


default search action
Liqun Chen 0002
Person information
- affiliation: University of Surrey, Surrey Centre for Cyber Security, Guildford, UK
- affiliation (former): Hewlett-Packard Laboratories, Bristol, UK
Other persons with the same name
- Liqun Chen — disambiguation page
- Liqun Chen 0001 — Duke University, Durham, NC, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j51]Liqun Chen, Nada El Kassem
, Christopher J. P. Newton
:
How To Bind A TPM's Attestation Keys With Its Endorsement Key. Comput. J. 67(3): 988-1004 (2024) - [j50]Jinguang Han
, Liqun Chen, Aiqun Hu, Liquan Chen, Jiguo Li:
Privacy-Preserving Decentralized Functional Encryption for Inner Product. IEEE Trans. Dependable Secur. Comput. 21(4): 1680-1694 (2024) - [j49]Liang Zhao
, Liqun Chen
:
Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited. IEEE Trans. Dependable Secur. Comput. 21(4): 3671-3687 (2024) - [j48]Liang Zhao
, Jie Yu
, Yiheng Zhang
, Liqun Chen
:
On the Privacy of Elementary Matrices Masking-Based Verifiable (Outsourced) Computation. IEEE Trans. Dependable Secur. Comput. 21(4): 4299-4301 (2024) - [j47]Suhui Liu
, Liquan Chen, Liqun Chen, Jianchang Lai:
Integrated and Accountable Data Sharing for Smart Grids With Fog and Dual-Blockchain Assistance. IEEE Trans. Ind. Informatics 20(3): 4940-4952 (2024) - [j46]Liqun Chen
, Changyu Dong
, Christopher J. P. Newton
, Yalan Wang
:
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives. ACM Trans. Priv. Secur. 27(1): 11:1-11:35 (2024) - [c109]Kwan Yin Chan
, Liqun Chen
, Yangguang Tian
, Tsz Hon Yuen
:
Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting. AsiaCCS 2024 - [c108]Long Meng
, Liqun Chen
, Yangguang Tian
, Mark Manulis
:
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption. CCS 2024: 4688-4702 - [c107]Long Meng, Liqun Chen:
Long-Term Time-Stamping Schemes Based on MACs, Archives, and Transient Keys. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 535-542 - [c106]Liqun Chen
, Changyu Dong
, Nada El Kassem
, Christopher J. P. Newton
, Yalan Wang
:
A New Hash-Based Enhanced Privacy ID Signature Scheme. PQCrypto (1) 2024: 37-71 - [c105]Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu:
FEASE: Fast and Expressive Asymmetric Searchable Encryption. USENIX Security Symposium 2024 - [i54]Sharar Ahmadi, Jay Le-Papin, Liqun Chen, Brijesh Dongol, Sasa Radomirovic, Helen Treharne:
On the Design and Security of Collective Remote Attestation Protocols. CoRR abs/2407.09203 (2024) - [i53]Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu:
FEASE: Fast and Expressive Asymmetric Searchable Encryption. IACR Cryptol. ePrint Arch. 2024: 54 (2024) - [i52]Liqun Chen, Changyu Dong, Christopher J. P. Newton, Yalan Wang:
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives. IACR Cryptol. ePrint Arch. 2024: 649 (2024) - [i51]Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
Hash-based Direct Anonymous Attestation. IACR Cryptol. ePrint Arch. 2024: 650 (2024) - [i50]Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
A New Hash-based Enhanced Privacy ID Signature Scheme. IACR Cryptol. ePrint Arch. 2024: 651 (2024) - [i49]Liqun Chen, Patrick Hough, Nada El Kassem:
Collaborative, Segregated NIZK (CoSNIZK) and More Efficient Lattice-Based Direct Anonymous Attestation. IACR Cryptol. ePrint Arch. 2024: 864 (2024) - [i48]Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis:
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption. IACR Cryptol. ePrint Arch. 2024: 986 (2024) - 2023
- [j45]Jinguang Han
, Liqun Chen, Willy Susilo
, Liquan Chen, Ge Wu
:
DFE-IP: Delegatable functional encryption for inner product. Inf. Sci. 647: 119425 (2023) - [c104]Loganathan Parthipan
, Liqun Chen
, Christopher J. P. Newton
, Yunpeng Li
, Fei Liu, Donghui Wang:
DRoT: A Decentralised Root of Trust for Trusted Networks. ICICS 2023: 683-701 - [c103]Yalan Wang
, Liqun Chen
, Long Meng
, Yangguang Tian
:
BAHS: A Blockchain-Aided Hash-Based Signature Scheme. ISPEC 2023: 419-439 - [c102]Liqun Chen
, Changyu Dong
, Nada El Kassem
, Christopher J. P. Newton
, Yalan Wang
:
Hash-Based Direct Anonymous Attestation. PQCrypto 2023: 565-600 - [c101]Benjamin Larsen
, Nada El Kassem, Thanassis Giannetsos, Ioannis Krontiris, Stefanos Vasileiadis, Liqun Chen:
Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets. TrustCom 2023: 1049-1059 - [i47]Feng Hao, Samiran Bag, Liqun Chen, Paul C. van Oorschot:
Owl: An Augmented Password-Authenticated Key Exchange Scheme. IACR Cryptol. ePrint Arch. 2023: 768 (2023) - 2022
- [j44]Wei Gao, Liqun Chen, Chunming Rong, Kaitai Liang, Xianghan Zheng, Jiangshan Yu
:
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things. Comput. J. 65(9): 2430-2438 (2022) - [j43]Liqun Chen
, Siaw-Lynn Ng
:
Securing emergent behaviour in swarm robotics. J. Inf. Secur. Appl. 64: 103047 (2022) - [c100]Liang Zhao
, Ze Chen, Liqun Chen, Xinyi Huang:
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. ACNS 2022: 45-64 - [c99]Long Meng, Liqun Chen:
A Blockchain-Based Long-Term Time-Stamping Scheme. ESORICS (1) 2022: 3-24 - [c98]Andreea-Ina Radu, Tom Chothia, Christopher J. P. Newton
, Ioana Boureanu, Liqun Chen:
Practical EMV Relay Protection. SP 2022: 1737-1756 - [e15]Cristina Alcaraz
, Liqun Chen
, Shujun Li
, Pierangela Samarati
:
Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings. Lecture Notes in Computer Science 13407, Springer 2022, ISBN 978-3-031-15776-9 [contents] - [i46]Long Meng, Liqun Chen:
A Blockchain-based Long-term Time-Stamping Scheme. IACR Cryptol. ePrint Arch. 2022: 319 (2022) - 2021
- [j42]Long Meng, Liqun Chen
:
Reviewing the ISO/IEC Standard for Timestamping Services. IEEE Commun. Stand. Mag. 5(3): 20-25 (2021) - [j41]Liqun Chen
, Kaibin Huang, Mark Manulis
, Venkkatesh Sekar:
Password-authenticated searchable encryption. Int. J. Inf. Sec. 20(5): 675-693 (2021) - [j40]Jinguang Han
, Liqun Chen
, Steve Schneider
, Helen Treharne
, Stephan Wesemeyer
:
Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials. IEEE Trans. Dependable Secur. Comput. 18(4): 1836-1849 (2021) - [j39]Kang Yang
, Liqun Chen
, Zhenfeng Zhang, Christopher J. P. Newton
, Bo Yang, Li Xi:
Direct Anonymous Attestation With Optimal TPM Signing Efficiency. IEEE Trans. Inf. Forensics Secur. 16: 2260-2275 (2021) - [c97]Long Meng, Liqun Chen
:
Analysis of Client-Side Security for Long-Term Time-Stamping Services. ACNS (1) 2021: 28-49 - [c96]Loganathan Parthipan
, Liqun Chen, David Gérault, Yunpeng Li
, Fei Liu, Christopher J. P. Newton
, Donghui Wang:
A Survey of Technologies for Building Trusted Networks. GLOBECOM (Workshops) 2021: 1-6 - [c95]Georgios Fotiadis
, José Moreira
, Thanassis Giannetsos
, Liqun Chen
, Peter B. Rønne
, Mark Ryan
, Peter Y. A. Ryan
:
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols. STM 2021: 163-184 - [e14]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
CYSARM@CCS '21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8661-6 [contents] - [i45]Liqun Chen, Siaw-Lynn Ng:
Securing emergent behaviour in swarm robotics. CoRR abs/2102.03148 (2021) - [i44]Long Meng, Liqun Chen:
Analysis of Client-side Security for Long-term Time-stamping Services. IACR Cryptol. ePrint Arch. 2021: 1411 (2021) - [i43]Long Meng, Liqun Chen:
Reviewing ISO/IEC Standard for Time-stamping Services. IACR Cryptol. ePrint Arch. 2021: 1429 (2021) - [i42]Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang:
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. IACR Cryptol. ePrint Arch. 2021: 1534 (2021) - [i41]Long Meng, Liqun Chen:
An Enhanced Long-term Blockchain Scheme Against Compromise of Cryptography. IACR Cryptol. ePrint Arch. 2021: 1606 (2021) - 2020
- [j38]Yi Zhao, Jianting Ning, Kaitai Liang, Yanqi Zhao, Liqun Chen, Bo Yang:
Privacy preserving search services against online attack. Comput. Secur. 95: 101836 (2020) - [j37]Liang Zhao
, Liqun Chen
:
On the Privacy of Matrix Masking-Based Verifiable (Outsourced) Computation. IEEE Trans. Cloud Comput. 8(4): 1296-1298 (2020) - [j36]Liang Zhao
, Liqun Chen
:
Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited. IEEE Trans. Dependable Secur. Comput. 17(6): 1188-1206 (2020) - [j35]Jinguang Han
, Liqun Chen
, Steve A. Schneider
, Helen Treharne
, Stephan Wesemeyer
, Nick Wilson:
Anonymous Single Sign-On With Proxy Re-Verification. IEEE Trans. Inf. Forensics Secur. 15: 223-236 (2020) - [c94]Ioana Boureanu, Liqun Chen
, Sam Ivey:
Provable-Security Model for Strong Proximity-based Attacks: With Application to Contactless Payments. AsiaCCS 2020: 87-100 - [c93]Stephan Wesemeyer
, Christopher J. P. Newton
, Helen Treharne
, Liqun Chen
, Ralf Sasse, Jorden Whitefield:
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme. AsiaCCS 2020: 784-798 - [c92]Heng Liu, Linzhi Jiang, Jian Xu, Dexin Wu, Liqun Chen:
Adversarial Perturbation with ResNet. ACM Great Lakes Symposium on VLSI 2020: 549-554 - [e13]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, Virtual Event, USA, November, 2020. ACM 2020, ISBN 978-1-4503-8091-1 [contents] - [e12]Liqun Chen
, Ninghui Li, Kaitai Liang
, Steve A. Schneider
:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12308, Springer 2020, ISBN 978-3-030-58950-9 [contents] - [e11]Liqun Chen
, Ninghui Li, Kaitai Liang
, Steve A. Schneider
:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12309, Springer 2020, ISBN 978-3-030-59012-3 [contents]
2010 – 2019
- 2019
- [j34]Jinguang Han
, Maoxuan Bei, Liqun Chen
, Yang Xiang, Jie Cao
, Fuchun Guo
, Weizhi Meng
:
Attribute-Based Information Flow Control. Comput. J. 62(8): 1214-1231 (2019) - [j33]Tassos Dimitriou, Thanassis Giannetsos
, Liqun Chen
:
REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems. Comput. Commun. 137: 1-14 (2019) - [j32]Nada El Kassem
, Liqun Chen
, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough, Paulo Martins, Leonel Sousa
:
More efficient, provably-secure direct anonymous attestation from lattices. Future Gener. Comput. Syst. 99: 425-458 (2019) - [j31]Wen Gao, Liqun Chen
, Yupu Hu, Christopher J. P. Newton
, Baocang Wang, Jiangshan Chen:
Lattice-based deniable ring signatures. Int. J. Inf. Sec. 18(3): 355-370 (2019) - [j30]Linzhi Jiang
, Liqun Chen
, Thanassis Giannetsos
, Bo Luo
, Kaitai Liang
, Jinguang Han
:
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case. IEEE Internet Things J. 6(6): 10177-10190 (2019) - [j29]Jinguang Han
, Liqun Chen
, Willy Susilo
, Xinyi Huang, Aniello Castiglione
, Kaitai Liang
:
Fine-grained information flow control using attributes. Inf. Sci. 484: 167-182 (2019) - [j28]Xun Yi, Zahir Tari
, Feng Hao
, Liqun Chen
, Joseph K. Liu, Xuechao Yang
, Kwok-Yan Lam
, Ibrahim Khalil
, Albert Y. Zomaya
:
Efficient threshold password-authenticated secret sharing protocols for cloud computing. J. Parallel Distributed Comput. 128: 57-70 (2019) - [j27]Yi Zhao
, Kaitai Liang
, Bo Yang
, Liqun Chen
:
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs. Secur. Commun. Networks 2019: 8357241:1-8357241:8 (2019) - [c91]Liqun Chen
, Nada El Kassem
, Anja Lehmann, Vadim Lyubashevsky:
A Framework for Efficient Lattice-Based DAA. CYSARM@CCS 2019: 23-34 - [c90]Jorden Whitefield, Liqun Chen
, Ralf Sasse, Steve A. Schneider
, Helen Treharne
, Stephan Wesemeyer
:
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation. EuroS&P 2019: 127-141 - [c89]Tom Chothia, Ioana Boureanu, Liqun Chen
:
Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers. Financial Cryptography 2019: 222-233 - [c88]Nada El Kassem
, Luís Fiolhais, Paulo Martins, Liqun Chen
, Leonel Sousa
:
A Lattice-Based Enhanced Privacy ID. WISTP 2019: 15-31 - [e10]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6840-7 [contents] - [i40]Nada El Kassem, Luís Fiolhais, Paulo Martins, Liqun Chen, Leonel Sousa:
A Lattice-based Enhanced Privacy ID. IACR Cryptol. ePrint Arch. 2019: 1366 (2019) - 2018
- [j26]Wei Yin
, Qiaoyan Wen, Kaitai Liang
, Zhenfei Zhang, Liqun Chen
, Hanbing Yan, Hua Zhang
:
Delegation of Decryption Rights With Revocability From Learning With Errors. IEEE Access 6: 61163-61175 (2018) - [j25]Kim-Kwang Raymond Choo
, Rongxing Lu, Liqun Chen
, Xun Yi:
A foggy research future: Advances and future opportunities in fog computing research. Future Gener. Comput. Syst. 78: 677-679 (2018) - [j24]Liqun Chen
, Jinguang Han
, Chris J. Mitchell:
Message from the Guest Editors. Int. J. Inf. Sec. 17(5): 491-492 (2018) - [j23]Xiuhua Lu
, Wei Yin, Qiaoyan Wen, Kaitai Liang
, Liqun Chen
, Jiageng Chen:
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures. Sensors 18(11): 4056 (2018) - [c87]Liang Zhao
, Liqun Chen
:
A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation. AsiaCCS 2018: 253-260 - [c86]Jinguang Han
, Liqun Chen
, Steve A. Schneider, Helen Treharne
, Stephan Wesemeyer
:
Anonymous Single-Sign-On for n Designated Services with Traceability. ESORICS (1) 2018: 470-490 - [c85]Zhaohui Cheng, Liqun Chen
:
Certificateless Public Key Signature Schemes from Standard Algorithms. ISPEC 2018: 179-197 - [e9]Liqun Chen, Mark Manulis, Steve A. Schneider:
Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. Lecture Notes in Computer Science 11060, Springer 2018, ISBN 978-3-319-99135-1 [contents] - [e8]Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse:
16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7493-2 [contents] - [i39]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Anonymous Single-Sign-On for n designated services with traceability. CoRR abs/1804.07201 (2018) - [i38]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer, Nick Wilson:
Anonymous Single Sign-on with Proxy Re-Verification. CoRR abs/1811.07642 (2018) - [i37]Zhaohui Cheng, Liqun Chen:
Certificateless Public Key Signature Schemes from Standard Algorithms. IACR Cryptol. ePrint Arch. 2018: 386 (2018) - [i36]Nada El Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough:
L-DAA: Lattice-Based Direct Anonymous Attestation. IACR Cryptol. ePrint Arch. 2018: 401 (2018) - [i35]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights with Revocability from Learning with Errors. IACR Cryptol. ePrint Arch. 2018: 777 (2018) - [i34]Kang Yang, Liqun Chen, Zhenfeng Zhang, Chris Newton, Bo Yang, Li Xi:
Direct Anonymous Attestation with Optimal TPM Signing Efficiency. IACR Cryptol. ePrint Arch. 2018: 1128 (2018) - 2017
- [j22]Liqun Chen
, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. IET Inf. Secur. 11(4): 204-210 (2017) - [c84]Liqun Chen
, Thalia M. Laing, Keith M. Martin:
Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme. AFRICACRYPT 2017: 40-57 - [c83]Kaibin Huang, Mark Manulis
, Liqun Chen
:
Password Authenticated Keyword Search. PAC 2017: 129-140 - [c82]Jan Camenisch, Liqun Chen
, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian:
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. IEEE Symposium on Security and Privacy 2017: 901-920 - [c81]Jorden Whitefield
, Liqun Chen
, Frank Kargl, Andrew Paverd
, Steve A. Schneider
, Helen Treharne
, Stephan Wesemeyer
:
Formal Analysis of V2X Revocation Protocols. STM 2017: 147-163 - [c80]Jiangshan Yu
, Mark Ryan
, Liqun Chen
:
Authenticating Compromisable Storage Systems. TrustCom/BigDataSE/ICESS 2017: 25-32 - [c79]Jorden Whitefield
, Liqun Chen
, Thanassis Giannetsos, Steve A. Schneider, Helen Treharne
:
Privacy-enhanced capabilities for VANETs using direct anonymous attestation. VNC 2017: 123-130 - [i33]Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Formal Analysis of V2X Revocation Protocols. CoRR abs/1704.07216 (2017) - [i32]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne:
