Professor Liqun Chen


Professor in Secure Systems
+44 (0)1483 684615
11 BB 02

About

Research

Research interests

Research projects

Teaching

Publications

Highlights

More recent publications can be found at

https://orcid.org/0000-0003-2680-4907

Books/Edited books/Book chapters

  • L. Chen and J. Han (eds), Provable Security (Proc. ProvSec 2016), LNCS 10005, Springer, 2016.
  • F. Bao, L. Chen, R.H. Deng and G. Wang (eds.), Information Security Practice and Experience (Proc. ISPEC 2016), LNCS 10060, Springer, 2016.
  • L. Chen and S. Matsuo (eds.), Security Standardisation Research (Proc. SSR 2015), LNCS 9497, Springer, 2015.
  • G. Proudler, L. Chen and C. Dalton. Trusted Computing Platforms - TPM2 in Context. Springer, 2014.
  • L. Chen and C. Mitchell (eds.), Security Standardisation Research (Proc. SSR 2014), LNCS 8893, Springer, 2014.
  • L. Chen, M. Yung and L. Zhu (eds.), Trusted Systems (Proc. INTRUST 2011), LNCS 7222, Springer, 2012.
  • L. Chen (ed.), Cryptography and Coding (Proc. Cryptography and Coding 2011), LNCS 7089, Springer, 2011.
  • L. Chen and M. Yung (eds.), Trusted Systems (Proc. INTRUST 2010), LNCS 6802, Springer, 2011.
  • L. Chen and M. Yung (eds.), Trusted Systems (Proc. INTRUST 2009), LNCS 6163, Springer, 2010.
  • L. Chen, C.J. Mitchell and A. Martin (eds.). Trusted Computing (Proc. Trust 2009), LNCS 5471, Springer, 2009.
  • L. Chen, M. Ryan and G. Wang (eds.), Information and Communication Security (Proc. ICICS 2008), LNCS 5308, Springer, 2008.
  • L. Chen, Y. Mu and W. Susilo (eds.), Information Security Practice and Experience (Proc. ISPEC 2008), LNCS 4991, Springer, 2008.
  • E. Brickell, J. Camenisch and L. Chen. Direct anonymous attestation in context. Chapter 5 of Trusted Computing, pp. 143-174, edited by C. Mitchell, IEE, London, 2005.
  • B. Balacheff, L. Chen, S. Pearson, D. Plaquin and G. Proudler. Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, 2003.
  • C. J. Mitchell and L. Chen. Security in future mobile multimedia networks. Chapter 11 of Insights into Mobile Multimedia Communications, pp. 177-190, edited by D. R. Bull, C. N. Canagarajah and A. R. Nix, Academic Press, 1998.

Refereed journal articles

  • L. Chen, Q. Li, K. Martin and S.-L. Ng. Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. To appear at IET Information Security. Online ISSN 1751-8717 Available online: 22 August 2016.
  • B. Smyth, M. Ryan and L. Chen. Formal analysis of privacy in direct anonymous attestation schemes. Science of Computer Programming (November 1, 2015), 111(P2), 300-317.
  • J. Y. Hwang, L. Chen, H. S. Cho, and D. Nyang. Short dynamic group signature scheme supporting controllable linkability. IEEE transactions on Information Forensics and Security, (June 2015), 10(6), 1109-1124.
  • L. Chen, H.W. Lim, and G. Yang. Cross-domain password-based authenticated key exchange revisited. ACM Transactions on Information and System Security (April 2014), 16(4), Article no. 15.
  • Z. Chen, J. Wang, L. Chen and X. Song. Review of how to construct a fully homomorphic encryption scheme. International Journal of Security and Its Applications (March 2014), 8(2), 221-230.
  • Z. Chen, J. Wang, L. Chen and X. Song. A Regev-type fully homomorphic encryption scheme using modulus switching. Scientific World Journal (June 25, 2014), 2014, Article no. 983862.
  • M. Beiter, M. Casassa Mont, L. Chen, S. Pearson. End-to-end policy based encryption techniques for multi-party data management. Computer Standards and Interfaces, ISI Journal Citation Reports, North Holland, D.G. Rosado (ed.), December 2013.
  • Y. Chen, L. Chen, D. Lin. Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme. Science China: Mathematics (July 2013), 56(7):1385-1401.
  • L. Chen and Y. Chen. The n-Diffie-Hellman problem and multiple-key encryption. International Journal of Information Security, Volume 11, Issue 5 (2012), Page 305-320.
  • L. Chen and J. Li. VLR group signatures with indisputable exculpability and efficient revocation. The International Journal of Information Privacy, Security and Integrity (IJIPSI 1(2/3): 129-159 (2012)).
  • Q. Tang and L. Chen. Extended KCI attack against two-party key establishment protocols. Information Processing Letters, 111(15):744-747, 2011.
  • L. Chen, S.-L. Ng and G. Wang. Threshold anonymous announcement in VANETs. IEEE Journal on Selected Areas in Communications, Special Issue on Vehicular Communications and Networks, 29(3):605-615, March 2011.
  • L. Chen and S.-L. Ng. Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga et al. IEEE Transactions on Vehicular Technology, 59(3):1503-1505, 2010.
  • L. Chen and J. Li. A note on the Chen-Morrissey-Smart direct anonymous attestation scheme. Information Processing Letters, 110(12-13):485-488, 2010.
  • L. Chen and C. Mitchell. Parsing ambiguities in authentication and key establishment protocols. International Journal of Electronic Security and Digital Forensics, 3(1):82-94, 2010.
  • E. Brickell, L. Chen and J. Li, Simplified security notions of direct anonymous attestation and a concrete scheme from pairings. International Journal of Information Security, 8(5):315-330, 2009.
  • G. Bertoni, L. Breveglieri, L. Chen, P. Fragneto, K. A. Harrison and G. Pelosi: A pairing SW implementation for smart-cards. Journal of Systems and Software, 81(7): 1240-1247, 2008.
  • L. Chen and Q. Tang. Bilateral unknown key-share attacks in key agreement protocols. Journal of Universal Computer Science, 14(3):416-440, 2008.
  • L. Chen, Z. Cheng and N. Smart. Identity-based key agreement protocols from pairings. International Journal of Information Security, 6(4):213-241, 2007.
  • Z. Cheng and L. Chen. On security proof of McCullagh-Barreto's key agreement protocol and its variants. International Journal of Security and Networks, 2(3/4):251-259, 2007.
  • L. Chen, Z. Cheng, J. Malone-Lee and N. Smart. Efficient ID-KEM based on the Sakai-Kasahara key construction. IEE Proceedings Information Security, 153(1):19-26, 2006.
  • B. Balacheff, L. Chen, S. Pearson, G. Proudler and D. Chan. Computing platform security in cyberspace. Elsevier Information Security Technical Report, 5(1):54-63, 2000.
  • L. Chen, D. Gollmann and C. Mitchell. Distributing trust amongst multiple authentication servers. Journal of Computer Security, 3(4):255-267, 1994/95.
  • B. Wu and L. Chen. Cipher rolling in the speech scrambling system requiring no frame synchronization. Journal of Southeast University, 21(5):1-8, 1991.
  • L. Chen and B. Wu. Generation of T and T-1 matrices for a speech scrambling system without frame synchronization. Communication security, 44(4):1-5, 1990.

Refereed conference papers

  • J. Camenisch, L. Chen, M. Drijvers, A. Lehmann, D. Novick and R. Urian. One TPM to bind them all: fixing TPM2.0 for provably secure anonymous attestation. To appear at IEEE S&P 2017.
  • L. Chen, T. Laing, K. Martin. Revisiting and extending the AONT-RS scheme: a robust computationally secure secret sharing scheme. To appear at AFRICACRYPT 2017.
  • L. Chen and R. Urian. Algorithm agility - discussion on TPM 2.0 ECC functionalities. In the Proc. The 3rd International Conference on Security Standardisation Research (SSR 2016), LNCS 10074, pp. 141-159, Springer, 2016.
  • L. Chen, T. Laing and K. M. Martin. Efficient, XOR-based ideal (t, n)-threshold schemes. To appear in the Proc. The 15th International Conference on Cryptography and Network Security (CANS 2016), LNCS 10052, pp. 467-483, Springer, 2016.
  • D. Kuhlmann, L. Chen and C. Mitchell. Trust and legitimacy in security standardization - a new management issue? To appear in the Proc. the 8th International Conference on Interoperability for Enterprise Systems and Application, Workshop on Corporate Standardisation Management, 2016.
  • M. Urquidi, J. Lancrenon, D. Khader and L. Chen. Attribute-based signatures with controllable linkability. To appear in Proc. International Conference on Trusted Systems (InTrust 2015).
  • L. Chen and R. Urian. DAA-A: Direct Anonymous Attestation with attributes. In Proc. 8th International Conference on Trust and Trustworthy Computing (TRUST 2015), LNCS 9229, pp. 228-245, Springer, 2015.
  • G. S. Grewal, M. D. Ryan, L. Chen, M. R. Clarkson. Du-Vote: Remote electronic voting with untrusted computers. In Proc. IEEE 28th Computer Security Foundations Symposium (CSF 2015), pp. 155-169, IEEE Press, 2015.
  • Y. Xun, F. Hao, L. Chen, J. K. Liu. Practical threshold password-authenticated secret sharing protocol. In Proc. 20th European Symposium on Research in Computer Security (ESORICS 2015), Proceedings, Part I. LNCS 9326, pp. 347-365, Springer, 2015.
  • F. Hao, X. Yi, L. Chen, S. Shahandashti. The fairy-ring dance: password authenticated key exchange in a group. In Proc. 1st ACM Workshop on IoT Privacy, Trust, and Security (IoTPTS 2015), In conjunction with ASIACCS 2015, pp. 27-34, ACM Press, 2015.
  • S. Zhang, X. Zhang, X. Ou, L. Chen, N. Edwards and J. Jin. Assessing attack surface with component-based package dependency. In Proc. 9th International Conference on Network and System Security (NSS 2015), LNCS 9408, pp. 405-417, Springer, 2015.
  • A. El Kaafarani, L. Chen, E. Ghadafi and J. Davenport. Attribute based signatures with user-controlled linkability. In Proc. 13th International Conference on Cryptography and Network Security (CANS 2014), LNCS 8813, pp. 256-269, Springer, 2014.
  • J. Liu, M. Ryan and L. Chen. Balancing societal security and individual privacy: accountable escrow system. In Proc. 27th Computer Security Foundations Symposium (CSF-27), pp. 427-440, IEEE Press, 2014.
  • C. Dong and L. Chen. A fast single server private information retrieval protocol with low communication cost. In Proc. 19th European Symposium on Research in Computer Security (ESORICS 2014), LNCS 8712, pp. 380-399, Springer, 2014.
  • C. Dong and L. Chen. A fast secure dot product protocol with application to privacy preserving association rule mining. In Proc. 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2014), LNCS 8443, pp. 606-617, Springer 2014.
  • L. Chen and J. Li. Flexible and scalable digital signatures in TPM 2.0. In Proc. 20th ACM Conference on Computer and Communications Security (CCS 2013), pp. 37-48, ACM Press, 2013.
  • L. Chen, Q. Li, K. M. Martin and S.-L. Ng. A privacy-aware reputation-based announcement scheme for VANETs. In Proc. 5th International Symposium on Wireless Vehicular Communications (IEEE WiVeC 2013), pp. 1-5, IEEE Press, 2013.
