Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Liqun Chen
2010 – today
- 2013
[c63]Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello: Fair Private Set Intersection with a Semi-trusted Arbiter. DBSec 2013: 128-144
[c62]Liqun Chen, Hoon Wei Lim, Guomin Yang: Cross-domain password-based authenticated key exchange revisited. INFOCOM 2013: 1052-1060
[c61]Klaus Potzmader, Johannes Winter, Daniel Hein, Christian Hanser, Peter Teufl, Liqun Chen: Group Signatures on Mobile Devices: Practical Experiences. TRUST 2013: 47-64
[i26]Changyu Dong, Liqun Chen, Zikai Wen: When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol. IACR Cryptology ePrint Archive 2013: 515 (2013)- 2012
[j18]
[j17]Liqun Chen, Jiangtao Li: VLR group signatures with indisputable exculpability and efficient revocation. IJIPSI 1(2/3): 129-159 (2012)
[j16]Liqun Chen, Yu Chen: The n-Diffie-Hellman problem and multiple-key encryption. Int. J. Inf. Sec. 11(5): 305-320 (2012)
[c60]Nigel Edwards, Liqun Chen: An historical examination of open source releases and their vulnerabilities. ACM Conference on Computer and Communications Security 2012: 183-194
[c59]Ernie Brickell, Liqun Chen, Jiangtao Li: A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes. INTRUST 2012: 95-111
[c58]
[e8]Liqun Chen, Moti Yung, Liehuang Zhu (Eds.): Trusted Systems - Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7222, Springer 2012, ISBN 978-3-642-32297-6
[i25]Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello: Fair Private Set Intersection with a Semi-trusted Arbiter. IACR Cryptology ePrint Archive 2012: 252 (2012)
[i24]
[i23]Liqun Chen, Hoon Wei Lim, Guomin Yang: Cross-Domain Password-Based Authenticated Key Exchange Revisited. IACR Cryptology ePrint Archive 2012: 397 (2012)
[i22]Ben Smyth, Mark Dermot Ryan, Liqun Chen: Formal analysis of privacy in Direct Anonymous Attestation schemes. IACR Cryptology ePrint Archive 2012: 650 (2012)- 2011
[j15]Qiang Tang, Liqun Chen: Extended KCI attack against two-party key establishment protocols. Inf. Process. Lett. 111(15): 744-747 (2011)
[j14]Liqun Chen, Siaw-Lynn Ng, Guilin Wang: Threshold Anonymous Announcement in VANETs. IEEE Journal on Selected Areas in Communications 29(3): 605-615 (2011)
[c57]Siani Pearson, Marco Casassa Mont, Liqun Chen, Archie Reed: End-to-End Policy-Based Encryption and Management of Data in the Cloud. CloudCom 2011: 764-771
[c56]Helen Balinsky, Liqun Chen, Steven J. Simske: Publicly posted composite documents with identity based encryption. ACM Symposium on Document Engineering 2011: 239-248
[c55]Yu Chen, Liqun Chen, Zongyang Zhang: CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. ICISC 2011: 275-301
[c54]Ben Smyth, Mark Ryan, Liqun Chen: Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes. Formal Aspects in Security and Trust 2011: 245-262
[c53]
[c52]Ernie Brickell, Liqun Chen, Jiangtao Li: A (Corrected) DAA Scheme Using Batch Proof and Verification. INTRUST 2011: 304-337
[c51]Yu Chen, Liqun Chen, Zhong Chen: Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. ISPEC 2011: 40-54
[c50]
[c49]Helen Balinsky, Liqun Chen, Steven J. Simske: Premature silent workflow termination in publicly posted composite documents. SMC 2011: 1292-1297
[c48]Liqun Chen, Ming-Feng Lee, Bogdan Warinschi: Security of the Enhanced TCG Privacy-CA Solution. TGC 2011: 121-141
[e7]Liqun Chen (Ed.): Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings. Lecture Notes in Computer Science 7089, Springer 2011, ISBN 978-3-642-25515-1
[e6]Liqun Chen, Moti Yung (Eds.): Trusted Systems - Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6802, Springer 2011, ISBN 978-3-642-25282-2
[i21]Yu Chen, Liqun Chen, Zhong Chen: Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. IACR Cryptology ePrint Archive 2011: 90 (2011)
[i20]Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter: Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. IACR Cryptology ePrint Archive 2011: 101 (2011)
[i19]Liqun Chen, Yu Chen: The n-Diffie-Hellman Problem and its Applications. IACR Cryptology ePrint Archive 2011: 397 (2011)
[i18]Yu Chen, Liqun Chen, Zongyang Zhang: CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. IACR Cryptology ePrint Archive 2011: 593 (2011)- 2010
[j13]Liqun Chen, Jiangtao Li: A note on the Chen-Morrissey-Smart DAA scheme. Inf. Process. Lett. 110(12-13): 485-488 (2010)
[j12]Liqun Chen, Siaw-Lynn Ng: Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga. IEEE T. Vehicular Technology 59(3): 1503-1505 (2010)
[c47]Liqun Chen, Dan Page, Nigel P. Smart: On the Design and Implementation of an Efficient DAA Scheme. CARDIS 2010: 223-237
[c46]
[c45]Yu Chen, Liqun Chen: The Twin Bilinear Diffie-Hellman Inversion Problem and Applications. ICISC 2010: 113-132
[c44]
[c43]Christian Wachsmann, Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter: Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. ISC 2010: 84-98
[c42]Frederik Armknecht, Liqun Chen, Ahmad-Reza Sadeghi, Christian Wachsmann: Anonymous Authentication for RFID Systems. RFIDSec 2010: 158-175
[c41]Liqun Chen, Jiangtao Li: VLR Group Signatures with Indisputable Exculpability and Efficient Revocation. SocialCom/PASSAT 2010: 727-734
[c40]
[e5]Liqun Chen, Moti Yung (Eds.): Trusted Systems, First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers. Lecture Notes in Computer Science 6163, Springer 2010, ISBN 978-3-642-14596-4
[i17]Liqun Chen: A DAA Scheme Requiring Less TPM Resources. IACR Cryptology ePrint Archive 2010: 8 (2010)
2000 – 2009
- 2009
[j11]Ernie Brickell, Liqun Chen, Jiangtao Li: Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. Int. J. Inf. Sec. 8(5): 315-330 (2009)
[c39]Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan Warinschi: Security Notions and Generic Constructions for Client Puzzles. ASIACRYPT 2009: 505-523
[c38]
[c37]
[c36]Liqun Chen, Mark Ryan: Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. Formal Aspects in Security and Trust 2009: 201-216
[c35]Dalia Khader, Liqun Chen, James H. Davenport: Certificate-Free Attribute Authentication. IMA Int. Conf. 2009: 301-325
[c34]Serdar Cabuk, Liqun Chen, David Plaquin, Mark Ryan: Trusted Integrity Measurement and Reporting for Virtualized Platforms. INTRUST 2009: 180-196
[c33]Helen Balinsky, Edward McDonnell, Liqun Chen, Keith A. Harrison: Anti-counterfeiting Using Memory Spots. WISTP 2009: 52-67
[e4]Liqun Chen, Chris J. Mitchell, Andrew Martin (Eds.): Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings. Lecture Notes in Computer Science 5471, Springer 2009, ISBN 978-3-642-00586-2
[i16]Liqun Chen, Paul Morrissey, Nigel P. Smart: DAA: Fixing the pairing based protocols. IACR Cryptology ePrint Archive 2009: 198 (2009)
[i15]Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan Warinschi: Security Notions and Generic Constructions for Client Puzzles. IACR Cryptology ePrint Archive 2009: 331 (2009)
[i14]Liqun Chen, Dan Page, Nigel P. Smart: On the Design and Implementation of an Efficient DAA Scheme. IACR Cryptology ePrint Archive 2009: 598 (2009)- 2008
[j10]Guido Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, Gerardo Pelosi: A pairing SW implementation for Smart-Cards. Journal of Systems and Software 81(7): 1240-1247 (2008)
[j9]Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008)
[j8]Liqun Chen, Qiang Tang: Bilateral Unknown Key-Share Attacks in Key Agreement Protocols. J. UCS 14(3): 416-440 (2008)
[c32]Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: Property-Based Attestation without a Trusted Third Party. ISC 2008: 31-46
[c31]
[c30]Liqun Chen, Paul Morrissey, Nigel P. Smart: On Proofs of Security for DAA Schemes. ProvSec 2008: 156-175
[c29]Ernie Brickell, Liqun Chen, Jiangtao Li: A New Direct Anonymous Attestation Scheme from Bilinear Maps. TRUST 2008: 166-178
[c28]Adrian Leung, Liqun Chen, Chris J. Mitchell: On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). TRUST 2008: 179-190
[e3]Liqun Chen, Steve Kremer, Mark Dermot Ryan (Eds.): Formal Protocol Verification Applied, 14.10. - 19.10.2007. Dagstuhl Seminar Proceedings 07421, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
[e2]Liqun Chen, Mark Dermot Ryan, Guilin Wang (Eds.): Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings. Lecture Notes in Computer Science 5308, Springer 2008, ISBN 978-3-540-88624-2
[e1]Liqun Chen, Yi Mu, Willy Susilo (Eds.): Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings. Lecture Notes in Computer Science 4991, Springer 2008, ISBN 978-3-540-79103-4
[i13]Ernie Brickell, Liqun Chen, Jiangtao Li: Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings. IACR Cryptology ePrint Archive 2008: 104 (2008)
[i12]Liqun Chen, Chris J. Mitchell: Parsing ambiguities in authentication and key establishment protocols. IACR Cryptology ePrint Archive 2008: 419 (2008)- 2007
[j7]Liqun Chen, Zhaohui Cheng, Nigel P. Smart: Identity-based key agreement protocols from pairings. Int. J. Inf. Sec. 6(4): 213-241 (2007)
[j6]Zhaohui Cheng, Liqun Chen: On security proof of McCullagh?Barreto's key agreement protocol and its variants. IJSN 2(3/4): 251-259 (2007)
[c27]Liqun Chen, Steve Kremer, Mark Dermot Ryan: 07421 Executive Summary -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007
[c26]Liqun Chen, Steve Kremer, Mark Dermot Ryan: 07421 Abstracts Collection -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007
[c25]
[c24]Liqun Chen, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. Financial Cryptography 2007: 29-44
[c23]
[c22]Zhaohui Cheng, Liqun Chen, Li Ling, Richard Comley: General and Efficient Certificateless Public Key Encryption Constructions. Pairing 2007: 83-107
[i11]Liqun Chen, Qiang Tang: Bilateral Unknown Key-Share Attacks in Key Agreement Protocols. IACR Cryptology ePrint Archive 2007: 209 (2007)- 2006
[j5]James L. Peterson, Patrick J. Bohrer, Liqun Chen, E. N. Elnozahy, Ahmed Gheith, Richard H. Jewell, Michael Kistler, T. R. Maeurer, Sean A. Malone, David B. Murrell, Neena Needel, Karthick Rajamani, Mark A. Rinaldi, Richard O. Simpson, Kartik Sudeep, Lixin Zhang: Application of full-system simulation in exploratory system design and development. IBM Journal of Research and Development 50(2-3): 321-332 (2006)
[c21]Liqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble: A protocol for property-based attestation. STC 2006: 7-16
[c20]Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang: Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. ISPEC 2006: 202-213
[i10]Liqun Chen, Zhaohui Cheng, Nigel P. Smart: A Built-in Decisional Function and Security Proof of ID-based Key Agreement Protocols from Pairings. IACR Cryptology ePrint Archive 2006: 160 (2006)
[i9]Liqun Chen, Zhaohui Cheng, Nigel P. Smart: Identity-based Key Agreement Protocols From Pairings. IACR Cryptology ePrint Archive 2006: 199 (2006)- 2005
[c19]Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner: A Privacy-Protecting Coupon System. Financial Cryptography 2005: 93-108
[c18]Liqun Chen, Zhaohui Cheng: Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. IMA Int. Conf. 2005: 442-459
