


Остановите войну!
for scientists:


default search action
Liqun Chen 0002
Person information

- affiliation: University of Surrey, Surrey Centre for Cyber Security, Guildford, UK
- affiliation (former): Hewlett-Packard Laboratories, Bristol, UK
Other persons with the same name
- Liqun Chen — disambiguation page
- Liqun Chen 0001 — Duke University, Durham, NC, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j41]Jinguang Han
, Liqun Chen, Willy Susilo
, Liquan Chen, Ge Wu
:
DFE-IP: Delegatable functional encryption for inner product. Inf. Sci. 647: 119425 (2023) - [c101]Loganathan Parthipan
, Liqun Chen
, Christopher J. P. Newton
, Yunpeng Li
, Fei Liu, Donghui Wang:
DRoT: A Decentralised Root of Trust for Trusted Networks. ICICS 2023: 683-701 - [c100]Yalan Wang, Liqun Chen, Long Meng, Yangguang Tian:
BAHS: A Blockchain-Aided Hash-Based Signature Scheme. ISPEC 2023: 419-439 - [c99]Liqun Chen
, Changyu Dong
, Nada El Kassem
, Christopher J. P. Newton
, Yalan Wang
:
Hash-Based Direct Anonymous Attestation. PQCrypto 2023: 565-600 - 2022
- [j40]Liqun Chen
, Siaw-Lynn Ng
:
Securing emergent behaviour in swarm robotics. J. Inf. Secur. Appl. 64: 103047 (2022) - [c98]Liang Zhao
, Ze Chen, Liqun Chen, Xinyi Huang:
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. ACNS 2022: 45-64 - [c97]Andreea-Ina Radu, Tom Chothia, Christopher J. P. Newton
, Ioana Boureanu, Liqun Chen:
Practical EMV Relay Protection. SP 2022: 1737-1756 - [e9]Cristina Alcaraz
, Liqun Chen
, Shujun Li
, Pierangela Samarati
:
Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings. Lecture Notes in Computer Science 13407, Springer 2022, ISBN 978-3-031-15776-9 [contents] - 2021
- [j39]Long Meng, Liqun Chen
:
Reviewing the ISO/IEC Standard for Timestamping Services. IEEE Commun. Stand. Mag. 5(3): 20-25 (2021) - [j38]Liqun Chen
, Kaibin Huang, Mark Manulis
, Venkkatesh Sekar:
Password-authenticated searchable encryption. Int. J. Inf. Sec. 20(5): 675-693 (2021) - [j37]Jinguang Han
, Liqun Chen
, Steve Schneider
, Helen Treharne
, Stephan Wesemeyer
:
Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials. IEEE Trans. Dependable Secur. Comput. 18(4): 1836-1849 (2021) - [j36]Kang Yang
, Liqun Chen
, Zhenfeng Zhang, Christopher J. P. Newton
, Bo Yang, Li Xi:
Direct Anonymous Attestation With Optimal TPM Signing Efficiency. IEEE Trans. Inf. Forensics Secur. 16: 2260-2275 (2021) - [c96]Long Meng, Liqun Chen
:
Analysis of Client-Side Security for Long-Term Time-Stamping Services. ACNS (1) 2021: 28-49 - [c95]Loganathan Parthipan
, Liqun Chen, David Gérault, Yunpeng Li
, Fei Liu, Christopher J. P. Newton
, Donghui Wang:
A Survey of Technologies for Building Trusted Networks. GLOBECOM (Workshops) 2021: 1-6 - [c94]Georgios Fotiadis
, José Moreira
, Thanassis Giannetsos
, Liqun Chen
, Peter B. Rønne
, Mark Ryan
, Peter Y. A. Ryan
:
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols. STM 2021: 163-184 - [i40]Liqun Chen, Siaw-Lynn Ng:
Securing emergent behaviour in swarm robotics. CoRR abs/2102.03148 (2021) - [i39]Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang:
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. IACR Cryptol. ePrint Arch. 2021: 1534 (2021) - 2020
- [j35]Liang Zhao
, Liqun Chen
:
On the Privacy of Matrix Masking-Based Verifiable (Outsourced) Computation. IEEE Trans. Cloud Comput. 8(4): 1296-1298 (2020) - [j34]Liang Zhao
, Liqun Chen
:
Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited. IEEE Trans. Dependable Secur. Comput. 17(6): 1188-1206 (2020) - [j33]Jinguang Han
, Liqun Chen
, Steve A. Schneider
, Helen Treharne
, Stephan Wesemeyer
, Nick Wilson:
Anonymous Single Sign-On With Proxy Re-Verification. IEEE Trans. Inf. Forensics Secur. 15: 223-236 (2020) - [c93]Ioana Boureanu, Liqun Chen