  • L. Chen, H.W. Lim and G. Yang. Cross-domain password-based authenticated key exchange revisited. In Proc. IEEE INFOCOM 2013: 32nd IEEE International Conference on Computer Communications, pp. 1052-1060, IEEE Press, 2013.
  • C. Dong, L. Chen and Z. Wen. When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol. In Proc. 20th ACM Conference on Computer and Communications Security (CCS 2013), pp. 789-800, ACM Press, 2013.
  • C. Dong, L. Chen, J. Camenisch and G. Russello. Fair private set intersection with a semi-trusted arbiter. In Proc. 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec '13), LNCS 7964, pp. 128-144, Springer, 2013.
  • K. Potzmader, J. Winter, D. Hein, C. Hanser, P. Teufl and L. Chen. Group signatures on mobile devices: Practical experiences. In Proc. 6th International Conference on Trust and Trustworthy Computing (TRUST 2013), LNCS 7904, pp. 47-64, Springer, 2013.
  • E. Brickell, L. Chen and J. Li. A static Diffie-Hellman attack on several direct anonymous attestation schemes. In Proc. 4th International Conference on Trusted Systems (InTrust 2012), LNCS 7711. Springer, 2012 (Best Paper Award).
  • L. Chen. Ring group signatures. In Proc. 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), pp. 409-418, IEEE Press, 2012.
  • E. Brickell, L. Chen and J. Li. A (corrected) DAA scheme using batch proof and verification. In Proc. INTRUST 2011, LNCS 7222, pp.304-337, Springer, 2012.
  • N. Edwards and L. Chen. An historical examination of open source releases and their vulnerabilities. In Proc. 19th ACM Conference on Computer and Communications Security (ACM CCS 2012), pp. 183-194, ACM Press, 2012.
  • Y. Chen, L. Chen and Z. Zhan. CCA secure IBE from computational bilinear Diffie-Hellman assumption in the standard model. In Proc. 14th International Conference on Information Security and Cryptology (ICISC 2011), LNCS 7259, pp. 275-301, Springer, 2011.
  • G. Kounga and L. Chen. Enforcing sticky policies with TPM and virtualization technologies. In Proc. International Conference on Trusted Systems (INTRUST 2011), LNCS 7222, pp. 32-47, Springer, 2012.
  • L. Chen, M. Lee and B. Warinschi. Security of the enhanced TCG privacy-CA solution. In Proc. 6th International Symposium on Trustworthy Global Computing (TGC 2011), LNCS 7173, pp. 121-141, Springer, 2011.
  • L. Chen and Y. Chen. The n-Diffie-Hellman problem and its applications. In Proc. 14th Information Security Conference (ISC 2011). LNCS 7001, pp 119-134, Springer, 2011.
  • S. Pearson, M. Casassa-Mont, L. Chen and A. Reed. End-to-end policy-based encryption and management of data in the cloud. In Proc. IEEE 3rd International Conference on Cloud Computing Technology and Science (CloudCom 2011), pp. 764-771, IEEE Press, 2011.
  • Y. Chen, L. Chen and Z. Chen. Generic methods to achieve tighter security reductions for a category of IBE schemes. In Proc. 7th Information Security Practice and Experience Conference (ISPEC 2011), LNCS 6672, pp. 40-54, Springer, 2011.
  • H. Balinsky, L. Chen and S. Simske. Premature silent workflow termination in publicly posted composite documents. In Proc. IEEE International conference on Systems, Man and Cybernetics (SMC 2011), pp. 1292-1297, IEEE Press, 2011.
  • H. Balinsky, L. Chen and S. Simske. Publicly posted composite documents with identity based encryption. In Proc. 11th ACM Symposium on Document Engineering (DocEng 2011), pp. 239-248, ACM Press, 2011.
  • H. Balinsky, L. Chen and S. Simske. Publicly posted composite documents in variably ordered workflows. In Proc. 7th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2011), pp. 631-638, IEEE Press, 2011.
