dblp.uni-trier.dewww.uni-trier.de

Liqun Chen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
42EELiqun Chen, Chris J. Mitchell, Andrew Martin: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings Springer 2009
2008
41 Liqun Chen, Steve Kremer, Mark Dermot Ryan: Formal Protocol Verification Applied, 14.10. - 19.10.2007 Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008
40 Liqun Chen, Yi Mu, Willy Susilo: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings Springer 2008
39 Liqun Chen, Mark Dermot Ryan, Guilin Wang: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings Springer 2008
38EELiqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: Property-Based Attestation without a Trusted Third Party. ISC 2008: 31-46
37EELiqun Chen, Paul Morrissey, Nigel P. Smart: Pairings in Trusted Computing. Pairing 2008: 1-17
36EELiqun Chen, Paul Morrissey, Nigel P. Smart: On Proofs of Security for DAA Schemes. ProvSec 2008: 156-175
35EEErnie Brickell, Liqun Chen, Jiangtao Li: A New Direct Anonymous Attestation Scheme from Bilinear Maps. TRUST 2008: 166-178
34EEAdrian Leung, Liqun Chen, Chris J. Mitchell: On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). TRUST 2008: 179-190
33 Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008)
32 Liqun Chen, Qiang Tang: Bilateral Unknown Key-Share Attacks in Key Agreement Protocols. J. UCS 14(3): 416-440 (2008)
31EEGuido Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, Gerardo Pelosi: A pairing SW implementation for Smart-Cards. Journal of Systems and Software 81(7): 1240-1247 (2008)
2007
30EEBen Smyth, Mark Ryan, Liqun Chen: Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. ESAS 2007: 218-231
29EELiqun Chen: An Interpretation of Identity-Based Cryptography. FOSAD 2007: 183-208
28EELiqun Chen, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi: A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. Financial Cryptography 2007: 29-44
27EELiqun Chen, Steve Kremer, Mark Dermot Ryan: 07421 Abstracts Collection -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007
26EELiqun Chen, Steve Kremer, Mark Dermot Ryan: 07421 Executive Summary -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007
25EEZhaohui Cheng, Liqun Chen, Li Ling, Richard Comley: General and Efficient Certificateless Public Key Encryption Constructions. Pairing 2007: 83-107
24EEZhaohui Cheng, Liqun Chen: On security proof of McCullagh?Barreto's key agreement protocol and its variants. IJSN 2(3/4): 251-259 (2007)
2006
23EEZhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang: Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. ISPEC 2006: 202-213
22EELiqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble: A protocol for property-based attestation. STC 2006: 7-16
21EEJames L. Peterson, Patrick J. Bohrer, Liqun Chen, E. N. Elnozahy, Ahmed Gheith, Richard H. Jewell, Michael Kistler, T. R. Maeurer, Sean A. Malone, David B. Murrell, Neena Needel, Karthick Rajamani, Mark A. Rinaldi, Richard O. Simpson, Kartik Sudeep, Lixin Zhang: Application of full-system simulation in exploratory system design and development. IBM Journal of Research and Development 50(2-3): 321-332 (2006)
2005
20EELiqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner: A Privacy-Protecting Coupon System. Financial Cryptography 2005: 93-108
19EELiqun Chen, Zhaohui Cheng: Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. IMA Int. Conf. 2005: 442-459
18EELiqun Chen, John Malone-Lee: Improved Identity-Based Signcryption. Public Key Cryptography 2005: 362-379
17EELiqun Chen, Hoon Wei Lim, Wenbo Mao: User-Friendly Grid Security Architecture and Protocols. Security Protocols Workshop 2005: 139-156
2004
16EEErnest F. Brickell, Jan Camenisch, Liqun Chen: Direct anonymous attestation. ACM Conference on Computer and Communications Security 2004: 132-145
15EELiqun Chen, Caroline Kudla, Kenneth G. Paterson: Concurrent Signatures. EUROCRYPT 2004: 287-305
2003
14EELiqun Chen, Caroline Kudla: Identity Based Authenticated Key Agreement Protocols from Pairings. CSFW 2003: 219-233
2001
13EELiqun Chen, Wenbo Mao: An Auditable Metering Scheme for Web Advertisement Applications. ISC 2001: 475-485
12EEBoris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler: A trusted process to digitally sign a document. NSPW 2001: 79-86
2000
11 Boris Balacheff, David Chan, Liqun Chen, Siani Pearson, Graeme Proudler: Securing Intelligent Adjuncts Using Trusted Computing Platform Technology. CARDIS 2000: 177-196
10EELiqun Chen, Siani Pearson, A. Vamvakas: On enhancing biometric authentication with data protection. KES 2000: 249-252
1998
9EELiqun Chen: Efficient Fair Exchange with Verifiable Confirmation of Signatures. ASIACRYPT 1998: 286-299
1997
8 Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild: Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193
7 Liqun Chen, Chris J. Mitchell: An anonymous and undeniable payment scheme. ICICS 1997: 478-482
6 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Authentication Using Minimally Trusted Servers. Operating Systems Review 31(3): 16-28 (1997)
1996
5 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133
4 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153
3 Chris J. Mitchell, Liqun Chen: Comments on the S/KEY User Authentication Scheme. Operating Systems Review 30(4): 12-16 (1996)
1995
2EELiqun Chen, Dieter Gollmann, Chris J. Mitchell: Key distribution without individual trusted authentification servers. CSFW 1995: 30-
1 Liqun Chen, Dieter Gollmann, Chris J. Mitchell: Distributing Trust Amongst Multiple Authentication Servers. Journal of Computer Security 3(4): 255-268 (1995)

Coauthor Index

1Boris Balacheff [11] [12]
2Guido Bertoni (Guido Marco Bertoni) [31]
3Patrick J. Bohrer [21]
4Luca Breveglieri [31]
5Ernest F. Brickell [16]
6Ernie Brickell [35]
7Jan Camenisch [16]
8David Chan [11]
9Zhaohui Cheng [19] [23] [24] [25]
10Richard Comley [23] [25]
11Ed Dawson [33]
12E. N. Elnozahy (Elmootazbellah (Mootaz) Elnozahy) [21]
13Matthias Enzmann [20]
14Alberto N. Escalante [28]
15Pasqualina Fragneto [31]
16Ahmed Gheith [21]
17Dieter Gollmann [1] [2] [4] [5] [6] [8]
18Keith A. Harrison [31]
19Richard H. Jewell [21]
20Michael Kistler [21]
21Steve Kremer [26] [27] [41]
22Caroline Kudla [14] [15]
23Xuejia Lai [33]
24Rainer Landfermann [22]
25Adrian Leung [34]
26Jiangtao Li [35]
27Hoon Wei Lim [17]
28Li Ling [25]
29Hans Löhr [22] [28] [38]
30T. R. Maeurer [21]
31Sean A. Malone [21]
32John Malone-Lee [18]
33Masahiro Mambo [33]
34Mark Manulis [28] [38]
35Wenbo Mao [13] [17]
36Andrew Martin [42]
37Chris J. Mitchell [1] [2] [3] [4] [5] [6] [7] [8] [34] [42]
38Atsuko Miyaji [33]
39Paul Morrissey [36] [37]
40Yi Mu [33] [40]
41David B. Murrell [21]
42Neena Needel [21]
43Kenneth G. Paterson [15]
44Siani Pearson [10] [11]
45Gerardo Pelosi [31]
46James L. Peterson [21]
47David Plaquin [12]
48David Pointcheval [33]
49Bart Preneel [33]
50Graeme Proudler [11] [12]
51Karthick Rajamani [21]
52Mark A. Rinaldi [21]
53Markus Rohe [22]
54Mark Ryan (Mark Dermot Ryan) [26] [27] [30] [39] [41]
55Ahmad-Reza Sadeghi [20] [22] [28] [38]
56Markus Schneider (Markus Schneider II) [20]
57Richard O. Simpson [21]
58Nigel P. Smart [33] [36] [37]
59Ben Smyth [30]
60Michael Steiner [20]
61Christian Stüble [22]
62Kartik Sudeep [21]
63Willy Susilo [33] [40]
64Qiang Tang [23] [32]
65A. Vamvakas [10]
66Guilin Wang [39]
67Huaxiong Wang [33]
68Peter R. Wild [8]
69Duncan S. Wong [33]
70Lixin Zhang [21]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)