Follow
Debiao He (何德彪)
Debiao He (何德彪)
Verified email at whu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Blockchain in healthcare applications: Research challenges and opportunities
T McGhin, KKR Choo, CZ Liu, D He
Journal of Network and Computer Applications 135, 62-75, 2019
9402019
A survey on privacy protection in blockchain system
Q Feng, D He, S Zeadally, MK Khan, N Kumar
Journal of Network and Computer Applications 126, 45-58, 2019
8932019
An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks
D He, S Zeadally, B Xu, X Huang
IEEE Transactions on Information Forensics and Security 10 (12), 2681-2691, 2015
8582015
Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment
D Wang, D He, P Wang, CH Chu
IEEE Transactions on Dependable and Secure Computing 12 (4), 428-442, 2015
4892015
Anonymous authentication for wireless body area networks with provable security
D He, S Zeadally, N Kumar, JH Lee
IEEE Systems Journal 11 (4), 2590-2601, 2017
4832017
Robust biometrics-based authentication scheme for multiserver environment
D He, D Wang
IEEE Systems Journal 9 (3), 816-823, 2015
4662015
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0
C Lin, D He, X Huang, KKR Choo, AV Vasilakos
Journal of Network and Computer Applications 116, 42-52, 2018
4372018
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey
S Shi, D He, L Li, N Kumar, MK Khan, KKR Choo
Computers & security 97, 101966, 2020
4342020
An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography
D He, S Zeadally
IEEE internet of things journal 2 (1), 72-83, 2014
4172014
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
D He, N Kumar, J Chen, CC Lee, N Chilamkurti, SS Yeo
Multimedia Systems 21, 49-60, 2015
3672015
Security and Privacy for the Internet of Drones: Challenges and Solutions
C Lin, D He, N Kumar, KKR Choo, A Vinel, X Huang
IEEE Communications Magazine 56 (1), 64-69, 2018
3482018
Block design-based key agreement for group data sharing in cloud computing
J Shen, T Zhou, D He, Y Zhang, X Sun, Y Xiang
IEEE Transactions on Dependable and Secure Computing 16 (6), 996-1010, 2017
3212017
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks
Q Jiang, S Zeadally, J Ma, D He
IEEE Access 5, 3376-3392, 2017
3142017
A more secure authentication scheme for telecare medicine information systems
H Debiao, C Jianhua, Z Rui
Journal of medical systems 36, 1989-1995, 2012
3092012
Certificateless public auditing scheme for cloud-assisted wireless body area networks
D He, S Zeadally, L Wu
IEEE Systems Journal 12 (1), 64-73, 2018
2912018
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
D He, N Kumar, N Chilamkurti
Information Sciences 321, 263-277, 2015
2892015
Blockchain-based identity management systems: A review
Y Liu, D He, MS Obaidat, N Kumar, MK Khan, KKR Choo
Journal of network and computer applications 166, 102731, 2020
2822020
Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure
J Wang, L Wu, KKR Choo, D He
IEEE Transactions on Industrial Informatics 16 (3), 1984-1992, 2019
2772019
Certificateless searchable public key encryption scheme for industrial internet of things
M Ma, D He, N Kumar, KKR Choo, J Chen
IEEE Transactions on Industrial Informatics 14 (2), 759-767, 2017
2532017
Authentication protocol for an ambient assisted living system
D He, S Zeadally
IEEE Communications Magazine 53 (1), 71-77, 2015
2472015
The system can't perform the operation now. Try again later.
Articles 1–20