发表论文

[1].Debiao He, Sherali Zeadally, Baowen Xu, Xinyi Huang, An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks, IEEE Transactions on Information Forensics& Security (SCI), DOI: 10.1109/TIFS.2015.2473820,2015.

[2].Debiao He, Sherali Zeadally, Libing Wu. Certificatelesspublic auditing scheme for cloud-assisted wireless body area networks, IEEE Systems Journal(SCI), DOI: 10.1109/JSYST.2015.2428620, 2015.

[3].Debiao He, Neeraj Kumar, Naveen Chilamkurti. A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks, Information Sciences (SCI) , 2015, 321: 263-277.

[4].Debiao He, Sherali Zeadally. Authentication protocol for ambient assisted living system, IEEE Communications Magazine(SCI) , 2015, 35(1): 71-77.

[5].Debiao He, Sherali Zeadally. An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography, IEEE Internet of Things Journal, 2015, 2(1): 72-83.

[6].Debiao He, Neeraj Kumar, Jong-Hyouk Lee. Secure pseudonym-based near field communication protocol for the consumer internet of things, IEEE Transactions on Consumer Electronics(SCI) , 2015, 61(1): 56-63.

[7].Debiao He, Ding Wang. Robust biometrics-based authentication scheme for multi-server environment, IEEE Systems Journal(SCI) , 2015, 9(3): 816-823.

[8].Debiao He, Neeraj Kumar, Jianhua Chen, et al. Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks, Multimedia Systems(SCI) , 2015, 21(1): 49-60.

[9].Debiao He, Muhammad Khurram Khan, Neeraj Kumar. A new handover authentication protocol based on bilinear pairing functions for wireless networks, International Journal of Ad Hoc and Ubiquitous Computing(SCI), 2015, 18(1-2): 67-74.

[10].Debiao He, Yuanyuan Zhang, Jianhua Chen. Robust biometric-based user authentication scheme for wireless sensor networks, Ad Hoc & Sensor Wireless Networks(SCI), 2015,25(3-4): 309-321.

[11].Debiao He, Miaomiao Tian, Jianhua Chen. Insecurity of an efficient certificateless aggregate signature with constant pairing computations, Information Sciences (SCI), 2014, 268(1): 458–462.

[12].Debiao He, Neeraj Kumar, Jong-Hyouk Lee. Enhanced three-factor security protocol for USB consumer storage devices, IEEE Transactions on Consumer Electronics (SCI), 2014, 60(1): 30-37.

[13].Debiao He, Yuanyuan Zhang, Jianhua Chen. Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks, Wireless Personal Communications (SCI), 74(2): 229-243, 2014.

[14].Debiao He, Neeraj Kumar, Naveen Chilamkurti, Jong-Hyouk Lee. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol, Journal of Medical Systems (SCI), 38(10): 1-6, 2014.

[15].Debiao He, Neeraj Kumar, Muhammad Khurram Khan, Jong-Hyouk Lee. Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks, IEEE Transactions on Consumer Electronics (SCI), 2013, 59(4): 811-817.

[16].Debiao He, Hao Hu. Cryptanalysis of a Dynamic ID-based remote user authentication scheme with access control for multi-server environment, IEICE Transactions on Information and Systems (SCI), 2013, E96-D (1): 138-140.

[17].Debiao He, Yitao Chen, Jianhua Chen. An efficient secure certificateless proxy signature scheme without pairings, Mathematical and Computer Modelling (SCI), 2013, 57(9-10): 2510-2518.

[18].Debiao He, Shuhua Wu. Security flaws in a smart card based authentication scheme for multi-server environment, Wireless Personal Communications (SCI), 2013, 70(1): 323-329.

[19].Debiao He, Ding Wang, Shuhua Wu. Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards, Information Technology and Control (SCI), 2013, 42(2): 170-177.

[20].Debiao He, Baojun Huang, Jianhua Chen. New certificateless short signature scheme, IET Information Security (SCI), 2013, 7(2): 113-117.

[21].Debiao He, Shuhua Wu, Jianhua Chen. Note on Design of improved password authentication and updating scheme based on elliptic curve cryptography, Mathematical and Computer Modelling (SCI), 2012, 55(3-4): 1661–1664.

