171 results on '"Chen, Liqun"'
Search Results
2. Hash-Based Direct Anonymous Attestation
3. BAHS: A Blockchain-Aided Hash-Based Signature Scheme
4. A Blockchain-Based Long-Term Time-Stamping Scheme
5. An Optimized GHV-Type HE Scheme: Simpler, Faster, and More Versatile
6. Analysis of Client-Side Security for Long-Term Time-Stamping Services
7. Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols
8. A Lattice-Based Enhanced Privacy ID
9. Short Paper: Making Contactless EMV Robust Against Rogue Readers Colluding with Relay Attackers
10. Certificateless Public Key Signature Schemes from Standard Algorithms
11. Anonymous Single-Sign-On for n Designated Services with Traceability
12. Formal Analysis of V2X Revocation Protocols
13. Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme
14. Efficient, XOR-Based, Ideal $$(t,n)-$$ threshold Schemes
15. Algorithm Agility – Discussion on TPM 2.0 ECC Functionalities
16. Attribute-Based Signatures with Controllable Linkability
17. Road Dynamic Responses Under Moving Vehicle Loads Based on Three-Dimensional Finite Element Model
18. Introduction
19. DAA-A: Direct Anonymous Attestation with Attributes
20. The Construction of a Highway Fieldtest Section for Vehicle–Road Interaction
21. Effect of Vibration Transmissibility on Fatigue Lifetime of Electronic Devices
22. Parameter Design of Vehicle–Road System with Low Dynamic Interaction
23. Modeling and Interaction of a Vehicle–Road System with Nonlinearity and Viscoelasticity
24. Dynamic Analysis of a Heavy Vehicle Using Lumped Parameter Model
25. Dynamic Analysis of a Pavement Structure Under a Vehicle’s Moving Load
26. Assessing Attack Surface with Component-Based Package Dependency
27. Modeling and Dynamic Analysis of Vehicle–Road Coupled Systems
28. Dynamic Analysis of a Heavy Vehicle Using Function Virtual Prototype
29. Dynamics of Vehicle-Road Coupled System
30. Practical Threshold Password-Authenticated Secret Sharing Protocol
31. Road Dynamic Responses Under Moving Vehicle Loads Based on Double-Layer Plate Model
32. TPM2 Requirements
33. Trusted Computing Platforms
34. Introduction
35. Machine Virtualisation, Virtual Machines, and TPMs
36. Trusted Platform Architecture
37. Managing TPM2
38. Customer Configuration of TPM2 and Its Host Platform
39. A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost
40. Basics of Trusted Platforms
41. Accessing Keys and Data in TPM2
42. A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining
43. Attribute-Based Signatures with User-Controlled Linkability
44. TPM2 Operation
45. Initialising TPM2
46. Direct Anonymous Attestation (DAA) in More Depth
47. Starting to Use TPM2
48. Futures for Trusted Computing
49. Chaos in Spatial Attitude Motion of Spacecraft
50. Chaos in Planar Attitude Motion of Spacecraft
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.