栏目分类
|
在线发表
1. Xiaoying Jia, Debiao He*, Li Li and Kim-Kwang Raymond Choo, Signature-based three-factor authenticated key exchange for internet of things applications, Multimedia Tools and Applications (SCI), DOI: 10.1007/s11042-017-5560-6, 2017.
2. Jiaxi Hu, Debiao He*, Qinglan Zhao, Kim-Kwang Raymond Choo, Privacy-preserving parking management system based on blockchain technology, IEEE Consumer Electronics Magazine (SCI), DOI: , 2017.
3. Huaqun Wang, Debiao He*, Jinguang Han, VOD-ADAC: Anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud, IEEE Transactions on Services Computing (SCI), DOI: 10.1109/TSC.2017.2687459, 2017.
4. Jian Shen, Dengzhi Liu, Debiao He, Xinyi Huang, Yang, Xiang, Algebraic signatures-based data integrity auditing for efficient data dynamics in cloud computing, IEEE Transactions on Sustainable Computing, DOI: 10.1109/TSUSC.2017.2781232, 2017.
5. Debiao He, Mimi Ma*, Sherali Zeadally, Neeraj Kumar, Kaitai Liang, Certificateless public key authenticated encryption with keyword search for industrial internet of things data management systems, IEEE Transaction on Industrial Informations, (SCI), DOI: 10.1109/TII.2017.2771382, 2017.
6. Debiao He*, Neeraj Kumar, Sherali Zeadally, Huaqun Wang, Certificateless provable data possession scheme for cloud-based smart grid data management systems, IEEE Transactions on Industrial Informatics (SCI), DOI: 10.1109/TII.2017.2761806, 2017.
7. Libing Wu, Yubo Zhang, Kim-Kwang Raymond Choo, Debiao He*, Efficient identity-based encryption scheme with equality test for smart city, IEEE Transactions on Sustainable Computing, DOI: 10.1109/TSUSC.2017.2734110, 2017.
8. Jian Shen, Tianqi Zhou, Debiao He, Yuexin Zhang, Xingming Sun, Yang Xiang*, Block design-based key agreement for group data sharing in cloud computing, IEEE Transactions on Dependable and Secure Computing (SCI), DOI: 10.1109/TDSC.2017.2725953, 2017.
9. Qi Feng, Debiao He*, Sherali Zeadally, Huaqun Wang, Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment, Future Generation Computer Systems (SCI), DOI: 10.1016/j.future.2017.06.028, 2017.
10. Huaqun Wang*, Debiao He, Yimu Ji, Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography, Future Generation Computer Systems(SCI), DOI: 10.1016/j.future.2017.06.028, 2017.
11. Mimi Ma, Debiao He*, Muhammad Khurram Khan, Jianhua Chen, Certificateless searchable public key encryption scheme for mobile healthcare system, Computers and Electrical Engineering(SCI), DOI: 10.1016/j.compeleceng.2017.04.015, 2017.
12. Debiao He*, Neeraj Kumar, Muhammad Khurram Khan, Lina Wang, Jian, Shen, Efficient privacy-aware authentication scheme for mobile cloud computing services, IEEE Systems Journal (SCI), DOI: 10.1109/JSYST.2016.2633809, 2016.
13. Debiao He*, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo, Alexey Vinel, A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network, IEEE Transactions on Dependable and Secure Computing (SCI, CCF-A), DOI: 10.1109/TDSC.2016.2596286, 2016.
14. Debiao He*, Sherali Zeadally, Libing Wu. Certificateless public auditing scheme for cloud-assisted wireless body area networks, IEEE Systems Journal (SCI), DOI: 10.1109/JSYST.2015.2428620, 2015.
15. Huaqun Wang*, Debiao He, Jia Yu, Zhiwei Wang, Incentive and unconditionally anonymous identity-based public provable data possession, IEEE Transactions on Services Computing (SCI, CCF-B), DOI: 10.1109/TSC.2016.2633260, 2016.
16. Huaqun Wang*, Debiao He, BAT-LA: balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid, IET Information Security (SCI, CCF-C), DOI: 10.1049/iet-ifs.2016.0150, 2016.
