Debiao He
Orcid: 0000-0002-2446-7436
According to our database1,
Debiao He
authored at least 409 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on d-nb.info
On csauthors.net:
Bibliography
2024
ACM Trans. Embed. Comput. Syst., November, 2024
Auto-Updating Intrusion Detection System for Vehicular Network: A Deep Learning Approach Based on Cloud-Edge-Vehicle Collaboration.
IEEE Trans. Veh. Technol., October, 2024
IEEE Internet Things J., October, 2024
MM-SDVN: Efficient Mobility Management Scheme for Optimal Network Handover in Software-Defined Vehicular Network.
IEEE Internet Things J., October, 2024
IEEE Trans. Intell. Transp. Syst., August, 2024
A Secure and Effective Hierarchical Identity-Based Signature Scheme for ADS-B Systems.
IEEE Trans. Aerosp. Electron. Syst., August, 2024
IEEE Trans. Inf. Theory, July, 2024
CBDDS: Secure and Revocable Cache-Based Distributed Data Sharing for Vehicular Networks.
IEEE Trans. Mob. Comput., June, 2024
A Decentralized Authenticated Key Agreement Scheme Based on Smart Contract for Securing Vehicular Ad-Hoc Networks.
IEEE Trans. Mob. Comput., May, 2024
IEEE Trans. Knowl. Data Eng., May, 2024
Ciphertext Range Query Scheme Against Agent Transfer and Permission Extension Attacks for Cloud Computing.
IEEE Internet Things J., May, 2024
IEEE Internet Things J., May, 2024
Efficient Blockchain-Based Mutual Authentication and Session Key Agreement for Cross-Domain IIoT.
IEEE Internet Things J., May, 2024
LPDB: Lightweight Policy-Driven Blockchain With Batch Verification for Rail Transit Systems.
IEEE Trans. Veh. Technol., April, 2024
Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things.
IEEE Internet Things J., April, 2024
Frontiers Comput. Sci., April, 2024
DBCPA: Dual Blockchain-Assisted Conditional Privacy-Preserving Authentication Framework and Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Mob. Comput., February, 2024
BAP: A Blockchain-Assisted Privacy-Preserving Authentication Protocol With User-Controlled Data Linkability for VANETs.
IEEE Trans. Intell. Veh., February, 2024
IEEE Trans. Emerg. Top. Comput. Intell., February, 2024
Efficient Certificateless Online/Offline Signcryption Scheme Without Bilinear Pairing for Smart Home Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024
PSSC: Practical and Secure Sidechain Construction for Heterogeneous Blockchains Orienting IoT.
IEEE Internet Things J., February, 2024
IEEE Trans. Veh. Technol., January, 2024
IEEE Trans. Artif. Intell., January, 2024
Comput. Stand. Interfaces, January, 2024
ATRC: An Anonymous Traceable and Revocable Credential System Using Blockchain for VANETs.
IEEE Trans. Veh. Technol., 2024
RCME: A Reputation Incentive Committee Consensus-Based for Matchmaking Encryption in IoT Healthcare.
IEEE Trans. Serv. Comput., 2024
Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security.
IEEE Trans. Serv. Comput., 2024
Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT.
IEEE Trans. Netw. Sci. Eng., 2024
A Practical and Provably Secure Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue.
IEEE Trans. Netw. Sci. Eng., 2024
LISP-MM: Efficient LISP-Based Mobility Management in Software Defined Vehicular Networks.
IEEE Trans. Netw. Sci. Eng., 2024
Device-Side Lightweight Mutual Authentication and Key Agreement Scheme Based on Chameleon Hashing for Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2024
Secure and Efficient User-Centric V2C Communication for Intelligent Cyber-Physical Transportation System.
IEEE Trans. Inf. Forensics Secur., 2024
SecureGPT: A Framework for Multi-Party Privacy-Preserving Transformer Inference in GPT.
IEEE Trans. Inf. Forensics Secur., 2024
Puncturable Attribute-Based Encryption From Lattices for Classified Document Sharing.
