
Publications
Books and
contributions to books
·
L. Chen, M. Yung and L. Zhu (editors), Trusted Systems (Proceedings of
INTRUST 2011), Springer LNCS
7222, 2012. Springer
2012, ISBN 9783642322976.
·
L. Chen
(editor), Cryptography
and Coding (Proceedings of Cryptography and Coding 2011), Springer LNCS
7089, ISBN: 9783642255168, SpringerVerlag, 2011.
·
L. Chen
and M. Yung (editors), Trusted Systems (Proceedings of INTRUST 2010), LNCS
6802, ISBN
9783642252822,
SpringerVerlag, 2011.
·
L. Chen
and M. Yung (editors), Trusted Systems (Proceedings of INTRUST 2009), LNCS
6163, ISBN: 9783642145964, SpringerVerlag, 2010.
·
L. Chen, C.J. Mitchell and A. Martin
(editors), Trusted Computing (Proceedings
of Trust 2009), LNCS 5471, ISBN 9783642005862, Springer, 2009.
·
L. Chen, M.D. Ryan and G. Wang
(editors), Information and Communications Security (Proceedings
of ICICS 2008), LNCS 5308, ISBN 9783540886242, Springer, 2008.
·
L. Chen, Y. Mu and W. Susilo (editors),
Information Security Practice and Experience (Proceedings
of ISPEC 2008), LNCS 4991, ISBN 9783540791034, Springer, 2008.
·
E. Brickell, J. Camenisch and L. Chen.
Direct anonymous attestation in context. Chapter 5 of Trusted
Computing, pp. 143174, edited by C. Mitchell, ISBN 0863415253,
IEE, London, 2005.
·
B. Balacheff, L. Chen, S. Pearson, D.
Plaquin and G. Proudler. Trusted Computing Platforms: TCPA
Technology in Context. ISBN 0130092207, Prentice Hall PTR,
2003.
·
C. J. Mitchell and L. Chen. Security
in future mobile multimedia networks. Chapter 11 of Insights
into Mobile Multimedia Communications, pp. 177190, edited by D. R.
Bull, C. N. Canagarajah and A. R. Nix, ISBN13: 9780121403102,
ISBN10: 0121403106, Academic Press, 1999.
Journal articles
·
L. Chen, H.W. Lim and G. Yang. Crossdomain
passwordbased authenticated key exchange revisited. ACM Transactions
on Information and System Security (TISSEC), accepted.
·
M. Beiter, M.
Casassa Mont, L. Chen and S. Pearson.
Endtoend policy based
encryption techniques for multiparty data
management. Computer Standards and Interfaces, ISI Journal
Citation Reports, North Holland, D.G. Rosado (ed.), December 2013.
·
Y. Chen, L. Chen and D. Lin. Reflections on
the security proofs of BonehFranklin identitybased encryption scheme.
Science China: Mathematics, 56(7):13851401,
2013.
·
L. Chen and J. Li. VLR group signatures with
indisputable exculpability and efficient revocation. The International Journal of
Information Privacy, Security and Integrity, 1(2/3): 129159, 2012.
·
L. Chen and Y. Chen.
The nDiffieHellman problem
and multiplekey encryption. International
Journal of Information Security, 11(5):305320, 2012.
·
Q. Tang and L. Chen. Extended KCI attack against twoparty key
establishment protocols. Information Processing
Letters, 111(15):–747,
2011.
·
L. Chen, S.L. Ng
and G. Wang. Threshold anonymous announcement in VANETs. IEEE Journal on Selected Areas in
Communications, 29(3):605615, 2011.
·
L. Chen and J. Li. A
note on the ChenMorrisseySmart direct anonymous attestation scheme. Information Processing Letters, 110(1213):485488, 2010.
·
L. Chen and C.J. Mitchell. Parsing
ambiguities in authentication and key establishment protocols. International Journal of Electronic
Security and Digital Forensics, 3(1):8294, 2010.
·
L. Chen and S. Ng.
Comments on "Proving Reliability of Anonymous Information in
VANETs" by Kounga et al. IEEE Transactions on Vehicular
Technology, 59(3):15031505, 2010.
·
E. Brickell, L. Chen and J. Li,
Simplified security notions of direct anonymous attestation and a
concrete scheme from pairings. International
Journal of Information Security, 8(5):315330, 2009.
·
G. Bertoni, L. Breveglieri, L. Chen, P.
Fragneto, K. A. Harrison, G. Pelosi: A pairing SW implementation for
SmartCards. Journal of Systems
and Software, 81(7):
12401247, 2008.
·
L. Chen and Q. Tang. Bilateral unknown
keyshare attacks in key agreement protocols. Journal of Universal
Computer Science, 14(3):416440, 2008.
·
L. Chen, Z. Cheng and N. Smart.
Identitybased key agreement protocols from pairings. International
Journal of Information Security, 6(4):213241, Springer Berlin
/ Heidelberg,
2007.
·
Z. Cheng and L. Chen. On security proof
of McCullaghBarreto's key agreement protocol and its variants. International
Journal of Security and Networks, 2(3/4): 251259, 2007.
·
L. Chen, Z. Cheng, J. MaloneLee and N.
Smart. Efficient IDKEM based on the SakaiKasahara key construction. IEE
Proceedings Information Security, 153(1):1926, 2006.
·
B. Balacheff, L. Chen, S. Pearson,
G. Proudler and D. Chan. Computing platform security in cyberspace.
Elsevier Information Security Technical Report, 5(1):5463,
2000.
·
L.
Chen, D. Gollmann and C.J. Mitchell. Authentication
using minimally trusted servers. ACM Operating Systems Review,
31(3):1628, 1997.
·
C.J. Mitchell and L. Chen. Comments
on the S/KEY user authentication scheme. ACM Operating Systems Review,
30(4):1216, 1996.
·
L.
Chen, D. Gollmann and C. Mitchell. Distributing trust
amongst multiple authentication servers. Journal of Computer
Security, 3(4):255267, 1994/95.
·
B. Wu and L. Chen. Cipher rolling in the
speech scrambling system requiring no frame synchronization. Journal
of Southeast
University, 21(5):18,
1991.
·
L. Chen and B. Wu. Generation of T
and T^{1} matrices for a speech scrambling system
without frame synchronization. Communication security, 44(4):1–5,
1990.
Conference
proceedings articles
·
C. Dong and L. Chen. A fast secure dot product protocol with application to privacy preserving association rule mining. To appear in Proceedings
of the 18th PacificAsia Conference on
Knowledge Discovery and Data Mining (PAKDD 2013).
·
C. Dong, L. Chen, Z. Wen. When private set
intersection meets big data: an efficient and scalable protocol. To
appear in the Proceedings of 20th ACM Conference on Computer and
Communications Security (CCS 2013), 2013.
·
L. Chen and J. Li. Flexible and scalable
digital signatures in TPM 2.0. To appear in the Proceedings of 20th ACM
Conference on Computer and Communications Security (CCS 2013), 2013.
·
C. Dong, L. Chen, J. Camenisch, G. Russello. Fair
private set intersection with a semitrusted arbiter. In the Proceedings of 27th Annual IFIP WG
11.3 Working Conference on Data and Applications Security and Privacy
(DBSec '13), 2013.
·
K.
Potzmader, J. Winter,
D. Hein,
C. Hanser,
P. Teufl,
L. Chen. Group Signatures on Mobile Devices: Practical Experiences. In the proceedings of 6th International
Conference on Trust and Trustworthy Computing (TRUST 2013), Springer
LNCS 7904, pp.4764, 2013.
·
L. Chen, Q. Li, K. M. Martin and S.L. Ng. A
privacyaware reputationbased announcement scheme for VANETs. To
appear in 5th International Symposium on Wireless Vehicular
Communications (IEEE WiVeC'13), 2013.
·
L. Chen, H.W. Lim and G. Yang. Crossdomain
passwordbased authenticated key exchange revisited. In the
Proceedings of 32^{nd} IEEE International Conference on
Computer Communications (IEEE INFOCOM 2013), pp.10521060.
·
E. Brickell, L. Chen and J. Li. A static
DiffieHellman attack on several direct anonymous attestation schemes.
To appear at the proceedings of the 4^{th} International Conference on
Trusted Systems (InTrust 2012), LNCS 7711,
Springer, 2012. (Best Paper Award)
·
N. Edwards and L. Chen. An historical
examination of open source releases and their vulnerabilities. To
appear at the proceedings of 19th ACM Conference on Computer and
Communications Security (ACM CCS 2012),
pp.183194.
·
L. Chen. Ring group signatures. In the proceedings of 11th IEEE
International Conference on Trust, Security and Privacy in Computing
and Communications, TrustCom 2012, pp.409418.
·
E. Brickell, L. Chen and J. Li. A
(corrected) DAA scheme using batch proof and verification. In the proceedings of INTRUST
2011, LNCS 7222, pp.304–337,
Springer, 2012.
·
Y. Chen, L. Chen and Z. Zhang. CCA
secure IBE from computational bilinear DiffieHellman assumption in the
standard model. To appear in the proceedings of the 14th Annual
International Conference on Information Security and Cryptology, ICISC
2011.
·
G. Kounga and L. Chen. Enforcing sticky
policies with TPM and virtualization technologies. In the proceedings of INTRUST
2011, LNCS 7222, pp. 32–47,
Springer, 2012.
·
B. Smyth, M. Ryan and L. Chen. Formal
analysis of anonymity in Direct Anonymous Attestation schemes. To
appear in the Proceedings of the 8th International Workshop on Formal
Aspects of Security & Trust (FAST 2011), pp. 245–262,
2011.
·
H. Balinsky, L. Chen and S. Simske.
Publicly posted composite documents in variably ordered workflows. To
appear in the Proceedings of the 7^{th}
IEEE/IFIP International Symposium on Trusted Computing and
Communications (TrustCom 2011).
·
S. Pearson, M. Casassa Mont, L. Chen and A. Reed. Endtoend
policybased encryption and management of data in the cloud. In the
Proceedings of the IEEE CloudCom, pp. 764771 2011.
·
L. Chen and Y. Chen. The nDiffieHellman
problem and its applications. In the Proceedings of the 14th Information
Security Conference, LNCS
7001, pp. 119–134, Springer, 2011.
·
L. Chen, M. Lee and B. Warinschi. Security
of the enhanced TCG privacyCA solution. To appear in the Proceedings of the 6th
International Symposium on Trustworthy Global Computing (TGC 2011).
·
Y. Chen, L. Chen and Z. Chen. Generic
methods to achieve tighter security reductions for a category of IBE
schemes. In the Proceedings of
the 7th Information Security Practice and Experience Conference (ISPEC
2011), Springer LNCS 6672, pp. 40–54, 2011.
·
H. Balinsky, L. Chen and S. Simske.
Premature silent workflow termination in publicly posted composite
documents. To appear in IEEE
International conference on Systems, Man and Cybernetics (SMC 2011).
·
H. Balinsky, L. Chen and S. Simske.
Publicly posted composite documents with identity based encryption. To
appear in the 11^{th} ACM
Symposium on Document Engineering (DocEng 2011), pp. 239248, 2011.
·
C. Wachsmann, A.
Sadeghi, L. Chen, K. Dietrich, H. Löhr and J. Winter. Lightweight
anonymous authentication with TLS and DAA for embedded mobile devices. To appear in the proceedings of 13^{th} Information Security Conference
(ISC 2010).
·
L. Chen. The twin
bilinear DiffieHellman inversion problem and applications. To appear
in the Proceedings of the 13^{th}
International Conference on
Information Security and Cryptology (ICISC 2010).
