Direct anonymous attestation E Brickell, J Camenisch, L Chen Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 1159 | 2004 |
Identity-based key agreement protocols from pairings L Chen, Z Cheng, NP Smart International Journal of Information Security 6 (4), 213-241, 2007 | 551 | 2007 |
Trusted computing platforms: TCPA technology in context S Pearson, B Balacheff Prentice Hall Professional, 2003 | 519 | 2003 |
Identity based authenticated key agreement protocols from pairings L Chen, C Kudla 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 219-233, 2003 | 450 | 2003 |
Improved identity-based signcryption L Chen, J Malone-Lee International Workshop on Public Key Cryptography, 362-379, 2005 | 385 | 2005 |
A protocol for property-based attestation L Chen, R Landfermann, H Löhr, M Rohe, AR Sadeghi, C Stüble Proceedings of the first ACM workshop on Scalable trusted computing, 7-16, 2006 | 284 | 2006 |
When private set intersection meets big data: an efficient and scalable protocol C Dong, L Chen, Z Wen Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 262 | 2013 |
Concurrent signatures L Chen, C Kudla, KG Paterson International Conference on the Theory and Applications of Cryptographic …, 2004 | 212 | 2004 |
Applications of multiple trust authorities in pairing based cryptosystems L Chen, K Harrison, D Soldera, NP Smart International Conference on Infrastructure Security, 260-275, 2002 | 195 | 2002 |
Alice: Towards understanding adversarial learning for joint distribution matching C Li, H Liu, C Chen, Y Pu, L Chen, R Henao, L Carin arXiv preprint arXiv:1709.01215, 2017 | 159 | 2017 |
Trusted system SL Pearson, L Chen US Patent 7,275,160, 2007 | 159 | 2007 |
Security proof of Sakai-Kasahara’s identity-based encryption scheme L Chen, Z Cheng IMA International conference on cryptography and coding, 442-459, 2005 | 154 | 2005 |
Threshold anonymous announcement in VANETs L Chen, SL Ng, G Wang IEEE Journal on Selected Areas in Communications 29 (3), 605-615, 2011 | 135 | 2011 |
A new direct anonymous attestation scheme from bilinear maps E Brickell, L Chen, J Li International Conference on Trusted Computing, 166-178, 2008 | 134 | 2008 |
Comments on the S/KEY user authentication scheme CJ Mitchell, L Chen ACM SIGOPS Operating Systems Review 30 (4), 12-16, 1996 | 134 | 1996 |
Electronic commerce system L Chen, B Balacheff, R Du Toit, SL Pearson, D Chan US Patent 7,096,204, 2006 | 130 | 2006 |
Multiple trusted computing environments J Griffin, CI Dalton, M Child, L Chen, AP Norman US Patent 7,865,876, 2011 | 125 | 2011 |
Multiple trusted computing environments with verifiable environment identities J Griffin, L Chen US Patent 7,076,655, 2006 | 118 | 2006 |
Simplified security notions of direct anonymous attestation and a concrete scheme from pairings E Brickell, L Chen, J Li International journal of information security 8 (5), 315-330, 2009 | 117 | 2009 |
Trusted computing platform using a trusted device assembly GJ Proudler, D Gupta, L Chen, SL Pearson, B Balacheff, BE Van Wilder, ... US Patent 6,988,250, 2006 | 112* | 2006 |