[c17]Liqun Chen, John Malone-Lee: Improved Identity-Based Signcryption. Public Key Cryptography 2005: 362-379
[c16]Liqun Chen, Hoon Wei Lim, Wenbo Mao: User-Friendly Grid Security Architecture and Protocols. Security Protocols Workshop 2005: 139-156
[i8]Qiang Tang, Liqun Chen: Weaknesses in two group Diffie-Hellman key exchange protocols. IACR Cryptology ePrint Archive 2005: 197 (2005)
[i7]Zhaohui Cheng, Liqun Chen: On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants. IACR Cryptology ePrint Archive 2005: 201 (2005)
[i6]Liqun Chen, Zhaohui Cheng, John Malone-Lee, Nigel P. Smart: An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction. IACR Cryptology ePrint Archive 2005: 224 (2005)
[i5]Liqun Chen, Zhaohui Cheng: Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. IACR Cryptology ePrint Archive 2005: 226 (2005)
[i4]Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang: Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. IACR Cryptology ePrint Archive 2005: 339 (2005)- 2004
[c15]Ernest F. Brickell, Jan Camenisch, Liqun Chen: Direct anonymous attestation. ACM Conference on Computer and Communications Security 2004: 132-145
[c14]
[i3]Liqun Chen, John Malone-Lee: Improved Identity-Based Signcryption. IACR Cryptology ePrint Archive 2004: 114 (2004)
[i2]Ernie Brickell, Jan Camenisch, Liqun Chen: Direct Anonymous Attestation. IACR Cryptology ePrint Archive 2004: 205 (2004)- 2003
[c13]Liqun Chen, Caroline Kudla: Identity Based Authenticated Key Agreement Protocols from Pairings. CSFW 2003: 219-233- 2002
[c12]Liqun Chen, Keith Harrison, David Soldera, Nigel P. Smart: Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. InfraSec 2002: 260-275
[c11]Liqun Chen, Keith Harrison, Andrew Moss, David Soldera, Nigel P. Smart: Certification of Public Keys within an Identity Based System. ISC 2002: 322-333
[i1]Liqun Chen, Caroline Kudla: Identity Based Authenticated Key Agreement Protocols from Pairings. IACR Cryptology ePrint Archive 2002: 184 (2002)- 2001
[c10]
[c9]Boris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler: A trusted process to digitally sign a document. NSPW 2001: 79-86- 2000
[j4]Boris Balacheff, Liqun Chen, Siani Pearson, Graeme Proudler, David Chan: Computing Platform Security in Cyberspace. Inf. Sec. Techn. Report 5(1): 54-63 (2000)
[c8]Boris Balacheff, David Chan, Liqun Chen, Siani Pearson, Graeme Proudler: Securing Intelligent Adjuncts Using Trusted Computing Platform Technology. CARDIS 2000: 177-196
[c7]Liqun Chen, Siani Pearson, A. Vamvakas: On enhancing biometric authentication with data protection. KES 2000: 249-252
1990 – 1999
- 1998
[c6]Liqun Chen: Efficient Fair Exchange with Verifiable Confirmation of Signatures. ASIACRYPT 1998: 286-299- 1997
[j3]Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Authentication Using Minimally Trusted Servers. Operating Systems Review 31(3): 16-28 (1997)
[c5]Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild: Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193
[c4]- 1996
[j2]Chris J. Mitchell, Liqun Chen: Comments on the S/KEY User Authentication Scheme. Operating Systems Review 30(4): 12-16 (1996)
[c3]Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133
[c2]Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153- 1995
[j1]Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Distributing Trust Amongst Multiple Authentication Servers. Journal of Computer Security 3(4): 255-268 (1995)
[c1]Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key distribution without individual trusted authentification servers. CSFW 1995: 30-
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:13 CEST by the dblp team



