D
Debiao He
Researcher at Wuhan University
Publications - 299
Citations - 13437
Debiao He is an academic researcher from Wuhan University. The author has contributed to research in topics: Computer science & Authentication. The author has an hindex of 49, co-authored 231 publications receiving 8888 citations. Previous affiliations of Debiao He include Nanjing University of Posts and Telecommunications & Anhui University.
Papers
More filters
Journal ArticleDOI
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
TL;DR: This work proposes a CPPA scheme for VANETs that does not use bilinear paring and demonstrates that it could supports both the mutual authentication and the privacy protection simultaneously and yields a better performance in terms of computation cost and communication cost.
Journal ArticleDOI
A survey on privacy protection in blockchain system
TL;DR: The privacy threats in blockchain are analyzed and existing cryptographic defense mechanisms, i.e., anonymity and transaction privacy preservation, are discussed to preserve privacy when blockchain is used.
Journal ArticleDOI
Blockchain in healthcare applications: Research challenges and opportunities
TL;DR: Concerns as blockchain technology has its own specific vulnerabilities and issues that need to be addressed, such as mining incentives, mining attacks, and key management are highlighted in this survey paper.
Journal ArticleDOI
Anonymous Authentication for Wireless Body Area Networks With Provable Security
TL;DR: A new anonymous authentication scheme for WBANs is proposed and it is proved that it is provably secure and overcomes the security weaknesses in previous schemes but also has the same computation costs at a client side.
Journal ArticleDOI
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
TL;DR: The present study makes the first step towards understanding the underlying evaluation metric for anonymous two-factor authentication, which is believed to facilitate better design of anonymousTwo-factor protocols that offer acceptable trade-offs among usability, security and privacy.