  • B. Smyth, M. Ryan and L. Chen. Formal analysis of anonymity in direct anonymous attestation schemes. In Proc. 8th International Workshop on Formal Aspects of Security & Trust (FAST 2011). Formal Aspects in Security and Trust 2011, LNCS 7140, pp. 245-262, Springer, 2011.
  • Y. Chen and L. Chen. The twin bilinear Diffie-Hellman inversion problem and applications. In Proc. 13th Annual International Conference on Information Security and Cryptology (ICISC 2010), LNCS 6829, pp. 113-132, Springer, 2010.
  • L. Chen and J. Li. Revocation of direct anonymous attestation. In Proc. International Conference on Trusted Systems (INTRUST 2010), LNCS 6802, pp. 128-147, Springer, 2011.
  • L. Chen and B. Warinschi. Security of the TCG privacy-CA solution. In Proc. 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom 2010), pp. 609-616, IEEE Press, 2010.
  • L. Chen and J. Li. VLR group signatures with indisputable exculpability and efficient revocation. In Proc. 2nd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), pp. 727-734, IEEE Press, 2010 (Best Paper Award).
  • C. Wachsmann, A.Sadeghi, L. Chen, K. Dietrich, H. Löhr and J. Winter. Lightweight anonymous authentication with TLS and DAA for embedded mobile devices. In Proc. 13th Information Security Conference (ISC 2010), pp. 84-98, ACM Press, 2010.
  • F. Armknecht, L. Chen, A. Sadeghi, and C. Wachsmann. Anonymous authentication for RFID systems. In Proc. 6th Workshop on RFID Security (RFIDSec 2010), pp. 158-175, ACM Press 2010.
  • L. Chen. A DAA scheme using batch proof and verification. In Proc. 3rd International Conference on Trust (Trust 2010), LNCS 6101, pp. 166-180, Springer, 2010.
  • L. Chen, D. Page and N. Smart. On the design and implementation of an efficient DAA scheme. In Proc. 9th Smart Card Research and Advanced Application IFIP Conference (CARDIS 2010), LNCS 6035, pp. 223-237, Springer, 2010.
  • S. Cabuk, L. Chen, D. Plaquin and M. Ryan. Trusted integrity measurement and reporting for virtualized platforms. In Proc. International Conference on Trusted Systems (INTRUST 2009), LNCS 6163, pp. 181-197, Springer, 2010.
  • L. Chen. A DAA scheme requiring less TPM resources. In Proc. 5th China International Conference on Information Security and Cryptology (Inscrypt 2009), LNCS 6151, pp. 350-365, Springer, 2010.
  • D. Khader, L. Chen and J. Davenport. Certificate-free attribute authentication. In Proc. 12th IMA International Conference on Cryptography and Coding (IMACC 2009), LNCS 5921, pp. 301-325, Springer, 2009.
  • L. Chen and M. Ryan. Attack, solution and verification for shared authorisation data in TCG TPM. In Proc. 6th International Workshop on Formal Aspects in Security and Trust (FAST2009), LNCS 5983, pp. 201-216, Springer, 2009.
  • L. Chen, P. Morrissey, N. P. Smart and B. Warinschi. Security notions and generic constructions for client puzzles. In Advances in Cryptology - Asiacrypt 2009, LNCS 5912, pp. 505-523, Springer, 2009.
  • Q. Tang and L. Chen. Public-key encryption with registered keyword search. In Proc. 6th European Workshop on Public Key Services, Applications and Infrastructures (EuroPKI'09), LNCS 6391, pp. 163-178, Springer, 2009.
  • H. Balinsky, E. McDonnell, L. Chen and K. Harrison. Anti-counterfeiting using memory spots. In Proc. 3rd Workshop in Information Security Theory and Practices (WISTP'09), LNCS 5746, pp. 52 - 67, Springer, 2009.
  • L. Chen and M. Ryan. Offline dictionary attack on TCG TPM weak authorisation data, and solution. In Proc. 1st International conference on the Future of Trust in Computing, pp. 193-196, Teubner, 2009.
  • L. Chen, P. Morrissey and N. P. Smart. On proofs of security for DAA schemes. In Proc. 2nd International Conference on Provable Security (ProvSec 2008), LNCS 5324, pp. 156-175, Springer, 2008.
  • L. Chen, H. Löhr, M. Manulis, and A.Sadeghi. Property-based attestation without a trusted third party. In Proc. 11th International Conference on Information Security (ISC 2008), LNCS 5222, pp. 31-46, Springer, 2008.
  • L. Chen, P. Morrissey and N.P. Smart. Pairings in trusted computing. In Proc. 2nd International Conference on Pairing-based Cryptography (Pairing 2008), LNCS 5209, PP. 1-17, Springer, 2008.
  • A. Leung, L. Chen, and C. J. Mitchell. On a possible privacy flaw in direct anonymous attestation (DAA). In Proc. 1st International Conference on Trust (TRUST 2008), LNCS 4968, pp. 179-190, Springer, 2008.
  • E. Brickell, L. Chen and J. Li. A new direct anonymous attestation scheme from bilinear maps. In Proc. 1st International Conference on Trust (TRUST 2008), LNCS 4968, pp. Springer, 166-178, 2008.
  • Z. Cheng, L. Chen, L. Ling, R. Comley. General and efficient certificateless public key encryption Constructions. In Proc. First International Conference on Pairing-Based Cryptography (Pairing 2007), LNCS 4575, pp. 83-107, Springer, 2007.
  • Y. Mu, D. Wong, L. Chen, W. Susilo and Q. Wu. Concurrent signatures without a conventional keystone. In Proc. 1st International Workshop on Coding and Cryptology, Series on Coding Theory and Cryptology, Vol. 4, World Scientific, 2007.
  • B. Smyth, L. Chen and M. Ryan. Direct Anonymous Attestation (DAA): ensuring privacy with corrupt administrators. In Proc. 4th European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS 2007), LNCS 4572, pages 218-231, Springer, 2007.
  • L. Chen, A. Escalante, H. Löhr, M. Manulis and A. Sadeghi. A privacy-protecting multi-coupon scheme with stronger protection against splitting. In Proc. 11th International Conference on Financial Cryptography and Data Security (FC 2007), LNCS 4886, pp. 29-44, Springer, 2007.
  • L. Chen, H. Lim and W. Mao. User-friendly grid security architecture and protocols. In Proc. 13th International Workshop on Security Protocols. LNCS 4631, pp. 139-156, Springer, 2007.
  • L. Chen, R. Landfermann, H. Löhr, M. Rohe, A.Sadeghi and C. Stüble. A protocol for property based attestation. In Proc. 1st ACM Workshop on Scalable Trusted Computing (STC'06), pp. 7-17, ACM Press, 2006.
  • Z. Cheng, L. Chen, R. Comley and Q. Tang. Identity-based key agreement with unilateral identity privacy using pairings. In Proc. 2nd Information Security Practice and Experience Conference (ISPEC 2006), LNCS 3903, pp. 202-213, Springer, 2006.
  • L. Chen and Z. Cheng. Security proof of Sakai-Kasahara's identity-based encryption scheme. In Proc. 10th IMA International Conference on Cryptography and Coding, LNCS 3796, pp. 442-459, Springer, 2005.
  • L. Chen, M. Enzmann, A. Sadeghi, M. Schneider and M. Steiner. A privacy-protecting coupon system. In Proc. 9th International Conference on Financial Cryptography and Data Security (FC 2005), LNCS 3570, pp. 93-108, Springer, 2005.
  • L. Chen and J. Malone-Lee. Improved identity-based signcryption. In Proc. 8th International Workshop on Theory and Practice in Public Key Cryptography (PKC 2005), LNCS 3386, pp. 362-379, Springer, 2005.
  • E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In Proc. 11th ACM Conference on Computer and Communications Security (ACMCCS 2004), pp. 132-145, ACM press, 2004. Security proof is at Cryptology ePrint Archive, Report 2004/205. This paper is received a test of time award at ACMCCS 2014.
  • L. Chen, C. Kudla and K. Paterson. Concurrent signatures. In Advances in Cryptology - EUROCRYPT 2004, LNCS 3027, pp. 287-305, Springer, 2004.
  • L. Chen and C. Kudla. Identity based key agreement protocols from pairings. In Proc. 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), pp. 219-233, IEEE Press, 2003.
  • L. Chen, K. Harrison, A. Moss, D. Soldera, and N. Smart. Certification of public keys within an identity based system. In Proc. 5th International Conference on Information Security (ISC 2002), LNCS 2433, pp. 322-333, Springer, 2002.
  • L. Chen, K. Harrison, D. Soldera, and N.P. Smart. Applications of multiple trust authorities in pairing based cryptosystems. In Proc. International Conference on Infrastructure Security (InfraSec 2002), LNCS 2437, pp. 260-275, Springer, 2002.
  • B. Balacheff, L. Chen, D. Plaquin and G. Proudler. A trusted process to digitally sign a document. In Proc. New Security Paradigms Workshop (NSPW'01), pp. 79-86, ACM Press, 2001.
  • L. Chen and W. Mao. An auditable metering scheme for web advertisement applications. In Proc. 4th International Conference on Information Security (ISC 2001), LNCS 2200, pp. 475-485, Springer, 2001.
  • B. Balacheff, D. Chan, L. Chen, S. Pearson, and G. Proudler. Securing intelligent adjuncts using trusted computing platform technology. In Proc. 4th Working Conference on Smart Card Research and Advanced Applications, pp. 177-195, Kluwer Academic Publishers, 2000.
  • B. Balacheff, D. Chan, L. Chen, S. Pearson, and G. Proudler. How can you trust a computing platform? In Proc. Information Security Solutions Europe Conference (ISSE 2000), Spain, 2000.
  • L. Chen, S. Pearson and A. Vamvakas. On enhancing biometric authentication with data protection. In Proc. 4th International Conference on Knowledge-Based Intelligent Engineering Systems & Allied Technologies (KES 2000), pp. 249-252, IEEE press, 2000.
  • L. Chen. Efficient fair exchange with verifiable confirmation of signatures. In Advances in Cryptology - Asiacrypt'98, LNCS 1514, pp. 286-299, Springer, 1998.
  • L. Chen, D. Gollmann and C.J. Mitchell. Key escrow in mutually mistrusting domains. In Proc. International Workshop on Security Protocols, LNCS 1189, pp.139-153, Springer, 1997.
  • L. Chen and C.J. Mitchell. Key escrow in multiple domains. In Proc. International Congress on Information Systems and Telecommunications Security (INFOSEC'COM '97), pp.101-116, MCI Paris, 1997.
  • L. Chen, D. Gollmann, C.J. Mitchell and P. Wild. Secret sharing with reusable polynomials. In Proc. 2nd Australasian Conference on Information Security and Privacy (ACISP'97), LNCS 1270, pp. 183-193, Springer, 1997.
  • L. Chen and C.J. Mitchell. An anonymous and undeniable payment scheme. In Proc. 1st International Conference on Information and Communications Security (ICICS'97), LNCS 1334, pp. 478-482, Springer, 1997.
  • L. Chen, D. Gollmann and C.J. Mitchell. Tailoring authentication protocols to match underlying mechanisms. In Proc. 1st Australasian Conference on Information Security and Privacy (ACISP'96), LNCS 1172, pp. 121-133, Springer, 1996.
  • L. Chen, H.-J. Hitz, G. Horn, K. Howker, V. Kessler, L. Knudsen, C.J. Mitchell and C. Radu. The use of trusted third parties and secure billing in UMTS. In Proc. 1st ACTS Mobile Communications Summit, Volume 2, pp. 493-499, Spain, 1996.
  • L. Chen, D. Gollmann and C.J. Mitchell. Key distribution without individual trusted authentication servers. In Proc. 8th IEEE Computer Security Foundations Workshop (CSFW'95), pp. 30-36, IEEE Press, 1995.
  • L. Chen and D. Edwards. Applications of non-uniform sampling techniques and fast Fourier transform in plane near-field antenna measurements. In Proc. 8th International Conference on Antennas and Propagation, IEE Conference Publication Number 370, pp. 1.311-1.314, IEE London, 1993.
  • L. Chen and B. Wu. An asynchronous speech scrambling using the fast number-theoretic transform technique. In Proc. 1st International Conference on Communication Systems (ICCS '88), pp. 10.9.1-10.9.5, IEEE Press, 1988.
  • L. Chen and B. Wu. Short-time Fourier transform and an asynchronous speech scrambler. In Proc. 3rd West Pacific Conference on Acoustics (WESTPAC III), pp. 723-726, 1988.

Other publications