dblp.uni-trier.dewww.uni-trier.de

Liqun Chen Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
44EELiqun Chen, Chris J. Mitchell, Andrew Martin: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings Springer 2009
43EEHelen Balinsky, Edward McDonnell, Liqun Chen, Keith A. Harrison: Anti-counterfeiting Using Memory Spots. WISTP 2009: 52-67
42EEErnie Brickell, Liqun Chen, Jiangtao Li: Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. Int. J. Inf. Sec. 8(5): 315-330 (2009)
2008
41 Liqun Chen, Steve Kremer, Mark Dermot Ryan: Formal Protocol Verification Applied, 14.10. - 19.10.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
40 Liqun Chen, Yi Mu, Willy Susilo: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings Springer 2008
39 Liqun Chen, Mark Dermot Ryan, Guilin Wang: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings Springer 2008
38EELiqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: Property-Based Attestation without a Trusted Third Party. ISC 2008: 31-46
37EELiqun Chen, Paul Morrissey, Nigel P. Smart: Pairings in Trusted Computing. Pairing 2008: 1-17
36EELiqun Chen, Paul Morrissey, Nigel P. Smart: On Proofs of Security for DAA Schemes. ProvSec 2008: 156-175
35EEErnie Brickell, Liqun Chen, Jiangtao Li: A New Direct Anonymous Attestation Scheme from Bilinear Maps. TRUST 2008: 166-178
34EEAdrian Leung, Liqun Chen, Chris J. Mitchell: On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). TRUST 2008: 179-190
33 Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008)
32 Liqun Chen, Qiang Tang: Bilateral Unknown Key-Share Attacks in Key Agreement Protocols. J. UCS 14(3): 416-440 (2008)
31EEGuido Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, Gerardo Pelosi: A pairing SW implementation for Smart-Cards. Journal of Systems and Software 81(7): 1240-1247 (2008)
2007
30EEBen Smyth, Mark Ryan, Liqun Chen: Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. ESAS 2007: 218-231
29EELiqun Chen: An Interpretation of Identity-Based Cryptography. FOSAD 2007: 183-208
28EELiqun Chen, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. Financial Cryptography 2007: 29-44
27EELiqun Chen, Steve Kremer, Mark Dermot Ryan: 07421 Abstracts Collection -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007
26EELiqun Chen, Steve Kremer, Mark Dermot Ryan: 07421 Executive Summary -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007
25EEZhaohui Cheng, Liqun Chen, Li Ling, Richard Comley: General and Efficient Certificateless Public Key Encryption Constructions. Pairing 2007: 83-107
24EEZhaohui Cheng, Liqun Chen: On security proof of McCullagh?Barreto's key agreement protocol and its variants. IJSN 2(3/4): 251-259 (2007)
2006
23EEZhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang: Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. ISPEC 2006: 202-213
22EELiqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble: A protocol for property-based attestation. STC 2006: 7-16
21EEJames L. Peterson, Patrick J. Bohrer, Liqun Chen, E. N. Elnozahy, Ahmed Gheith, Richard H. Jewell, Michael Kistler, T. R. Maeurer, Sean A. Malone, David B. Murrell, Neena Needel, Karthick Rajamani, Mark A. Rinaldi, Richard O. Simpson, Kartik Sudeep, Lixin Zhang: Application of full-system simulation in exploratory system design and development. IBM Journal of Research and Development 50(2-3): 321-332 (2006)
2005
20EELiqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner: A Privacy-Protecting Coupon System. Financial Cryptography 2005: 93-108
19EELiqun Chen, Zhaohui Cheng: Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. IMA Int. Conf. 2005: 442-459
18EELiqun Chen, John Malone-Lee: Improved Identity-Based Signcryption. Public Key Cryptography 2005: 362-379
17EELiqun Chen, Hoon Wei Lim, Wenbo Mao: User-Friendly Grid Security Architecture and Protocols. Security Protocols Workshop 2005: 139-156
2004
16EEErnest F. Brickell, Jan Camenisch, Liqun Chen: Direct anonymous attestation. ACM Conference on Computer and Communications Security 2004: 132-145
15EELiqun Chen, Caroline Kudla, Kenneth G. Paterson: Concurrent Signatures. EUROCRYPT 2004: 287-305
2003
14EELiqun Chen, Caroline Kudla: Identity Based Authenticated Key Agreement Protocols from Pairings. CSFW 2003: 219-233
2001
13EELiqun Chen, Wenbo Mao: An Auditable Metering Scheme for Web Advertisement Applications. ISC 2001: 475-485
12EEBoris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler: A trusted process to digitally sign a document. NSPW 2001: 79-86
2000
11 Boris Balacheff, David Chan, Liqun Chen, Siani Pearson, Graeme Proudler: Securing Intelligent Adjuncts Using Trusted Computing Platform Technology. CARDIS 2000: 177-196
10EELiqun Chen, Siani Pearson, A. Vamvakas: On enhancing biometric authentication with data protection. KES 2000: 249-252
1998
9EELiqun Chen: Efficient Fair Exchange with Verifiable Confirmation of Signatures. ASIACRYPT 1998: 286-299
1997
8 Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild: Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193
7 Liqun Chen, Chris J. Mitchell: An anonymous and undeniable payment scheme. ICICS 1997: 478-482
6 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Authentication Using Minimally Trusted Servers. Operating Systems Review 31(3): 16-28 (1997)
1996
5 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133
4 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153
3 Chris J. Mitchell, Liqun Chen: Comments on the S/KEY User Authentication Scheme. Operating Systems Review 30(4): 12-16 (1996)
1995
2EELiqun Chen, Dieter Gollmann, Chris J. Mitchell: Key distribution without individual trusted authentification servers. CSFW 1995: 30-
1 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Distributing Trust Amongst Multiple Authentication Servers. Journal of Computer Security 3(4): 255-268 (1995)

Coauthor Index

1Boris Balacheff [11] [12]
2Helen Balinsky [43]
3Guido Bertoni (Guido Marco Bertoni) [31]
4Patrick J. Bohrer [21]
5Luca Breveglieri [31]
6Ernest F. Brickell [16]
7Ernie Brickell [35] [42]
8Jan Camenisch [16]
9David Chan [11]
10Zhaohui Cheng [19] [23] [24] [25]
11Richard Comley [23] [25]
12Ed Dawson [33]
13E. N. Elnozahy (Elmootazbellah (Mootaz) Elnozahy) [21]
14Matthias Enzmann [20]
15Alberto N. Escalante [28]
16Pasqualina Fragneto [31]
17Ahmed Gheith [21]
18Dieter Gollmann [1] [2] [4] [5] [6] [8]
19Keith A. Harrison [31] [43]
20Richard H. Jewell [21]
21Michael Kistler [21]
22Steve Kremer [26] [27] [41]
23Caroline Kudla [14] [15]
24Xuejia Lai [33]
25Rainer Landfermann [22]
26Adrian Leung [34]
27Jiangtao Li [35] [42]
28Hoon Wei Lim [17]
29Li Ling [25]
30Hans Löhr [22] [28] [38]
31T. R. Maeurer [21]
32Sean A. Malone [21]
33John Malone-Lee [18]
34Masahiro Mambo [33]
35Mark Manulis [28] [38]
36Wenbo Mao [13] [17]
37Andrew Martin [44]
38Edward McDonnell [43]
39Chris J. Mitchell [1] [2] [3] [4] [5] [6] [7] [8] [34] [44]
40Atsuko Miyaji [33]
41Paul Morrissey [36] [37]
42Yi Mu [33] [40]
43David B. Murrell [21]
44Neena Needel [21]
45Kenneth G. Paterson [15]
46Siani Pearson [10] [11]
47Gerardo Pelosi [31]
48James L. Peterson [21]
49David Plaquin [12]
50David Pointcheval [33]
51Bart Preneel [33]
52Graeme Proudler [11] [12]
53Karthick Rajamani [21]
54Mark A. Rinaldi [21]
55Markus Rohe [22]
56Mark Ryan (Mark Dermot Ryan) [26] [27] [30] [39] [41]
57Ahmad-Reza Sadeghi [20] [22] [28] [38]
58Markus Schneider (Markus Schneider II) [20]
59Richard O. Simpson [21]
60Nigel P. Smart [33] [36] [37]
61Ben Smyth [30]
62Michael Steiner [20]
63Christian Stüble [22]
64Kartik Sudeep [21]
65Willy Susilo [33] [40]
66Qiang Tang [23] [32]
67A. Vamvakas [10]
68Guilin Wang [39]
69Huaxiong Wang [33]
70Peter R. Wild [8]
71Duncan S. Wong [33]
72Lixin Zhang [21]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)