H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 57 Citations 10,612 230 World Ranking 1932 National Ranking 180

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Cryptography

Debiao He mostly deals with Computer security, Computer network, Authentication, Authentication protocol and Mutual authentication. His Computer security research focuses on Public-key cryptography, Cryptography, Multi-factor authentication, Anonymity and Smart card. His work in Computer network is not limited to one particular discipline; it also encompasses Wireless.

He has included themes like Body area network, Elliptic curve cryptography, Mobile computing and Information and Communications Technology in his Authentication study. The various areas that Debiao He examines in his Authentication protocol study include Roaming and Mobile device. His studies in Mutual authentication integrate themes in fields like Key-agreement protocol, Cryptanalysis and Message authentication code.

His most cited work include:

  • An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks (315 citations)
  • Robust Biometrics-Based Authentication Scheme for Multiserver Environment (254 citations)
  • Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment (239 citations)

What are the main themes of his work throughout his whole career to date?

His primary scientific interests are in Computer security, Computer network, Authentication, Public-key cryptography and Random oracle. Password, Encryption, Key, Cryptography and Elliptic curve cryptography are subfields of Computer security in which his conducts study. His Computer network research is multidisciplinary, incorporating elements of Wireless and Mobile device.

The concepts of his Authentication study are interwoven with issues in The Internet, Secure communication, Mobile computing and Anonymity. The Public-key cryptography study combines topics in areas such as Secret sharing, Server and Digital signature. Debiao He combines subjects such as Signature, Theoretical computer science, Distributed computing and Provable security with his study of Random oracle.

He most often published in these fields:

  • Computer security (70.61%)
  • Computer network (40.46%)
  • Authentication (26.34%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (70.61%)
  • Computer network (40.46%)
  • Public-key cryptography (22.14%)

In recent papers he was focusing on the following fields of study:

Debiao He spends much of his time researching Computer security, Computer network, Public-key cryptography, Authentication and Blockchain. His study in Computer security concentrates on Cryptography, Anonymity, Computer security model, Cryptocurrency and Smart contract. His Computer network research is multidisciplinary, relying on both Wireless and Edge computing.

His Public-key cryptography research is multidisciplinary, incorporating perspectives in Signature and Digital signature. His studies deal with areas such as Random oracle, The Internet and Wireless ad hoc network as well as Authentication. His Blockchain study incorporates themes from Control, Cryptographic protocol and Internet privacy.

Between 2019 and 2021, his most popular works were:

  • Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure (39 citations)
  • BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks (27 citations)
  • HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes (25 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Computer network
  • Cryptography

His primary scientific interests are in Blockchain, Authentication, Computer network, Computer security and Public-key cryptography. His study looks at the intersection of Blockchain and topics like Internet privacy with Electronic health record, Control and Identity management. Debiao He works in the field of Authentication, namely Mutual authentication.

The study incorporates disciplines such as Wireless ad hoc network, Scalability and Revocation in addition to Computer network. His research combines The Internet and Computer security. His Public-key cryptography research integrates issues from Cryptographic primitive, Protocol, Cryptography and Digital signature.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Debiao He;Sherali Zeadally;Baowen Xu;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2015)

413 Citations

Robust Biometrics-Based Authentication Scheme for Multiserver Environment

Debiao He;Ding Wang.
IEEE Systems Journal (2015)

358 Citations

Anonymous Authentication for Wireless Body Area Networks With Provable Security

Debiao He;Sherali Zeadally;Neeraj Kumar;Jong-Hyouk Lee.
IEEE Systems Journal (2017)

341 Citations

Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment

Ding Wang;Debiao He;Ping Wang;Chao-Hsien Chu.
IEEE Transactions on Dependable and Secure Computing (2015)

324 Citations

An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

Debiao He;Sherali Zeadally.
IEEE Internet of Things Journal (2015)

285 Citations

A survey on privacy protection in blockchain system

Qi Feng;Debiao He;Sherali Zeadally;Muhammad Khurram Khan.
Journal of Network and Computer Applications (2019)

244 Citations

Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks

Debiao He;Neeraj Kumar;Jianhua Chen;Cheng-Chi Lee.
Multimedia Systems (2015)

242 Citations

A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks

Debiao He;Neeraj Kumar;Naveen Chilamkurti.
Information Sciences (2015)

225 Citations

Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks

Debiao He;Sherali Zeadally;Libing Wu.
IEEE Systems Journal (2018)

198 Citations

Authentication protocol for an ambient assisted living system

Debiao He;Sherali Zeadally.
IEEE Communications Magazine (2015)

192 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Debiao He

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 118

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 112

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 105

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 80

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 68

Cheng-Chi Lee

Cheng-Chi Lee

Fu Jen Catholic University

Publications: 44

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 43

Joel J. P. C. Rodrigues

Joel J. P. C. Rodrigues

Federal University of Piauí

Publications: 36

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 27

Arun Kumar Sangaiah

Arun Kumar Sangaiah

Vellore Institute of Technology University

Publications: 25

Fan Wu

Fan Wu

Shanghai Jiao Tong University

Publications: 24

Sherali Zeadally

Sherali Zeadally

University of Kentucky

Publications: 24

Mohammad S. Obaidat

Mohammad S. Obaidat

University of Jordan

Publications: 24

Fadi Al-Turjman

Fadi Al-Turjman

Near East University

Publications: 22

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 20

Something went wrong. Please try again later.