, Sam Ivey:
Provable-Security Model for Strong Proximity-based Attacks: With Application to Contactless Payments. AsiaCCS 2020: 87-100 - [c92]Stephan Wesemeyer
, Christopher J. P. Newton
, Helen Treharne
, Liqun Chen
, Ralf Sasse, Jorden Whitefield:
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme. AsiaCCS 2020: 784-798 - [c91]Heng Liu, Linzhi Jiang, Jian Xu, Dexin Wu, Liqun Chen:
Adversarial Perturbation with ResNet. ACM Great Lakes Symposium on VLSI 2020: 549-554 - [e8]Liqun Chen
, Ninghui Li, Kaitai Liang
, Steve A. Schneider
:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12308, Springer 2020, ISBN 978-3-030-58950-9 [contents] - [e7]Liqun Chen
, Ninghui Li, Kaitai Liang
, Steve A. Schneider
:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12309, Springer 2020, ISBN 978-3-030-59012-3 [contents]
2010 – 2019
- 2019
- [j32]Jinguang Han
, Maoxuan Bei, Liqun Chen
, Yang Xiang, Jie Cao
, Fuchun Guo, Weizhi Meng
:
Attribute-Based Information Flow Control. Comput. J. 62(8): 1214-1231 (2019) - [j31]Tassos Dimitriou, Thanassis Giannetsos
, Liqun Chen
:
REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems. Comput. Commun. 137: 1-14 (2019) - [j30]Nada El Kassem
, Liqun Chen
, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough, Paulo Martins, Leonel Sousa
:
More efficient, provably-secure direct anonymous attestation from lattices. Future Gener. Comput. Syst. 99: 425-458 (2019) - [j29]Wen Gao, Liqun Chen
, Yupu Hu, Christopher J. P. Newton
, Baocang Wang, Jiangshan Chen:
Lattice-based deniable ring signatures. Int. J. Inf. Sec. 18(3): 355-370 (2019) - [j28]Linzhi Jiang
, Liqun Chen
, Thanassis Giannetsos
, Bo Luo
, Kaitai Liang
, Jinguang Han
:
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case. IEEE Internet Things J. 6(6): 10177-10190 (2019) - [j27]Jinguang Han
, Liqun Chen
, Willy Susilo
, Xinyi Huang, Aniello Castiglione
, Kaitai Liang
:
Fine-grained information flow control using attributes. Inf. Sci. 484: 167-182 (2019) - [j26]Xun Yi, Zahir Tari
, Feng Hao
, Liqun Chen
, Joseph K. Liu, Xuechao Yang
, Kwok-Yan Lam
, Ibrahim Khalil
, Albert Y. Zomaya
:
Efficient threshold password-authenticated secret sharing protocols for cloud computing. J. Parallel Distributed Comput. 128: 57-70 (2019) - [j25]Yi Zhao
, Kaitai Liang
, Bo Yang
, Liqun Chen
:
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs. Secur. Commun. Networks 2019: 8357241:1-8357241:8 (2019) - [c90]Liqun Chen
, Nada El Kassem
, Anja Lehmann, Vadim Lyubashevsky:
A Framework for Efficient Lattice-Based DAA. CYSARM@CCS 2019: 23-34 - [c89]Jorden Whitefield, Liqun Chen
, Ralf Sasse, Steve A. Schneider, Helen Treharne
, Stephan Wesemeyer
:
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation. EuroS&P 2019: 127-141 - [c88]Tom Chothia, Ioana Boureanu, Liqun Chen
:
Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers. Financial Cryptography 2019: 222-233 - [c87]Nada El Kassem
, Luís Fiolhais, Paulo Martins, Liqun Chen
, Leonel Sousa
:
A Lattice-Based Enhanced Privacy ID. WISTP 2019: 15-31 - [e6]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6840-7 [contents] - [i38]Nada El Kassem, Luís Fiolhais, Paulo Martins, Liqun Chen, Leonel Sousa:
A Lattice-based Enhanced Privacy ID. IACR Cryptol. ePrint Arch. 2019: 1366 (2019) - 2018
- [j24]Wei Yin
, Qiaoyan Wen, Kaitai Liang
, Zhenfei Zhang, Liqun Chen
, Hanbing Yan, Hua Zhang
:
Delegation of Decryption Rights With Revocability From Learning With Errors. IEEE Access 6: 61163-61175 (2018) - [j23]Kim-Kwang Raymond Choo
, Rongxing Lu, Liqun Chen
, Xun Yi:
A foggy research future: Advances and future opportunities in fog computing research. Future Gener. Comput. Syst. 78: 677-679 (2018) - [j22]Liqun Chen
