Debiao He mostly deals with Computer security, Computer network, Authentication, Authentication protocol and Mutual authentication. His Computer security research focuses on Public-key cryptography, Cryptography, Multi-factor authentication, Anonymity and Smart card. His work in Computer network is not limited to one particular discipline; it also encompasses Wireless.
He has included themes like Body area network, Elliptic curve cryptography, Mobile computing and Information and Communications Technology in his Authentication study. The various areas that Debiao He examines in his Authentication protocol study include Roaming and Mobile device. His studies in Mutual authentication integrate themes in fields like Key-agreement protocol, Cryptanalysis and Message authentication code.
His primary scientific interests are in Computer security, Computer network, Authentication, Public-key cryptography and Random oracle. Password, Encryption, Key, Cryptography and Elliptic curve cryptography are subfields of Computer security in which his conducts study. His Computer network research is multidisciplinary, incorporating elements of Wireless and Mobile device.
The concepts of his Authentication study are interwoven with issues in The Internet, Secure communication, Mobile computing and Anonymity. The Public-key cryptography study combines topics in areas such as Secret sharing, Server and Digital signature. Debiao He combines subjects such as Signature, Theoretical computer science, Distributed computing and Provable security with his study of Random oracle.
Debiao He spends much of his time researching Computer security, Computer network, Public-key cryptography, Authentication and Blockchain. His study in Computer security concentrates on Cryptography, Anonymity, Computer security model, Cryptocurrency and Smart contract. His Computer network research is multidisciplinary, relying on both Wireless and Edge computing.
His Public-key cryptography research is multidisciplinary, incorporating perspectives in Signature and Digital signature. His studies deal with areas such as Random oracle, The Internet and Wireless ad hoc network as well as Authentication. His Blockchain study incorporates themes from Control, Cryptographic protocol and Internet privacy.
His primary scientific interests are in Blockchain, Authentication, Computer network, Computer security and Public-key cryptography. His study looks at the intersection of Blockchain and topics like Internet privacy with Electronic health record, Control and Identity management. Debiao He works in the field of Authentication, namely Mutual authentication.
The study incorporates disciplines such as Wireless ad hoc network, Scalability and Revocation in addition to Computer network. His research combines The Internet and Computer security. His Public-key cryptography research integrates issues from Cryptographic primitive, Protocol, Cryptography and Digital signature.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
Debiao He;Sherali Zeadally;Baowen Xu;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2015)
Robust Biometrics-Based Authentication Scheme for Multiserver Environment
Debiao He;Ding Wang.
IEEE Systems Journal (2015)
Anonymous Authentication for Wireless Body Area Networks With Provable Security
Debiao He;Sherali Zeadally;Neeraj Kumar;Jong-Hyouk Lee.
IEEE Systems Journal (2017)
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Ding Wang;Debiao He;Ping Wang;Chao-Hsien Chu.
IEEE Transactions on Dependable and Secure Computing (2015)
An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography
Debiao He;Sherali Zeadally.
IEEE Internet of Things Journal (2015)
A survey on privacy protection in blockchain system
Qi Feng;Debiao He;Sherali Zeadally;Muhammad Khurram Khan.
Journal of Network and Computer Applications (2019)
Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks
Debiao He;Neeraj Kumar;Jianhua Chen;Cheng-Chi Lee.
Multimedia Systems (2015)
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
Debiao He;Neeraj Kumar;Naveen Chilamkurti.
Information Sciences (2015)
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
Debiao He;Sherali Zeadally;Libing Wu.
IEEE Systems Journal (2018)
Authentication protocol for an ambient assisted living system
Debiao He;Sherali Zeadally.
IEEE Communications Magazine (2015)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: