The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ning Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ning Zhang, Qi Shi
    Security Issues in an EDI Environment. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:129-137 [Conf]
  2. Qi Shi, Ning Zhang
    A General Approach to Evaluation of Secure Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1995, pp:396-401 [Conf]
  3. Qi Shi, Ning Zhang
    Applying Composable Security Properties to Assessment of Information Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1996, pp:118-123 [Conf]
  4. Ning Zhang, Jay Chin, Alan L. Rector, Carole A. Goble, Y. Li
    Towards an Authentication Middleware to Support Ubiquitous Web Access. [Citation Graph (0, 0)][DBLP]
    COMPSAC Workshops, 2004, pp:36-38 [Conf]
  5. Omaima Bamasak, Ning Zhang
    A Distributed Reputation Management Scheme for Mobile Agent-Based E-Commerce Applications . [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:270-275 [Conf]
  6. Aleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble
    DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:94-99 [Conf]
  7. Hongbo Li, Ronghua Xu, Ning Zhang
    On Miquel's Five-Circle Theorem. [Citation Graph (0, 0)][DBLP]
    IWMM/GIAE, 2004, pp:217-228 [Conf]
  8. Qi Shi, Ning Zhang
    A general approach to secure components composition. [Citation Graph (0, 0)][DBLP]
    HASE, 1996, pp:263-286 [Conf]
  9. Ning Zhang, Timothy Mount, Richard Boisvert
    Generators Bidding Behavior in the NYISO Day-Ahead Wholesale Electricity Market. [Citation Graph (0, 0)][DBLP]
    HICSS, 2007, pp:123- [Conf]
  10. Omaima Bamasak, Ning Zhang
    Towards a Secure Mobile Agent Based M-Commerce System. [Citation Graph (0, 0)][DBLP]
    ICEIS (4), 2003, pp:408-412 [Conf]
  11. Aleksandra Nenadic, Ning Zhang
    Non-Repudiation and Fairness in Electronic Data Exchange. [Citation Graph (0, 0)][DBLP]
    ICEIS (4), 2003, pp:55-62 [Conf]
  12. Xiaolin Wu, Ning Zhang
    Primary-consistent soft-decision color demosaic for digital cameras. [Citation Graph (0, 0)][DBLP]
    ICIP (1), 2003, pp:477-480 [Conf]
  13. Ning Zhang, Xiaolin Wu
    Lossless compression of color mosaic images. [Citation Graph (0, 0)][DBLP]
    ICIP, 2004, pp:517-520 [Conf]
  14. Ning Zhang, Manhee Jo, Shigetomo Kimura, Yoshihiko Ebihara
    A Study of Fairness for ATM ABR Service Based on Cell Delay. [Citation Graph (0, 0)][DBLP]
    ICOIN, 2001, pp:219-0 [Conf]
  15. Omaima Bamasak, Ning Zhang, Doug Edwards
    DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Schem. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  16. Aleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble
    Certified E-Mail Delivery with DSA Receipts. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  17. Li-Sha He, Ning Zhang
    An Asymmetric Authentication Protocol for M-Commerce Applications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:244-0 [Conf]
  18. Omaima Bamasak, Ning Zhang
    A secure proxy signature protocol for agent-based M-commerce applications. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:399-406 [Conf]
  19. D. Critchlow, Ning Zhang
    Revocation invocation for accountable anonymous PKI certificate trees. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:386-392 [Conf]
  20. Aleksandra Nenadic, Ning Zhang, Stephen Barton
    A secure and fair DSA-based signature exchange protocol. [Citation Graph (0, 0)][DBLP]
    ISCC, 2004, pp:412-417 [Conf]
  21. Omaima Bamasak, Ning Zhang
    Achieving Distributed Trusted Services. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:56-61 [Conf]
  22. Aleksandra Nenadic, Ning Zhang, Stephen Barton
    A Security Protocol for Certified E-Goods Delivery. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:22-0 [Conf]
  23. Li-Sha He, Ning Zhang
    A new signature scheme: joint-signature. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:807-812 [Conf]
  24. Omaima Bamasak, Ning Zhang
    A secure method for signature delegation to mobile agents. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:813-818 [Conf]
  25. Aleksandra Nenadic, Ning Zhang, Stephen Barton
    Fair certified e-mail delivery. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:391-396 [Conf]
  26. D. Critchlow, Ning Zhang
    An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:411-422 [Conf]
  27. Li-Sha He, Ning Zhang, Li-Rong He
    A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:239-250 [Conf]
  28. José L. Encarnação, Geory Köberle, Ning Zhang
    Distributed Supercomputing for Graphics Applications: A Case Study on an Implementation of the Radiosity Approach. [Citation Graph (0, 0)][DBLP]
    Supercomputer, 1989, pp:11-24 [Conf]
  29. Ning Zhang, Xinggang Lin, Yujin Zhang
    L-8 constrained micronoise filtering for high-fidelity image compression. [Citation Graph (0, 0)][DBLP]
    VCIP, 2000, pp:576-585 [Conf]
  30. Junzhong Ji, Ning Zhang, Chunnian Liu, Ning Zhong
    An Ant Colony Optimization Algorithm for Learning Classification Rules. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2006, pp:1034-1037 [Conf]
  31. Jia Zhang, Ning Zhang, Jen-Yao Chung
    Assisting Seller Pricing Strategy Selection for Electronic Auctions. [Citation Graph (0, 0)][DBLP]
    CEC, 2004, pp:27-33 [Conf]
