Liqun Chen
Liqun Chen
Professor, University of Surrey, UK
Verified email at - Homepage
Cited by
Cited by
Direct anonymous attestation
E Brickell, J Camenisch, L Chen
Proceedings of the 11th ACM conference on Computer and communications …, 2004
Identity-based key agreement protocols from pairings
L Chen, Z Cheng, NP Smart
International Journal of Information Security 6 (4), 213-241, 2007
Identity based authenticated key agreement protocols from pairings
L Chen, C Kudla
16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 219-233, 2003
Improved identity-based signcryption
L Chen, J Malone-Lee
International workshop on public key cryptography, 362-379, 2005
When private set intersection meets big data: an efficient and scalable protocol
C Dong, L Chen, Z Wen
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
A protocol for property-based attestation
L Chen, R Landfermann, H Löhr, M Rohe, AR Sadeghi, C Stüble
Proceedings of the first ACM workshop on Scalable trusted computing, 7-16, 2006
Alice: Towards understanding adversarial learning for joint distribution matching
C Li, H Liu, C Chen, Y Pu, L Chen, R Henao, L Carin
Advances in neural information processing systems 30, 2017
Concurrent signatures
L Chen, C Kudla, KG Paterson
International Conference on the Theory and Applications of Cryptographic …, 2004
Applications of multiple trust authorities in pairing based cryptosystems
L Chen, K Harrison, D Soldera, NP Smart
International Conference on Infrastructure Security, 260-275, 2002
Trusted system
SL Pearson, L Chen
US Patent 7,275,160, 2007
Security proof of Sakai-Kasahara’s identity-based encryption scheme
L Chen, Z Cheng
IMA International conference on cryptography and coding, 442-459, 2005
Threshold anonymous announcement in VANETs
L Chen, SL Ng, G Wang
IEEE Journal on selected areas in communications 29 (3), 605-615, 2011
Electronic commerce system
L Chen, B Balacheff, R Du Toit, SL Pearson, D Chan
US Patent 7,096,204, 2006
A new direct anonymous attestation scheme from bilinear maps
E Brickell, L Chen, J Li
International Conference on Trusted Computing, 166-178, 2008
Comments on the S/KEY user authentication scheme
CJ Mitchell, L Chen
ACM SIGOPS Operating Systems Review 30 (4), 12-16, 1996
Triangle generative adversarial networks
Z Gan, L Chen, W Wang, Y Pu, Y Zhang, H Liu, C Li, L Carin
Advances in neural information processing systems 30, 2017
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings
E Brickell, L Chen, J Li
International journal of information security 8 (5), 315-330, 2009
Adversarial text generation via feature-mover's distance
L Chen, S Dai, C Tao, H Zhang, Z Gan, D Shen, Y Zhang, G Wang, ...
Advances in Neural Information Processing Systems 31, 2018
Multiple trusted computing environments
J Griffin, CI Dalton, M Child, L Chen, AP Norman
US Patent 7,865,876, 2011
Public-key encryption with registered keyword search
Q Tang, L Chen
European Public Key Infrastructure Workshop, 163-178, 2009
The system can't perform the operation now. Try again later.
Articles 1–20