What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Liqun Chen
Google Scholar
49
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
SPARK: Secure Privacy-Preserving Anonymous Swarm Attestation for In-Vehicle Networks.
Wouter Hellemans
Nada El Kassem
Md Masoom Rabbani
Edlira Dushku
Liqun Chen
An Braeken
Bart Preneel
Nele Mentens
2025
conf/uss
Who Pays Whom? Anonymous EMV-Compliant Contactless Payments.
Charles Olivier-Anclin
Ioana Boureanu
Liqun Chen
Christopher J. P. Newton
Tom Chothia
Anna Clee
Andreas Kokkinis
Pascal Lafourcade
2024
conf/ccs
FABESA: Fast (and Anonymous) Attribute-Based Encryption under Standard Assumption.
Long Meng
Liqun Chen
Yangguang Tian
Mark Manulis
2024
conf/uss
FEASE: Fast and Expressive Asymmetric Searchable Encryption.
Long Meng
Liqun Chen
Yangguang Tian
Mark Manulis
Suhui Liu
2024
conf/fc
Owl: An Augmented Password-Authenticated Key Exchange Scheme.
Feng Hao
Samiran Bag
Liqun Chen
Paul C. van Oorschot
2024
conf/asiaccs
Reconstructing Chameleon Hash: Full Security and the Multi-Party Setting.
Kwan Yin Chan
Liqun Chen
Yangguang Tian
Tsz Hon Yuen
2023
conf/icics
DRoT: A Decentralised Root of Trust for Trusted Networks.
Loganathan Parthipan
Liqun Chen
Christopher J. P. Newton
Yunpeng Li
Fei Liu
Donghui Wang
2022
journals/istr
Securing emergent behaviour in swarm robotics.
Liqun Chen
Siaw-Lynn Ng
2022
conf/sp
Practical EMV Relay Protection.
Andreea-Ina Radu
Tom Chothia
Christopher J. P. Newton
Ioana Boureanu
Liqun Chen
2022
conf/acns
An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile.
Liang Zhao
Ze Chen
Liqun Chen
Xinyi Huang
2022
conf/esorics
A Blockchain-Based Long-Term Time-Stamping Scheme.
Long Meng
Liqun Chen
2021
journals/tifs
Direct Anonymous Attestation With Optimal TPM Signing Efficiency.
Kang Yang
Liqun Chen
Zhenfeng Zhang
Christopher J. P. Newton
Bo Yang
Li Xi
2021
conf/acns
Analysis of Client-Side Security for Long-Term Time-Stamping Services.
Long Meng
Liqun Chen
2020
journals/compsec
Privacy preserving search services against online attack.
Yi Zhao
Jianting Ning
Kaitai Liang
Yanqi Zhao
Liqun Chen
Bo Yang
2020
journals/tifs
Anonymous Single Sign-On With Proxy Re-Verification.
Jinguang Han
Liqun Chen
Steve A. Schneider
Helen Treharne
Stephan Wesemeyer
Nick Wilson
2020
conf/ccs
Provable-Security Model for Strong Proximity-based Attacks: With Application to Contactless Payments.
Ioana Boureanu
Liqun Chen
Sam Ivey
2020
conf/ccs
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme.
Stephan Wesemeyer
Christopher J. P. Newton
Helen Treharne
Liqun Chen
Ralf Sasse
Jorden Whitefield
2019
conf/ccs
A Framework for Efficient Lattice-Based DAA.
Liqun Chen
Nada El Kassem
Anja Lehmann
Vadim Lyubashevsky
2019
conf/fc
Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers.
Tom Chothia
Ioana Boureanu
Liqun Chen
2019
conf/eurosp
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation.
Jorden Whitefield
Liqun Chen
Ralf Sasse
Steve A. Schneider
Helen Treharne
Stephan Wesemeyer
2018
conf/ccs
A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation.
Liang Zhao
Liqun Chen
2018
conf/esorics
Anonymous Single-Sign-On for n Designated Services with Traceability.
Jinguang Han
Liqun Chen
Steve A. Schneider
Helen Treharne
Stephan Wesemeyer
2017
conf/sp
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation.
Jan Camenisch
Liqun Chen
Manu Drijvers
Anja Lehmann
David Novick
Rainer Urian
2017
conf/africacrypt
Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme.
Liqun Chen
Thalia M. Laing
Keith M. Martin
2016
conf/cans
Efficient, XOR-Based, Ideal (t, n)- threshold Schemes.
Liqun Chen
Thalia M. Laing
Keith M. Martin
2015
journals/tifs
Short Dynamic Group Signature Scheme Supporting Controllable Linkability.
Jung Yeon Hwang
Liqun Chen
Hyun Sook Cho
DaeHun Nyang
2015
conf/ccs
The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group.
Feng Hao
Xun Yi
Liqun Chen
Siamak Fayyaz Shahandashti
2015
conf/esorics
Practical Threshold Password-Authenticated Secret Sharing Protocol.
Xun Yi
Feng Hao
Liqun Chen
Joseph K. Liu
2014
conf/esorics
A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost.
Changyu Dong
Liqun Chen
2014
conf/cans
Attribute-Based Signatures with User-Controlled Linkability.
Ali El Kaafarani
Liqun Chen
Essam Ghadafi
James H. Davenport
2013
conf/ccs
When private set intersection meets big data: an efficient and scalable protocol.
Changyu Dong
Liqun Chen
Zikai Wen
2013
conf/ccs
Flexible and scalable digital signatures in TPM 2.0.
Liqun Chen
Jiangtao Li
2012
conf/ccs
An historical examination of open source releases and their vulnerabilities.
Nigel Edwards
Liqun Chen
2011
conf/icisc
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model.
Yu Chen
Liqun Chen
Zongyang Zhang
2010
conf/icisc
The Twin Bilinear Diffie-Hellman Inversion Problem and Applications.
Yu Chen
Liqun Chen
2009
conf/asiacrypt
Security Notions and Generic Constructions for Client Puzzles.
Liqun Chen
Paul Morrissey
Nigel P. Smart
Bogdan Warinschi
2008
conf/provsec
On Proofs of Security for DAA Schemes.
Liqun Chen
Paul Morrissey
Nigel P. Smart
2007
conf/fc
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting.
Liqun Chen
Alberto N. Escalante
Hans Löhr
Mark Manulis
Ahmad-Reza Sadeghi
2006
conf/ccs
A protocol for property-based attestation.
Liqun Chen
Rainer Landfermann
Hans Löhr
Markus Rohe
Ahmad-Reza Sadeghi
Christian Stüble
2005
conf/fc
A Privacy-Protecting Coupon System.
Liqun Chen
Matthias Enzmann
Ahmad-Reza Sadeghi
Markus Schneider
Michael Steiner
2005
conf/pkc
Improved Identity-Based Signcryption.
Liqun Chen
John Malone-Lee
2004
conf/ccs
Direct anonymous attestation.
Ernest F. Brickell
Jan Camenisch
Liqun Chen
2004
conf/eurocrypt
Concurrent Signatures.
Liqun Chen
Caroline Kudla
Kenneth G. Paterson
2001
conf/nspw
A trusted process to digitally sign a document.
Boris Balacheff
Liqun Chen
David Plaquin
Graeme Proudler
2000
journals/istr
Computing Platform Security in Cyberspace.
Boris Balacheff
Liqun Chen
Siani Pearson
Graeme Proudler
David Chan
1998
conf/asiacrypt
Efficient Fair Exchange with Verifiable Confirmation of Signatures.
Liqun Chen
1997
conf/acisp
Secret Sharing with Reusable Polynomials.
Liqun Chen
Dieter Gollmann
Chris J. Mitchell
Peter R. Wild
1997
conf/icics
An anonymous and undeniable payment scheme.
Liqun Chen
Chris J. Mitchell
1996
conf/acisp
Tailoring authentication protocols to match underlying mechanisms.
Liqun Chen
Dieter Gollmann
Chris J. Mitchell
Coauthors
Ahmad-Reza Sadeghi
(3)
Alberto N. Escalante
(1)
Ali El Kaafarani
(1)
An Braeken
(1)
Andreas Kokkinis
(1)
Andreea-Ina Radu
(1)
Anja Lehmann
(2)
Anna Clee
(1)
Bart Preneel
(1)
Bo Yang
(2)
Bogdan Warinschi
(1)
Boris Balacheff
(2)
Caroline Kudla
(1)
Changyu Dong
(2)
Charles Olivier-Anclin
(1)
Chris J. Mitchell
(3)
Christian Stüble
(1)
Christopher J. P. Newton
(5)
DaeHun Nyang
(1)
David Chan
(1)
David Novick
(1)
David Plaquin
(1)
Dieter Gollmann
(2)
Donghui Wang
(1)
Edlira Dushku
(1)
Ernest F. Brickell
(1)
Essam Ghadafi
(1)
Fei Liu
(1)
Feng Hao
(3)
Graeme Proudler
(2)
Hans Löhr
(2)
Helen Treharne
(4)
Hyun Sook Cho
(1)
Ioana Boureanu
(4)
James H. Davenport
(1)
Jan Camenisch
(2)
Jiangtao Li
(1)
Jianting Ning
(1)
Jinguang Han
(2)
John Malone-Lee
(1)
Jorden Whitefield
(2)
Joseph K. Liu
(1)
Jung Yeon Hwang
(1)
Kaitai Liang
(1)
Kang Yang
(1)
Keith M. Martin
(2)
Kenneth G. Paterson
(1)
Kwan Yin Chan
(1)
Li Xi
(1)
Liang Zhao
(2)
Liqun Chen
(49)
Loganathan Parthipan
(1)
Long Meng
(4)
Manu Drijvers
(1)
Mark Manulis
(3)
Markus Rohe
(1)
Markus Schneider
(1)
Matthias Enzmann
(1)
Md Masoom Rabbani
(1)
Michael Steiner
(1)
Nada El Kassem
(2)
Nele Mentens
(1)
Nick Wilson
(1)
Nigel Edwards
(1)
Nigel P. Smart
(2)
Pascal Lafourcade
(1)
Paul C. van Oorschot
(1)
Paul Morrissey
(2)
Peter R. Wild
(1)
Rainer Landfermann
(1)
Rainer Urian
(1)
Ralf Sasse
(2)
Sam Ivey
(1)
Samiran Bag
(1)
Siamak Fayyaz Shahandashti
(1)
Siani Pearson
(1)
Siaw-Lynn Ng
(1)
Stephan Wesemeyer
(4)
Steve A. Schneider
(3)
Suhui Liu
(1)
Thalia M. Laing
(2)
Tom Chothia
(3)
Tsz Hon Yuen
(1)
Vadim Lyubashevsky
(1)
Wouter Hellemans
(1)
Xinyi Huang
(1)
Xun Yi
(2)
Yangguang Tian
(3)
Yanqi Zhao
(1)
Yi Zhao
(1)
Yu Chen
(2)
Yunpeng Li
(1)
Ze Chen
(1)
Zhenfeng Zhang
(1)
Zikai Wen
(1)
Zongyang Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to