抑郁症健康,内容丰富有趣,生活中的好帮手!
抑郁症健康 > 武大计算机学院钱铁云 何德彪(武汉大学计算机学院教授)_百度百科

武大计算机学院钱铁云 何德彪(武汉大学计算机学院教授)_百度百科

时间:2019-06-18 04:21:00

相关推荐

发表论文

[1].Debiao He, Sherali Zeadally, Baowen Xu, Xinyi Huang, An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks, IEEE Transactions on Information Forensics& Security (SCI), DOI: 10.1109/TIFS..2473820,.

[2].Debiao He, Sherali Zeadally, Libing Wu. Certificatelesspublic auditing scheme for cloud-assisted wireless body area networks, IEEE Systems Journal(SCI), DOI: 10.1109/JSYST..2428620, .

[3].Debiao He, Neeraj Kumar, Naveen Chilamkurti. A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks, Information Sciences (SCI) , , 321: 263-277.

[4].Debiao He, Sherali Zeadally. Authentication protocol for ambient assisted living system, IEEE Communications Magazine(SCI) , , 35(1): 71-77.

[5].Debiao He, Sherali Zeadally. An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography, IEEE Internet of Things Journal, , 2(1): 72-83.

[6].Debiao He, Neeraj Kumar, Jong-Hyouk Lee. Secure pseudonym-based near field communication protocol for the consumer internet of things, IEEE Transactions on Consumer Electronics(SCI) , , 61(1): 56-63.

[7].Debiao He, Ding Wang. Robust biometrics-based authentication scheme for multi-server environment, IEEE Systems Journal(SCI) , , 9(3): 816-823.

[8].Debiao He, Neeraj Kumar, Jianhua Chen, et al. Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks, Multimedia Systems(SCI) , , 21(1): 49-60.

[9].Debiao He, Muhammad Khurram Khan, Neeraj Kumar. A new handover authentication protocol based on bilinear pairing functions for wireless networks, International Journal of Ad Hoc and Ubiquitous Computing(SCI), , 18(1-2): 67-74.

[10].Debiao He, Yuanyuan Zhang, Jianhua Chen. Robust biometric-based user authentication scheme for wireless sensor networks, Ad Hoc & Sensor Wireless Networks(SCI), ,25(3-4): 309-321.

[11].Debiao He, Miaomiao Tian, Jianhua Chen. Insecurity of an efficient certificateless aggregate signature with constant pairing computations, Information Sciences (SCI), , 268(1): 458–462.

[12].Debiao He, Neeraj Kumar, Jong-Hyouk Lee. Enhanced three-factor security protocol for USB consumer storage devices, IEEE Transactions on Consumer Electronics (SCI), , 60(1): 30-37.

[13].Debiao He, Yuanyuan Zhang, Jianhua Chen. Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks, Wireless Personal Communications (SCI), 74(2): 229-243, .

[14].Debiao He, Neeraj Kumar, Naveen Chilamkurti, Jong-Hyouk Lee. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol, Journal of Medical Systems (SCI), 38(10): 1-6, .

[15].Debiao He, Neeraj Kumar, Muhammad Khurram Khan, Jong-Hyouk Lee. Anonymous two-factor authentication for consumer roaming service in Global Mobility Networks, IEEE Transactions on Consumer Electronics (SCI), , 59(4): 811-817.

[16].Debiao He, Hao Hu. Cryptanalysis of a Dynamic ID-based remote user authentication scheme with access control for multi-server environment, IEICE Transactions on Information and Systems (SCI), , E96-D (1): 138-140.

[17].Debiao He, Yitao Chen, Jianhua Chen. An efficient secure certificateless proxy signature scheme without pairings, Mathematical and Computer Modelling (SCI), , 57(9-10): 2510-2518.

[18].Debiao He, Shuhua Wu. Security flaws in a smart card based authentication scheme for multi-server environment, Wireless Personal Communications (SCI), , 70(1): 323-329.

[19].Debiao He, Ding Wang, Shuhua Wu. Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards, Information Technology and Control (SCI), , 42(2): 170-177.

[20].Debiao He, Baojun Huang, Jianhua Chen. New certificateless short signature scheme, IET Information Security (SCI), , 7(2): 113-117.

[21].Debiao He, Shuhua Wu, Jianhua Chen. Note on Design of improved password authentication and updating scheme based on elliptic curve cryptography, Mathematical and Computer Modelling (SCI), , 55(3-4): 1661–1664.

[22].Debiao He, Jianhua Chen, Jin Hu. A pairing-free certificateless authenticated key agreement protocol, International Journal of Communication Systems (SCI), , 25(2): 221-230.

[23].Debiao He, Jianhua Chen, Jin Hu. An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security, Information Fusion (SCI), , 13(3): 223–230.

[24].Debiao He. An efficient remote user authentication and key exchange protocol for mobile client-server environment from pairings, Ad Hoc Networks (SCI), , 10(6): 1009–1016.

[25].Debiao He, Jianhua Chen, Rui Zhang. A more secure authentication scheme for telecare medicine information systems, Journal of Medical Systems (SCI), , 36(3), 1989-1995.

[26].Debiao He, Cryptanalysis of an authenticated key agreement protocol for wireless mobile communications, ETRI Journal (SCI), , 34(3): 482–484.

[27].Debiao He, Jianhua Chen, Jin Hu. Improvement on a smart card based password authentication scheme, Journal of Internet Technology (SCI), , 13(3): 405–410.

[28].Debiao He, Hao Hu. Cryptanalysis of a smartcard-based user authentication scheme for multi-server environments, IEICE Transactions on Communications (SCI), , E95-B(9): 3052-3054.

[29].Debiao He, Sahadeo Padhye, Jianhua Chen. An efficient certificateless two-party authenticated key agreement protocol, Computers & Mathematics with Applications (SCI), , 64(6): 1914–1926.

[30].Debiao He, Jianhua Chen, Rui Zhang. An efficient and provably-secure certificateless signature scheme without bilinear pairings, International Journal of Communication Systems (SCI), , 25(11), 1432–1442.

[31].Debiao He, Jianhua Chen, Yitao Chen. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography, Security and Communication Networks (SCI), , 5(12): 1423-1429.

[32].Debiao He, Jianhua Chen, Jin Hu. An authentication key agreement protocol using isogenies between elliptic curves, International Journal of Computers Communications & Control (SCI), , 6(2): 251-258.

[33].Debiao He, Jianhua Chen, Rui Zhang. An efficient identity-based blind signature scheme without bilinear pairings, Computers & Electrical Engineering (SCI, IF: 0.837), , 37(4): 444–450.

[34].Debiao He, Yitao Chen, Jianhua Chen, Rui Zhang. A new two-round certificateless authenticated key agreement protocol without bilinear pairings, Mathematical and Computer Modelling (SCI), , 54(11-12): 3143–3152.

[35].Debiao He, Jianhua Chen, Jin Hu. An ID-based proxy signature schemes without bilinear pairings, Annals of Telecommunications (SCI), , 66(11-12): 657–662.[3]

如果觉得《武大计算机学院钱铁云 何德彪(武汉大学计算机学院教授)_百度百科》对你有帮助,请点赞、收藏,并留下你的观点哦!

本内容不代表本网观点和政治立场,如有侵犯你的权益请联系我们处理。
网友评论
网友评论仅供其表达个人看法,并不表明网站立场。