default search action
Liqun Chen 0002
Person information
- affiliation: University of Surrey, Surrey Centre for Cyber Security, Guildford, UK
- affiliation (former): Hewlett-Packard Laboratories, Bristol, UK
Other persons with the same name
- Liqun Chen — disambiguation page
- Liqun Chen 0001 — Duke University, Durham, NC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Liqun Chen, Nada El Kassem, Christopher J. P. Newton:
How To Bind A TPM's Attestation Keys With Its Endorsement Key. Comput. J. 67(3): 988-1004 (2024) - [j50]Jinguang Han, Liqun Chen, Aiqun Hu, Liquan Chen, Jiguo Li:
Privacy-Preserving Decentralized Functional Encryption for Inner Product. IEEE Trans. Dependable Secur. Comput. 21(4): 1680-1694 (2024) - [j49]Liang Zhao, Liqun Chen:
Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited. IEEE Trans. Dependable Secur. Comput. 21(4): 3671-3687 (2024) - [j48]Liang Zhao, Jie Yu, Yiheng Zhang, Liqun Chen:
On the Privacy of Elementary Matrices Masking-Based Verifiable (Outsourced) Computation. IEEE Trans. Dependable Secur. Comput. 21(4): 4299-4301 (2024) - [j47]Suhui Liu, Liquan Chen, Liqun Chen, Jianchang Lai:
Integrated and Accountable Data Sharing for Smart Grids With Fog and Dual-Blockchain Assistance. IEEE Trans. Ind. Informatics 20(3): 4940-4952 (2024) - [j46]Liqun Chen, Changyu Dong, Christopher J. P. Newton, Yalan Wang:
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives. ACM Trans. Priv. Secur. 27(1): 11:1-11:35 (2024) - [c108]Kwan Yin Chan, Liqun Chen, Yangguang Tian, Tsz Hon Yuen:
Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting. AsiaCCS 2024 - [c107]Long Meng, Liqun Chen:
Long-Term Time-Stamping Schemes Based on MACs, Archives, and Transient Keys. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 535-542 - [c106]Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
A New Hash-Based Enhanced Privacy ID Signature Scheme. PQCrypto (1) 2024: 37-71 - [c105]Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu:
FEASE: Fast and Expressive Asymmetric Searchable Encryption. USENIX Security Symposium 2024 - [i54]Sharar Ahmadi, Jay Le-Papin, Liqun Chen, Brijesh Dongol, Sasa Radomirovic, Helen Treharne:
On the Design and Security of Collective Remote Attestation Protocols. CoRR abs/2407.09203 (2024) - [i53]Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis, Suhui Liu:
FEASE: Fast and Expressive Asymmetric Searchable Encryption. IACR Cryptol. ePrint Arch. 2024: 54 (2024) - [i52]Liqun Chen, Changyu Dong, Christopher J. P. Newton, Yalan Wang:
Sphinx-in-the-Head: Group Signatures from Symmetric Primitives. IACR Cryptol. ePrint Arch. 2024: 649 (2024) - [i51]Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
Hash-based Direct Anonymous Attestation. IACR Cryptol. ePrint Arch. 2024: 650 (2024) - [i50]Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
A New Hash-based Enhanced Privacy ID Signature Scheme. IACR Cryptol. ePrint Arch. 2024: 651 (2024) - [i49]Liqun Chen, Patrick Hough, Nada El Kassem:
Collaborative, Segregated NIZK (CoSNIZK) and More Efficient Lattice-Based Direct Anonymous Attestation. IACR Cryptol. ePrint Arch. 2024: 864 (2024) - [i48]Long Meng, Liqun Chen, Yangguang Tian, Mark Manulis:
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption. IACR Cryptol. ePrint Arch. 2024: 986 (2024) - 2023
- [j45]Jinguang Han, Liqun Chen, Willy Susilo, Liquan Chen, Ge Wu:
DFE-IP: Delegatable functional encryption for inner product. Inf. Sci. 647: 119425 (2023) - [c104]Loganathan Parthipan, Liqun Chen, Christopher J. P. Newton, Yunpeng Li, Fei Liu, Donghui Wang:
DRoT: A Decentralised Root of Trust for Trusted Networks. ICICS 2023: 683-701 - [c103]Yalan Wang, Liqun Chen, Long Meng, Yangguang Tian:
BAHS: A Blockchain-Aided Hash-Based Signature Scheme. ISPEC 2023: 419-439 - [c102]Liqun Chen, Changyu Dong, Nada El Kassem, Christopher J. P. Newton, Yalan Wang:
Hash-Based Direct Anonymous Attestation. PQCrypto 2023: 565-600 - [c101]Benjamin Larsen, Nada El Kassem, Thanassis Giannetsos, Ioannis Krontiris, Stefanos Vasileiadis, Liqun Chen:
Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets. TrustCom 2023: 1049-1059 - [i47]Feng Hao, Samiran Bag, Liqun Chen, Paul C. van Oorschot:
Owl: An Augmented Password-Authenticated Key Exchange Scheme. IACR Cryptol. ePrint Arch. 2023: 768 (2023) - 2022
- [j44]Wei Gao, Liqun Chen, Chunming Rong, Kaitai Liang, Xianghan Zheng, Jiangshan Yu:
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things. Comput. J. 65(9): 2430-2438 (2022) - [j43]Liqun Chen, Siaw-Lynn Ng:
Securing emergent behaviour in swarm robotics. J. Inf. Secur. Appl. 64: 103047 (2022) - [c100]Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang:
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. ACNS 2022: 45-64 - [c99]Long Meng, Liqun Chen:
A Blockchain-Based Long-Term Time-Stamping Scheme. ESORICS (1) 2022: 3-24 - [c98]Andreea-Ina Radu, Tom Chothia, Christopher J. P. Newton, Ioana Boureanu, Liqun Chen:
Practical EMV Relay Protection. SP 2022: 1737-1756 - [e15]Cristina Alcaraz, Liqun Chen, Shujun Li, Pierangela Samarati:
Information and Communications Security - 24th International Conference, ICICS 2022, Canterbury, UK, September 5-8, 2022, Proceedings. Lecture Notes in Computer Science 13407, Springer 2022, ISBN 978-3-031-15776-9 [contents] - [i46]Long Meng, Liqun Chen:
A Blockchain-based Long-term Time-Stamping Scheme. IACR Cryptol. ePrint Arch. 2022: 319 (2022) - 2021
- [j42]Long Meng, Liqun Chen:
Reviewing the ISO/IEC Standard for Timestamping Services. IEEE Commun. Stand. Mag. 5(3): 20-25 (2021) - [j41]Liqun Chen, Kaibin Huang, Mark Manulis, Venkkatesh Sekar:
Password-authenticated searchable encryption. Int. J. Inf. Sec. 20(5): 675-693 (2021) - [j40]Jinguang Han, Liqun Chen, Steve Schneider, Helen Treharne, Stephan Wesemeyer:
Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials. IEEE Trans. Dependable Secur. Comput. 18(4): 1836-1849 (2021) - [j39]Kang Yang, Liqun Chen, Zhenfeng Zhang, Christopher J. P. Newton, Bo Yang, Li Xi:
Direct Anonymous Attestation With Optimal TPM Signing Efficiency. IEEE Trans. Inf. Forensics Secur. 16: 2260-2275 (2021) - [c97]Long Meng, Liqun Chen:
Analysis of Client-Side Security for Long-Term Time-Stamping Services. ACNS (1) 2021: 28-49 - [c96]Loganathan Parthipan, Liqun Chen, David Gérault, Yunpeng Li, Fei Liu, Christopher J. P. Newton, Donghui Wang:
A Survey of Technologies for Building Trusted Networks. GLOBECOM (Workshops) 2021: 1-6 - [c95]Georgios Fotiadis, José Moreira, Thanassis Giannetsos, Liqun Chen, Peter B. Rønne, Mark Ryan, Peter Y. A. Ryan:
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols. STM 2021: 163-184 - [e14]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
CYSARM@CCS '21: Proceedings of the 3rd Workshop on Cyber-Security Arms Race, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8661-6 [contents] - [i45]Liqun Chen, Siaw-Lynn Ng:
Securing emergent behaviour in swarm robotics. CoRR abs/2102.03148 (2021) - [i44]Long Meng, Liqun Chen:
Analysis of Client-side Security for Long-term Time-stamping Services. IACR Cryptol. ePrint Arch. 2021: 1411 (2021) - [i43]Long Meng, Liqun Chen:
Reviewing ISO/IEC Standard for Time-stamping Services. IACR Cryptol. ePrint Arch. 2021: 1429 (2021) - [i42]Liang Zhao, Ze Chen, Liqun Chen, Xinyi Huang:
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile. IACR Cryptol. ePrint Arch. 2021: 1534 (2021) - [i41]Long Meng, Liqun Chen:
An Enhanced Long-term Blockchain Scheme Against Compromise of Cryptography. IACR Cryptol. ePrint Arch. 2021: 1606 (2021) - 2020
- [j38]Yi Zhao, Jianting Ning, Kaitai Liang, Yanqi Zhao, Liqun Chen, Bo Yang:
Privacy preserving search services against online attack. Comput. Secur. 95: 101836 (2020) - [j37]Liang Zhao, Liqun Chen:
On the Privacy of Matrix Masking-Based Verifiable (Outsourced) Computation. IEEE Trans. Cloud Comput. 8(4): 1296-1298 (2020) - [j36]Liang Zhao, Liqun Chen:
Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited. IEEE Trans. Dependable Secur. Comput. 17(6): 1188-1206 (2020) - [j35]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer, Nick Wilson:
Anonymous Single Sign-On With Proxy Re-Verification. IEEE Trans. Inf. Forensics Secur. 15: 223-236 (2020) - [c94]Ioana Boureanu, Liqun Chen, Sam Ivey:
Provable-Security Model for Strong Proximity-based Attacks: With Application to Contactless Payments. AsiaCCS 2020: 87-100 - [c93]Stephan Wesemeyer, Christopher J. P. Newton, Helen Treharne, Liqun Chen, Ralf Sasse, Jorden Whitefield:
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme. AsiaCCS 2020: 784-798 - [c92]Heng Liu, Linzhi Jiang, Jian Xu, Dexin Wu, Liqun Chen:
Adversarial Perturbation with ResNet. ACM Great Lakes Symposium on VLSI 2020: 549-554 - [e13]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
CYSARM@CCS '20: Proceedings of the 2nd Workshop on Cyber-Security Arms Race, Virtual Event, USA, November, 2020. ACM 2020, ISBN 978-1-4503-8091-1 [contents] - [e12]Liqun Chen, Ninghui Li, Kaitai Liang, Steve A. Schneider:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12308, Springer 2020, ISBN 978-3-030-58950-9 [contents] - [e11]Liqun Chen, Ninghui Li, Kaitai Liang, Steve A. Schneider:
Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12309, Springer 2020, ISBN 978-3-030-59012-3 [contents]
2010 – 2019
- 2019
- [j34]Jinguang Han, Maoxuan Bei, Liqun Chen, Yang Xiang, Jie Cao, Fuchun Guo, Weizhi Meng:
Attribute-Based Information Flow Control. Comput. J. 62(8): 1214-1231 (2019) - [j33]Tassos Dimitriou, Thanassis Giannetsos, Liqun Chen:
REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems. Comput. Commun. 137: 1-14 (2019) - [j32]Nada El Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough, Paulo Martins, Leonel Sousa:
More efficient, provably-secure direct anonymous attestation from lattices. Future Gener. Comput. Syst. 99: 425-458 (2019) - [j31]Wen Gao, Liqun Chen, Yupu Hu, Christopher J. P. Newton, Baocang Wang, Jiangshan Chen:
Lattice-based deniable ring signatures. Int. J. Inf. Sec. 18(3): 355-370 (2019) - [j30]Linzhi Jiang, Liqun Chen, Thanassis Giannetsos, Bo Luo, Kaitai Liang, Jinguang Han:
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case. IEEE Internet Things J. 6(6): 10177-10190 (2019) - [j29]Jinguang Han, Liqun Chen, Willy Susilo, Xinyi Huang, Aniello Castiglione, Kaitai Liang:
Fine-grained information flow control using attributes. Inf. Sci. 484: 167-182 (2019) - [j28]Xun Yi, Zahir Tari, Feng Hao, Liqun Chen, Joseph K. Liu, Xuechao Yang, Kwok-Yan Lam, Ibrahim Khalil, Albert Y. Zomaya:
Efficient threshold password-authenticated secret sharing protocols for cloud computing. J. Parallel Distributed Comput. 128: 57-70 (2019) - [j27]Yi Zhao, Kaitai Liang, Bo Yang, Liqun Chen:
CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs. Secur. Commun. Networks 2019: 8357241:1-8357241:8 (2019) - [c91]Liqun Chen, Nada El Kassem, Anja Lehmann, Vadim Lyubashevsky:
A Framework for Efficient Lattice-Based DAA. CYSARM@CCS 2019: 23-34 - [c90]Jorden Whitefield, Liqun Chen, Ralf Sasse, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation. EuroS&P 2019: 127-141 - [c89]Tom Chothia, Ioana Boureanu, Liqun Chen:
Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers. Financial Cryptography 2019: 222-233 - [c88]Nada El Kassem, Luís Fiolhais, Paulo Martins, Liqun Chen, Leonel Sousa:
A Lattice-Based Enhanced Privacy ID. WISTP 2019: 15-31 - [e10]Liqun Chen, Chris J. Mitchell, Thanassis Giannetsos, Daniele Sgandurra:
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, CYSARM@CCS 2019, London, UK, November 15, 2019. ACM 2019, ISBN 978-1-4503-6840-7 [contents] - [i40]Nada El Kassem, Luís Fiolhais, Paulo Martins, Liqun Chen, Leonel Sousa:
A Lattice-based Enhanced Privacy ID. IACR Cryptol. ePrint Arch. 2019: 1366 (2019) - 2018
- [j26]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights With Revocability From Learning With Errors. IEEE Access 6: 61163-61175 (2018) - [j25]Kim-Kwang Raymond Choo, Rongxing Lu, Liqun Chen, Xun Yi:
A foggy research future: Advances and future opportunities in fog computing research. Future Gener. Comput. Syst. 78: 677-679 (2018) - [j24]Liqun Chen, Jinguang Han, Chris J. Mitchell:
Message from the Guest Editors. Int. J. Inf. Sec. 17(5): 491-492 (2018) - [j23]Xiuhua Lu, Wei Yin, Qiaoyan Wen, Kaitai Liang, Liqun Chen, Jiageng Chen:
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures. Sensors 18(11): 4056 (2018) - [c87]Liang Zhao, Liqun Chen:
A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation. AsiaCCS 2018: 253-260 - [c86]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Anonymous Single-Sign-On for n Designated Services with Traceability. ESORICS (1) 2018: 470-490 - [c85]Zhaohui Cheng, Liqun Chen:
Certificateless Public Key Signature Schemes from Standard Algorithms. ISPEC 2018: 179-197 - [e9]Liqun Chen, Mark Manulis, Steve A. Schneider:
Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. Lecture Notes in Computer Science 11060, Springer 2018, ISBN 978-3-319-99135-1 [contents] - [e8]Kieran McLaughlin, Ali A. Ghorbani, Sakir Sezer, Rongxing Lu, Liqun Chen, Robert H. Deng, Paul Miller, Stephen Marsh, Jason R. C. Nurse:
16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, Uk, August 28-30, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7493-2 [contents] - [i39]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Anonymous Single-Sign-On for n designated services with traceability. CoRR abs/1804.07201 (2018) - [i38]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer, Nick Wilson:
Anonymous Single Sign-on with Proxy Re-Verification. CoRR abs/1811.07642 (2018) - [i37]Zhaohui Cheng, Liqun Chen:
Certificateless Public Key Signature Schemes from Standard Algorithms. IACR Cryptol. ePrint Arch. 2018: 386 (2018) - [i36]Nada El Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough:
L-DAA: Lattice-Based Direct Anonymous Attestation. IACR Cryptol. ePrint Arch. 2018: 401 (2018) - [i35]Wei Yin, Qiaoyan Wen, Kaitai Liang, Zhenfei Zhang, Liqun Chen, Hanbing Yan, Hua Zhang:
Delegation of Decryption Rights with Revocability from Learning with Errors. IACR Cryptol. ePrint Arch. 2018: 777 (2018) - [i34]Kang Yang, Liqun Chen, Zhenfeng Zhang, Chris Newton, Bo Yang, Li Xi:
Direct Anonymous Attestation with Optimal TPM Signing Efficiency. IACR Cryptol. ePrint Arch. 2018: 1128 (2018) - 2017
- [j22]Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. IET Inf. Secur. 11(4): 204-210 (2017) - [c84]Liqun Chen, Thalia M. Laing, Keith M. Martin:
Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme. AFRICACRYPT 2017: 40-57 - [c83]Kaibin Huang, Mark Manulis, Liqun Chen:
Password Authenticated Keyword Search. PAC 2017: 129-140 - [c82]Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian:
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. IEEE Symposium on Security and Privacy 2017: 901-920 - [c81]Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Formal Analysis of V2X Revocation Protocols. STM 2017: 147-163 - [c80]Jiangshan Yu, Mark Ryan, Liqun Chen:
Authenticating Compromisable Storage Systems. TrustCom/BigDataSE/ICESS 2017: 25-32 - [c79]Jorden Whitefield, Liqun Chen, Thanassis Giannetsos, Steve A. Schneider, Helen Treharne:
Privacy-enhanced capabilities for VANETs using direct anonymous attestation. VNC 2017: 123-130 - [i33]Jorden Whitefield, Liqun Chen, Frank Kargl, Andrew Paverd, Steve A. Schneider, Helen Treharne, Stephan Wesemeyer:
Formal Analysis of V2X Revocation Protocols. CoRR abs/1704.07216 (2017) - [i32]Jinguang Han, Liqun Chen, Steve A. Schneider, Helen Treharne:
PPETS-FGP: Privacy-Preserving Electronic Ticket Scheme with Fine-Grained Pricing. CoRR abs/1706.03016 (2017) - [i31]Jiangshan Yu, Mark Ryan, Liqun Chen:
Authenticating compromisable storage systems. IACR Cryptol. ePrint Arch. 2017: 485 (2017) - [i30]Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian:
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. IACR Cryptol. ePrint Arch. 2017: 639 (2017) - 2016
- [j21]Liqun Chen, Chris J. Mitchell:
Message from the guest editors. Int. J. Inf. Sec. 15(6): 573-574 (2016) - [c78]Liqun Chen, Thalia M. Laing, Keith M. Martin:
Efficient, XOR-Based, Ideal (t, n)- threshold Schemes. CANS 2016: 467-483 - [c77]Liqun Chen, Rainer Urian:
Algorithm Agility - Discussion on TPM 2.0 ECC Functionalities. SSR 2016: 141-159 - [e7]Feng Bao, Liqun Chen, Robert H. Deng, Guojun Wang:
Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10060, 2016, ISBN 978-3-319-49150-9 [contents] - [e6]Liqun Chen, Jinguang Han:
Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings. Lecture Notes in Computer Science 10005, 2016, ISBN 978-3-319-47421-2 [contents] - [i29]Liqun Chen, Thalia M. Laing, Keith M. Martin:
Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme. IACR Cryptol. ePrint Arch. 2016: 1014 (2016) - 2015
- [j20]Ben Smyth, Mark Dermot Ryan, Liqun Chen:
Formal analysis of privacy in Direct Anonymous Attestation schemes. Sci. Comput. Program. 111: 300-317 (2015) - [j19]Jung Yeon Hwang, Liqun Chen, Hyun Sook Cho, DaeHun Nyang:
Short Dynamic Group Signature Scheme Supporting Controllable Linkability. IEEE Trans. Inf. Forensics Secur. 10(6): 1109-1124 (2015) - [c76]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IoTPTS@AsiaCCS 2015: 27-34 - [c75]Gurchetan S. Grewal, Mark Dermot Ryan, Liqun Chen, Michael R. Clarkson:
Du-Vote: Remote Electronic Voting with Untrusted Computers. CSF 2015: 155-169 - [c74]Xun Yi, Feng Hao, Liqun Chen, Joseph K. Liu:
Practical Threshold Password-Authenticated Secret Sharing Protocol. ESORICS (1) 2015: 347-365 - [c73]Miguel Urquidi, Dalia Khader, Jean Lancrenon, Liqun Chen:
Attribute-Based Signatures with Controllable Linkability. INTRUST 2015: 114-129 - [c72]Su Zhang, Xinwen Zhang, Xinming Ou, Liqun Chen, Nigel Edwards, Jing Jin:
Assessing Attack Surface with Component-Based Package Dependency. NSS 2015: 405-417 - [c71]Liqun Chen, Rainer Urian:
DAA-A: Direct Anonymous Attestation with Attributes. TRUST 2015: 228-245 - [i28]Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. CoRR abs/1506.03588 (2015) - [i27]Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. IACR Cryptol. ePrint Arch. 2015: 80 (2015) - 2014
- [j18]Michael Beiter, Marco Casassa Mont, Liqun Chen, Siani Pearson:
End-to-end policy based encryption techniques for multi-party data management. Comput. Stand. Interfaces 36(4): 689-703 (2014) - [j17]Liqun Chen, Hoon Wei Lim, Guomin Yang:
Cross-Domain Password-Based Authenticated Key Exchange Revisited. ACM Trans. Inf. Syst. Secur. 16(4): 15 (2014) - [c70]Mark Ryan, Gurchetan S. Grewal, Liqun Chen:
Du-Vote: Remote Electronic Voting with Untrusted Computers. FMS @ Petri Nets 2014: 4 - [c69]Ali El Kaafarani, Liqun Chen, Essam Ghadafi, James H. Davenport:
Attribute-Based Signatures with User-Controlled Linkability. CANS 2014: 256-269 - [c68]Jia Liu, Mark Dermot Ryan, Liqun Chen:
Balancing Societal Security and Individual Privacy: Accountable Escrow System. CSF 2014: 427-440 - [c67]Changyu Dong, Liqun Chen:
A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost. ESORICS (1) 2014: 380-399 - [c66]Changyu Dong, Liqun Chen:
A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining. PAKDD (1) 2014: 606-617 - [e5]Liqun Chen, Chris J. Mitchell:
Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings. Lecture Notes in Computer Science 8893, Springer 2014, ISBN 978-3-319-14053-7 [contents] - 2013
- [c65]Liqun Chen, Jiangtao Li:
Flexible and scalable digital signatures in TPM 2.0. CCS 2013: 37-48 - [c64]Changyu Dong, Liqun Chen, Zikai Wen:
When private set intersection meets big data: an efficient and scalable protocol. CCS 2013: 789-800 - [c63]Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello:
Fair Private Set Intersection with a Semi-trusted Arbiter. DBSec 2013: 128-144 - [c62]Liqun Chen, Hoon Wei Lim, Guomin Yang:
Cross-domain password-based authenticated key exchange revisited. INFOCOM 2013: 1052-1060 - [c61]Klaus Potzmader, Johannes Winter, Daniel M. Hein, Christian Hanser, Peter Teufl, Liqun Chen:
Group Signatures on Mobile Devices: Practical Experiences. TRUST 2013: 47-64 - [c60]Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
A privacy-aware reputation-based announcement scheme for VANETs. WiVeC 2013: 1-5 - [i26]Changyu Dong, Liqun Chen, Zikai Wen:
When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol. IACR Cryptol. ePrint Arch. 2013: 515 (2013) - 2012
- [j16]Liqun Chen, Yu Chen:
The n-Diffie-Hellman problem and multiple-key encryption. Int. J. Inf. Sec. 11(5): 305-320 (2012) - [c59]Nigel Edwards, Liqun Chen:
An historical examination of open source releases and their vulnerabilities. CCS 2012: 183-194 - [c58]Ernie Brickell, Liqun Chen, Jiangtao Li:
A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes. INTRUST 2012: 95-111 - [c57]Liqun Chen:
Ring Group Signatures. TrustCom 2012: 409-418 - [i25]Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello:
Fair Private Set Intersection with a Semi-trusted Arbiter. IACR Cryptol. ePrint Arch. 2012: 252 (2012) - [i24]Liqun Chen:
Ring Group Signatures. IACR Cryptol. ePrint Arch. 2012: 289 (2012) - [i23]Liqun Chen, Hoon Wei Lim, Guomin Yang:
Cross-Domain Password-Based Authenticated Key Exchange Revisited. IACR Cryptol. ePrint Arch. 2012: 397 (2012) - [i22]Ben Smyth, Mark Dermot Ryan, Liqun Chen:
Formal analysis of privacy in Direct Anonymous Attestation schemes. IACR Cryptol. ePrint Arch. 2012: 650 (2012) - 2011
- [j15]Qiang Tang, Liqun Chen:
Extended KCI attack against two-party key establishment protocols. Inf. Process. Lett. 111(15): 744-747 (2011) - [j14]Liqun Chen, Siaw-Lynn Ng, Guilin Wang:
Threshold Anonymous Announcement in VANETs. IEEE J. Sel. Areas Commun. 29(3): 605-615 (2011) - [c56]Siani Pearson, Marco Casassa Mont, Liqun Chen, Archie Reed:
End-to-End Policy-Based Encryption and Management of Data in the Cloud. CloudCom 2011: 764-771 - [c55]Helen Balinsky, Liqun Chen, Steven J. Simske:
Publicly posted composite documents with identity based encryption. ACM Symposium on Document Engineering 2011: 239-248 - [c54]Yu Chen, Liqun Chen, Zongyang Zhang:
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. ICISC 2011: 275-301 - [c53]Ben Smyth, Mark Ryan, Liqun Chen:
Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes. Formal Aspects in Security and Trust 2011: 245-262 - [c52]Gina Kounga, Liqun Chen:
Enforcing Sticky Policies with TPM and Virtualization. INTRUST 2011: 32-47 - [c51]Ernie Brickell, Liqun Chen, Jiangtao Li:
A (Corrected) DAA Scheme Using Batch Proof and Verification. INTRUST 2011: 304-337 - [c50]Yu Chen, Liqun Chen, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. ISPEC 2011: 40-54 - [c49]Liqun Chen, Yu Chen:
The n-Diffie-Hellman Problem and Its Applications. ISC 2011: 119-134 - [c48]Helen Balinsky, Liqun Chen, Steven J. Simske:
Premature silent workflow termination in publicly posted composite documents. SMC 2011: 1292-1297 - [c47]Liqun Chen, Ming-Feng Lee, Bogdan Warinschi:
Security of the Enhanced TCG Privacy-CA Solution. TGC 2011: 121-141 - [c46]Helen Balinsky, Liqun Chen, Steven J. Simske:
Publicly Posted Composite Documents in Variably Ordered Workflows. TrustCom 2011: 631-638 - [i21]Yu Chen, Liqun Chen, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. IACR Cryptol. ePrint Arch. 2011: 90 (2011) - [i20]Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. IACR Cryptol. ePrint Arch. 2011: 101 (2011) - [i19]Liqun Chen, Yu Chen:
The n-Diffie-Hellman Problem and its Applications. IACR Cryptol. ePrint Arch. 2011: 397 (2011) - [i18]Yu Chen, Liqun Chen, Zongyang Zhang:
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. IACR Cryptol. ePrint Arch. 2011: 593 (2011) - 2010
- [j13]Liqun Chen, Chris J. Mitchell:
Parsing ambiguities in authentication and key establishment protocols. Int. J. Electron. Secur. Digit. Forensics 3(1): 82-94 (2010) - [j12]Liqun Chen, Jiangtao Li:
A note on the Chen-Morrissey-Smart DAA scheme. Inf. Process. Lett. 110(12-13): 485-488 (2010) - [j11]Liqun Chen, Siaw-Lynn Ng:
Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga. IEEE Trans. Veh. Technol. 59(3): 1503-1505 (2010) - [c45]Liqun Chen, Dan Page, Nigel P. Smart:
On the Design and Implementation of an Efficient DAA Scheme. CARDIS 2010: 223-237 - [c44]Liqun Chen, Bogdan Warinschi:
Security of the TCG Privacy-CA Solution. EUC 2010: 609-616 - [c43]Yu Chen, Liqun Chen:
The Twin Bilinear Diffie-Hellman Inversion Problem and Applications. ICISC 2010: 113-132 - [c42]Liqun Chen, Jiangtao Li:
Revocation of Direct Anonymous Attestation. INTRUST 2010: 128-147 - [c41]Christian Wachsmann, Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. ISC 2010: 84-98 - [c40]Frederik Armknecht, Liqun Chen, Ahmad-Reza Sadeghi, Christian Wachsmann:
Anonymous Authentication for RFID Systems. RFIDSec 2010: 158-175 - [c39]Liqun Chen, Jiangtao Li:
VLR Group Signatures with Indisputable Exculpability and Efficient Revocation. SocialCom/PASSAT 2010: 727-734 - [c38]Liqun Chen:
A DAA Scheme Using Batch Proof and Verification. TRUST 2010: 166-180 - [i17]Liqun Chen:
A DAA Scheme Requiring Less TPM Resources. IACR Cryptol. ePrint Arch. 2010: 8 (2010)
2000 – 2009
- 2009
- [j10]Ernie Brickell, Liqun Chen, Jiangtao Li:
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. Int. J. Inf. Sec. 8(5): 315-330 (2009) - [c37]Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan Warinschi:
Security Notions and Generic Constructions for Client Puzzles. ASIACRYPT 2009: 505-523 - [c36]Liqun Chen:
A DAA Scheme Requiring Less TPM Resources. Inscrypt 2009: 350-365 - [c35]Qiang Tang, Liqun Chen:
Public-Key Encryption with Registered Keyword Search. EuroPKI 2009: 163-178 - [c34]Liqun Chen, Mark Ryan:
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. Formal Aspects in Security and Trust 2009: 201-216 - [c33]Dalia Khader, Liqun Chen, James H. Davenport:
Certificate-Free Attribute Authentication. IMACC 2009: 301-325 - [c32]Serdar Cabuk, Liqun Chen, David Plaquin, Mark Ryan:
Trusted Integrity Measurement and Reporting for Virtualized Platforms. INTRUST 2009: 180-196 - [c31]Helen Balinsky, Edward McDonnell, Liqun Chen, Keith A. Harrison:
Anti-counterfeiting Using Memory Spots. WISTP 2009: 52-67 - [e4]Liqun Chen, Chris J. Mitchell, Andrew P. Martin:
Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings. Lecture Notes in Computer Science 5471, Springer 2009, ISBN 978-3-642-00586-2 [contents] - [i16]Liqun Chen, Paul Morrissey, Nigel P. Smart, Bogdan Warinschi:
Security Notions and Generic Constructions for Client Puzzles. IACR Cryptol. ePrint Arch. 2009: 331 (2009) - [i15]Liqun Chen, Dan Page, Nigel P. Smart:
On the Design and Implementation of an Efficient DAA Scheme. IACR Cryptol. ePrint Arch. 2009: 598 (2009) - 2008
- [j9]Guido Bertoni, Luca Breveglieri, Liqun Chen, Pasqualina Fragneto, Keith A. Harrison, Gerardo Pelosi:
A pairing SW implementation for Smart-Cards. J. Syst. Softw. 81(7): 1240-1247 (2008) - [j8]Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart:
Cryptography in Computer System Security. J. Univers. Comput. Sci. 14(3): 314-317 (2008) - [j7]Liqun Chen, Qiang Tang:
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols. J. Univers. Comput. Sci. 14(3): 416-440 (2008) - [c30]Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
Property-Based Attestation without a Trusted Third Party. ISC 2008: 31-46 - [c29]Liqun Chen, Paul Morrissey, Nigel P. Smart:
Pairings in Trusted Computing. Pairing 2008: 1-17 - [c28]Liqun Chen, Paul Morrissey, Nigel P. Smart:
On Proofs of Security for DAA Schemes. ProvSec 2008: 156-175 - [c27]Ernie Brickell, Liqun Chen, Jiangtao Li:
A New Direct Anonymous Attestation Scheme from Bilinear Maps. TRUST 2008: 166-178 - [c26]Adrian Leung, Liqun Chen, Chris J. Mitchell:
On a Possible Privacy Flaw in Direct Anonymous Attestation (DAA). TRUST 2008: 179-190 - [e3]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
Formal Protocol Verification Applied, 14.10. - 19.10.2007. Dagstuhl Seminar Proceedings 07421, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2008 [contents] - [e2]Liqun Chen, Mark Dermot Ryan, Guilin Wang:
Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings. Lecture Notes in Computer Science 5308, Springer 2008, ISBN 978-3-540-88624-2 [contents] - [e1]Liqun Chen, Yi Mu, Willy Susilo:
Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings. Lecture Notes in Computer Science 4991, Springer 2008, ISBN 978-3-540-79103-4 [contents] - [i14]Ernie Brickell, Liqun Chen, Jiangtao Li:
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings. IACR Cryptol. ePrint Arch. 2008: 104 (2008) - [i13]Liqun Chen, Chris J. Mitchell:
Parsing ambiguities in authentication and key establishment protocols. IACR Cryptol. ePrint Arch. 2008: 419 (2008) - 2007
- [j6]Liqun Chen, Zhaohui Cheng, Nigel P. Smart:
Identity-based key agreement protocols from pairings. Int. J. Inf. Sec. 6(4): 213-241 (2007) - [j5]Zhaohui Cheng, Liqun Chen:
On security proof of McCullagh?Barreto's key agreement protocol and its variants. Int. J. Secur. Networks 2(3/4): 251-259 (2007) - [c25]Ben Smyth, Mark Ryan, Liqun Chen:
Direct Anonymous Attestation (DAA): Ensuring Privacy with Corrupt Administrators. ESAS 2007: 218-231 - [c24]Liqun Chen, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting. Financial Cryptography 2007: 29-44 - [c23]Liqun Chen:
An Interpretation of Identity-Based Cryptography. FOSAD 2007: 183-208 - [c22]Zhaohui Cheng, Liqun Chen, Li Ling, Richard Comley:
General and Efficient Certificateless Public Key Encryption Constructions. Pairing 2007: 83-107 - [i12]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
07421 Executive Summary -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007 - [i11]Liqun Chen, Steve Kremer, Mark Dermot Ryan:
07421 Abstracts Collection -- Formal Protocol Verification Applied. Formal Protocol Verification Applied 2007 - [i10]Liqun Chen, Qiang Tang:
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols. IACR Cryptol. ePrint Arch. 2007: 209 (2007) - 2006
- [c21]Liqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble:
A protocol for property-based attestation. STC 2006: 7-16 - [c20]Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang:
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. ISPEC 2006: 202-213 - [i9]Liqun Chen, Zhaohui Cheng, Nigel P. Smart:
Identity-based Key Agreement Protocols From Pairings. IACR Cryptol. ePrint Arch. 2006: 199 (2006) - 2005
