Liqun Chen
Liqun Chen
Professor, University of Surrey, UK
Verified email at - Homepage
Cited by
Cited by
Direct anonymous attestation
E Brickell, J Camenisch, L Chen
Proceedings of the 11th ACM conference on Computer and communications …, 2004
Identity-based key agreement protocols from pairings
L Chen, Z Cheng, NP Smart
International Journal of Information Security 6, 213-241, 2007
Identity based authenticated key agreement protocols from pairings
L Chen, C Kudla
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 219-233, 2003
Improved identity-based signcryption.
L Chen, J Malone-Lee
Public Key Cryptography 3386, 362-379, 2005
When private set intersection meets big data: an efficient and scalable protocol
C Dong, L Chen, Z Wen
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
A protocol for property-based attestation
L Chen, R Landfermann, H Löhr, M Rohe, AR Sadeghi, C Stüble
Proceedings of the first ACM workshop on Scalable trusted computing, 7-16, 2006
Alice: Towards understanding adversarial learning for joint distribution matching
C Li, H Liu, C Chen, Y Pu, L Chen, R Henao, L Carin
Advances in neural information processing systems 30, 2017
Concurrent signatures
L Chen, C Kudla, KG Paterson
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
Applications of multiple trust authorities in pairing based cryptosystems
L Chen, K Harrison, D Soldera, NP Smart
Infrastructure Security: International Conference, InfraSec 2002 Bristol, UK …, 2002
Trusted system
SL Pearson, L Chen
US Patent 7,275,160, 2007
Security proof of Sakai-Kasahara’s identity-based encryption scheme
L Chen, Z Cheng
Cryptography and Coding: 10th IMA International Conference, Cirencester, UK …, 2005
Threshold anonymous announcement in VANETs
L Chen, SL Ng, G Wang
IEEE Journal on selected areas in communications 29 (3), 605-615, 2011
Electronic commerce system
L Chen, B Balacheff, R Du Toit, SL Pearson, D Chan
US Patent 7,096,204, 2006
A new direct anonymous attestation scheme from bilinear maps
E Brickell, L Chen, J Li
Trusted Computing-Challenges and Applications: First International …, 2008
Triangle generative adversarial networks
Z Gan, L Chen, W Wang, Y Pu, Y Zhang, H Liu, C Li, L Carin
Advances in neural information processing systems 30, 2017
Comments on the S/KEY user authentication scheme
CJ Mitchell, L Chen
ACM SIGOPS Operating Systems Review 30 (4), 12-16, 1996
Adversarial text generation via feature-mover's distance
L Chen, S Dai, C Tao, H Zhang, Z Gan, D Shen, Y Zhang, G Wang, ...
Advances in Neural Information Processing Systems 31, 2018
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings
E Brickell, L Chen, J Li
Cryptology ePrint Archive, 2008
Public-key encryption with registered keyword search
Q Tang, L Chen
Public Key Infrastructures, Services and Applications: 6th European Workshop …, 2010
Multiple trusted computing environments
J Griffin, CI Dalton, M Child, L Chen, AP Norman
US Patent 7,865,876, 2011
The system can't perform the operation now. Try again later.
Articles 1–20