[22].Debiao He, Jianhua Chen, Jin Hu. A pairing-free certificateless authenticated key agreement protocol, International Journal of Communication Systems (SCI), 2012, 25(2): 221-230.

[23].Debiao He, Jianhua Chen, Jin Hu. An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security, Information Fusion (SCI), 2012, 13(3): 223–230.

[24].Debiao He. An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings, Ad Hoc Networks (SCI), 2012, 10(6): 1009–1016.

[25].Debiao He, Jianhua Chen, Rui Zhang. A more secure authentication scheme for telecare medicine information systems, Journal of Medical Systems (SCI), 2012, 36(3), 1989-1995.

[26].Debiao He, Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications, ETRI Journal (SCI), 2012, 34(3): 482–484.

[27].Debiao He, Jianhua Chen, Jin Hu. Improvement on a smart card based password authentication scheme, Journal of Internet Technology (SCI), 2012, 13(3): 405–410.

[28].Debiao He, Hao Hu. Cryptanalysis of a smartcard-based user authentication scheme for multi-server environments, IEICE Transactions on Communications (SCI), 2012, E95-B(9): 3052-3054.

[29].Debiao He, Sahadeo Padhye, Jianhua Chen. An efficient certificateless two-party authenticated key agreement protocol, Computers & Mathematics with Applications (SCI), 2012, 64(6): 1914–1926.

[30].Debiao He, Jianhua Chen, Rui Zhang. An efficient and provably-secure certificateless signature scheme without bilinear pairings, International Journal of Communication Systems (SCI), 2012, 25(11), 1432–1442.

[31].Debiao He, Jianhua Chen, Yitao Chen. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography, Security and Communication Networks (SCI), , 2012 5(12): 1423-1429.

[32].Debiao He, Jianhua Chen, Jin Hu. An authentication key agreement protocol using isogenies between elliptic curves, International Journal of Computers Communications & Control (SCI), 2011, 6(2): 251-258.

[33].Debiao He, Jianhua Chen, Rui Zhang. An efficient identity-based blind signature scheme without bilinear pairings, Computers & Electrical Engineering (SCI, IF: 0.837), 2011, 37(4): 444–450.

[34].Debiao He, Yitao Chen, Jianhua Chen, Rui Zhang. A new two-round certificateless authenticated key agreement protocol without bilinear pairings, Mathematical and Computer Modelling (SCI), 2011, 54(11-12): 3143–3152.

[35].Debiao He, Jianhua Chen, Jin Hu. An ID-based proxy signature schemes without bilinear pairings, Annals of Telecommunications (SCI), 2011, 66(11-12): 657–662.[3]

武大计算机学院钱铁云,何德彪(武汉大学计算机学院教授)_百度百科相关推荐

  1. 武大计算机导师蔡贤涛,程媛(武汉大学计算中心教师)_百度百科

    程媛 (武汉大学计算中心教师) 语音 编辑 锁定 讨论 上传视频 本词条缺少概述图,补充相关内容使词条更完整,还能快速升级,赶紧来编辑吧! 程媛,女,汉族,1983年12月生,工学博士,讲师.在武汉大 ...

  2. 生字辟用计算机的歌,生僻字(陈柯宇演唱歌曲)_百度百科

    生僻字 (陈柯宇演唱歌曲) 语音 编辑 锁定 讨论 上传视频 <生僻字>是由陈柯宇作词.作曲并演唱的歌曲,收录于同名专辑<生僻字>,发行于2017年11月14日[1] . 中文 ...

  3. 计算机音乐简谱图片,1(音乐简谱基本音级)_百度百科

    1是指在音乐简谱中的音乐简谱基本音级.[1] 1代表音阶中的1个基本音级,读音为Do(谐音汉字"哆"),在C大调里唱Do.常用来表示音级第一位或首位. 中文名 哆 外文名 do术语 ...

  4. 计算机李维,李维(南京工业大学名师——李维)_百度百科

    李维 (南京工业大学名师--李维) 语音 编辑 锁定 讨论 上传视频 本词条缺少概述图,补充相关内容使词条更完整,还能快速升级,赶紧来编辑吧! 李维,出生于1963年4月,是南京工业大学的名师,主要研 ...

