Liqun Chen

From MaRDI portal
Revision as of 10:51, 6 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:763532

Available identifiers

zbMath Open chen.liqun.1MaRDI QIDQ763532

List of research outcomes





PublicationDate of PublicationType
Saturated adaptive control for high-order fully actuated systems with an extended state2024-07-23Paper
An inerter-based X-structure vibration isolator2024-05-29Paper
Hash-Based Direct Anonymous Attestation2024-04-26Paper
Nonlinear vibrations of thermo-hyperelastic moderately thick cylindrical shells with 2:1 internal resonance2024-04-23Paper
Assessing the Dissipative Capacity of Particle Impact Dampers Based on their Nonlinear Bandwidth Characteristics2023-09-25Paper
DFE-IP: delegatable functional encryption for inner product2023-09-08Paper
Certificateless Public Key Signature Schemes from Standard Algorithms2023-06-30Paper
Anonymous single-sign-on for \(n\) designated services with traceability2022-08-25Paper
Efficient, XOR-based, ideal \((t,n)\)-threshold schemes2018-10-26Paper
Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme2017-08-04Paper
A Static Diffie-Hellman Attack on Several Direct Anonymous Attestation Schemes2017-01-23Paper
Attribute-Based Signatures with User-Controlled Linkability2015-02-10Paper
Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme2014-03-05Paper
Extended KCI attack against two-party key establishment protocols2013-04-04Paper
CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model2012-11-01Paper
A note on the Chen-Morrissey-Smart DAA scheme2012-03-12Paper
The Twin Bilinear Diffie-Hellman Inversion Problem and Applications2011-10-27Paper
A DAA Scheme Requiring Less TPM Resources2010-11-23Paper
Certificate-Free Attribute Authentication2010-01-07Paper
Security Notions and Generic Constructions for Client Puzzles2009-12-15Paper
An Interpretation of Identity-Based Cryptography2009-10-22Paper
Concurrent Signatures without a Conventional Keystone2009-03-09Paper
Pairings in Trusted Computing2009-02-10Paper
On Proofs of Security for DAA Schemes2009-01-27Paper
Property-Based Attestation without a Trusted Third Party2008-11-20Paper
https://portal.mardi4nfdi.de/entity/Q35184162008-08-07Paper
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting2008-03-07Paper
General and Efficient Certificateless Public Key Encryption Constructions2007-11-29Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
https://portal.mardi4nfdi.de/entity/Q34424622007-05-18Paper
Cryptography and Coding2006-11-01Paper
Financial Cryptography and Data Security2005-12-22Paper
Public Key Cryptography - PKC 20052005-12-07Paper
https://portal.mardi4nfdi.de/entity/Q44484252004-02-18Paper
https://portal.mardi4nfdi.de/entity/Q44084532003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q45014982002-08-05Paper
https://portal.mardi4nfdi.de/entity/Q42492731999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43736641998-01-21Paper

Research outcomes over time

This page was built for person: Liqun Chen