Search

Your search keyword '"Chen, Liqun"' showing total 1,986 results

Search Constraints

Start Over You searched for: Author "Chen, Liqun" Remove constraint Author: "Chen, Liqun"
1,986 results on '"Chen, Liqun"'

Search Results

251. A (Corrected) DAA Scheme Using Batch Proof and Verification

252. Enforcing Sticky Policies with TPM and Virtualization

253. Revocation of Direct Anonymous Attestation

254. Trusted Integrity Measurement and Reporting for Virtualized Platforms : (Work-in-Progress)

255. Attribute-Based Signatures with User-Controlled Linkability

256. A Fast Single Server Private Information Retrieval Protocol with Low Communication Cost

257. A Fast Secure Dot Product Protocol with Application to Privacy Preserving Association Rule Mining

273. Fair Private Set Intersection with a Semi-trusted Arbiter

274. Group Signatures on Mobile Devices: Practical Experiences

275. Catheter-directed thrombolysis for patients with acute lower extremity deep vein thrombosis: a meta-analysis

276. A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes

277. CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model

278. Security of the Enhanced TCG Privacy-CA Solution

279. Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes

280. The n-Diffie-Hellman Problem and Its Applications

281. The Twin Bilinear Diffie-Hellman Inversion Problem and Applications

282. Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes

283. Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices

284. On the Privacy of Elementary Matrices Masking-Based Verifiable (Outsourced) Computation

292. Anonymous Authentication for RFID Systems

293. Public-Key Encryption with Registered Keyword Search

294. A DAA Scheme Requiring Less TPM Resources

295. A DAA Scheme Using Batch Proof and Verification

296. On the Design and Implementation of an Efficient DAA Scheme

297. Attack, Solution and Verification for Shared Authorisation Data in TCG TPM

300. Certificate-Free Attribute Authentication

Catalog

Books, media, physical & digital resources