ID-based signature with cloud revocation server, IEEE Access(SCI), vol. 5, pp. 2945-2954, 2017.
17. Libing Wu, Yubo Zhang, Kim-Kwang Raymond Choo, Debiao He*, Efficient and secure identity-based encryption scheme with equality test in cloud computing, Future Generation Computer Systems (SCI), vol. 73, pp. 22-31, 2017.
18. Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He, Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access (SCI), vol. 5, pp. 3376-3392, 2017.
19. Jie Xu*, Qiaoyan Wen, Wenmin Li, Jian Shen, Debiao He, Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing, Soft Computing (SCI),  vol. 21, no. 18 , pp. 5265-5279, 2017.
20. Min Luo, Xiaotong Zhou, Li Li*, Debiao He, Security analysis of two password-authenticated multi-key exchange protocols, IEEE Access (SCI), vol. 5, pp. 8017 - 8024, 2017.
21. Zhiyan Xu, Libing Wu*, Debiao He, Muhammad Khurram Khan, Security analysis of a publicly verifiable data possession scheme for remote storage, The Journal of Supercomputing(SCI), vol. 73, no. 11, pp. 4923–4930, 2017.
 
地址:湖北省武汉市武昌区珞珈山,武汉大学国家网络安全学院

Tel:186-7403-6424   Fax:   Email:cpeng@whu.edu.cn (彭聪)