17. Ding Wang, Haibo Cheng, Debiao He*, Ping Wang, On the challenges in designing identity-based privacy-preserving authentication schemes for mobile devices, IEEE Systems Journal (SCI), DOI: 10.1109/JSYST.2016.2585681, 2016.
18. Hao Wang, Debiao He*, Jian Shen, Zhihua Zheng, Xiaoyan Yang, Man Ho Au, Fuzzy matching and direct revocation: a new CP-ABE scheme from multi-linear maps, Soft Computing (SCI), DOI: 10.1007/s00500-017-2488-8, 2017.
19. Yudi Zhang, Debiao He*, Mingwu Zhang, Kim-Kwang Raymond Choo, A Provable-Secure and Practical Two-Party Distributed Signing Protocol for SM2 Signature Algorithm, Frontiers of Computer Science, accepted. 20. Yudi Zhang, Debiao He*, Sherali Zeadally, Ding Wang, Kim-Kwang Raymond Choo, Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks, IEEE Internet of Things Journal (SCI), DOI: 10.1109/JIOT.2018.2865247, 2018. 21. Libing Wu, Jing Wang, Kim-Kwang Raymond Choo, Debiao He*, Secure Key Agreement and Key Protection for Mobile Device User Authentication, Journal of Supercomputing (SCI), DOI: 10.1007/s11227-018-2527-y, 2018. 22. Debiao He*, Yudi Zhang, Ding Wang, Kim-Kwang Raymond Choo, Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography, IEEE Transactions on Dependable and Secure Computing (CCF-A, SCI), DOI: 10.1109/TDSC.2018.2857775, 2018. 23. Xiaoying Jia, Debiao He*, Neeraj Kumar, Kim-Kwang Raymond Choo, Authenticated key agreement scheme for fog-driven IoT healthcare system, Wireless Networks (SCI), DOI: 10.1007/s11276-018-1759-3, 2018. 24. Xiaoying Jia, Debiao He*, Li Li and Kim-Kwang Raymond Choo, Signature-based three-factor authenticated key exchange for internet of things applications, Multimedia Tools and Applications (SCI), DOI: 10.1007/s11042-017-5560-6, 2017. 25. Jiaxi Hu, Debiao He*, Qinglan Zhao, Kim-Kwang Raymond Choo, Privacy-preserving parking management system based on blockchain technology, IEEE Consumer Electronics Magazine (SCI), DOI: , 2017. 26. Huaqun Wang, Debiao He*, Jinguang Han, VOD-ADAC: Anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud, IEEE Transactions on Services Computing (SCI), DOI: 10.1109/TSC.2017.2687459, 2017. 27. Jian Shen, Dengzhi Liu, Debiao He, Xinyi Huang, Yang, Xiang, Algebraic signatures-based data integrity auditing for efficient data dynamics in cloud computing, IEEE Transactions on Sustainable Computing, DOI: 10.1109/TSUSC.2017.2781232, 2017. 28. Jian Shen, Tianqi Zhou, Debiao He, Yuexin Zhang, Xingming Sun, Yang Xiang*, Block design-based key agreement for group data sharing in cloud computing, IEEE Transactions on Dependable and Secure Computing (SCI), DOI: 10.1109/TDSC.2017.2725953, 2017. 29. Huaqun Wang*, Debiao He, Yimu Ji, Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography, Future Generation Computer Systems(SCI), DOI: 10.1016/j.future.2017.06.028, 2017. 30. Mimi Ma, Debiao He*, Muhammad Khurram Khan, Jianhua Chen, Certificateless searchable public key encryption scheme for mobile healthcare system, Computers and Electrical Engineering(SCI), DOI: 10.1016/j.compeleceng.2017.04.015, 2017. 31. Huaqun Wang*, Debiao He, Jia Yu, Zhiwei Wang, Incentive and unconditionally anonymous identity-based public provable data possession, IEEE Transactions on Services Computing (SCI, CCF-B), DOI: 10.1109/TSC.2016.2633260, 2016. |
Tel:186-7403-6424 Fax: Email:cpeng@whu.edu.cn (彭聪)