IEEE Trans. Inf. Forensics Secur., 2024
A Lightweight Certificateless Multi-User Matchmaking Encryption for Mobile Devices: Enhancing Security and Performance.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2024
CAT: A Consensus-Adaptive Trust Management Based on the Group Decision Making in IoVs.
IEEE Trans. Inf. Forensics Secur., 2024
Generic Construction of Conditional Privacy-Preserving Certificateless Signatures With Efficient Instantiations for VANETs.
IEEE Trans. Inf. Forensics Secur., 2024
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2024
DSChain: A Blockchain System for Complete Lifecycle Security of Data in Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2024
Load-Balanced Parallel Implementation on GPUs for Multi-Scalar Multiplication Algorithm.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
The implementation of polynomial multiplication for lattice-based cryptography: A survey.
J. Inf. Secur. Appl., 2024
An efficient quantum-resistant undeniable signature protocol for the E-voting system.
J. Inf. Secur. Appl., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Revisiting subgroup membership testing on pairing-friendly curves via the Tate pairing.
IACR Cryptol. ePrint Arch., 2024
Comput. J., 2024
Proceedings of the Information Security Practice and Experience, 2024
Outsourced and Robust Multi-party Computation with Identifying Malicious Behavior and Application to Machine Learning.
Proceedings of the Information Security Practice and Experience, 2024
SG-FCB: A Stackelberg Game-Driven Fair Committee-Based Blockchain Consensus Protocol.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
2023
Provable Secure and Lightweight Blockchain-Based V2I Handover Authentication and V2V Broadcast Protocol for VANETs.
IEEE Trans. Veh. Technol., December, 2023
Efficient Blockchain-Based Data Integrity Auditing for Multi-Copy in Decentralized Storage.
IEEE Trans. Parallel Distributed Syst., December, 2023
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023
LedgerMaze: An Efficient Privacy-Preserving Noninteractive Zero-Knowledge Scheme Over Account-Model Blockchain.
IEEE Trans. Computers, December, 2023
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth.
Connect. Sci., December, 2023
Lightweight Encryption and Authentication for Controller Area Network of Autonomous Vehicles.
IEEE Trans. Veh. Technol., November, 2023
MCPAP: A MSIS-based conditional privacy-preserving authentication protocol for smart grids.
J. Syst. Archit., October, 2023
Collaborative Intrusion Detection System for SDVN: A Fairness Federated Deep Learning Approach.
IEEE Trans. Parallel Distributed Syst., September, 2023
Blockchain-Assisted Privacy-Preserving Traffic Route Management Scheme for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Trans. Netw. Serv. Manag., September, 2023
ACM Trans. Embed. Comput. Syst., September, 2023
EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things.
IEEE Trans. Computers, September, 2023
Blockchain-Assisted Secure Data Sharing Protocol With a Dynamic Multiuser Keyword Search in IIoT.
IEEE Internet Things J., September, 2023
User-Friendly Public-Key Authenticated Encryption With Keyword Search for Industrial Internet of Things.
IEEE Internet Things J., August, 2023
Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions.
IEEE Commun. Mag., August, 2023
Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles.
IEEE Trans. Veh. Technol., June, 2023
IEEE Trans. Inf. Theory, June, 2023
Isoga: An Isogeny-Based Quantum-Resist Searchable Encryption Scheme Against Keyword Guessing Attacks.
IEEE Syst. J., June, 2023
SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things.
IEEE Internet Things J., June, 2023
Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs.
IEEE J. Biomed. Health Informatics, May, 2023
A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things.
IEEE Internet Things J., May, 2023
Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things.
Ad Hoc Networks, May, 2023
An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks.
IEEE Trans. Intell. Veh., April, 2023
High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU.
ACM Trans. Embed. Comput. Syst., March, 2023
Veh. Commun., 2023
An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs.
IEEE Trans. Veh. Technol., 2023
IEEE Trans. Serv. Comput., 2023
Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Netw. Sci. Eng., 2023
PCNN<sub>CEC</sub>: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Netw. Sci. Eng., 2023
PBidm: Privacy-Preserving Blockchain-Based Identity Management System for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023
Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments.