  5. 湖南大学计算机科学与技术导师,肖德贵(湖南大学计算机与通信学院教师)_百度百科...

    肖德贵 (湖南大学计算机与通信学院教师) 语音 编辑 锁定 讨论 上传视频 本词条缺少概述图,补充相关内容使词条更完整,还能快速升级,赶紧来编辑吧! 肖德贵,男,1972年2月出生,湖南省南县人,博士 ...

  6. 武大教授计算机学院,牛晓光(武汉大学计算机学院教授)_百度百科

    牛晓光 (武汉大学计算机学院教授) 语音 编辑 锁定 讨论 上传视频 本词条缺少概述图,补充相关内容使词条更完整,还能快速升级,赶紧来编辑吧! 牛晓光,武汉大学计算机学院教授,CCF/IEEE/ACM ...

  7. 东华大学计算机学院刘国华,刘国华(东华大学教授)_百度百科

    本词条缺少概述图,补充相关内容使词条更完整,还能快速升级,赶紧来编辑吧! 刘国华,1966年出生.东华大学计算机科学与技术学院计算机软件与理论系教授,博士,博士生导师,中国计算机学会高级会员,中国计算 ...

  8. 内蒙古大学计算机学院周建涛,刘靖(内蒙古大学副教授)_百度百科

    刘靖 (内蒙古大学副教授) 语音 编辑 锁定 讨论 上传视频 本词条缺少概述图,补充相关内容使词条更完整,还能快速升级,赶紧来编辑吧! 刘靖,男,汉族,1981年出生,内蒙古呼和浩特人,2011年7月 ...

  9. 云大博士计算机系的刘明,刘明(西南大学计算机与信息科学学院讲师)_百度百科...

    刘明 (西南大学计算机与信息科学学院讲师) 语音 编辑 锁定 讨论 上传视频 中文名 刘明 国    籍 中国 民    族 汉族职    业 教师[1] 学位/学历 博士[1] 专业方向 人工智能与 ...

最新文章

  1. 吴恩达机器学习笔记21-正则化线性回归(Regularized Linear Regression)
  2. 深入探索C++对象模型学习笔记2
  3. 二级计算机为让利消费者,计算机二级office题库训练题(2)
  4. 10kv电压互感器型号_35kV、10kV母线电压异常处理
  5. aix如何安装mysql_AIX下安装Mysql
  6. mt4 指标 涨跌幅 颜色k线_通达信指标公式源码阴线买股+黄金K线指标+源码
  7. python学习笔记(python介绍)
  8. 济宁医学院计算机科学与技术专业怎么样,济宁医学院专业排名及介绍 哪些专业最好...
  9. 最耗性能的SQL语句
  10. prototype中的$R函数的用法
  11. html5 游戏 性能测试工具,没事跑个分!几款Chrome内核浏览器性能测试
  12. 计算机不能报名系统软件,电脑无法安装税控系统、国税申报软件,怎么回事
  13. css 边框代码,边框代码大全
  14. word添加目录和更新
  15. 海康威视web管理端下载视频录像
  16. APM,云时代的应用性能优化神器
  17. #码神心得_03# 浮点类型、char类型
  18. 手机软键盘弹起导致页面变形的一种解决方案
  19. 前端H5项目部署到OSS-利用jenkins实现自动发布【生产环境实战】
  20. stream流去除对象的值_I/O流(过滤流、对象序列化、字符流)

热门文章

  1. 组装服务器详细攻略,深度学习服务器组装经验过程分享
  2. ITF25码详解(附带PB代码)
  3. 硕腾“猫友好在中国”项目正式启动,改善中国猫咪诊疗环境
  4. 孵化器行业拓客的10个经典方法
  5. uniapp - 【全端兼容】实现保存视频到手机相册功能,将 mp4 在线视频下载并存储到用户的手机中,uniapp App h5 小程序将视频文件下载保存(详细示例源码及注释一键复制,开箱即用!)
  6. 走向云:京东下拉框优化,下拉词的原理是什么?
  7. ubuntu 16.04 更改系统语言为简体中文
  8. 亚马逊选品_2022年亚马逊最全的选品方法和策略
  9. 图片标签和多媒体标签的使用
  10. FOHEART H1数据手套_Unity3D SDK开发