hp.com home


Liqun Chen



 

 

» 

HP Labs

 

»

Research

 

 

 

 

 

»

News and events

»

Technical reports

 

 

»

About HP Labs

»

http://www.hpl.hp.com/jobs/

»

People

»

Worldwide sites

 

 

»

Downloads

Content starts here

Content starts here

 

Publications

Books and contributions to books

·        L. Chen, M. Yung and L. Zhu (editors), Trusted Systems (Proceedings of INTRUST 2011), Springer LNCS 7222, 2012. Springer 2012, ISBN 978-3-642-32297-6.

·        L. Chen (editor),  Cryptography and Coding (Proceedings of Cryptography and Coding 2011), Springer LNCS 7089, ISBN: 978-3-642-25516-8, Springer-Verlag, 2011.

·        L. Chen and M. Yung (editors), Trusted Systems (Proceedings of INTRUST 2010), LNCS 6802, ISBN 978-3-642-25282-2, Springer-Verlag, 2011.

·        L. Chen and M. Yung (editors), Trusted Systems (Proceedings of INTRUST 2009), LNCS 6163, ISBN: 978-3-642-14596-4, Springer-Verlag, 2010.

·        L. Chen, C.J. Mitchell and A. Martin (editors), Trusted Computing (Proceedings of Trust 2009), LNCS 5471, ISBN 978-3-642-00586-2, Springer, 2009.

·        L. Chen, M.D. Ryan and G. Wang (editors), Information and Communications Security (Proceedings of ICICS 2008), LNCS 5308, ISBN 978-3-540-88624-2, Springer, 2008.

·        L. Chen, Y. Mu and W. Susilo (editors), Information Security Practice and Experience (Proceedings of ISPEC 2008), LNCS 4991, ISBN 978-3-540-79103-4, Springer, 2008.

·        E. Brickell, J. Camenisch and L. Chen. Direct anonymous attestation in context. Chapter 5 of Trusted Computing, pp. 143-174, edited by C. Mitchell, ISBN 0-86341-525-3, IEE, London, 2005.

·        B. Balacheff, L. Chen, S. Pearson, D. Plaquin and G. Proudler. Trusted Computing Platforms: TCPA Technology in Context. ISBN 0-13-009220-7, Prentice Hall PTR, 2003.  

·        C. J. Mitchell and L. Chen. Security in future mobile multimedia networks. Chapter 11 of Insights into Mobile Multimedia Communications, pp. 177-190, edited by D. R. Bull, C. N. Canagarajah and A. R. Nix, ISBN-13: 978-0-12-140310-2, ISBN-10: 0-12-140310-6, Academic Press, 1999.

Journal articles

·        L. Chen, H.W. Lim and G. Yang. Cross-domain password-based authenticated key exchange revisited. ACM Transactions on Information and System Security (TISSEC), accepted.

·        M. Beiter, M. Casassa Mont, L. Chen and S. Pearson. End-to-end policy based encryption techniques for multi-party data management. Computer Standards and Interfaces, ISI Journal Citation Reports, North Holland, D.G. Rosado (ed.), December 2013.

·        Y. Chen, L. Chen and D. Lin. Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme. Science China: Mathematics, 56(7):1385-1401, 2013.

·        L. Chen and J. Li. VLR group signatures with indisputable exculpability and efficient revocation. The International Journal of Information Privacy, Security and Integrity, 1(2/3): 129-159, 2012.

·        L. Chen and Y. Chen. The n-Diffie-Hellman problem and multiple-key encryption. International Journal of Information Security, 11(5):305-320, 2012.

·        Q. Tang and L. Chen. Extended KCI attack against two-party key establishment protocols. Information Processing Letters, 111(15):744–747, 2011.

·        L. Chen, S.-L. Ng and G. Wang. Threshold anonymous announcement in VANETs. IEEE Journal on Selected Areas in Communications, 29(3):605-615, 2011.

·        L. Chen and J. Li. A note on the Chen-Morrissey-Smart direct anonymous attestation scheme. Information Processing Letters, 110(12-13):485-488, 2010.

·        L. Chen and C.J. Mitchell. Parsing ambiguities in authentication and key establishment protocols. International Journal of Electronic Security and Digital Forensics, 3(1):82-94, 2010.

·        L. Chen and S. Ng. Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga et al. IEEE Transactions on Vehicular Technology, 59(3):1503-1505, 2010.

·        E. Brickell, L. Chen and J. Li, Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. International Journal of Information Security, 8(5):315-330, 2009.

·        G. Bertoni, L. Breveglieri, L. Chen, P. Fragneto, K. A. Harrison, G. Pelosi: A pairing SW implementation for Smart-Cards. Journal of Systems and Software, 81(7): 1240-1247, 2008.

·        L. Chen and Q. Tang. Bilateral unknown key-share attacks in key agreement protocols. Journal of Universal Computer Science, 14(3):416-440, 2008.

·        L. Chen, Z. Cheng and N. Smart. Identity-based key agreement protocols from pairings. International Journal of Information Security, 6(4):213-241, Springer Berlin / Heidelberg, 2007.

·        Z. Cheng and L. Chen. On security proof of McCullagh-Barreto's key agreement protocol and its variants. International Journal of Security and Networks, 2(3/4): 251-259, 2007.

·        L. Chen, Z. Cheng, J. Malone-Lee and N. Smart. Efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proceedings Information Security, 153(1):19-26, 2006.

·        B. Balacheff,  L. Chen, S. Pearson, G. Proudler and D. Chan. Computing platform security in cyberspace. Elsevier Information Security Technical Report, 5(1):54-63, 2000.

·        L. Chen, D. Gollmann and C.J. Mitchell. Authentication using minimally trusted servers. ACM Operating Systems Review, 31(3):16-28, 1997.

·        C.J. Mitchell and L. Chen. Comments on the S/KEY user authentication scheme. ACM Operating Systems Review,   30(4):12-16, 1996.

·        L. Chen, D. Gollmann and C. Mitchell. Distributing trust amongst multiple authentication servers. Journal of Computer Security, 3(4):255-267, 1994/95.

·        B. Wu and L. Chen. Cipher rolling in the speech scrambling system requiring no frame synchronization. Journal of Southeast University, 21(5):1-8, 1991.

·        L. Chen and B. Wu. Generation of T and T-1 matrices for a speech scrambling system without frame synchronization. Communication security, 44(4):1–5, 1990.

Conference proceedings articles

·        C. Dong and L. Chen. A fast secure dot product protocol with application to privacy preserving association rule mining. To appear in Proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2013).

·        C. Dong, L. Chen, Z. Wen. When private set intersection meets big data: an efficient and scalable protocol. To appear in the Proceedings of 20th ACM Conference on Computer and Communications Security (CCS 2013), 2013.

·        L. Chen and J. Li. Flexible and scalable digital signatures in TPM 2.0. To appear in the Proceedings of 20th ACM Conference on Computer and Communications Security (CCS 2013), 2013.

·        C. Dong, L. Chen, J. Camenisch, G. Russello. Fair private set intersection with a semi-trusted arbiter. In the Proceedings of 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '13), 2013.

·        K. Potzmader, J. Winter, D. Hein, C. Hanser, P. Teufl, L. Chen. Group Signatures on Mobile Devices: Practical Experiences. In the proceedings of 6th International Conference on Trust and Trustworthy Computing (TRUST 2013), Springer LNCS 7904, pp.47-64, 2013.

·        L. Chen, Q. Li, K. M. Martin and S.-L. Ng. A privacy-aware reputation-based announcement scheme for VANETs. To appear in 5th International Symposium on Wireless Vehicular Communications (IEEE WiVeC'13), 2013.

·        L. Chen, H.W. Lim and G. Yang. Cross-domain password-based authenticated key exchange revisited. In the Proceedings of 32nd IEEE International Conference on Computer Communications (IEEE INFOCOM 2013), pp.1052-1060.

·        E. Brickell, L. Chen and J. Li. A static Diffie-Hellman attack on several direct anonymous attestation schemes. To appear at the proceedings of the 4th International Conference on Trusted Systems (InTrust 2012), LNCS 7711, Springer, 2012. (Best Paper Award)

·        N. Edwards and L. Chen. An historical examination of open source releases and their vulnerabilities. To appear at the proceedings of 19th ACM Conference on Computer and Communications Security (ACM CCS 2012), pp.183-194.

·        L. Chen. Ring group signatures. In the proceedings of 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, pp.409-418.

·        E. Brickell, L. Chen and J. Li. A (corrected) DAA scheme using batch proof and verification. In the proceedings of INTRUST 2011, LNCS 7222, pp.304337, Springer, 2012.

·        Y. Chen, L. Chen and Z. Zhang. CCA secure IBE from computational bilinear Diffie-Hellman assumption in the standard model. To appear in the proceedings of the 14th Annual International Conference on Information Security and Cryptology, ICISC 2011.

·        G. Kounga and L. Chen. Enforcing sticky policies with TPM and virtualization technologies. In the proceedings of INTRUST 2011, LNCS 7222, pp. 3247, Springer, 2012.

·        B. Smyth, M. Ryan and L. Chen. Formal analysis of anonymity in Direct Anonymous Attestation schemes. To appear in the Proceedings of the 8th International Workshop on Formal Aspects of Security & Trust (FAST 2011), pp. 245262, 2011.

·        H. Balinsky, L. Chen and S. Simske. Publicly posted composite documents in variably ordered workflows. To appear in the Proceedings of the 7th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2011).

·        S. Pearson, M. Casassa Mont, L. Chen and A. Reed. End-to-end policy-based encryption and management of data in the cloud. In the Proceedings of the IEEE CloudCom, pp. 764-771 2011.

·        L. Chen and Y. Chen. The n-Diffie-Hellman problem and its applications. In the Proceedings of the 14th Information Security Conference, LNCS 7001, pp. 119134, Springer, 2011.

·        L. Chen, M. Lee and B. Warinschi. Security of the enhanced TCG privacy-CA solution. To appear in the Proceedings of the 6th International Symposium on Trustworthy Global Computing (TGC 2011).

·        Y. Chen, L. Chen and Z. Chen. Generic methods to achieve tighter security reductions for a category of IBE schemes. In the Proceedings of the 7th Information Security Practice and Experience Conference (ISPEC 2011), Springer LNCS 6672, pp. 40–54, 2011.

·        H. Balinsky, L. Chen and S. Simske. Premature silent workflow termination in publicly posted composite documents. To appear in IEEE International conference on Systems, Man and Cybernetics (SMC 2011).

·        H. Balinsky, L. Chen and S. Simske. Publicly posted composite documents with identity based encryption. To appear in the 11th ACM Symposium on Document Engineering (DocEng 2011), pp. 239-248, 2011.

·        C. Wachsmann, A. Sadeghi, L. Chen, K. Dietrich, H. Löhr and J. Winter. Lightweight anonymous authentication with TLS and DAA for embedded mobile devices. To appear in the proceedings of 13th Information Security Conference (ISC 2010).

·        L. Chen. The twin bilinear Diffie-Hellman inversion problem and applications. To appear in the Proceedings of the 13th International Conference on Information Security and Cryptology (ICISC 2010).

·        L. Chen and J. Li. Revocation of direct anonymous attestation. In the Proceedings of the 2nd International Conference on Trusted Systems (INTRUST 2010), LNCS 6802, pp. 128147, Springer, 2011.

·        L. Chen and B. Warinschi. Security of the TCG privacy-CA solution. To appear in the Proceedings of the 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010).

·        L. Chen and J. Li. VLR group signatures with indisputable exculpability and efficient revocation. To appear in the Proceedings of the Second IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), IEEE Computer Society Press, 2010. (Best PASSAT Conference Paper Award).

·        F. Armknecht, L. Chen, A. Sadeghi, and C. Wachsmann. Anonymous authentication for RFID systems. To appear in the Proceedings of the 6th Workshop on RFID Security (RFIDSec 2010).

·        L. Chen. A DAA scheme using batch proof and verification. In the Proceedings of the 3rd International Conference on Trust (Trust 2010), LNCS 6101, pp. 166–180, Springer, 2010.

·        L. Chen, D. Page and N. Smart. On the design and implementation of an efficient DAA scheme. In the Proceedings of the Ninth Smart Card Research and Advanced Application IFIP Conference (CARDIS 2010), LNCS Volume 6035, pp. 223–237, Springer, 2010.

·        S. Cabuk, L. Chen, D. Plaquin and M. Ryan. Trusted integrity measurement and reporting for virtualized platforms. In the Proceedings of the International Conference on Trusted Systems (INTRUST 2009), LNCS 6163, pp. 181–197, Springer, 2010.

·        L. Chen. A DAA scheme requiring less TPM resources. To appear in the Proceedings of the 5th China International Conference on Information Security and Cryptology (Inscrypt 2009).

·        D. Khader, L. Chen and J. Davenport. Certificate-free attribute authentication. In the Proceedings of the Twelfth IMA International Conference on Cryptography and Coding (IMACC 2009), LNCS 5921, pp. 301–325, Springer-Verlag, 2009.

·        L. Chen and M. Ryan. Attack, solution and verification for shared authorisation data in TCG TPM. To appear in the Proceedings of the sixth International Workshop on Formal Aspects in Security and Trust (FAST2009), 2009.

·        L. Chen, P. Morrissey, N. P. Smart and B. Warinschi. Security notions and generic constructions for client puzzles. To appear in the Proceedings of Advances in Cryptology – Asiacrypt'09, Springer-Verlag, 2009.

·        Q. Tang and L. Chen. Public-key encryption with registered keyword search. To appear in the Proceedings of the 6th European Workshop on Public Key Services, Applications and Infrastructures (EuroPKI'09), Springer-Verlag, 2009.

·        H. Balinsky, E. McDonnell, L. Chen and K. Harrison. Anti-counterfeiting using memory spots. In the Proceedings of the 3rd Workshop in Information Security Theory and Practices – WISTP'09, LNCS 5746, pp. 52 – 67, Springer-Verlag, 2009.

·        L. Chen, P. Morrissey and N. P. Smart. On Proofs of Security for DAA Schemes. In the Proceedings of the Second International Conference on Provable Security (ProvSec 2008), LNCS 5324, pp. 156-175, Springer-Verlag, 2008.

·        L. Chen, H. Löhr, M. Manulis, and A.Sadeghi. Property-based attestation without a trusted third party. In the Proceedings of the 11thInternational Conference on Information Security (ISC 2008), LNCS 5222, pp. 31-46, Springer-Verlag, 2008.

·        L. Chen, P. Morrissey and N.P. Smart. Pairings in trusted computing. To appear in the Proceedings of the Second International Conference on Pairing-based Cryptography (Pairing 2008), Royal Holloway, University of London, UK, September 2008.

·        L. Chen and M. Ryan. Offline dictionary attack on TCG TPM weak authorisation data, and solution. To appear in the Proceedings of the International conference on the Future of Trust in Computing, Berlin, Germany, June 30 - July 2, 2008.

·        A. Leung, L. Chen, and C. J. Mitchell. On a possible privacy flaw in direct anonymous attestation (DAA). In the Proceedings of the 1st International Conference on Trust (TRUST 2008), LNCS 4968, pp. 179-190, Springer-Verlag, 2008.

·        E. Brickell, L. Chen and J. Li. A new direct anonymous attestation scheme from bilinear maps. In the Proceedings of the 1st International Conference on Trust (TRUST 2008), LNCS 4968, pp. 166-178, Springer-Verlag, 2008.

·        Yi Mu, Duncan Wong, Liqun Chen, Willy Susilo, Qianhong Wu. Concurrent signatures without a conventional keystone. In the Proceedings of the First International Workshop on Coding and Cryptology, Series on Coding Theory and Cryptology, Vol. 4, World Scientific, 2007.

·        L. Chen. An interpretation of identity-based cryptography. In A. Aldini and R. Gorrieri (Eds.): Foundations of Security Analysis and Design IV, FOSAD 2006/2007, LNCS 4677, pp. 183–208, Springer-Verlag, 2007.

·        B. Smyth, M. Ryan and L. Chen. Direct Anonymous Attestation (DAA): ensuring privacy with corrupt administrators. In F. Stajano, editor, the Proceedings of Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2007), LNCS 4572, pp. 218-231, Springer-Verlag, 2007.

·        L. Chen, A. Escalante, H. Löhr, M. Manulis and A. Sadeghi. A privacy-protecting multi-coupon scheme with stronger protection against splitting. In S. Dietrich and R. Dhamija (Eds.), Proceedings of the 11th International Conference on Financial Cryptography and Data Security (FC 2007), LNCS 4886, pp. 29-44, Springer-Verlag, 2008.

·        L. Chen, R. Landfermann, H. Löhr, M. Rohe, A.Sadeghi and C. Stüble. A protocol for property based attestation. In G. Tsudik, S. Xu and M. Yung (Eds.), proceedings of the First ACM Workshop on Scalable Trusted Computing (STC'06), pp. 7-16, the ACM Press, 2006.

