scispace - formally typeset
D

Debiao He

Researcher at Wuhan University

Publications -  299
Citations -  13437

Debiao He is an academic researcher from Wuhan University. The author has contributed to research in topics: Computer science & Authentication. The author has an hindex of 49, co-authored 231 publications receiving 8888 citations. Previous affiliations of Debiao He include Nanjing University of Posts and Telecommunications & Anhui University.

Papers
More filters
Journal ArticleDOI

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

TL;DR: This work proposes a CPPA scheme for VANETs that does not use bilinear paring and demonstrates that it could supports both the mutual authentication and the privacy protection simultaneously and yields a better performance in terms of computation cost and communication cost.
Journal ArticleDOI

A survey on privacy protection in blockchain system

TL;DR: The privacy threats in blockchain are analyzed and existing cryptographic defense mechanisms, i.e., anonymity and transaction privacy preservation, are discussed to preserve privacy when blockchain is used.
Journal ArticleDOI

Blockchain in healthcare applications: Research challenges and opportunities

TL;DR: Concerns as blockchain technology has its own specific vulnerabilities and issues that need to be addressed, such as mining incentives, mining attacks, and key management are highlighted in this survey paper.
Journal ArticleDOI

Anonymous Authentication for Wireless Body Area Networks With Provable Security

TL;DR: A new anonymous authentication scheme for WBANs is proposed and it is proved that it is provably secure and overcomes the security weaknesses in previous schemes but also has the same computation costs at a client side.
Journal ArticleDOI

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

TL;DR: The present study makes the first step towards understanding the underlying evaluation metric for anonymous two-factor authentication, which is believed to facilitate better design of anonymousTwo-factor protocols that offer acceptable trade-offs among usability, security and privacy.