Debiao He

ORCID: 0000-0002-2446-7436
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Advanced Authentication Protocols Security
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • User Authentication and Security Systems
  • Cloud Data Security Solutions
  • Vehicular Ad Hoc Networks (VANETs)
  • Cryptography and Residue Arithmetic
  • Complexity and Algorithms in Graphs
  • Security in Wireless Sensor Networks
  • Internet Traffic Analysis and Secure E-voting
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • IoT and Edge/Fog Computing
  • Coding theory and cryptography
  • Biometric Identification and Security
  • Security and Verification in Computing
  • Smart Grid Security and Resilience
  • Advanced Steganography and Watermarking Techniques
  • Advanced Malware Detection Techniques
  • RFID technology advancements
  • Digital Rights Management and Security
  • Quantum Computing Algorithms and Architecture
  • Network Security and Intrusion Detection
  • Wireless Body Area Networks

Wuhan University
2016-2025

Qilu University of Technology
2021-2025

Shandong Academy of Sciences
2021-2025

Hangzhou Normal University
2022-2024

State Key Laboratory of Cryptology
2016-2023

Beihang University
2022-2023

Peng Cheng Laboratory
2019-2022

Shanghai Huali Microelectronics (China)
2022

Guilin University of Electronic Technology
2016-2021

Wuchang University of Technology
2021

By broadcasting messages about traffic status to vehicles wirelessly, a vehicular ad hoc network (VANET) can improve safety and efficiency. To guarantee secure communication in VANETs, security privacy issues must be addressed before their deployment. The conditional privacy-preserving authentication (CPPA) scheme is suitable for solving problems because it supports both mutual protection simultaneously. Many identity-based CPPA schemes VANETs using bilinear pairings have been proposed over...

10.1109/tifs.2015.2473820 article EN IEEE Transactions on Information Forensics and Security 2015-08-31

10.1016/j.jnca.2018.10.020 article EN Journal of Network and Computer Applications 2018-11-13

Advances in wireless communications, embedded systems, and integrated circuit technologies have enabled the body area network (WBAN) to become a promising networking paradigm. Over last decade, as an important part of Internet Things, we witnessed WBANs playing increasing role modern medical systems because its capabilities collect real-time biomedical data through intelligent sensors or around patients' send collected remote personnel for clinical diagnostics. not only bring us conveniences...

10.1109/jsyst.2016.2544805 article EN IEEE Systems Journal 2016-04-22

Despite two decades of intensive research, it remains a challenge to design practical anonymous two-factor authentication scheme, for the designers are confronted with an impressive list security requirements (e.g., resistance smart card loss attack) and desirable attributes local password update). Numerous solutions have been proposed, yet most them shortly found either unable satisfy some critical or short few important features. To overcome this unsatisfactory situation, researchers often...

10.1109/tdsc.2014.2355850 article EN IEEE Transactions on Dependable and Secure Computing 2014-09-10

The authentication scheme is an important cryptographic mechanism, through which two communication parties could authenticate each other in the open network environment. To satisfy requirement of practical applications, many schemes using passwords and smart cards have been proposed. However, might be divulged or forgotten, shared, lost, stolen. In contrast, biometric methods, such as fingerprints iris scans, no drawbacks. Therefore, biometrics-based gain wide attention. this paper, we...

10.1109/jsyst.2014.2301517 article EN IEEE Systems Journal 2014-02-06

A recent trend in both industry and research is the Internet of Drones, which has applications civilian military settings. However, drones (also known as unmanned aerial vehicles) are generally not designed with security mind, there fundamental privacy issues that need study. Hence, this article, we study architecture its requirements. We also outline potential solutions to address challenging such leakage, data confidentiality protection, flexible accessibility, hope article will provide...

10.1109/mcom.2017.1700390 article EN IEEE Communications Magazine 2018-01-01

Advances in information and communication technologies have led to the emergence of Internet Things (IoT). In healthcare environment, use IoT brings convenience physicians patients as they can be applied various medical areas (such constant real-time monitoring, patient management, emergency blood health management). The radio-frequency identification (RFID) technology is one core deployments environment. To satisfy security requirements RFID IoT, many authentication schemes been proposed...

10.1109/jiot.2014.2360121 article EN IEEE Internet of Things Journal 2014-09-23

Wireless sensor networks (WSNs) will be integrated into the future Internet as one of components Things, and become globally addressable by any entity connected to Internet. Despite great potential this integration, it also brings new threats, such exposure nodes attacks originating from In context, lightweight authentication key agreement protocols must in place enable end-to-end secure communication. Recently, Amin et al. proposed a three-factor mutual protocol for WSNs. However, we...

10.1109/access.2017.2673239 article EN cc-by-nc-nd IEEE Access 2017-01-01

Data sharing in cloud computing enables multiple participants to freely share the group data, which improves efficiency of work cooperative environments and has widespread potential applications. However, how ensure security data within a efficiently outsourced manner are formidable challenges. Note that key agreement protocols have played very important role secure efficient computing. In this paper, by taking advantage symmetric balanced incomplete block design (SBIBD), we present novel...

10.1109/tdsc.2017.2725953 article EN IEEE Transactions on Dependable and Secure Computing 2017-07-12

Achieving low latency and providing real-time services are two of several key challenges in conventional cloud-based smart grid systems, hence, there has been an increasing trend moving to edge computing. While have a number cryptographic protocols designed facilitate secure communications existing generally do not support conditional anonymity flexible management. Thus, this article, we introduce blockchain-based mutual authentication agreement protocol for edge-computing-based systems....

10.1109/tii.2019.2936278 article EN publisher-specific-oa IEEE Transactions on Industrial Informatics 2019-08-22

Wireless body area networks (WBANs) consist of many small low-power sensors, through which users could monitor the real-time parameters patients' physiology remotely. This capability improve medical care and monitoring patients. WBAN devices typically have limited computing, storage, power, communication capabilities. These limitations restrict applications that WBANs can support. To enhance capabilities WBANs, concept cloud-assisted has been introduced recently. By using cloud computing...

10.1109/jsyst.2015.2428620 article EN IEEE Systems Journal 2015-05-21

With the widespread adoption of Internet Things and cloud computing in different industry sectors, an increasing number individuals or organizations are outsourcing their Industrial (IIoT) data server to achieve cost saving collaboration (e.g., sharing). However, this environment, preserving privacy remains a key challenge inhibiting factor even wider IIoT environment. To mitigate these issues, paper, we design new secure channel-free certificateless searchable public encryption with...

10.1109/tii.2017.2703922 article EN IEEE Transactions on Industrial Informatics 2017-05-12

Recent advances in healthcare technologies along with improved medical care have led to a steady increase life expectancy over the past few decades. As result, we been witnessing significant growth number of elderly people around world. Ensuring comfortable living environment for has gained much attention recent years. By leveraging information and communication technologies, AAL system shows great promise satisfying many requirements enables them live safely, securely, healthily,...

10.1109/mcom.2015.7010518 article EN IEEE Communications Magazine 2015-01-01

If all vehicles are connected together through a wireless communication channel, vehicular ad hoc networks (VANETs) can support wide range of real-time traffic information services, such as intelligent routing, weather monitoring, emergency call, etc. However, the accuracy and credibility transmitted messages among VANETs paramount importance life may depend on it. In this article we introduce novel framework called blockchain-assisted privacy-preserving authentication system (BPAS) that...

10.1109/tii.2019.2948053 article EN IEEE Transactions on Industrial Informatics 2019-10-17

The Universal Serial Bus (USB) is an extremely popular interface standard for computer peripheral connections and widely used in consumer Mass Storage Devices (MSDs). While current USB MSDs provide relatively high transmission speed are convenient to carry, the use of has been prohibited many commercial everyday environments primarily due security concerns. Security protocols have previously proposed a recent approach utilize multi-factor authentication. This paper proposes significant...

10.1109/tce.2014.6780922 article EN IEEE Transactions on Consumer Electronics 2014-02-01

Industrial Internet of Things (IIoT) integrates various types intelligent terminals, mobile devices, and communication technologies to enable the upgrade traditional industries industries. IIoT relies on powerful data processing capabilities cloud computing reduce cost on-demand services as per requirements users. However, privacy confidentiality outsourced should be protected in this environment because are typically "handled" by a third-party service provider. An encryption technique can...

10.1109/tii.2017.2771382 article EN IEEE Transactions on Industrial Informatics 2017-11-08
Coming Soon ...