Остановите войну!
for scientists:
default search action
Debiao He
Publications
- 2024
- [j308]Xiaohu Wang, Chao Lin, Xinyi Huang, Debiao He:
Anonymity-Enhancing Multi-Hop Locks for Monero-Enabled Payment Channel Networks. IEEE Trans. Inf. Forensics Secur. 19: 2438-2453 (2024) - [j304]Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang:
Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT. IEEE Trans. Netw. Sci. Eng. 11(1): 404-415 (2024) - [c26]Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang:
Parameter-Hiding Order-Revealing Encryption Without Pairings. PKC (4) 2024: 227-256 - [i31]Cong Peng, Rongmao Chen, Yi Wang, Debiao He, Xinyi Huang:
Parameter-Hiding Order-Revealing Encryption without Pairings. IACR Cryptol. ePrint Arch. 2024: 434 (2024) - 2023
- [j295]Yunru Zhang, Debiao He, Pandi Vijayakumar, Min Luo, Xinyi Huang:
SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things. IEEE Internet Things J. 10(11): 9716-9726 (2023) - [j285]Qi Feng, Debiao He, Min Luo, Xinyi Huang, Kim-Kwang Raymond Choo:
EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things. IEEE Trans. Computers 72(9): 2482-2495 (2023) - [j284]Zijian Bao, Debiao He, Wei Wei, Cong Peng, Xinyi Huang:
LedgerMaze: An Efficient Privacy-Preserving Noninteractive Zero-Knowledge Scheme Over Account-Model Blockchain. IEEE Trans. Computers 72(12): 3489-3502 (2023) - [j280]Chao Lin, Xinyi Huang, Debiao He:
EBCPA: Efficient Blockchain-Based Conditional Privacy-Preserving Authentication for VANETs. IEEE Trans. Dependable Secur. Comput. 20(3): 1818-1832 (2023) - [j278]Chao Lin, Xinyi Huang, Jianting Ning, Debiao He:
ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain. IEEE Trans. Dependable Secur. Comput. 20(6): 4536-4550 (2023) - [j277]Xinyi Hu, Debiao He, Min Luo, Cong Peng, Qi Feng, Xinyi Huang:
High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU. ACM Trans. Embed. Comput. Syst. 22(2): 25:1-25:35 (2023) - [j276]Douwei Lei, Debiao He, Cong Peng, Min Luo, Zhe Liu, Xinyi Huang:
Faster Implementation of Ideal Lattice-Based Cryptography Using AVX512. ACM Trans. Embed. Comput. Syst. 22(5): 83:1-83:18 (2023) - [j274]Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang:
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services. IEEE Trans. Inf. Forensics Secur. 18: 290-303 (2023) - [j266]Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang:
Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments. IEEE Trans. Inf. Forensics Secur. 18: 5345-5358 (2023) - [j255]Pengfei Wu, Jianting Ning, Wu Luo, Xinyi Huang, Debiao He:
Exploring Dynamic Task Loading in SGX-Based Distributed Computing. IEEE Trans. Serv. Comput. 16(1): 288-301 (2023) - [j254]Chao Lin, Xinyi Huang, Debiao He:
Efficient Blockchain-Based Electronic Medical Record Sharing With Anti-Malicious Propagation. IEEE Trans. Serv. Comput. 16(5): 3294-3304 (2023) - 2022
- [j245]Jianchang Lai, Xinyi Huang, Debiao He, Wei Wu:
Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9. Comput. J. 65(7): 1692-1701 (2022) - [j236]Xu Yang, Xuechao Yang, Xun Yi, Ibrahim Khalil, Xiaotong Zhou, Debiao He, Xinyi Huang, Surya Nepal:
Blockchain-Based Secure and Lightweight Authentication for Internet of Things. IEEE Internet Things J. 9(5): 3321-3332 (2022) - [j229]Chao Lin, Min Luo, Xinyi Huang, Kim-Kwang Raymond Choo, Debiao He:
An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof. IEEE Syst. J. 16(1): 1592-1601 (2022) - 2021
- [j215]Chao Lin, Debiao He, Hongjie Zhang, Lisong Shao, Xinyi Huang:
Privacy-Enhancing Decentralized Anonymous Credential in Smart Grids. Comput. Stand. Interfaces 75: 103505 (2021) - [j202]Chao Lin, Debiao He, Xinyi Huang, Xiang Xie, Kim-Kwang Raymond Choo:
PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications. IEEE Syst. J. 15(3): 4367-4378 (2021) - [j197]Chao Lin, Debiao He, Xinyi Huang, Kim-Kwang Raymond Choo:
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 16: 3241-3253 (2021) - [j194]Chao Lin, Debiao He, Xinyi Huang, Neeraj Kumar, Kim-Kwang Raymond Choo:
BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 22(12): 7408-7420 (2021) - [j191]Chao Lin, Debiao He, Sherali Zeadally, Xinyi Huang, Zhe Liu:
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities. ACM Trans. Internet Techn. 21(2): 40:1-40:21 (2021) - 2020
- [j177]Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo, Jing Wang:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IEICE Trans. Inf. Syst. 103-D(2): 188-195 (2020) - [j175]Qi Feng, Debiao He, Huaqun Wang, Ding Wang, Xinyi Huang:
Multi-party key generation protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography. IET Inf. Secur. 14(6): 724-732 (2020) - [j174]Chao Lin, Debiao He, Neeraj Kumar, Xinyi Huang, Pandi Vijayakumar, Kim-Kwang Raymond Choo:
HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes. IEEE Internet Things J. 7(2): 818-829 (2020) - [j171]Chao Lin, Debiao He, Xinyi Huang, Xiang Xie, Kim-Kwang Raymond Choo:
Blockchain-based system for secure outsourcing of bilinear pairings. Inf. Sci. 527: 590-601 (2020) - [j158]Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain. IEEE Trans. Inf. Forensics Secur. 15: 2440-2452 (2020) - [j152]Jian Shen, Dengzhi Liu, Debiao He, Xinyi Huang, Yang Xiang:
Algebraic Signatures-Based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing. IEEE Trans. Sustain. Comput. 5(2): 161-173 (2020) - [c16]Yudi Zhang, Debiao He, Fangguo Zhang, Xinyi Huang, Dawei Li:
An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm. Inscrypt 2020: 368-384 - 2018
- [j132]Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems. IEEE Access 6: 28203-28212 (2018) - [j127]Chao Lin, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Alexey V. Vinel, Xinyi Huang:
Security and Privacy for the Internet of Drones: Challenges and Solutions. IEEE Commun. Mag. 56(1): 64-69 (2018) - [j119]Chao Lin, Debiao He, Xinyi Huang, Kim-Kwang Raymond Choo, Athanasios V. Vasilakos:
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0. J. Netw. Comput. Appl. 116: 42-52 (2018) - [i25]Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IACR Cryptol. ePrint Arch. 2018: 814 (2018) - 2017
- [c9]Zhiqiang Xu, Debiao He, Xinyi Huang:
Secure and Efficient Two-Factor Authentication Protocol Using RSA Signature for Multi-server Environments. ICICS 2017: 595-605 - 2015
- [j43]Debiao He, Sherali Zeadally, Baowen Xu, Xinyi Huang:
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 10(12): 2681-2691 (2015)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint