The SCEAS System
Navigation Menu

Search the dblp DataBase


Liqun Chen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Tailoring authentication protocols to match underlying mechanisms. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:121-133 [Conf]
  2. Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild
    Secret Sharing with Reusable Polynomials. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:183-193 [Conf]
  3. Liqun Chen
    Efficient Fair Exchange with Verifiable Confirmation of Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:286-299 [Conf]
  4. Boris Balacheff, David Chan, Liqun Chen, Siani Pearson, Graeme Proudler
    Securing Intelligent Adjuncts Using Trusted Computing Platform Technology. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2000, pp:177-196 [Conf]
  5. Ernest F. Brickell, Jan Camenisch, Liqun Chen
    Direct anonymous attestation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:132-145 [Conf]
  6. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Key distribution without individual trusted authentification servers. [Citation Graph (0, 0)][DBLP]
    CSFW, 1995, pp:30-0 [Conf]
  7. Liqun Chen, Caroline Kudla
    Identity Based Authenticated Key Agreement Protocols from Pairings. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:219-233 [Conf]
  8. Liqun Chen, Caroline Kudla, Kenneth G. Paterson
    Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:287-305 [Conf]
  9. Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider 0002, Michael Steiner
    A Privacy-Protecting Coupon System. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:93-108 [Conf]
  10. Liqun Chen, Chris J. Mitchell
    An anonymous and undeniable payment scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:478-482 [Conf]
  11. Liqun Chen, Zhaohui Cheng
    Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:442-459 [Conf]
  12. L. Chen, Keith Harrison, David Soldera, Nigel P. Smart
    Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:260-275 [Conf]
  13. Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
    Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:202-213 [Conf]
  14. L. Chen, Keith Harrison, A. Moss, David Soldera, Nigel P. Smart
    Certification of Public Keys within an Identity Based System. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:322-333 [Conf]
  15. Liqun Chen, Wenbo Mao
    An Auditable Metering Scheme for Web Advertisement Applications. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:475-485 [Conf]
  16. Boris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler
    A trusted process to digitally sign a document. [Citation Graph (0, 0)][DBLP]
    NSPW, 2001, pp:79-86 [Conf]
  17. Liqun Chen, John Malone-Lee
    Improved Identity-Based Signcryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:362-379 [Conf]
  18. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Key Escrow in Mutually Mistrusting Domains. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:139-153 [Conf]
  19. James L. Peterson, Patrick J. Bohrer, Liqun Chen, E. N. Elnozahy, Ahmed Gheith, Richard H. Jewell, Michael Kistler, T. R. Maeurer, Sean A. Malone, David B. Murrell, Neena Needel, Karthick Rajamani, Mark A. Rinaldi, Richard O. Simpson, Kartik Sudeep, Lixin Zhang
    Application of full-system simulation in exploratory system design and development. [Citation Graph (0, 0)][DBLP]
    IBM Journal of Research and Development, 2006, v:50, n:2-3, pp:321-332 [Journal]
  20. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Distributing Trust Amongst Multiple Authentication Servers. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1995, v:3, n:4, pp:255-268 [Journal]
  21. Liqun Chen, Dieter Gollmann, Chris J. Mitchell
    Authentication Using Minimally Trusted Servers. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1997, v:31, n:3, pp:16-28 [Journal]
  22. Chris J. Mitchell, Liqun Chen
    Comments on the S/KEY User Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1996, v:30, n:4, pp:12-16 [Journal]
  23. Ben Smyth, Mark Ryan, Liqun Chen
    Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:218-231 [Conf]
  24. Liqun Chen
    An Interpretation of Identity-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:183-208 [Conf]
  25. Zhaohui Cheng, Liqun Chen, Li Ling, Richard Comley
    General and Efficient Certificateless Public Key Encryption Constructions. [Citation Graph (0, 0)][DBLP]
    Pairing, 2007, pp:83-107 [Conf]

  26. Security Notions and Generic Constructions for Client Puzzles. [Citation Graph (, )][DBLP]

  27. On the Design and Implementation of an Efficient DAA Scheme. [Citation Graph (, )][DBLP]

  28. A protocol for property-based attestation. [Citation Graph (, )][DBLP]

  29. 07421 Executive Summary -- Formal Protocol Verification Applied. [Citation Graph (, )][DBLP]

  30. 07421 Abstracts Collection -- Formal Protocol Verification Applied. [Citation Graph (, )][DBLP]

  31. A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. [Citation Graph (, )][DBLP]

  32. Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. [Citation Graph (, )][DBLP]

  33. Certificate-Free Attribute Authentication. [Citation Graph (, )][DBLP]

  34. Property-Based Attestation without a Trusted Third Party. [Citation Graph (, )][DBLP]

  35. On enhancing biometric authentication with data protection. [Citation Graph (, )][DBLP]

  36. User-Friendly Grid Security Architecture and Protocols. [Citation Graph (, )][DBLP]

  37. Anti-counterfeiting Using Memory Spots. [Citation Graph (, )][DBLP]

  38. Pairings in Trusted Computing. [Citation Graph (, )][DBLP]

  39. On Proofs of Security for DAA Schemes. [Citation Graph (, )][DBLP]

  40. A New Direct Anonymous Attestation Scheme from Bilinear Maps. [Citation Graph (, )][DBLP]

  41. On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). [Citation Graph (, )][DBLP]

  42. A DAA Scheme Using Batch Proof and Verification. [Citation Graph (, )][DBLP]

  43. An Improved Algorithm for Discrete Logarithm Problem. [Citation Graph (, )][DBLP]

  44. Trusted Integrity Measurement and Reporting for Virtualized Platforms. [Citation Graph (, )][DBLP]

Search in 0.006secs, Finished in 0.008secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002