  32. Ning Zhang, L. Yao, Jay Chin, Aleksandra Nenadic, A. McNab, Alan L. Rector, Carole A. Goble, Qi Shi
    Plugging a Scalable Authentication Framework into Shibboleth. [Citation Graph (0, 0)][DBLP]
    WETICE, 2005, pp:271-276 [Conf]
  33. Ning Zhang, Qi Shi
    Achieving Non-Repudiation of Receipt. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1996, v:39, n:10, pp:844-853 [Journal]
  34. Ning Zhang, Qi Shi, Madjid Merabti
    A Flexible Approach to Secure and Fair Document Exchange. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1999, v:42, n:7, pp:569-581 [Journal]
  35. D. Critchlow, Ning Zhang
    Security enhanced accountable anonymous PKI certificates for mobile e-commerce. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:45, n:4, pp:483-503 [Journal]
  36. Ning Zhang, Qi Shi, Madjid Merabti
    An efficient protocol for anonymous and fair document exchange. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:41, n:1, pp:19-28 [Journal]
  37. Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith
    Autonomous mobile agent based fair exchange. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:46, n:6, pp:751-770 [Journal]
  38. Omaima Bamasak, Ning Zhang
    Reputation management and signature delegation: A distributed approach. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2006, v:6, n:3-4, pp:227-263 [Journal]
  39. Aleksandra Nenadic, Ning Zhang, Qi Shi
    RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2005, v:13, n:5, pp:757-777 [Journal]
  40. Ning Zhang, Gang Feng
    H2 Control design for fuzzy dynamic systems via LMI. [Citation Graph (0, 0)][DBLP]
    Journal of Intelligent and Fuzzy Systems, 2000, v:8, n:4, pp:275-287 [Journal]
  41. Qi Shi, Ning Zhang
    An effective model for composition of secure systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1998, v:43, n:3, pp:233-244 [Journal]
  42. Ning Zhang, Qi Shi, Madjid Merabti
    A unified approach to a fair document exchange system. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2004, v:72, n:1, pp:83-96 [Journal]
  43. Ning Zhang, Qi Shi, Madjid Merabti
    Revocation of privacy-enhanced public-key certificates. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:75, n:1-2, pp:205-214 [Journal]
  44. Aleksandra Nenadic, Ning Zhang, Barry M. G. Cheetham, Carole A. Goble
    RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2005, v:11, n:1, pp:175-192 [Journal]
  45. Anneliese von Mayrhauser, Ning Zhang
    Automated regression testing using DBT and Sleuth. [Citation Graph (0, 0)][DBLP]
    Journal of Software Maintenance, 1999, v:11, n:2, pp:93-116 [Journal]
  46. Xiaolin Wu, Ning Zhang
    Primary-consistent soft-decision color demosaicking for digital cameras (patent pending). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2004, v:13, n:9, pp:1263-1274 [Journal]
  47. Xiaolin Wu, Sorina Dumitrescu, Ning Zhang
    On multirate optimality of JPEG2000 code stream. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2005, v:14, n:12, pp:2012-2023 [Journal]
  48. Ning Zhang, Xiaolin Wu
    Lossless compression of color mosaic images. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Image Processing, 2006, v:15, n:6, pp:1379-1388 [Journal]
  49. Ning Zhang, Solomon W. Golomb
    Sixty-phase generalized Barker sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1989, v:35, n:4, pp:911-0 [Journal]
  50. Ning Zhang, Solomon W. Golomb
    A limit theorem for n-phase Barker sequences (corresp.). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:4, pp:863-0 [Journal]
  51. Ning Zhang, Solomon W. Golomb
    Uniqueness of the generalized Barker sequence of length 6. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:5, pp:1167-0 [Journal]
  52. Ning Zhang, Solomon W. Golomb
    On the crosscorrelation of generalized Barker sequences. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:6, pp:1478-0 [Journal]
  53. Ning Zhang, Solomon W. Golomb
    Polyphase sequence with low autocorrelations. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:3, pp:1085-0 [Journal]
  54. Aleksandra Nenadic, Ning Zhang, Jay Chin, Carole A. Goble
    FAME: Adding Multi-Level Authentication to Shibboleth. [Citation Graph (0, 0)][DBLP]
    e-Science, 2006, pp:157- [Conf]
  55. Li Zhang, Xiaolin Wu, Ning Zhang, Wen Gao, Qiang Wang, Debin Zhao
    Context-based Arithmetic Coding Reexamined for DCT Video Compression. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:3147-3150 [Conf]
  56. Zhuo Song, Ning Zhang, Zhuo Yang, Tao Zhang
    Prediction of Helix, Strand Segments from Primary Protein Sequences by a Set of Neural Networks. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2007, pp:1248-1253 [Conf]
  57. Ning Zhang, Zhixiong Chen, Guozhen Xiao
    Efficient elliptic curve scalar multiplication algorithms resistant to power analysis. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:10, pp:2119-2129 [Journal]
  58. My T. Thai, Ning Zhang, Ravi Tiwari, Xiaochun Xu
    On approximation algorithms of k-connected m-dominating sets in disk graphs. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:385, n:1-3, pp:49-59 [Journal]
  59. Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith
    Practical and efficient fair document exchange over networks. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2006, v:29, n:1, pp:46-61 [Journal]

  60. A tag recommendation system for folksonomy. [Citation Graph (, )][DBLP]


  61. Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. [Citation Graph (, )][DBLP]


  62. Towards Context Constrained Authorisation for Pervasive Grid Computing. [Citation Graph (, )][DBLP]


  63. A Fast Algorithm for the Chirp Rate Estimation. [Citation Graph (, )][DBLP]


  64. CRM Method for Power Supply Enterprises Based on Analysis of Utility and Customers_ Credit and Multistage Fuzzy Evaluation. [Citation Graph (, )][DBLP]


  65. Fuzzy Comprehensive Evaluation for Power Network Operating Schemes. [Citation Graph (, )][DBLP]


  66. Fuzzy Comprehensive Evaluation for Electromagnetic Loop in China Ultra-high Voltage Grid. [Citation Graph (, )][DBLP]


  67. Mining maximal frequent itemsets on graphics processors. [Citation Graph (, )][DBLP]


  68. A Novel Algorithm for Faults Acquiring and Locating on Fiber Optic Cable Line. [Citation Graph (, )][DBLP]


  69. Discovery-driven graph summarization. [Citation Graph (, )][DBLP]


  70. A sample selection algorithm based on maximum entropy and contribution. [Citation Graph (, )][DBLP]


  71. A General Fuzzified CMAC Controller with Eligibility. [Citation Graph (, )][DBLP]


  72. An Analysis Framework of Factors Influencing China Software and Information Service Offshore Outsourcing. [Citation Graph (, )][DBLP]


