|   | Publications Books and
        contributions to books ·        
        L. Chen and
        M. Yung (editors), Trusted Systems (Proceedings of INTRUST 2009), LNCS
        6163, ISBN: 978-3-642-14596-4, Springer-Verlag,
        2010. ·        
        L. Chen, C.J. Mitchell and A. Martin
        (editors), Trusted Computing (Proceedings
        of Trust 2009), LNCS 5471, ISBN 978-3-642-00586-2, Springer, 2009.  ·        
        L. Chen, M.D. Ryan and G. Wang
        (editors), Information and Communications Security (Proceedings
        of ICICS 2008), LNCS 5308, ISBN 978-3-540-88624-2, Springer, 2008. ·        
        L. Chen, Y. Mu
        and W. Susilo (editors), Information Security
        Practice and Experience (Proceedings
        of ISPEC 2008), LNCS 4991, ISBN 978-3-540-79103-4, Springer, 2008.  ·        
        E. Brickell,
        J. Camenisch and L. Chen. Direct anonymous
        attestation in context. Chapter 5 of Trusted Computing, pp.
        143-174, edited by C. Mitchell, ISBN 0-86341-525-3, IEE, London, 2005. ·        
        B. Balacheff,
        L. Chen, S. Pearson, D. Plaquin and G. Proudler. Trusted Computing Platforms: TCPA
        Technology in Context. ISBN 0-13-009220-7, Prentice Hall PTR,
        2003.    ·        
        C. J. Mitchell and L. Chen. Security
        in future mobile multimedia networks. Chapter 11 of Insights
        into Mobile Multimedia Communications, pp. 177-190, edited by D. R.
        Bull, C. N. Canagarajah and A. R. Nix,
        ISBN-13: 978-0-12-140310-2, ISBN-10: 0-12-140310-6, Academic Press,
        1999. Journal articles ·        
        
		
		Q. Tang 
		
		and 
		
		L. Chen.
		
		Extended KCI attack against two-party key establishment protocols.
		
		Information Processing Letters, 
		111(15):–.  ·        
        L. Chen, S.-L. Ng and G. Wang. Threshold
        anonymous announcement in VANETs. 
		IEEE Journal on Selected Areas
        in Communications, 
		
		29(3):605-615, 2011.  ·     L. Chen and J. Li. A note on the
        Chen-Morrissey-Smart direct anonymous attestation scheme. Information Processing Letters, 110(12-13):485-488, 2010. ·        
        L. Chen and C.J. Mitchell. Parsing
        ambiguities in authentication and key establishment protocols. International Journal of Electronic
        Security and Digital Forensics, 3(1):82-94, 2010. ·        
        L. Chen and S. Ng.
        Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga et
        al. IEEE
        Transactions on Vehicular Technology, 59(3):1503-1505,
        2010. ·        
        E. Brickell,
        L. Chen and J. Li, Simplified security notions of direct anonymous
        attestation and a concrete scheme from pairings. International Journal of Information Security, 8(5):315-330, 2009. ·        
        G. Bertoni, L.
        Breveglieri, L. Chen, P. Fragneto,
        K. A. Harrison, G. Pelosi: A pairing SW implementation for Smart-Cards.
        Journal of Systems and Software 81(7):
        1240-1247, 2008. ·        
        L. Chen and Q. Tang. Bilateral unknown
        key-share attacks in key agreement protocols. Journal of Universal
        Computer Science, 14(3):416-440, 2008. ·        
        L. Chen, Z. Cheng and N. Smart. Identity-based key agreement
        protocols from pairings. International Journal of
        Information Security, 6(4):213-241,
        Springer Berlin / Heidelberg, 2007.  ·        
        Z. Cheng and L. Chen. On security proof of McCullagh-Barreto's
        key agreement protocol and its variants. International
        Journal of Security and Networks, 2(3/4): 251-259, 2007.  ·        
        L. Chen, Z. Cheng, J. Malone-Lee and N.
        Smart. Efficient ID-KEM based on the Sakai-Kasahara
        key construction. IEE Proceedings Information Security, 153(1):19-26,
        2006.  ·        
        B. Balacheff, 
        L. Chen, S. Pearson, G. Proudler and D. Chan.
        Computing platform security in cyberspace. Elsevier Information
        Security Technical Report, 5(1):54-63, 2000. ·        
        L.
        Chen, D. Gollmann and C.J.
        Mitchell. Authentication
        using minimally trusted servers. ACM Operating Systems Review,
        31(3):16-28, 1997. ·        
        C.J. Mitchell and L. Chen. Comments
        on the S/KEY user authentication scheme. ACM Operating Systems Review,
          30(4):12-16, 1996. ·        
        L.
        Chen, D. Gollmann and C. Mitchell.
        Distributing trust amongst multiple authentication servers. Journal
        of Computer Security, 3(4):255-267, 1994/95. ·        
        B. Wu and L. Chen. Cipher rolling in the
        speech scrambling system requiring no frame synchronization. Journal
        of Southeast
         University, 21(5):1-8,
        1991. ·        
        L. Chen and B. Wu. Generation of T
        and T-1 matrices for a speech scrambling system
        without frame synchronization. Communication security, 44(4):1–5,
        1990. Conference
        proceedings articles ·        
        
		
		L. Chen, M. Lee and B. Warinschi. Security of the enhanced TCG 
		privacy-CA solution. To appear in
		the Proceedings of the 6th International Symposium on Trustworthy Global 
		Computing (TGC 2011). ·        
        
		
		Y. Chen, L. Chen and Z. Chen. Generic methods to achieve tighter 
		security reductions for a category of IBE schemes. In
		the Proceedings of the 7th 
		Information Security Practice and Experience Conference (ISPEC 2011), 
		Springer LNCS 6672, pp. 40–54, 2011. ·        
        
		
		H. Balinsky, L. Chen and S. Simske. Premature silent workflow 
		termination in publicly posted composite documents. To appear in
		IEEE International conference on 
		Systems, Man and Cybernetics (SMC 2011). ·        
        
		
		H. Balinsky, L. Chen and S. Simske. Publicly posted composite documents 
		with identity based encryption. To appear in
		the 11th ACM Symposium 
		on Document Engineering (DocEng 2011). ·        
        C. Wachsmann,
        A. Sadeghi, L. Chen, K. Dietrich, H. Löhr and J. Winter. Lightweight anonymous
        authentication with TLS and DAA for embedded mobile
        devices. To appear in the
        proceedings of 13th Information Security Conference (ISC
        2010). ·     Y. Chen and
        L. Chen.
        The twin bilinear Diffie-Hellman inversion problem and applications. To appear in the
		 Proceedings of 
		the 13th
        International Conference on 
		Information Security and Cryptology (ICISC 2010).
		 ·     L. Chen and 
		J. Li.
        Revocation of direct anonymous attestation. To appear in the Proceedings of the 2nd International 
		Conference on Trusted Systems (INTRUST 2010). ·     L. Chen and B. Warinschi.
        Security of the TCG privacy-CA solution. To appear in the Proceedings of the 6th
        IEEE/IFIP International Symposium on Trusted Computing and
        Communications (TrustCom 2010). ·     L. Chen and J. Li. VLR group signatures
        with indisputable exculpability and efficient revocation. To appear in the Proceedings of the Second IEEE
        International Conference on Information Privacy, Security, Risk and
        Trust (PASSAT2010), IEEE Computer Society Press, 2010. (Best PASSAT
        Conference Paper Award). ·        
        F. Armknecht,
        L. Chen, A. Sadeghi, and C. Wachsmann. Anonymous authentication for RFID systems.
        To appear in the Proceedings of the
         6th Workshop on RFID Security (RFIDSec 2010). ·        
        L. Chen. A DAA scheme using batch proof
        and verification. In the
        Proceedings of the 3rd International Conference on Trust
        (Trust 2010), LNCS 6101, pp. 166–180, Springer, 2010. ·        
        L. Chen, D. Page and N. Smart. On the
        design and implementation of an efficient DAA scheme. In the Proceedings of the Ninth Smart
        Card Research and Advanced Application IFIP Conference (CARDIS 2010),
        LNCS Volume 6035, pp. 223–237, Springer, 2010. ·        
        S. Cabuk, L.
        Chen, D. Plaquin and M. Ryan. Trusted
        integrity measurement and reporting for virtualized platforms. In the Proceedings of the International
        Conference on Trusted Systems (INTRUST 2009), LNCS 6163, pp.
        181–197, Springer, 2010. ·        
        L. Chen. A DAA scheme requiring less TPM
        resources. To appear in the
        Proceedings of the 5th China International
        Conference on Information Security and Cryptology (Inscrypt
        2009). ·        
        D. Khader, L.
        Chen and J. Davenport. Certificate-free attribute authentication. In
        the Proceedings of the Twelfth
        IMA International Conference on Cryptography and Coding (IMACC 2009),
        LNCS 5921, pp. 301–325, Springer-Verlag,
        2009. ·        
        L. Chen and M. Ryan. Attack, solution
        and verification for shared authorisation data in TCG TPM. To appear in
        the Proceedings of the sixth
        International Workshop on Formal Aspects in Security and Trust
        (FAST2009), 2009. ·        
        L. Chen, P. Morrissey, N. P. Smart and
        B. Warinschi. Security notions and generic
        constructions for client puzzles. To appear in the Proceedings of Advances
        in Cryptology – Asiacrypt'09, Springer-Verlag,
        2009. ·        
        Q. Tang and L. Chen. Public-key
        encryption with registered keyword search. To appear in the Proceedings of the 6th
        European Workshop on Public Key Services, Applications and
        Infrastructures (EuroPKI'09), Springer-Verlag,
        2009. ·        
        H. Balinsky,
        E. McDonnell, L. Chen and K. Harrison. Anti-counterfeiting using memory
        spots. In the Proceedings of the
        3rd Workshop in Information Security Theory and Practices
        – WISTP'09, LNCS 5746, pp. 52 – 67, Springer-Verlag, 2009. ·        
        L. Chen, P. Morrissey and N. P. Smart. On Proofs of
        Security for DAA Schemes. In the
        Proceedings of the Second International Conference
        on Provable Security (ProvSec 2008), LNCS
        5324, pp. 156-175, Springer-Verlag, 2008. ·        
        L. Chen, H. Löhr,
        M. Manulis, and A.Sadeghi.
        Property-based attestation without a trusted third party. In the Proceedings of the 11thInternational
        Conference on Information Security (ISC 2008), LNCS 5222, pp. 31-46, Springer-Verlag,
        2008. ·        
        L. Chen, P. Morrissey and N.P. Smart. Pairings
        in trusted computing. To appear in the Proceedings of the Second
        International Conference on Pairing-based Cryptography (Pairing 2008),
        Royal Holloway, University of London, UK, September 2008. ·        
        L. Chen and M. Ryan. Offline dictionary
        attack on TCG TPM weak authorisation data, and solution. To appear in the
        Proceedings of the International conference on the Future of Trust in Computing, Berlin, Germany, June 30 - July 2, 2008. ·        
        A. Leung, L. Chen, and C. J. Mitchell.
        On a possible privacy flaw in direct anonymous attestation (DAA). In the Proceedings of the 1st
        International Conference on Trust (TRUST 2008), LNCS 4968, pp. 179-190,
        Springer-Verlag, 2008. ·        
        E. Brickell,
        L. Chen and J. Li. A new direct anonymous attestation scheme from
        bilinear maps. In the Proceedings
        of the 1st International Conference on Trust (TRUST 2008),
        LNCS 4968, pp. 166-178, Springer-Verlag,
        2008. ·        
        Yi Mu, Duncan
        Wong, Liqun Chen, Willy Susilo,
        Qianhong Wu. Concurrent signatures without a
        conventional keystone. In the
        Proceedings of the First International Workshop on Coding and
        Cryptology, Series on Coding Theory and Cryptology, Vol. 4, World
        Scientific, 2007. ·        
        L. Chen. An interpretation of
        identity-based cryptography. In A. Aldini and R. Gorrieri (Eds.): Foundations of Security Analysis and Design IV, FOSAD
        2006/2007, LNCS 4677, pp. 183–208, Springer-Verlag,
        2007. ·        
        B. Smyth, L. Chen and M. Ryan. Direct
        Anonymous Attestation (DAA): ensuring privacy with corrupt
        administrators. In F. Stajano, editor, the
        Proceedings of Fourth European Workshop on Security and Privacy in Ad
        hoc and Sensor Networks (ESAS 2007), LNCS 4572, pp. 218-231, Springer-Verlag, 2007.  ·        
        L. Chen, A. Escalante, H. Löhr, M. Manulis and A. Sadeghi. A privacy-protecting multi-coupon scheme
        with stronger protection against splitting. In S. Dietrich
        and R. Dhamija (Eds.), Proceedings of the
        11th International Conference on Financial Cryptography and
        Data Security (FC 2007), LNCS 4886, pp. 29-44, Springer-Verlag, 2008. ·        
        L. Chen, R. Landfermann, H. Löhr, M. Rohe, A.Sadeghi and C. Stüble.
        A protocol for property based attestation. In G. Tsudik, S. Xu and M. Yung
        (Eds.), proceedings of the First ACM Workshop on Scalable Trusted
        Computing (STC'06), pp. 7-16, the ACM Press, 2006. ·        
        Z. Cheng, L. Chen, R. Comley and Q. Tang. Identity-based key agreement
        with unilateral identity privacy using pairings. In K. Chen and R. Deng (Eds), Proceedings of the Second Information
        Security Practice and Experience Conference (ISPEC 2006), LNCS 3903, pp. 202-213, Springer-Verlag, 2006.  ·        
        L. Chen and Z. Cheng. Security proof of
        Sakai-Kasahara's identity-based encryption
        scheme. In N. Smart (Ed.), Proceedings of the 10th IMA
        International Conference on Cryptography and Coding, LNCS
        3796, pp. 442-459, Springer-Verlag, 2005.  ·        
        L. Chen, M. Enzmann, A. Sadeghi, M. Schneider and M.
        Steiner. A privacy-protecting coupon system. In A.
        Patrick and M. Yung (Eds), Proceedings of
        the 9th International Conference on Financial
        Cryptography and Data Security (FC 2005), LNCS
        3570, pp. 93-108, Springer-Verlag,
        2005.  ·        
        L. Chen and J. Malone-Lee. Improved
        identity-based signcryption. In V. Serge
        (Ed.), Proceedings of the 8th International
        Workshop on Theory and Practice in Public Key Cryptography (PKC 2005),
        LNCS 3386, pp. 362-379, Springer-Verlag,
        2005.  ·        
        L. Chen, H. Lim and W. Mao.
        User-friendly grid security architecture and protocols. In B. Christianson, B. Crispo, J.
        A. Malcolm, M. Roe (Eds.), Proceedings of 13th
        International Workshop on Security Protocols, Cambridge, UK, April
        20-22, 2005, LNCS 4631, pp. 139-156, Springer-Verlag,
        2007. ·        
        E. Brickell,
        J. Camenisch, and L. Chen. Direct anonymous
        attestation. In B. Pfitzmann and P. Liu
        (Eds.), Proceedings of the 11th ACM Conference on Computer and
        Communications Security (CCS 2004), pp. 132-145, ACM press, 2004.  ·        
        L. Chen, C. Kudla
        and K. Paterson. Concurrent signatures. In C. Cachin
        and J. Camenisch (Eds.), Proceedings of
        Advances in Cryptology – EUROCRYPT 2004, LNCS 3027, pp.
        287-305, Springer-Verlag, 2004.  ·        
        L. Chen and C. Kudla.
        Identity based key agreement protocols from pairings. In R. Focardi (Ed.), Proceedings of the 16th IEEE
        Computer Security Foundations Workshop (CSFW-16 2003), pp. 219-233,
        IEEE Computer Society Press, 2003. A revised version is available at Cryptology ePrint Archive, Report 2002/184, 2002. ·        
        L. Chen, K. Harrison, A. Moss, D. Soldera, and N. Smart. Certification of public keys
        within an identity based system. In A. Chan and V. Gligor
        (Eds.), Proceedings of the 5th International Conference
        on Information Security (ISC 2002), LNCS 2433, pp. 322-333,
        Springer-Verlag, 2002. ·        
        L. Chen, K. Harrison, D. Soldera, and N.P. Smart. Applications of multiple
        trust authorities in pairing based cryptosystems. In G. Davida, Y. Frankel, O. Rees (Eds.), Proceedings
        of the International Conference on Infrastructure Security (InfraSec 2002), LNCS 2437, pp. 260-275, Springer-Verlag, 2002. ·        
        B. Balacheff,
        L. Chen, D. Plaquin and G. Proudler. A trusted process to digitally sign a
        document. In V. Raskin and C. Hempelmann (Eds.), Proceedings of the 2001 New
        Security Paradigms Workshop (NSPW'01), pp. 79-86, ACM Press, 2001. ·        
        L. Chen and W. Mao. An auditable
        metering scheme for web advertisement applications. In G. Davida and Y. Frankel (Eds.), Proceedings of the
        4th International Conference on Information Security (ISC
        2001), LNCS 2200, pp. 475-485, Springer-Verlag,
        2001. ·        
        B. Balacheff,
        D. Chan, L. Chen, S. Pearson, and G. Proudler.
        Securing intelligent adjuncts using trusted computing platform
        technology. In J. Domingo-Ferrer, D. Chan and
        A. Watson (Eds.), Proceedings of the 4th Working Conference
        on Smart Card Research and Advanced Applications, pp. 177-195, Kluwer Academic Publishers, 2000. ·        
        B. Balacheff,
        D. Chan, L. Chen, S. Pearson, and G. Proudler.
        How can you trust a computing platform? In Proceedings of
        Information Security Solutions Europe Conference (ISSE 2000), Spain,
        2000. ·        
        L. Chen, S. Pearson and A. Vamvakas. On enhancing biometric authentication
        with data protection. In R. Howlett and L.
        Jain (Eds.), Proceedings of the 4th International
        Conference on Knowledge-Based Intelligent Engineering Systems &
        Allied Technologies (KES 2000), pp. 249-252, IEEE press, 2000. ·        
        L. Chen. Efficient fair exchange with
        verifiable confirmation of signatures. In K. Ohta
        and D. Pei (Eds.), Proceedings of Advances in Cryptology –
        Asiacrypt'98, LNCS 1514, pp. 286-299, Springer-Verlag,
        1998. ·        
        L.
        Chen, D. Gollmann and C.J.
        Mitchell. Key
        escrow in mutually mistrusting domains. In M. Lomas (Ed.), Proceedings
        of International Workshop on Security Protocols, LNCS
        1189, pp.139-153, Springer-Verlag, 1997. ·        
        L.
        Chen and C.J. Mitchell. Key escrow in
        multiple domains. In J. Lamere
        (Ed.), Proceedings of the International Congress on Information
        Systems and Telecommunications Security (INFOSEC'COM '97), pp.101-116,
        MCI Paris, 1997. ·        
        L.
        Chen, D. Gollmann, C.J. Mitchell
        and P. Wild. Secret
        sharing with reusable polynomials. In V. Varadharajan,
        J. Pieprzyk and Y. Mu
        (Eds.), Proceedings of the 2nd Australasian Conference on
        Information Security and Privacy (ACISP'97), LNCS
        1270, pp. 183-193, Springer-Verlag, 1997. ·        
        L.
        Chen and C.J. Mitchell. An
        anonymous and undeniable payment scheme. In Y. Han, T.
        Okamoto and S. Qing (Eds.), Proceedings of the 1st
        International Conference on Information and Communications Security
        (ICICS'97), LNCS
        1334, pp. 478-482, Springer-Verlag,
        1997. ·        
        L.
        Chen, D. Gollmann and C.J.
        Mitchell. Tailoring
        authentication protocols to match underlying mechanisms. In
        J. Pieprzyk and J. Seberry
        (Eds.), Proceedings of the 1st Australasian Conference on
        Information Security and Privacy (ACISP'96), LNCS
        1172, pp. 121-133, Springer-Verlag, 1996. ·        
        L.
        Chen, H.-J. Hitz, G. Horn, K. Howker, V. Kessler, L. Knudsen, C.J.
        Mitchell and C. Radu. The
        use of trusted third parties and secure billing in UMTS. In Proceedings
        of the 1st ACTS Mobile Communications Summit,
        Volume 2, pp. 493-499, Spain, 1996.  ·        
        L.
        Chen, D. Gollmann and C.J.
        Mitchell. Key
        distribution without individual trusted authentication servers.
        In L. Gong (Ed.), Proceedings of the 8th IEEE Computer Security
        Foundations Workshop (CSFW'95), pp. 30-36, IEEE Computer Society
        Press, 1995. ·        
        L. Chen and D. Edwards. Applications of
        non-uniform sampling techniques and fast Fourier transform in plane
        near-field antenna measurements. In J. Norbury,
        A. Brown and M. Mehler (Eds.), Proceedings
        of the 8th International Conference on Antennas and
        Propagation, IEE Conference Publication Number 370, pp.
        1.311-1.314, IEE London, 1993. ·        
        L. Chen and B. Wu. An asynchronous
        speech scrambling using the fast number-theoretic transform technique.
        In Proceedings of the 1st International Conference on
        Communication Systems (ICCS '88), pp. 10.9.1 – 10.9.5, IEEE
        press, 1988. ·        
        L. Chen and B. Wu. Short-time Fourier
        transform and an asynchronous speech scrambler. In Proceedings of
        the 3rd West Pacific Conference on Acoustics (WESTPAC III),
        pp. 723-726, 1988. Other publications ·        
        L. Chen, P. Morrissey and N. P. Smart.
        DAA: Fixing the pairing based protocols. Cryptology ePrint
        Archive, Report 2009/198, 2009 ·        
        Q. Tang and L. Chen. Weaknesses in two
        group Diffie-Hellman key exchange protocols. Cryptology ePrint Archive, Report 2005/197, 2005. ·        
        L. Chen and K. Harrison. Multiple
        trusted authorities in identifier based cryptography from pairings on
        elliptic curves. HP Labs Technical Reports, HPL-2003-48, 2003. ·        
        L. Chen. Study of an asynchronous
        speech scrambling system. PhD Thesis. Southeast University,
        P. R. China, 1988 (in Chinese).   Last updated: 17-July-2011 
         
          | You can reach me at: |  
          | Email:  | liqun.chen <at> hp.com  |  
          | Phone: | +44 117 312 8217 |  
          | Address:  | Hewlett Packard LabsLong Down Avenue, Stoke Gifford
 Bristol, BS34 8QZ,
           UK
 |  
          |   |   |  
          |   |   |  
          |   |   |  
 |