, Jinguang Han
, Chris J. Mitchell:
Message from the Guest Editors. Int. J. Inf. Sec. 17(5): 491-492 (2018) - [j21]Xiuhua Lu
, Wei Yin, Qiaoyan Wen, Kaitai Liang
, Liqun Chen
, Jiageng Chen:
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures. Sensors 18(11): 4056 (2018) - [c86]Liang Zhao
, Liqun Chen
:
A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation. AsiaCCS 2018: 253-260 - [c85]Jinguang Han
, Liqun Chen
, Steve A. Schneider, Helen Treharne
, Stephan Wesemeyer
:
Anonymous Single-Sign-On for n Designated Services with Traceability. ESORICS (1) 2018: 470-490 - [c84]Zhaohui Cheng, Liqun Chen
:
Certificateless Public Key Signature Schemes from Standard Algorithms. ISPEC 2018: 179-197 - [i37]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Anonymous Single-Sign-On for n designated services with traceability. CoRR abs/1804.07201 (2018) - [i36]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer, Nick Wilson:
Anonymous Single Sign-on with Proxy Re-Verification. CoRR abs/1811.07642 (2018) - [i35]Zhaohui Cheng, Liqun Chen:
Certificateless Public Key Signature Schemes from Standard Algorithms. IACR Cryptol. ePrint Arch. 2018: 386 (2018) - [i34]Nada El Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough:
L-DAA: Lattice-Based Direct Anonymous Attestation. IACR Cryptol. ePrint Arch. 2018: 401 (2018) - [i33]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights with Revocability from Learning with Errors. IACR Cryptol. ePrint Arch. 2018: 777 (2018) - [i32]Kang Yang, Liqun Chen, Zhenfeng Zhang, Chris Newton, Bo Yang, Li Xi:
Direct Anonymous Attestation with Optimal TPM Signing Efficiency. IACR Cryptol. ePrint Arch. 2018: 1128 (2018) - 2017
- [j20]Liqun Chen
, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. IET Inf. Secur. 11(4): 204-210 (2017) - [c83]Liqun Chen
, Thalia M. Laing, Keith M. Martin:
Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme. AFRICACRYPT 2017: 40-57 - [c82]Kaibin Huang, Mark Manulis
, Liqun Chen
:
Password Authenticated Keyword Search. PAC 2017: 129-140 - [c81]Jan Camenisch, Liqun Chen
, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian:
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. IEEE Symposium on Security and Privacy 2017: 901-920 - [c80]Jorden Whitefield
, Liqun Chen
, Frank Kargl, Andrew Paverd
, Steve A. Schneider
, Helen Treharne
, Stephan Wesemeyer
:
Formal Analysis of V2X Revocation Protocols. STM 2017: 147-163 - [c79]Jiangshan Yu, Mark Ryan
, Liqun Chen
:
Authenticating Compromisable Storage Systems. TrustCom/BigDataSE/ICESS 2017: 25-32 - [c78]Jorden Whitefield
, Liqun Chen
, Thanassis Giannetsos, Steve A. Schneider, Helen Treharne
:
Privacy-enhanced capabilities for VANETs using direct anonymous attestation. VNC 2017: 123-130 - [i31]Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Formal Analysis of V2X Revocation Protocols. CoRR abs/1704.07216 (2017) - [i30]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne:
PPETS-FGP: Privacy-Preserving Electronic Ticket Scheme with Fine-Grained Pricing. CoRR abs/1706.03016 (2017) - [i29]Jiangshan Yu, Mark Ryan, Liqun Chen:
Authenticating compromisable storage systems. IACR Cryptol. ePrint Arch. 2017: 485 (2017) - [i28]Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian:
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. IACR Cryptol. ePrint Arch. 2017: 639 (2017) - 2016
- [j19]Liqun Chen
, Chris J. Mitchell
:
Message from the guest editors. Int. J. Inf. Sec. 15(6): 573-574 (2016) - [c77]Liqun Chen
, Thalia M. Laing, Keith M. Martin:
Efficient, XOR-Based, Ideal (t, n)- threshold Schemes. CANS 2016: 467-483 - [c76]Liqun Chen
, Rainer Urian:
Algorithm Agility - Discussion on TPM 2.0 ECC Functionalities. SSR 2016: 141-159 - [e5]Liqun Chen, Jinguang Han
:
Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings. Lecture Notes in Computer Science 10005, 2016, ISBN 978-3-319-47421-2 [contents] - [i27]Liqun Chen, Thalia M. Laing, Keith M. Martin:
Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme. IACR Cryptol. ePrint Arch. 2016: 1014 (2016) - 2015
- [j18]Ben Smyth, Mark Dermot Ryan
, Liqun Chen
:
Formal analysis of privacy in Direct Anonymous Attestation schemes. Sci. Comput. Program. 111: 300-317 (2015) - [j17]Jung Yeon Hwang, Liqun Chen
, Hyun Sook Cho, DaeHun Nyang:
Short Dynamic Group Signature Scheme Supporting Controllable Linkability. IEEE Trans. Inf. Forensics Secur. 10(6): 1109-1124 (2015) - [c75]Feng Hao
, Xun Yi, Liqun Chen
, Siamak Fayyaz Shahandashti
:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IoTPTS@AsiaCCS 2015: 27-34 - [c74]Gurchetan S. Grewal, Mark Dermot Ryan
, Liqun Chen
, Michael R. Clarkson:
Du-Vote: Remote Electronic Voting with Untrusted Computers. CSF 2015: 155-169 - [c73]Xun Yi, Feng Hao
, Liqun Chen
, Joseph K. Liu:
Practical Threshold Password-Authenticated Secret Sharing Protocol. ESORICS (1) 2015: 347-365 - [c72]Miguel Urquidi, Dalia Khader, Jean Lancrenon, Liqun Chen
:
Attribute-Based Signatures with Controllable Linkability. INTRUST 2015: 114-129 - [c71]Su Zhang, Xinwen Zhang, Xinming Ou, Liqun Chen
, Nigel Edwards, Jing Jin:
Assessing Attack Surface with Component-Based Package Dependency. NSS 2015: 405-417 - [c70]Liqun Chen
, Rainer Urian:
DAA-A: Direct Anonymous Attestation with Attributes. TRUST 2015: 228-245 - [i26]Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. CoRR abs/1506.03588 (2015) - [i25]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IACR Cryptol. ePrint Arch. 2015: 80 (2015) - 2014
- [j16]Michael Beiter, Marco Casassa Mont
, Liqun Chen
, Siani Pearson
:
End-to-end policy based encryption techniques for multi-party data management. Comput. Stand. Interfaces 36(4): 689-703 (2014) - [j15]Liqun Chen
, Hoon Wei Lim, Guomin Yang
:
Cross-Domain Password-Based Authenticated Key Exchange Revisited. ACM Trans. Inf. Syst. Secur. 16(4): 15 (2014) - [c69]Mark Ryan, Gurchetan S. Grewal, Liqun Chen:
Du-Vote: Remote Electronic Voting with Untrusted Computers. FMS @ Petri Nets 2014: 4 - [c68]Ali El Kaafarani, Liqun Chen
, Essam Ghadafi
, James H. Davenport
:
Attribute-Based Signatures with User-Controlled Linkability. CANS 2014: 256-269 - [c67]Jia Liu, Mark Dermot Ryan
, Liqun Chen
:
Balancing Societal Security and Individual Privacy: Accountable Escrow System. CSF 2014: 427-440 - [c66]Changyu Dong, Liqun Chen
:
A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost. ESORICS (1) 2014: 380-399 - [c65]Changyu Dong, Liqun Chen
:
A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining. PAKDD (1) 2014: 606-617 - [e4]Liqun Chen
, Chris J. Mitchell
:
Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings. Lecture Notes in Computer Science 8893, Springer 2014, ISBN 978-3-319-14053-7 [contents] - 2013
- [c64]Liqun Chen
, Jiangtao Li:
Flexible and scalable digital signatures in TPM 2.0. CCS 2013: 37-48 - [c63]Changyu Dong, Liqun Chen
, Zikai Wen
:
When private set intersection meets big data: an efficient and scalable protocol. CCS 2013: 789-800 - [c62]Changyu Dong, Liqun Chen
, Jan Camenisch, Giovanni Russello:
Fair Private Set Intersection with a Semi-trusted Arbiter. DBSec 2013: 128-144 - [c61]Liqun Chen
, Hoon Wei Lim, Guomin Yang
:
Cross-domain password-based authenticated key exchange revisited. INFOCOM 2013: 1052-1060 - [c60]Klaus Potzmader, Johannes Winter, Daniel M. Hein, Christian Hanser, Peter Teufl, Liqun Chen
