2009 | ||
---|---|---|
46 | Liqun Chen, Chris J. Mitchell, Andrew Martin: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings Springer 2009 | |
45 | Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan Warinschi: Security Notions and Generic Constructions for Client Puzzles. ASIACRYPT 2009: 505-523 | |
44 | Dalia Khader, Liqun Chen, James H. Davenport: Certificate-Free Attribute Authentication. IMA Int. Conf. 2009: 301-325 | |
43 | Helen Balinsky, Edward McDonnell, Liqun Chen, Keith A. Harrison: Anti-counterfeiting Using Memory Spots. WISTP 2009: 52-67 | |
42 | Ernie Brickell, Liqun Chen, Jiangtao Li: Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. Int. J. Inf. Sec. 8(5): 315-330 (2009) | |
2008 | ||
41 | Liqun Chen, Steve Kremer, Mark Dermot Ryan: Formal Protocol Verification Applied, 14.10. - 19.10.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 | |
40 | Liqun Chen, Yi Mu, Willy Susilo: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings Springer 2008 | |
39 | Liqun Chen, Mark Dermot Ryan, Guilin Wang: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings Springer 2008 | |
38 | Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: Property-Based Attestation without a Trusted Third Party. ISC 2008: 31-46 | |
37 | Liqun Chen, Paul Morrissey, Nigel P. Smart: Pairings in Trusted Computing. Pairing 2008: 1-17 | |
36 | Liqun Chen, Paul Morrissey, Nigel P. Smart: On Proofs of Security for DAA Schemes. ProvSec 2008: 156-175 | |
35 | Ernie Brickell, Liqun Chen, Jiangtao Li: A New Direct Anonymous Attestation Scheme from Bilinear Maps. TRUST 2008: 166-178 | |
34 | Adrian Leung, Liqun Chen, Chris J. Mitchell: On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). TRUST 2008: 179-190 | |
33 | Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008) | |
32 | Liqun Chen, Qiang Tang: Bilateral Unknown Key-Share Attacks in Key Agreement Protocols. J. UCS 14(3): 416-440 (2008) | |
31 | Guido Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, Gerardo Pelosi: A pairing SW implementation for Smart-Cards. Journal of Systems and Software 81(7): 1240-1247 (2008) | |
2007 | ||
30 | Ben Smyth, Mark Ryan, Liqun Chen: Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. ESAS 2007: 218-231 | |
29 | Liqun Chen: An Interpretation of Identity-Based Cryptography. FOSAD 2007: 183-208 | |
28 | Liqun Chen, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. Financial Cryptography 2007: 29-44 | |
27 | Liqun Chen, Steve Kremer, Mark Dermot Ryan: 07421 Abstracts Collection -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007 | |
26 | Liqun Chen, Steve Kremer, Mark Dermot Ryan: 07421 Executive Summary -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007 | |
25 | Zhaohui Cheng, Liqun Chen, Li Ling, Richard Comley: General and Efficient Certificateless Public Key Encryption Constructions. Pairing 2007: 83-107 | |
24 | Zhaohui Cheng, Liqun Chen: On security proof of McCullagh?Barreto's key agreement protocol and its variants. IJSN 2(3/4): 251-259 (2007) | |
2006 | ||
23 | Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang: Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. ISPEC 2006: 202-213 | |
22 | Liqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble: A protocol for property-based attestation. STC 2006: 7-16 | |
21 | James L. Peterson, Patrick J. Bohrer, Liqun Chen, E. N. Elnozahy, Ahmed Gheith, Richard H. Jewell, Michael Kistler, T. R. Maeurer, Sean A. Malone, David B. Murrell, Neena Needel, Karthick Rajamani, Mark A. Rinaldi, Richard O. Simpson, Kartik Sudeep, Lixin Zhang: Application of full-system simulation in exploratory system design and development. IBM Journal of Research and Development 50(2-3): 321-332 (2006) | |
2005 | ||
20 | Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner: A Privacy-Protecting Coupon System. Financial Cryptography 2005: 93-108 | |
19 | Liqun Chen, Zhaohui Cheng: Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. IMA Int. Conf. 2005: 442-459 | |
18 | Liqun Chen, John Malone-Lee: Improved Identity-Based Signcryption. Public Key Cryptography 2005: 362-379 | |
17 | Liqun Chen, Hoon Wei Lim, Wenbo Mao: User-Friendly Grid Security Architecture and Protocols. Security Protocols Workshop 2005: 139-156 | |
2004 | ||
16 | Ernest F. Brickell, Jan Camenisch, Liqun Chen: Direct anonymous attestation. ACM Conference on Computer and Communications Security 2004: 132-145 | |
15 | Liqun Chen, Caroline Kudla, Kenneth G. Paterson: Concurrent Signatures. EUROCRYPT 2004: 287-305 | |
2003 | ||
14 | Liqun Chen, Caroline Kudla: Identity Based Authenticated Key Agreement Protocols from Pairings. CSFW 2003: 219-233 | |
2001 | ||
13 | Liqun Chen, Wenbo Mao: An Auditable Metering Scheme for Web Advertisement Applications. ISC 2001: 475-485 | |
12 | Boris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler: A trusted process to digitally sign a document. NSPW 2001: 79-86 | |
2000 | ||
11 | Boris Balacheff, David Chan, Liqun Chen, Siani Pearson, Graeme Proudler: Securing Intelligent Adjuncts Using Trusted Computing Platform Technology. CARDIS 2000: 177-196 | |
10 | Liqun Chen, Siani Pearson, A. Vamvakas: On enhancing biometric authentication with data protection. KES 2000: 249-252 | |
1998 | ||
9 | Liqun Chen: Efficient Fair Exchange with Verifiable Confirmation of Signatures. ASIACRYPT 1998: 286-299 | |
1997 | ||
8 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild: Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193 | |
7 | Liqun Chen, Chris J. Mitchell: An anonymous and undeniable payment scheme. ICICS 1997: 478-482 | |
6 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Authentication Using Minimally Trusted Servers. Operating Systems Review 31(3): 16-28 (1997) | |
1996 | ||
5 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133 | |
4 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153 | |
3 | Chris J. Mitchell, Liqun Chen: Comments on the S/KEY User Authentication Scheme. Operating Systems Review 30(4): 12-16 (1996) | |
1995 | ||
2 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key distribution without individual trusted authentification servers. CSFW 1995: 30- | |
1 | Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Distributing Trust Amongst Multiple Authentication Servers. Journal of Computer Security 3(4): 255-268 (1995) |