|
Search the dblp DataBase
Liqun Chen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Liqun Chen, Dieter Gollmann, Chris J. Mitchell
Tailoring authentication protocols to match underlying mechanisms. [Citation Graph (0, 0)][DBLP] ACISP, 1996, pp:121-133 [Conf]
- Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild
Secret Sharing with Reusable Polynomials. [Citation Graph (0, 0)][DBLP] ACISP, 1997, pp:183-193 [Conf]
- Liqun Chen
Efficient Fair Exchange with Verifiable Confirmation of Signatures. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1998, pp:286-299 [Conf]
- Boris Balacheff, David Chan, Liqun Chen, Siani Pearson, Graeme Proudler
Securing Intelligent Adjuncts Using Trusted Computing Platform Technology. [Citation Graph (0, 0)][DBLP] CARDIS, 2000, pp:177-196 [Conf]
- Ernest F. Brickell, Jan Camenisch, Liqun Chen
Direct anonymous attestation. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:132-145 [Conf]
- Liqun Chen, Dieter Gollmann, Chris J. Mitchell
Key distribution without individual trusted authentification servers. [Citation Graph (0, 0)][DBLP] CSFW, 1995, pp:30-0 [Conf]
- Liqun Chen, Caroline Kudla
Identity Based Authenticated Key Agreement Protocols from Pairings. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:219-233 [Conf]
- Liqun Chen, Caroline Kudla, Kenneth G. Paterson
Concurrent Signatures. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:287-305 [Conf]
- Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider 0002, Michael Steiner
A Privacy-Protecting Coupon System. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2005, pp:93-108 [Conf]
- Liqun Chen, Chris J. Mitchell
An anonymous and undeniable payment scheme. [Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:478-482 [Conf]
- Liqun Chen, Zhaohui Cheng
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 2005, pp:442-459 [Conf]
- L. Chen, Keith Harrison, David Soldera, Nigel P. Smart
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. [Citation Graph (0, 0)][DBLP] InfraSec, 2002, pp:260-275 [Conf]
- Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:202-213 [Conf]
- L. Chen, Keith Harrison, A. Moss, David Soldera, Nigel P. Smart
Certification of Public Keys within an Identity Based System. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:322-333 [Conf]
- Liqun Chen, Wenbo Mao
An Auditable Metering Scheme for Web Advertisement Applications. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:475-485 [Conf]
- Boris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler
A trusted process to digitally sign a document. [Citation Graph (0, 0)][DBLP] NSPW, 2001, pp:79-86 [Conf]
- Liqun Chen, John Malone-Lee
Improved Identity-Based Signcryption. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2005, pp:362-379 [Conf]
- Liqun Chen, Dieter Gollmann, Chris J. Mitchell
Key Escrow in Mutually Mistrusting Domains. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1996, pp:139-153 [Conf]
- James L. Peterson, Patrick J. Bohrer, Liqun Chen, E. N. Elnozahy, Ahmed Gheith, Richard H. Jewell, Michael Kistler, T. R. Maeurer, Sean A. Malone, David B. Murrell, Neena Needel, Karthick Rajamani, Mark A. Rinaldi, Richard O. Simpson, Kartik Sudeep, Lixin Zhang
Application of full-system simulation in exploratory system design and development. [Citation Graph (0, 0)][DBLP] IBM Journal of Research and Development, 2006, v:50, n:2-3, pp:321-332 [Journal]
- Liqun Chen, Dieter Gollmann, Chris J. Mitchell
Distributing Trust Amongst Multiple Authentication Servers. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1995, v:3, n:4, pp:255-268 [Journal]
- Liqun Chen, Dieter Gollmann, Chris J. Mitchell
Authentication Using Minimally Trusted Servers. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1997, v:31, n:3, pp:16-28 [Journal]
- Chris J. Mitchell, Liqun Chen
Comments on the S/KEY User Authentication Scheme. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1996, v:30, n:4, pp:12-16 [Journal]
- Ben Smyth, Mark Ryan, Liqun Chen
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. [Citation Graph (0, 0)][DBLP] ESAS, 2007, pp:218-231 [Conf]
- Liqun Chen
An Interpretation of Identity-Based Cryptography. [Citation Graph (0, 0)][DBLP] FOSAD, 2007, pp:183-208 [Conf]
- Zhaohui Cheng, Liqun Chen, Li Ling, Richard Comley
General and Efficient Certificateless Public Key Encryption Constructions. [Citation Graph (0, 0)][DBLP] Pairing, 2007, pp:83-107 [Conf]
Security Notions and Generic Constructions for Client Puzzles. [Citation Graph (, )][DBLP]
On the Design and Implementation of an Efficient DAA Scheme. [Citation Graph (, )][DBLP]
A protocol for property-based attestation. [Citation Graph (, )][DBLP]
07421 Executive Summary -- Formal Protocol Verification Applied. [Citation Graph (, )][DBLP]
07421 Abstracts Collection -- Formal Protocol Verification Applied. [Citation Graph (, )][DBLP]
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. [Citation Graph (, )][DBLP]
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. [Citation Graph (, )][DBLP]
Certificate-Free Attribute Authentication. [Citation Graph (, )][DBLP]
Property-Based Attestation without a Trusted Third Party. [Citation Graph (, )][DBLP]
On enhancing biometric authentication with data protection. [Citation Graph (, )][DBLP]
User-Friendly Grid Security Architecture and Protocols. [Citation Graph (, )][DBLP]
Anti-counterfeiting Using Memory Spots. [Citation Graph (, )][DBLP]
Pairings in Trusted Computing. [Citation Graph (, )][DBLP]
On Proofs of Security for DAA Schemes. [Citation Graph (, )][DBLP]
A New Direct Anonymous Attestation Scheme from Bilinear Maps. [Citation Graph (, )][DBLP]
On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). [Citation Graph (, )][DBLP]
A DAA Scheme Using Batch Proof and Verification. [Citation Graph (, )][DBLP]
An Improved Algorithm for Discrete Logarithm Problem. [Citation Graph (, )][DBLP]
Trusted Integrity Measurement and Reporting for Virtualized Platforms. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.008secs
|