The SCEAS System
Navigation Menu

Search the dblp DataBase


Kan Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kan Zhang
    A Theory for System Security. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:148-155 [Conf]
  2. Kan Zhang
    IRI: A Quantitative Approach to Inference Analysis in Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:279-290 [Conf]
  3. Tim Kindberg, Kan Zhang
    Secure Spontaneous Device Association. [Citation Graph (0, 0)][DBLP]
    Ubicomp, 2003, pp:124-131 [Conf]
  4. Prakash Reddy, Venky Krishnan, Kan Zhang, Devaraj Das
    Authentication and Authorization of Mobile Clients in Public Data Networks. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:115-128 [Conf]
  5. Tim Kindberg, Kan Zhang
    Validating and Securing Spontaneous Associations between Wireless Devices. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:44-53 [Conf]
  6. Kan Zhang
    On Rough Sets and Inference Analysis. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:256-265 [Conf]
  7. Kan Zhang
    Threshold Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:282-290 [Conf]
  8. Kan Zhang
    Efficient Protocols for Signing Routing Messages. [Citation Graph (0, 0)][DBLP]
    NDSS, 1998, pp:- [Conf]
  9. Kan Zhang, Tim Kindberg
    An authorization infrastructure for nomadic computing. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:107-113 [Conf]
  10. Denis Bohm, Mik Lamming, Robert N. Mayo, Jeff Morgan, Kan Zhang
    Controlling Who Tracks Me. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:151-154 [Conf]
  11. Fabien A. P. Petitcolas, Kan Zhang
    WebGroup: A Secure Group Access Control Tool for the World-Wide Web. [Citation Graph (0, 0)][DBLP]
    WETICE, 1998, pp:301-305 [Conf]
  12. Tim Kindberg, Kan Zhang, Narendar Shankar
    Context Authentication Using Constrained Channels. [Citation Graph (0, 0)][DBLP]
    WMCSA, 2002, pp:14-21 [Conf]
  13. Changxu Wu, Kan Zhang, Yongge Hu
    Human performance modeling in temporary segmentation Chinese character handwriting recognizers. [Citation Graph (0, 0)][DBLP]
    Int. J. Hum.-Comput. Stud., 2003, v:58, n:4, pp:483-508 [Journal]
  14. Ronggang Zhou, Kan Zhang
    Impact of Mental Rotation Strategy on Absolute Direction Judgments: Supplementing Conventional Measures with Eye Movement Data. [Citation Graph (0, 0)][DBLP]
    HCI (3), 2007, pp:789-798 [Conf]
  15. Huiyang Li, Xianghong Sun, Kan Zhang
    Voice Alarm System in Emergency Evacuation. [Citation Graph (0, 0)][DBLP]
    HCI (13), 2007, pp:723-730 [Conf]
  16. Yan Ge, Ronggang Zhou, Xi Liu, Kan Zhang
    Chinese Color Preference in Software Design. [Citation Graph (0, 0)][DBLP]
    HCI (13), 2007, pp:62-68 [Conf]
  17. Xueqin Hao, Zhiguo Wang, Fan Yang, Ying Wang, Yanru Guo, Kan Zhang
    The Effect of Traffic on Situation Awareness and Mental Workload: Simulator-Based Study. [Citation Graph (0, 0)][DBLP]
    HCI (13), 2007, pp:288-296 [Conf]

  18. Towards a Cluster Based Incentive Mechanism for P2P Networks. [Citation Graph (, )][DBLP]

  19. Spatial Categorization and Computation - Empirical Evidence from Artificial Label. [Citation Graph (, )][DBLP]

  20. Why Not See: Inhibition on Distractors. [Citation Graph (, )][DBLP]

  21. Culture-Centered Design: Cultural Factors in Interface Usability and Usability tests. [Citation Graph (, )][DBLP]

  22. Effects of Attention on Dynamic Emotional Expressions Processing. [Citation Graph (, )][DBLP]

  23. A Review of Incentive Mechanism in Peer-to-Peer Systems. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002