·
L. Chen and J. Li.
Revocation of direct anonymous attestation. In the Proceedings of the 2^{nd} International Conference on
Trusted Systems (INTRUST 2010), LNCS 6802, pp. 128–147, Springer, 2011.
·
L. Chen and B.
Warinschi. Security of the TCG privacyCA solution. To appear in the Proceedings of the 6^{th}
IEEE/IFIP International Symposium on Trusted Computing and
Communications (TrustCom 2010).
·
L. Chen and J. Li.
VLR group signatures with indisputable exculpability and efﬁcient
revocation. To appear in the
Proceedings of the Second IEEE International Conference on Information
Privacy, Security, Risk and Trust (PASSAT2010), IEEE Computer
Society Press, 2010. (Best PASSAT Conference Paper Award).
·
F. Armknecht, L. Chen, A.
Sadeghi, and C. Wachsmann. Anonymous authentication for RFID systems.
To appear in the Proceedings of the
6^{th} Workshop on RFID
Security (RFIDSec 2010).
·
L. Chen. A DAA scheme using batch proof
and verification. In the
Proceedings of the 3^{rd} International Conference on Trust
(Trust 2010), LNCS 6101, pp. 166–180, Springer, 2010.
·
L. Chen, D. Page and N. Smart. On the
design and implementation of an efficient DAA scheme. In the Proceedings of the Ninth Smart
Card Research and Advanced Application IFIP Conference (CARDIS 2010),
LNCS Volume 6035, pp. 223–237, Springer, 2010.
·
S. Cabuk, L. Chen, D. Plaquin and M.
Ryan. Trusted integrity measurement and reporting for virtualized
platforms. In the Proceedings of
the International Conference on Trusted Systems (INTRUST 2009),
LNCS 6163, pp. 181–197, Springer, 2010.
·
L. Chen. A DAA scheme requiring less TPM
resources. To appear in the
Proceedings of the 5^{th} China International
Conference on Information Security and Cryptology (Inscrypt 2009).
·
D. Khader, L. Chen and J. Davenport.
Certificatefree attribute authentication. In the Proceedings of the Twelfth IMA International Conference on
Cryptography and Coding (IMACC 2009), LNCS 5921, pp. 301–325,
SpringerVerlag, 2009.
·
L. Chen and M. Ryan. Attack, solution
and verification for shared authorisation data in TCG TPM. To appear in
the Proceedings of the sixth
International Workshop on Formal Aspects in Security and Trust
(FAST2009), 2009.
·
L. Chen, P. Morrissey, N. P. Smart and
B. Warinschi. Security notions and generic constructions for client
puzzles. To appear in the
Proceedings of Advances in
Cryptology – Asiacrypt'09, SpringerVerlag, 2009.
·
Q. Tang and L. Chen. Publickey
encryption with registered keyword search. To appear in the Proceedings of the 6^{th}
European Workshop on Public Key Services, Applications and
Infrastructures (EuroPKI'09), SpringerVerlag, 2009.
·
H. Balinsky, E. McDonnell, L. Chen and
K. Harrison. Anticounterfeiting using memory spots. In the Proceedings of the 3^{rd}
Workshop in Information Security Theory and Practices – WISTP'09,
LNCS 5746, pp. 52 – 67, SpringerVerlag, 2009.
·
L. Chen, P. Morrissey and N. P. Smart. On Proofs of
Security for DAA Schemes. In the
Proceedings of the Second International Conference
on Provable Security (ProvSec 2008), LNCS 5324,
pp. 156175, SpringerVerlag, 2008.
·
L. Chen, H. Löhr, M. Manulis, and
A.Sadeghi. Propertybased attestation without a trusted third party. In
the Proceedings of the 11^{th}International
Conference on Information Security (ISC 2008), LNCS 5222, pp. 3146, SpringerVerlag, 2008.
·
L. Chen, P. Morrissey and N.P. Smart.
Pairings in trusted computing. To appear in the Proceedings of the
Second International Conference on Pairingbased Cryptography (Pairing
2008), Royal Holloway, University of London, UK, September 2008.
·
L. Chen and M. Ryan. Offline dictionary
attack on TCG TPM weak authorisation data, and solution. To appear in the
Proceedings of the International conference on the Future of Trust in Computing, Berlin, Germany, June 30  July 2, 2008.
·
A. Leung, L. Chen, and C. J. Mitchell.
On a possible privacy flaw in direct anonymous attestation (DAA). In the Proceedings of the 1^{st}
International Conference on Trust (TRUST 2008), LNCS 4968, pp. 179190,
SpringerVerlag, 2008.
·
E. Brickell, L. Chen and J. Li. A new
direct anonymous attestation scheme from bilinear maps. In the Proceedings of the 1^{st}
International Conference on Trust (TRUST 2008), LNCS 4968, pp. 166178,
SpringerVerlag, 2008.
·
Yi Mu, Duncan Wong, Liqun Chen, Willy
Susilo, Qianhong Wu. Concurrent signatures without a conventional
keystone. In the Proceedings of
the First International Workshop on Coding and Cryptology, Series on
Coding Theory and Cryptology, Vol. 4, World Scientific, 2007.
·
L. Chen. An interpretation of
identitybased cryptography. In A. Aldini and R. Gorrieri (Eds.): Foundations of Security Analysis and Design IV, FOSAD
2006/2007, LNCS 4677, pp. 183–208, SpringerVerlag, 2007.
·
B. Smyth, M. Ryan and L. Chen. Direct
Anonymous Attestation (DAA): ensuring privacy with corrupt
administrators. In F. Stajano, editor, the Proceedings of Fourth
European Workshop on Security and Privacy in Ad hoc and Sensor Networks
(ESAS 2007), LNCS 4572, pp. 218231, SpringerVerlag, 2007.
·
L. Chen, A. Escalante, H. Löhr, M.
Manulis and A. Sadeghi. A privacyprotecting multicoupon scheme with
stronger protection against splitting. In S. Dietrich
and R. Dhamija (Eds.), Proceedings of the 11^{th}
International Conference on Financial Cryptography and Data Security
(FC 2007), LNCS 4886, pp. 2944, SpringerVerlag, 2008.
·
L. Chen, R. Landfermann, H. Löhr, M. Rohe, A.Sadeghi and C. Stüble.
A protocol for property based attestation. In G. Tsudik, S. Xu
and M. Yung (Eds.), proceedings of the First ACM Workshop on
Scalable Trusted Computing (STC'06), pp. 716, the
ACM Press, 2006.
·
Z. Cheng, L. Chen, R. Comley and Q.
Tang. Identitybased key agreement with unilateral identity privacy
using pairings. In K. Chen and R. Deng (Eds), Proceedings of the
Second Information Security Practice and Experience Conference (ISPEC
2006), LNCS 3903, pp. 202213, SpringerVerlag, 2006.
·
L. Chen and Z. Cheng. Security proof of
SakaiKasahara's identitybased encryption scheme. In N. Smart (Ed.), Proceedings
of the 10^{th} IMA International Conference on Cryptography and
Coding, LNCS
3796, pp. 442459, SpringerVerlag, 2005.
·
L. Chen, M. Enzmann, A. Sadeghi, M. Schneider and M.
Steiner. A privacyprotecting coupon system. In A.
Patrick and M. Yung (Eds), Proceedings of the 9^{th}
International Conference on Financial Cryptography and Data Security
(FC 2005), LNCS
3570, pp. 93108, SpringerVerlag, 2005.
·
L. Chen and J. MaloneLee. Improved
identitybased signcryption. In V. Serge (Ed.), Proceedings of the 8^{th}
International Workshop on Theory and Practice in Public Key
Cryptography (PKC 2005), LNCS 3386, pp. 362379,
SpringerVerlag, 2005.
·
L. Chen, H. Lim and W. Mao.
Userfriendly grid security architecture and protocols. In B. Christianson, B. Crispo, J. A. Malcolm, M. Roe (Eds.),
Proceedings of 13^{th} International Workshop on Security
Protocols, Cambridge, UK, April 2022, 2005, LNCS 4631, pp.
139156, SpringerVerlag, 2007.
·
E. Brickell, J. Camenisch, and L. Chen.
Direct anonymous attestation. In B. Pfitzmann and P. Liu (Eds.), Proceedings
of the 11th ACM Conference on Computer and Communications Security (CCS
2004), pp. 132145, ACM press, 2004.
·
L. Chen, C. Kudla and K. Paterson.
Concurrent signatures. In C. Cachin and J. Camenisch (Eds.), Proceedings
of Advances in Cryptology – EUROCRYPT 2004, LNCS 3027, pp. 287305,
SpringerVerlag, 2004.
·
L. Chen and C. Kudla. Identity based key
agreement protocols from pairings. In R. Focardi (Ed.), Proceedings
of the 16th IEEE Computer Security Foundations Workshop (CSFW16 2003),
pp. 219233, IEEE Computer Society Press, 2003. A revised version is
available at Cryptology ePrint Archive,
Report 2002/184,
2002.
·
L. Chen, K. Harrison, A. Moss, D. Soldera,
and N. Smart. Certification of public keys within an identity based
system. In A. Chan and V. Gligor (Eds.), Proceedings of the 5^{th}
International Conference on Information Security (ISC 2002), LNCS
2433, pp. 322333, SpringerVerlag, 2002.
·
L. Chen, K. Harrison, D. Soldera, and
N.P. Smart. Applications of multiple trust authorities in pairing based
cryptosystems. In G. Davida, Y. Frankel, O. Rees (Eds.), Proceedings
of the International Conference on Infrastructure Security (InfraSec
2002), LNCS 2437,
pp. 260275, SpringerVerlag, 2002.
·
B. Balacheff, L. Chen, D. Plaquin and G.
Proudler. A trusted process to digitally sign a document. In V. Raskin
and C. Hempelmann (Eds.), Proceedings of the 2001 New Security
Paradigms Workshop (NSPW'01), pp. 7986, ACM Press, 2001.
·
L. Chen and W. Mao. An auditable
metering scheme for web advertisement applications. In G. Davida and Y.
Frankel (Eds.), Proceedings of the 4^{th} International
Conference on Information Security (ISC 2001), LNCS 2200, pp.
475485, SpringerVerlag, 2001.
·
B. Balacheff, D. Chan, L. Chen, S.
Pearson, and G. Proudler. Securing intelligent adjuncts using trusted
computing platform technology. In J. DomingoFerrer, D. Chan and A.
Watson (Eds.), Proceedings of the 4^{th} Working Conference
on Smart Card Research and Advanced Applications, pp. 177195,
Kluwer Academic Publishers, 2000.
·
B. Balacheff, D. Chan, L. Chen, S.
Pearson, and G. Proudler. How can you trust a computing platform? In Proceedings
of Information Security Solutions Europe Conference (ISSE 2000), Spain,
2000.
·
L. Chen, S. Pearson and A. Vamvakas. On
enhancing biometric authentication with data protection. In R. Howlett
and L. Jain (Eds.), Proceedings of the 4^{th}
International Conference on KnowledgeBased Intelligent Engineering
Systems & Allied Technologies (KES 2000), pp. 249252, IEEE
press, 2000.
·
L. Chen. Efficient fair exchange with
verifiable confirmation of signatures. In K. Ohta and D. Pei (Eds.), Proceedings
of Advances in Cryptology – Asiacrypt'98, LNCS 1514, pp. 286299,
SpringerVerlag, 1998.
·
L.
Chen, D. Gollmann and C.J. Mitchell. Key
escrow in mutually mistrusting domains. In M. Lomas (Ed.), Proceedings
of International Workshop on Security Protocols, LNCS
1189, pp.139153, SpringerVerlag, 1997.
·
L.
Chen and C.J. Mitchell. Key escrow in
multiple domains. In J. Lamere (Ed.), Proceedings of the
International Congress on Information Systems and Telecommunications
Security (INFOSEC'COM '97), pp.101116, MCI Paris, 1997.
·
L.
Chen, D. Gollmann, C.J. Mitchell and P. Wild. Secret sharing
with reusable polynomials. In V. Varadharajan, J. Pieprzyk
and Y. Mu (Eds.), Proceedings of the 2^{nd} Australasian
Conference on Information Security and Privacy (ACISP'97), LNCS
1270, pp. 183193, SpringerVerlag, 1997.
·
L.
Chen and C.J. Mitchell. An
anonymous and undeniable payment scheme. In Y. Han, T.
Okamoto and S. Qing (Eds.), Proceedings of the 1^{st}
International Conference on Information and Communications Security
(ICICS'97), LNCS
1334, pp. 478482, SpringerVerlag, 1997.
·
L.
Chen, D. Gollmann and C.J. Mitchell. Tailoring
authentication protocols to match underlying mechanisms. In
J. Pieprzyk and J. Seberry (Eds.), Proceedings of the 1^{st}
Australasian Conference on Information Security and Privacy (ACISP'96),
LNCS
1172, pp. 121133, SpringerVerlag, 1996.
·
L.
Chen, H.J. Hitz, G. Horn, K. Howker, V. Kessler, L. Knudsen, C.J.
Mitchell and C. Radu. The
use of trusted third parties and secure billing in UMTS. In Proceedings
of the 1^{st} ACTS Mobile Communications Summit,
Volume 2, pp. 493499, Spain, 1996.
·
L.
Chen, D. Gollmann and C.J. Mitchell. Key
distribution without individual trusted authentication servers.
In L. Gong (Ed.), Proceedings of the 8th IEEE Computer Security
Foundations Workshop (CSFW'95), pp. 3036, IEEE Computer Society
Press, 1995.
·
L. Chen and D. Edwards. Applications of
nonuniform sampling techniques and fast Fourier transform in plane
nearfield antenna measurements. In J. Norbury, A. Brown and M. Mehler
(Eds.), Proceedings of the 8^{th} International Conference
on Antennas and Propagation, IEE Conference Publication Number 370,
pp. 1.3111.314, IEE London, 1993.
·
L. Chen and B. Wu. An asynchronous
speech scrambling using the fast numbertheoretic transform technique.
In Proceedings of the 1^{st} International Conference on
Communication Systems (ICCS '88), pp. 10.9.1 – 10.9.5, IEEE press,
1988.
·
L. Chen and B. Wu. Shorttime Fourier
transform and an asynchronous speech scrambler. In Proceedings of
the 3^{rd} West Pacific Conference on Acoustics (WESTPAC III),
pp. 723726, 1988.
Other publications
·
L. Chen, P. Morrissey and N. P. Smart.
DAA: Fixing the pairing based protocols. Cryptology ePrint Archive,
Report 2009/198, 2009
·
Q. Tang and L. Chen. Weaknesses in two
group DiffieHellman key exchange protocols. Cryptology ePrint Archive,
Report 2005/197,
2005.
·
L. Chen and K. Harrison. Multiple
trusted authorities in identifier based cryptography from pairings on
elliptic curves. HP Labs Technical Reports, HPL200348, 2003.
·
L. Chen. Study of an asynchronous
speech scrambling system. PhD Thesis. Southeast University,
P. R. China, 1988 (in Chinese).
Patents
· Click here to
see granted patents
·
Click here to
see published patent applications
Last updated: 03April2014
You can reach me at:

Email:

liqun.chen <at> hp.com

Phone:

+44 117 316 2201

Address:

Hewlett Packard Labs
Long Down Avenue, Stoke Gifford
Bristol, BS34 8QZ,
UK