:
Group Signatures on Mobile Devices: Practical Experiences. TRUST 2013: 47-64 - [c59]Liqun Chen
, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
A privacy-aware reputation-based announcement scheme for VANETs. WiVeC 2013: 1-5 - [i24]Changyu Dong, Liqun Chen, Zikai Wen:
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol. IACR Cryptol. ePrint Arch. 2013: 515 (2013) - 2012
- [j14]Liqun Chen
, Yu Chen:
The n-Diffie-Hellman problem and multiple-key encryption. Int. J. Inf. Sec. 11(5): 305-320 (2012) - [c58]Nigel Edwards, Liqun Chen
:
An historical examination of open source releases and their vulnerabilities. CCS 2012: 183-194 - [c57]Ernie Brickell, Liqun Chen
, Jiangtao Li:
A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes. INTRUST 2012: 95-111 - [c56]Liqun Chen
:
Ring Group Signatures. TrustCom 2012: 409-418 - [i23]Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello:
Fair Private Set Intersection with a Semi-trusted Arbiter. IACR Cryptol. ePrint Arch. 2012: 252 (2012) - [i22]Liqun Chen:
Ring Group Signatures. IACR Cryptol. ePrint Arch. 2012: 289 (2012) - [i21]Liqun Chen, Hoon Wei Lim, Guomin Yang:
Cross-Domain Password-Based Authenticated Key Exchange Revisited. IACR Cryptol. ePrint Arch. 2012: 397 (2012) - [i20]Ben Smyth, Mark Dermot Ryan, Liqun Chen:
Formal analysis of privacy in Direct Anonymous Attestation schemes. IACR Cryptol. ePrint Arch. 2012: 650 (2012) - 2011
- [j13]Qiang Tang
, Liqun Chen
:
Extended KCI attack against two-party key establishment protocols. Inf. Process. Lett. 111(15): 744-747 (2011) - [j12]Liqun Chen
, Siaw-Lynn Ng, Guilin Wang:
Threshold Anonymous Announcement in VANETs. IEEE J. Sel. Areas Commun. 29(3): 605-615 (2011) - [c55]Siani Pearson
, Marco Casassa Mont
, Liqun Chen
, Archie Reed:
End-to-End Policy-Based Encryption and Management of Data in the Cloud. CloudCom 2011: 764-771 - [c54]Helen Balinsky, Liqun Chen
, Steven J. Simske:
Publicly posted composite documents with identity based encryption. ACM Symposium on Document Engineering 2011: 239-248 - [c53]Yu Chen, Liqun Chen
, Zongyang Zhang:
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. ICISC 2011: 275-301 - [c52]Ben Smyth, Mark Ryan
, Liqun Chen
:
Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes. Formal Aspects in Security and Trust 2011: 245-262 - [c51]Gina Kounga, Liqun Chen
:
Enforcing Sticky Policies with TPM and Virtualization. INTRUST 2011: 32-47 - [c50]Ernie Brickell, Liqun Chen
, Jiangtao Li:
A (Corrected) DAA Scheme Using Batch Proof and Verification. INTRUST 2011: 304-337 - [c49]Yu Chen, Liqun Chen
, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. ISPEC 2011: 40-54 - [c48]Liqun Chen
, Yu Chen:
The n-Diffie-Hellman Problem and Its Applications. ISC 2011: 119-134 - [c47]Helen Balinsky, Liqun Chen
, Steven J. Simske:
Premature silent workflow termination in publicly posted composite documents. SMC 2011: 1292-1297 - [c46]Liqun Chen
, Ming-Feng Lee, Bogdan Warinschi:
Security of the Enhanced TCG Privacy-CA Solution. TGC 2011: 121-141 - [c45]Helen Balinsky, Liqun Chen
, Steven J. Simske:
Publicly Posted Composite Documents in Variably Ordered Workflows. TrustCom 2011: 631-638 - [i19]Yu Chen, Liqun Chen, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. IACR Cryptol. ePrint Arch. 2011: 90 (2011) - [i18]Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. IACR Cryptol. ePrint Arch. 2011: 101 (2011) - [i17]Liqun Chen, Yu Chen:
The n-Diffie-Hellman Problem and its Applications. IACR Cryptol. ePrint Arch. 2011: 397 (2011) - [i16]Yu Chen, Liqun Chen, Zongyang Zhang:
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. IACR Cryptol. ePrint Arch. 2011: 593 (2011) - 2010
- [j11]