IEEE Trans. Inf. Forensics Secur., 2023
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services.
IEEE Trans. Inf. Forensics Secur., 2023
Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT.
IEEE Trans. Inf. Forensics Secur., 2023
Efficient Multi-Party EdDSA Signature With Identifiable Aborts and its Applications to Blockchain.
IEEE Trans. Inf. Forensics Secur., 2023
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
IEEE Open J. Commun. Soc., 2023
An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System.
IEEE Open J. Comput. Soc., 2023
Communication-Efficient and Byzantine-Robust Federated Learning for Mobile Edge Computing Networks.
IEEE Netw., 2023
J. Syst. Archit., 2023
A Group Signature Scheme With Selective Linkability and Traceability for Blockchain-Based Data Sharing Systems in E-Health Services.
IEEE Internet Things J., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Traceable Ring Signatures from Group Actions: Logarithmic, Flexible, and Quantum Resistant.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023
FleS: A Compact and Parameter-Flexible Supersingular Isogeny Based Public Key Encryption Scheme.
Proceedings of the Provable and Practical Security, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Power Grid Encrypted Data Range Filtering Scheme Based on Order-revealing Encryption.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
IEEE Trans. Netw. Serv. Manag., December, 2022
IEEE Trans. Veh. Technol., 2022
Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network.
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Netw. Sci. Eng., 2022
SAKE*: A Symmetric Authenticated Key Exchange Protocol With Perfect Forward Secrecy for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
An Efficient Identity-Based Aggregate Signcryption Scheme With Blockchain for IoT-Enabled Maritime Transportation System.
IEEE Trans. Green Commun. Netw., 2022
IEEE Trans. Emerg. Top. Comput. Intell., 2022
IEEE Trans. Cloud Comput., 2022
DssP: Efficient Dual-Server Secret Sharing Protocol Based on Password Authentication for Cloud Storage Services.
IEEE Syst. J., 2022
The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities.
IEEE Syst. J., 2022
An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof.
IEEE Syst. J., 2022
A Quantum Secure and Noninteractive Identity-Based Aggregate Signature Protocol From Lattices.
IEEE Syst. J., 2022
A blockchain-based conditional privacy-preserving authentication scheme for edge computing services.
J. Inf. Secur. Appl., 2022
IEEE Internet Things J., 2022
A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
A Blockchain-Assisted Privacy-Aware Authentication Scheme for Internet of Medical Things.
IEEE Internet Things J., 2022
A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing.
IEEE Internet Things J., 2022
Hash-balanced binary tree-based public auditing in vehicular edge computing and networks.
Int. J. Commun. Syst., 2022
An efficient blockchain-based batch verification scheme for vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022
Digit. Commun. Networks, 2022
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges.
ACM Comput. Surv., 2022
ACM Comput. Surv., 2022
Comput. Stand. Interfaces, 2022
Comput. J., 2022
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0.
Sci. China Inf. Sci., 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Asymmetric Secure Multi-party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
Proceedings of the Emerging Information Security and Applications, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
IEEE Trans. Serv. Comput., 2021
ACM Trans. Reconfigurable Technol. Syst., 2021
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid.
ACM Trans. Sens. Networks, 2021
EPRT: An Efficient Privacy-Preserving Medical Service Recommendation and Trust Discovery Scheme for eHealth System.
ACM Trans. Internet Techn., 2021
ACM Trans. Internet Techn., 2021
ACM Trans. Internet Techn., 2021
A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems.
IEEE Trans. Netw. Sci. Eng., 2021
An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021
BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2021
Secure Storage Auditing With Efficient Key Updates for Cognitive Industrial IoT Environment.
IEEE Trans. Ind. Informatics, 2021
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2021
Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data.
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications.
IEEE Syst. J., 2021
Secur. Commun. Networks, 2021
IEEE Netw., 2021
Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System.
IEEE J. Sel. Areas Commun., 2021
RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.
J. Parallel Distributed Comput., 2021
Inf. Sci., 2021
An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things.