  73. Dynamic output feedback Hinfinity controller design of fuzzy dynamic systems using LMI techniques. [Citation Graph (, )][DBLP]


  74. Automatic sports genre categorization and view-type classification over large-scale dataset. [Citation Graph (, )][DBLP]


  75. Trade-off scheme for fault tolerant connected dominating sets on size and diameter. [Citation Graph (, )][DBLP]


  76. A mobility monitoring based advance reservation protocol. [Citation Graph (, )][DBLP]


  77. Characteristics of the Group Interest Network. [Citation Graph (, )][DBLP]


  78. Graph Cuts in Content-Based Image Classification and Retrieval with Relevance Feedback. [Citation Graph (, )][DBLP]


  79. A Generic Authentication LoA Derivation Model. [Citation Graph (, )][DBLP]


  80. Research on Visualization Techniques for Web Usability Analysis. [Citation Graph (, )][DBLP]


  81. Analysis of Sidelobe Elevation for Polyphase Complementary Codes through the Non-ideal System. [Citation Graph (, )][DBLP]


  82. A Model of Implementing NETCONF Based on SOAP for Network Management. [Citation Graph (, )][DBLP]


  83. New Approximation for Minimum-Weight Routing Backbone in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  84. A comprehensive simulation study of SWAN QoS model in MANETs with proactive and reactive routing. [Citation Graph (, )][DBLP]


  85. Levels of Authentication Assurance: an Investigation. [Citation Graph (, )][DBLP]


  86. A Purpose-Based Access Control Model. [Citation Graph (, )][DBLP]


  87. Secure M-commerce Transactions: A Third Party Based Signature Protocol. [Citation Graph (, )][DBLP]


  88. A New Secure Binding Management Protocol for Mobile IPv6 Networks. [Citation Graph (, )][DBLP]


  89. E-learning and Its Information Technology. [Citation Graph (, )][DBLP]


  90. A More Efficient Closest String Problem. [Citation Graph (, )][DBLP]


  91. The Bipartite Network Study of the Library Book Lending System. [Citation Graph (, )][DBLP]


  92. Topological Structure and Interest Spectrum of the Group Interest Network. [Citation Graph (, )][DBLP]


  93. An Efficient Cloud Computing-Based Architecture for Freight System Application in China Railway. [Citation Graph (, )][DBLP]


  94. Research on Distributed Data Mining Technology Based on Grid. [Citation Graph (, )][DBLP]


  95. Analysis and Simulation Protocols Based on Slotted ALOHA for Plastic Optical Fiber Network. [Citation Graph (, )][DBLP]


  96. Outlier Detection from Pooled Data for Image Retrieval System Evaluation. [Citation Graph (, )][DBLP]


  97. A Flexible Routing Decision Framework to Support Diversified Application-Level Data Types in MANETs. [Citation Graph (, )][DBLP]


  98. A Context-Risk-Aware Access Control model for Ubiquitous environments. [Citation Graph (, )][DBLP]


  99. Self-Protection Model Based on Intelligent Agent. [Citation Graph (, )][DBLP]


  100. MS-BID: a Java package for label-free LC-MS-based comparative proteomic analysis. [Citation Graph (, )][DBLP]


  101. Corra: Computational framework and tools for LC-MS discovery and targeted mass spectrometry-based proteomics. [Citation Graph (, )][DBLP]


  102. Achieving fine-grained access control in virtual organizations. [Citation Graph (, )][DBLP]


  103. SHEETSPAIR: A Database of Amino Acid Pairs in Protein Sheet Structures. [Citation Graph (, )][DBLP]


  104. ERPDB: An Integrated Database of ERP Data for Neuroinformatics Research. [Citation Graph (, )][DBLP]


Search in 0.075secs, Finished in 0.080secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002