·        Z. Cheng, L. Chen, R. Comley and Q. Tang. Identity-based key agreement with unilateral identity privacy using pairings. In K. Chen and R. Deng (Eds), Proceedings of the Second Information Security Practice and Experience Conference (ISPEC 2006), LNCS 3903, pp. 202-213, Springer-Verlag, 2006.

·        L. Chen and Z. Cheng. Security proof of Sakai-Kasahara's identity-based encryption scheme. In N. Smart (Ed.), Proceedings of the 10th IMA International Conference on Cryptography and Coding, LNCS 3796, pp. 442-459, Springer-Verlag, 2005.

·        L. Chen, M. Enzmann, A. Sadeghi, M. Schneider and M. Steiner. A privacy-protecting coupon system. In A. Patrick and M. Yung (Eds), Proceedings of the 9th International Conference on Financial Cryptography and Data Security (FC 2005), LNCS 3570, pp. 93-108, Springer-Verlag, 2005. 

·        L. Chen and J. Malone-Lee. Improved identity-based signcryption. In V. Serge (Ed.), Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography (PKC 2005), LNCS 3386, pp. 362-379, Springer-Verlag, 2005.

·        L. Chen, H. Lim and W. Mao. User-friendly grid security architecture and protocols. In B. Christianson, B. Crispo, J. A. Malcolm, M. Roe (Eds.), Proceedings of 13th International Workshop on Security Protocols, Cambridge, UK, April 20-22, 2005, LNCS 4631, pp. 139-156, Springer-Verlag, 2007.

·        E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In B. Pfitzmann and P. Liu (Eds.), Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004), pp. 132-145, ACM press, 2004.

·        L. Chen, C. Kudla and K. Paterson. Concurrent signatures. In C. Cachin and J. Camenisch (Eds.), Proceedings of Advances in Cryptology – EUROCRYPT 2004, LNCS 3027, pp. 287-305, Springer-Verlag, 2004.

·        L. Chen and C. Kudla. Identity based key agreement protocols from pairings. In R. Focardi (Ed.), Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), pp. 219-233, IEEE Computer Society Press, 2003. A revised version is available at Cryptology ePrint Archive, Report 2002/184, 2002.

·        L. Chen, K. Harrison, A. Moss, D. Soldera, and N. Smart. Certification of public keys within an identity based system. In A. Chan and V. Gligor (Eds.), Proceedings of the 5th International Conference on Information Security (ISC 2002), LNCS 2433, pp. 322-333, Springer-Verlag, 2002.

·        L. Chen, K. Harrison, D. Soldera, and N.P. Smart. Applications of multiple trust authorities in pairing based cryptosystems. In G. Davida, Y. Frankel, O. Rees (Eds.), Proceedings of the International Conference on Infrastructure Security (InfraSec 2002), LNCS 2437, pp. 260-275, Springer-Verlag, 2002.

·        B. Balacheff, L. Chen, D. Plaquin and G. Proudler. A trusted process to digitally sign a document. In V. Raskin and C. Hempelmann (Eds.), Proceedings of the 2001 New Security Paradigms Workshop (NSPW'01), pp. 79-86, ACM Press, 2001.

·        L. Chen and W. Mao. An auditable metering scheme for web advertisement applications. In G. Davida and Y. Frankel (Eds.), Proceedings of the 4th International Conference on Information Security (ISC 2001), LNCS 2200, pp. 475-485, Springer-Verlag, 2001.

·        B. Balacheff, D. Chan, L. Chen, S. Pearson, and G. Proudler. Securing intelligent adjuncts using trusted computing platform technology. In J. Domingo-Ferrer, D. Chan and A. Watson (Eds.), Proceedings of the 4th Working Conference on Smart Card Research and Advanced Applications, pp. 177-195, Kluwer Academic Publishers, 2000.

·        B. Balacheff, D. Chan, L. Chen, S. Pearson, and G. Proudler. How can you trust a computing platform? In Proceedings of Information Security Solutions Europe Conference (ISSE 2000), Spain, 2000.

·        L. Chen, S. Pearson and A. Vamvakas. On enhancing biometric authentication with data protection. In R. Howlett and L. Jain (Eds.), Proceedings of the 4th International Conference on Knowledge-Based Intelligent Engineering Systems & Allied Technologies (KES 2000), pp. 249-252, IEEE press, 2000.

·        L. Chen. Efficient fair exchange with verifiable confirmation of signatures. In K. Ohta and D. Pei (Eds.), Proceedings of Advances in Cryptology – Asiacrypt'98, LNCS 1514, pp. 286-299, Springer-Verlag, 1998.

·        L. Chen, D. Gollmann and C.J. Mitchell. Key escrow in mutually mistrusting domains. In M. Lomas (Ed.), Proceedings of International Workshop on Security Protocols, LNCS 1189, pp.139-153, Springer-Verlag, 1997.

·        L. Chen and C.J. Mitchell. Key escrow in multiple domains. In J. Lamere (Ed.), Proceedings of the International Congress on Information Systems and Telecommunications Security (INFOSEC'COM '97), pp.101-116, MCI Paris, 1997.

·        L. Chen, D. Gollmann, C.J. Mitchell and P. Wild. Secret sharing with reusable polynomials. In V. Varadharajan, J. Pieprzyk and Y. Mu (Eds.), Proceedings of the 2nd Australasian Conference on Information Security and Privacy (ACISP'97), LNCS 1270, pp. 183-193, Springer-Verlag, 1997.

·        L. Chen and C.J. Mitchell. An anonymous and undeniable payment scheme. In Y. Han, T. Okamoto and S. Qing (Eds.), Proceedings of the 1st International Conference on Information and Communications Security (ICICS'97), LNCS 1334, pp. 478-482, Springer-Verlag, 1997.

·        L. Chen, D. Gollmann and C.J. Mitchell. Tailoring authentication protocols to match underlying mechanisms. In J. Pieprzyk and J. Seberry (Eds.), Proceedings of the 1st Australasian Conference on Information Security and Privacy (ACISP'96), LNCS 1172, pp. 121-133, Springer-Verlag, 1996.

·        L. Chen, H.-J. Hitz, G. Horn, K. Howker, V. Kessler, L. Knudsen, C.J. Mitchell and C. Radu. The use of trusted third parties and secure billing in UMTS. In Proceedings of the 1st ACTS Mobile Communications Summit, Volume 2, pp. 493-499, Spain, 1996.

·        L. Chen, D. Gollmann and C.J. Mitchell. Key distribution without individual trusted authentication servers. In L. Gong (Ed.), Proceedings of the 8th IEEE Computer Security Foundations Workshop (CSFW'95), pp. 30-36, IEEE Computer Society Press, 1995.

·        L. Chen and D. Edwards. Applications of non-uniform sampling techniques and fast Fourier transform in plane near-field antenna measurements. In J. Norbury, A. Brown and M. Mehler (Eds.), Proceedings of the 8th International Conference on Antennas and Propagation, IEE Conference Publication Number 370, pp. 1.311-1.314, IEE London, 1993.

·        L. Chen and B. Wu. An asynchronous speech scrambling using the fast number-theoretic transform technique. In Proceedings of the 1st International Conference on Communication Systems (ICCS '88), pp. 10.9.1 – 10.9.5, IEEE press, 1988.

·        L. Chen and B. Wu. Short-time Fourier transform and an asynchronous speech scrambler. In Proceedings of the 3rd West Pacific Conference on Acoustics (WESTPAC III), pp. 723-726, 1988.

Other publications

·        L. Chen, P. Morrissey and N. P. Smart. DAA: Fixing the pairing based protocols. Cryptology ePrint Archive, Report 2009/198, 2009

·        Q. Tang and L. Chen. Weaknesses in two group Diffie-Hellman key exchange protocols. Cryptology ePrint Archive, Report 2005/197, 2005.

·        L. Chen and K. Harrison. Multiple trusted authorities in identifier based cryptography from pairings on elliptic curves. HP Labs Technical Reports, HPL-2003-48, 2003.

·        L. Chen. Study of an asynchronous speech scrambling system. PhD Thesis. Southeast University, P. R. China, 1988 (in Chinese).

Patents

·        Click here to see granted patents

·        Click here to see published patent applications

 

Last updated: 03-April-2014


You can reach me at:

Email:

liqun.chen <at> hp.com

Phone:

+44 117 316 2201

Address:

Hewlett Packard Labs
Long Down Avenue, Stoke Gifford
Bristol
, BS34 8QZ, UK

 

 

 

 

 

 

 

   Links

»

Liqun's home page

 

»

Previous activities

 

 

 

  

 

 

Privacy statement

Using this site means you accept its terms

Feedback to HP Labs

 

© 2006 Hewlett-Packard Development Company, L.P.