IEEE Internet Things J., 2021
Efficient Certificateless Online/Offline Signature Scheme for Wireless Body Area Networks.
IEEE Internet Things J., 2021
Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios.
IEEE Commun. Lett., 2021
CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2021
Editorial for special issue on "security and privacy protection in the era of IoT devices".
Digit. Commun. Networks, 2021
Comput. Stand. Interfaces, 2021
An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud.
Connect. Sci., 2021
A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare Framework.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
2020
A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing.
IEEE Trans. Sustain. Comput., 2020
VOD-ADAC: Anonymous Distributed Fine-Grained Access Control Protocol with Verifiable Outsourced Decryption in Public Cloud.
IEEE Trans. Serv. Comput., 2020
Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure.
IEEE Trans. Ind. Informatics, 2020
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks.
IEEE Trans. Ind. Informatics, 2020
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Engineering Management, 2020
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEEE Trans. Dependable Secur. Comput., 2020
Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks.
IEEE Syst. J., 2020
IEEE Syst. J., 2020
A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing.
IEEE Syst. J., 2020
IEEE Syst. J., 2020
Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs.
Secur. Commun. Networks, 2020
Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.
J. Medical Syst., 2020
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
J. Inf. Secur. Appl., 2020
J. Inf. Secur. Appl., 2020
Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare.
J. Inf. Secur. Appl., 2020
An efficient and provable certificate-based proxy signature scheme for IIoT environment.
Inf. Sci., 2020
Efficient and Provably Secure Multireceiver Signcryption Scheme for Multicast Communication in Edge Computing.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography.
IET Inf. Secur., 2020
Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme.
IET Inf. Secur., 2020
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEICE Trans. Inf. Syst., 2020
Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography.
Future Gener. Comput. Syst., 2020
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm.
Frontiers Comput. Sci., 2020
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey.
Comput. Secur., 2020
Comput. Commun., 2020
Sci. China Inf. Sci., 2020
Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov).
Comput. Electr. Eng., 2020
Efficient and Secure Ciphertext-Policy Attribute-Based Encryption Without Pairing for Cloud-Assisted Smart Grid.
IEEE Access, 2020
A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing.
IEEE Access, 2020
Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature Algorithm.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
A Practical NIZK Argument for Confidential Transactions over Account-Model Blockchain.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Wirel. Networks, 2019
Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network.
IEEE Trans. Veh. Technol., 2019
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession.
IEEE Trans. Serv. Comput., 2019
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Trans. Dependable Secur. Comput., 2019
IEEE Syst. J., 2019
Secur. Commun. Networks, 2019
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks.
Secur. Commun. Networks, 2019
J. Netw. Comput. Appl., 2019
Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019
IEEE Internet Things J., 2019
An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Internet Things J., 2019
Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks.
Int. J. Found. Comput. Sci., 2019
IEEE Consumer Electron. Mag., 2019
Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things.
Ann. des Télécommunications, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
Wirel. Commun. Mob. Comput., 2018
IEEE Trans. Sustain. Comput., 2018
J. Supercomput., 2018
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018
Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018
Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems.
IEEE Trans. Ind. Informatics, 2018
A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommun. Syst., 2018
A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Secur. Comput., 2018
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage.
Soft Comput., 2018
Soft Comput., 2018
Soft Comput., 2018
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
Soft Comput., 2018
On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices.
IEEE Syst. J., 2018
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks.
IEEE Syst. J., 2018
IEEE Syst. J., 2018
A General Architecture for Multiserver Authentication Key Agreement with Provable Security.
Secur. Commun. Networks, 2018
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment.
Secur. Commun. Networks, 2018
An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System.
Secur. Commun. Networks, 2018
Signature-based three-factor authenticated key exchange for internet of things applications.
Multim. Tools Appl., 2018
Efficient and secure searchable encryption protocol for cloud-based Internet of Things.
J. Parallel Distributed Comput., 2018
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0.
J. Netw. Comput. Appl., 2018
Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
IEEE Internet Things J., 2018
An efficient and secure 3-factor user-authentication protocol for multiserver environment.