- [c19]Liqun Chen, Matthias Enzmann, Ahmad-Reza Sadeghi, Markus Schneider, Michael Steiner:
A Privacy-Protecting Coupon System. Financial Cryptography 2005: 93-108 - [c18]Liqun Chen, Zhaohui Cheng:
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. IMACC 2005: 442-459 - [c17]Liqun Chen, John Malone-Lee:
Improved Identity-Based Signcryption. Public Key Cryptography 2005: 362-379 - [c16]Liqun Chen, Hoon Wei Lim, Wenbo Mao:
User-Friendly Grid Security Architecture and Protocols. Security Protocols Workshop 2005: 139-156 - [i8]Qiang Tang, Liqun Chen:
Weaknesses in two group Diffie-Hellman key exchange protocols. IACR Cryptol. ePrint Arch. 2005: 197 (2005) - [i7]Zhaohui Cheng, Liqun Chen:
On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants. IACR Cryptol. ePrint Arch. 2005: 201 (2005) - [i6]Liqun Chen, Zhaohui Cheng, John Malone-Lee, Nigel P. Smart:
An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction. IACR Cryptol. ePrint Arch. 2005: 224 (2005) - [i5]Liqun Chen, Zhaohui Cheng:
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. IACR Cryptol. ePrint Arch. 2005: 226 (2005) - [i4]Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang:
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. IACR Cryptol. ePrint Arch. 2005: 339 (2005) - 2004
- [c15]Ernest F. Brickell, Jan Camenisch, Liqun Chen:
Direct anonymous attestation. CCS 2004: 132-145 - [c14]Liqun Chen, Caroline Kudla, Kenneth G. Paterson:
Concurrent Signatures. EUROCRYPT 2004: 287-305 - [i3]Liqun Chen, John Malone-Lee:
Improved Identity-Based Signcryption. IACR Cryptol. ePrint Arch. 2004: 114 (2004) - [i2]Ernie Brickell, Jan Camenisch, Liqun Chen:
Direct Anonymous Attestation. IACR Cryptol. ePrint Arch. 2004: 205 (2004) - 2003
- [c13]Liqun Chen, Caroline Kudla:
Identity Based Authenticated Key Agreement Protocols from Pairings. CSFW 2003: 219-233 - 2002
- [c12]Liqun Chen, Keith Harrison, David Soldera, Nigel P. Smart:
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. InfraSec 2002: 260-275 - [c11]Liqun Chen, Keith Harrison, Andrew Moss, David Soldera, Nigel P. Smart:
Certification of Public Keys within an Identity Based System. ISC 2002: 322-333 - [i1]Liqun Chen, Caroline Kudla:
Identity Based Authenticated Key Agreement Protocols from Pairings. IACR Cryptol. ePrint Arch. 2002: 184 (2002) - 2001
- [c10]Liqun Chen, Wenbo Mao:
An Auditable Metering Scheme for Web Advertisement Applications. ISC 2001: 475-485 - [c9]Boris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler:
A trusted process to digitally sign a document. NSPW 2001: 79-86 - 2000
- [j4]Boris Balacheff, Liqun Chen, Siani Pearson, Graeme Proudler, David Chan:
Computing Platform Security in Cyberspace. Inf. Secur. Tech. Rep. 5(1): 54-63 (2000) - [c8]Boris Balacheff, David Chan, Liqun Chen, Siani Pearson, Graeme Proudler:
Securing Intelligent Adjuncts Using Trusted Computing Platform Technology. CARDIS 2000: 177-196 - [c7]Liqun Chen, Siani Pearson, A. Vamvakas:
On enhancing biometric authentication with data protection. KES 2000: 249-252
1990 – 1999
- 1998
- [c6]Liqun Chen:
Efficient Fair Exchange with Verifiable Confirmation of Signatures. ASIACRYPT 1998: 286-299 - 1997
- [j3]Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Authentication Using Minimally Trusted Servers. ACM SIGOPS Oper. Syst. Rev. 31(3): 16-28 (1997) - [c5]Liqun Chen, Dieter Gollmann, Chris J. Mitchell, Peter R. Wild:
Secret Sharing with Reusable Polynomials. ACISP 1997: 183-193 - [c4]Liqun Chen, Chris J. Mitchell:
An anonymous and undeniable payment scheme. ICICS 1997: 478-482 - 1996
- [j2]Chris J. Mitchell, Liqun Chen:
Comments on the S/KEY User Authentication Scheme. ACM SIGOPS Oper. Syst. Rev. 30(4): 12-16 (1996) - [c3]Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Tailoring authentication protocols to match underlying mechanisms. ACISP 1996: 121-133 - [c2]Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Key Escrow in Mutually Mistrusting Domains. Security Protocols Workshop 1996: 139-153 - 1995
- [j1]Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Distributing Trust Amongst Multiple Authentication Servers. J. Comput. Secur. 3(4): 255-268 (1995) - [c1]Liqun Chen, Dieter Gollmann, Chris J. Mitchell:
Key distribution without individual trusted authentification servers. CSFW 1995: 30-
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint