Liqun Chen
Orcid: 0000-0003-2680-4907Affiliations:
- University of Surrey, Surrey Centre for Cyber Security, Guildford, UK
- Hewlett-Packard Laboratories, Bristol, UK (former)
According to our database1,
Liqun Chen
authored at least 171 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on surrey.ac.uk
-
on orcid.org
On csauthors.net:
Bibliography
2024
Integrated and Accountable Data Sharing for Smart Grids With Fog and Dual-Blockchain Assistance.
IEEE Trans. Ind. Informatics, March, 2024
ACM Trans. Priv. Secur., 2024
On the Privacy of Elementary Matrices Masking-Based Verifiable (Outsourced) Computation.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation, Revisited.
IEEE Trans. Dependable Secur. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Collaborative, Segregated NIZK (CoSNIZK) and More Efficient Lattice-Based Direct Anonymous Attestation.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Inf. Sci., November, 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
2022
Security Analysis and Improvement of a Redactable Consortium Blockchain for Industrial Internet-of-Things.
Comput. J., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IEEE Commun. Stand. Mag., 2021
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021
Proceedings of the IEEE Globecom 2021 Workshops, Madrid, Spain, December 7-11, 2021, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Sparse Matrix Masking-Based Non-Interactive Verifiable (Outsourced) Computation, Revisited.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Cloud Comput., 2020
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020
Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Provable-Security Model for Strong Proximity-based Attacks: With Application to Contactless Payments.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
Secur. Commun. Networks, 2019
Efficient threshold password-authenticated secret sharing protocols for cloud computing.
J. Parallel Distributed Comput., 2019
Toward Practical Privacy-Preserving Processing Over Encrypted Data in IoT: An Assistive Healthcare Use Case.
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
REWARDS: Privacy-preserving rewarding and incentive schemes for the smart electricity grid and other loyalty systems.
Comput. Commun., 2019
Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers.
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019
2018
Message Integration Authentication in the Internet-of-Things via Lattice-Based Batch Signatures.
Sensors, 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
A foggy research future: Advances and future opportunities in fog computing research.
Future Gener. Comput. Syst., 2018
IEEE Access, 2018
Proceedings of the Computer Security, 2018
A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs.
IET Inf. Secur., 2017
IACR Cryptol. ePrint Arch., 2017
CoRR, 2017
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017
Proceedings of the Security and Trust Management - 13th International Workshop, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
2016
Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security Standardisation Research - Third International Conference, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Sci. Comput. Program., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Trusted Systems - 7th International Conference, 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
2014
ACM Trans. Inf. Syst. Secur., 2014
Comput. Stand. Interfaces, 2014
A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
Proceedings of the Formal Methods for Security Workshop co-located with the PetriNets-2014 Conference , 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 5th IEEE International Symposium on Wireless Vehicular Communications, 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Trusted Systems, 4th International Conference, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Inf. Process. Lett., 2011
IACR Cryptol. ePrint Arch., 2011
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model.
IACR Cryptol. ePrint Arch., 2011
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Trustworthy Global Computing - 6th International Symposium, 2011
Proceedings of the IEEE International Conference on Systems, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011
Proceedings of the 2011 ACM Symposium on Document Engineering, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
2010
IEEE Trans. Veh. Technol., 2010
Int. J. Electron. Secur. Digit. Forensics, 2010
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Trusted Systems - Second International Conference, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009
Proceedings of the Trusted Systems, First International Conference, 2009
Proceedings of the Cryptography and Coding, 2009
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
2008
J. Univers. Comput. Sci., 2008
Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Trusted Computing, 2008
Proceedings of the Trusted Computing, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Information Security, 11th International Conference, 2008
2007
Proceedings of the Pairing-Based Cryptography, 2007
Proceedings of the Foundations of Security Analysis and Design IV, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007
Proceedings of the Formal Protocol Verification Applied, 14.10. - 19.10.2007, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Security Protocols, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
2004
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Infrastructure Security, International Conference, 2002
2001
Proceedings of the New Security Paradigms Workshop 2001, 2001
Proceedings of the Information Security, 4th International Conference, 2001
2000
Proceedings of the Fourth International Conference on Knowledge-Based Intelligent Information Engineering Systems & Allied Technologies, 2000
Securing Intelligent Adjuncts Using Trusted Computing Platform Technology.
Proceedings of the Smart Card Research and Advanced Applications, 2000
1998
Proceedings of the Advances in Cryptology, 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
Proceedings of the Security Protocols, 1996
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996
1995
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995