PPETS-FGP: Privacy-Preserving Electronic Ticket Scheme with Fine-Grained Pricing. CoRR abs/1706.03016 (2017) - [i31]Jiangshan Yu, Mark Ryan, Liqun Chen:
Authenticating compromisable storage systems. IACR Cryptol. ePrint Arch. 2017: 485 (2017) - [i30]Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian:
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. IACR Cryptol. ePrint Arch. 2017: 639 (2017) - 2016
- [j21]Liqun Chen
, Chris J. Mitchell
:
Message from the guest editors. Int. J. Inf. Sec. 15(6): 573-574 (2016) - [c78]Liqun Chen
, Thalia M. Laing, Keith M. Martin:
Efficient, XOR-Based, Ideal (t, n)- threshold Schemes. CANS 2016: 467-483 - [c77]Liqun Chen
, Rainer Urian:
Algorithm Agility - Discussion on TPM 2.0 ECC Functionalities. SSR 2016: 141-159 - [e7]Feng Bao, Liqun Chen, Robert H. Deng
, Guojun Wang:
Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10060, 2016, ISBN 978-3-319-49150-9 [contents] - [e6]Liqun Chen, Jinguang Han
:
Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings. Lecture Notes in Computer Science 10005, 2016, ISBN 978-3-319-47421-2 [contents] - [i29]Liqun Chen, Thalia M. Laing, Keith M. Martin:
Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme. IACR Cryptol. ePrint Arch. 2016: 1014 (2016) - 2015
- [j20]Ben Smyth, Mark Dermot Ryan
, Liqun Chen
:
Formal analysis of privacy in Direct Anonymous Attestation schemes. Sci. Comput. Program. 111: 300-317 (2015) - [j19]Jung Yeon Hwang, Liqun Chen
, Hyun Sook Cho, DaeHun Nyang:
Short Dynamic Group Signature Scheme Supporting Controllable Linkability. IEEE Trans. Inf. Forensics Secur. 10(6): 1109-1124 (2015) - [c76]Feng Hao
, Xun Yi, Liqun Chen
, Siamak Fayyaz Shahandashti
:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IoTPTS@AsiaCCS 2015: 27-34 - [c75]Gurchetan S. Grewal, Mark Dermot Ryan
, Liqun Chen
, Michael R. Clarkson:
Du-Vote: Remote Electronic Voting with Untrusted Computers. CSF 2015: 155-169 - [c74]Xun Yi, Feng Hao
, Liqun Chen
, Joseph K. Liu:
Practical Threshold Password-Authenticated Secret Sharing Protocol. ESORICS (1) 2015: 347-365 - [c73]Miguel Urquidi, Dalia Khader, Jean Lancrenon, Liqun Chen
:
Attribute-Based Signatures with Controllable Linkability. INTRUST 2015: 114-129 - [c72]Su Zhang, Xinwen Zhang, Xinming Ou, Liqun Chen
, Nigel Edwards, Jing Jin:
Assessing Attack Surface with Component-Based Package Dependency. NSS 2015: 405-417 - [c71]Liqun Chen
, Rainer Urian:
DAA-A: Direct Anonymous Attestation with Attributes. TRUST 2015: 228-245 - [i28]Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. CoRR abs/1506.03588 (2015) - [i27]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IACR Cryptol. ePrint Arch. 2015: 80 (2015) - 2014
- [j18]Michael Beiter, Marco Casassa Mont
, Liqun Chen
, Siani Pearson
:
End-to-end policy based encryption techniques for multi-party data management. Comput. Stand. Interfaces 36(4): 689-703 (2014) - [j17]Liqun Chen
, Hoon Wei Lim, Guomin Yang
:
Cross-Domain Password-Based Authenticated Key Exchange Revisited. ACM Trans. Inf. Syst. Secur. 16(4): 15 (2014) - [c70]Mark Ryan, Gurchetan S. Grewal, Liqun Chen:
Du-Vote: Remote Electronic Voting with Untrusted Computers. FMS @ Petri Nets 2014: 4 - [c69]Ali El Kaafarani, Liqun Chen
, Essam Ghadafi
, James H. Davenport
:
Attribute-Based Signatures with User-Controlled Linkability. CANS 2014: 256-269 - [c68]Jia Liu
, Mark Dermot Ryan
, Liqun Chen
:
Balancing Societal Security and Individual Privacy: Accountable Escrow System. CSF 2014: 427-440 - [c67]Changyu Dong, Liqun Chen
:
A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost. ESORICS (1) 2014: 380-399 - [c66]Changyu Dong, Liqun Chen
:
A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining. PAKDD (1) 2014: 606-617 - [e5]