Int. J. Commun. Syst., 2018
Int. J. Commun. Syst., 2018
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptol. ePrint Arch., 2018
PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.
Future Gener. Comput. Syst., 2018
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
A general compiler for password-authenticated group key exchange protocol in the standard model.
Discret. Appl. Math., 2018
IEEE Commun. Mag., 2018
Certificateless searchable public key encryption scheme for mobile healthcare system.
Comput. Electr. Eng., 2018
An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment.
Ad Hoc Networks, 2018
IEEE Access, 2018
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.
IEEE Access, 2018
IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies.
IEEE Access, 2018
2017
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography.
Wirel. Commun. Mob. Comput., 2017
Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries.
IEEE Trans. Smart Grid, 2017
J. Supercomput., 2017
Security analysis of a publicly verifiable data possession scheme for remote storage.
J. Supercomput., 2017
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Inf. Forensics Secur., 2017
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing.
Soft Comput., 2017
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices.
Soft Comput., 2017
IEEE Syst. J., 2017
Pers. Ubiquitous Comput., 2017
Frontiers Inf. Technol. Electron. Eng., 2017
An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City.
J. Inf. Sci. Eng., 2017
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network.
J. Inf. Secur. Appl., 2017
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. J. Netw. Manag., 2017
A secure and efficient identity-based mutual authentication scheme with smart card using elliptic curve cryptography.
Int. J. Commun. Syst., 2017
Int. J. Commun. Syst., 2017
Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid.
IET Inf. Secur., 2017
Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error.
IACR Cryptol. ePrint Arch., 2017
Efficient and secure identity-based encryption scheme with equality test in cloud computing.
Future Gener. Comput. Syst., 2017
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography.
Comput. Networks, 2017
Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation.
Sci. China Inf. Sci., 2017
Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies.
Comput. Electr. Eng., 2017
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Appl. Math. Comput., 2017
IEEE Access, 2017
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks.
IEEE Access, 2017
IEEE Access, 2017
Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
Privacy-preserving data aggregation scheme against internal attackers in smart grids.
Wirel. Networks, 2016
A security-enhanced authentication with key agreement scheme for wireless mobile communications using elliptic curve cryptosystem.
J. Supercomput., 2016
J. Supercomput., 2016
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2016
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.
IEEE Trans. Inf. Forensics Secur., 2016
Secur. Commun. Networks, 2016
A novel covert channel detection method in cloud based on XSRM and improved event association algorithm.
Secur. Commun. Networks, 2016
Cryptanalysis of a certificateless aggregate signature scheme with efficient verification.
Secur. Commun. Networks, 2016
New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems.
J. High Speed Networks, 2016
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography.
IET Commun., 2016
Sci. China Inf. Sci., 2016
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography.
Wirel. Pers. Commun., 2015
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2015
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment.
IEEE Trans. Dependable Secur. Comput., 2015
Secure pseudonym-based near field communication protocol for the consumer internet of things.
IEEE Trans. Consumer Electron., 2015
IEEE Syst. J., 2015
Pervasive Mob. Comput., 2015
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks.
Multim. Syst., 2015
New biometrics-based authentication scheme for multi-server environment in critical systems.
J. Ambient Intell. Humaniz. Comput., 2015
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks.
Inf. Sci., 2015
An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography.
IEEE Internet Things J., 2015
Int. J. Electron. Secur. Digit. Forensics, 2015
A new handover authentication protocol based on bilinear pairing functions for wireless networks.
Int. J. Ad Hoc Ubiquitous Comput., 2015
IEEE Commun. Mag., 2015
Comput. J., 2015
Ad Hoc Sens. Wirel. Networks, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
Cryptanalysis and Improvement of an Anonymous Authentication Protocol for Wireless Access Networks.
Wirel. Pers. Commun., 2014
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks.
J. Supercomput., 2014
IEEE Trans. Consumer Electron., 2014
Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol.
J. Medical Syst., 2014
Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol.
Inf. Technol. Control., 2014
Inf. Technol. Control., 2014
Insecurity of an efficient certificateless aggregate signature with constant pairing computations.
Inf. Sci., 2014
Int. J. Netw. Secur., 2014
Int. J. Netw. Secur., 2014
Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card.
Int. J. Inf. Commun. Technol., 2014
IACR Cryptol. ePrint Arch., 2014
2013
Security Flaws in a Smart Card Based Authentication Scheme for Multi-server Environment.
Wirel. Pers. Commun., 2013
Anonymous two-factor authentication for consumer roaming service in global mobility networks.
IEEE Trans. Consumer Electron., 2013
Math. Comput. Model., 2013
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards.
Inf. Technol. Control., 2013
Security Analysis of a Dynamic ID-based Authentication Scheme for Multi-server Environment Using Smart Cards.
Int. J. Netw. Secur., 2013
Int. J. Electron. Secur. Digit. Forensics, 2013
Int. J. Electron. Secur. Digit. Forensics, 2013
Cryptanalysis of a Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environments.
IEICE Trans. Inf. Syst., 2013
Int. Arab J. Inf. Technol., 2013
Ann. des Télécommunications, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
A secure temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks.
Proceedings of the International Symposium on Wireless and pervasive Computing, 2013
2012
A new dynamic identity-based authentication protocol for multi-server environment using elliptic curve cryptography.
Secur. Commun. Networks, 2012
A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography.
Secur. Commun. Networks, 2012
Note on 'Design of improved password authentication and update scheme based on elliptic curve cryptography'.
Math. Comput. Model., 2012
J. Medical Syst., 2012
Cryptanalysis of a communication-efficient three-party password authenticated key exchange protocol.
Inf. Sci., 2012
An ID-based client authentication with key agreement protocol for mobile client-server environment on ECC with provable security.
Inf. Fusion, 2012
Weaknesses in a dynamic ID-based remote user authentication scheme for multi-server environment.
Int. J. Electron. Secur. Digit. Forensics, 2012
Cryptanalysis of a three-party password-based authenticated key exchange protocol using Weil pairing.
Int. J. Electron. Secur. Digit. Forensics, 2012
An efficient and provably-secure certificateless signature scheme without bilinear pairings.
Int. J. Commun. Syst., 2012
Int. J. Commun. Syst., 2012
Cryptanalysis of a Smartcard-Based User Authentication Scheme for Multi-Server Environments.
IEICE Trans. Commun., 2012
A note on 'An efficient certificateless aggregate signature with constant pairing computations'.
IACR Cryptol. ePrint Arch., 2012
Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Comput. Math. Appl., 2012
An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings.
Ad Hoc Networks, 2012
Weaknesses of "Security Analysis and Enhancement for Three-Party Password-Based Authenticated Key Exchange Protocol".
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012
2011
A new two-round certificateless authenticated key agreement protocol without bilinear pairings.
Math. Comput. Model., 2011
Int. J. Netw. Secur., 2011
Int. J. Comput. Commun. Control, 2011
A Pairing-free Certificateless Authenticated Key Agreement Protocol in the eCK Model.
IACR Cryptol. ePrint Arch., 2011
An efficient certificateless two-party authenticated key agreement scheme from pairings.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Comments on a password authentication and update scheme based on elliptic curve cryptography.
IACR Cryptol. ePrint Arch., 2011
Security flaws in a biometrics-based multi-server authentication with key agreement scheme.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards.
IACR Cryptol. ePrint Arch., 2011
Weakness in a Mutual Authentication Scheme for Session Initiation Protocol using Elliptic Curve Cryptography
CoRR, 2011
An efficient certificateless authenticated key agreement protocol without bilinear pairings
CoRR, 2011
Comput. Electr. Eng., 2011
Ann. des Télécommunications, 2011
2010
Informatica (Slovenia), 2010
Int. J. Electron. Secur. Digit. Forensics, 2010
Efficient and provably-secure certificateless signature scheme without bilinear pairings.
IACR Cryptol. ePrint Arch., 2010
Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Weakness Analysis and Improvement of a Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
CoRR, 2010
2009
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009