Search the dblp DataBase
Ning Zhang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ning Zhang , Qi Shi Security Issues in an EDI Environment. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:129-137 [Conf ] Qi Shi , Ning Zhang A General Approach to Evaluation of Secure Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1995, pp:396-401 [Conf ] Qi Shi , Ning Zhang Applying Composable Security Properties to Assessment of Information Systems. [Citation Graph (0, 0)][DBLP ] COMPSAC, 1996, pp:118-123 [Conf ] Ning Zhang , Jay Chin , Alan L. Rector , Carole A. Goble , Y. Li Towards an Authentication Middleware to Support Ubiquitous Web Access. [Citation Graph (0, 0)][DBLP ] COMPSAC Workshops, 2004, pp:36-38 [Conf ] Omaima Bamasak , Ning Zhang A Distributed Reputation Management Scheme for Mobile Agent-Based E-Commerce Applications . [Citation Graph (0, 0)][DBLP ] EEE, 2005, pp:270-275 [Conf ] Aleksandra Nenadic , Ning Zhang , Qi Shi , Carole A. Goble DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. [Citation Graph (0, 0)][DBLP ] EEE, 2005, pp:94-99 [Conf ] Hongbo Li , Ronghua Xu , Ning Zhang On Miquel's Five-Circle Theorem. [Citation Graph (0, 0)][DBLP ] IWMM/GIAE, 2004, pp:217-228 [Conf ] Qi Shi , Ning Zhang A general approach to secure components composition. [Citation Graph (0, 0)][DBLP ] HASE, 1996, pp:263-286 [Conf ] Ning Zhang , Timothy Mount , Richard Boisvert Generators Bidding Behavior in the NYISO Day-Ahead Wholesale Electricity Market. [Citation Graph (0, 0)][DBLP ] HICSS, 2007, pp:123- [Conf ] Omaima Bamasak , Ning Zhang Towards a Secure Mobile Agent Based M-Commerce System. [Citation Graph (0, 0)][DBLP ] ICEIS (4), 2003, pp:408-412 [Conf ] Aleksandra Nenadic , Ning Zhang Non-Repudiation and Fairness in Electronic Data Exchange. [Citation Graph (0, 0)][DBLP ] ICEIS (4), 2003, pp:55-62 [Conf ] Xiaolin Wu , Ning Zhang Primary-consistent soft-decision color demosaic for digital cameras. [Citation Graph (0, 0)][DBLP ] ICIP (1), 2003, pp:477-480 [Conf ] Ning Zhang , Xiaolin Wu Lossless compression of color mosaic images. [Citation Graph (0, 0)][DBLP ] ICIP, 2004, pp:517-520 [Conf ] Ning Zhang , Manhee Jo , Shigetomo Kimura , Yoshihiko Ebihara A Study of Fairness for ATM ABR Service Based on Cell Delay. [Citation Graph (0, 0)][DBLP ] ICOIN, 2001, pp:219-0 [Conf ] Omaima Bamasak , Ning Zhang , Doug Edwards DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Schem. [Citation Graph (0, 0)][DBLP ] IPDPS, 2005, pp:- [Conf ] Aleksandra Nenadic , Ning Zhang , Qi Shi , Carole A. Goble Certified E-Mail Delivery with DSA Receipts. [Citation Graph (0, 0)][DBLP ] IPDPS, 2005, pp:- [Conf ] Li-Sha He , Ning Zhang An Asymmetric Authentication Protocol for M-Commerce Applications. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:244-0 [Conf ] Omaima Bamasak , Ning Zhang A secure proxy signature protocol for agent-based M-commerce applications. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:399-406 [Conf ] D. Critchlow , Ning Zhang Revocation invocation for accountable anonymous PKI certificate trees. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:386-392 [Conf ] Aleksandra Nenadic , Ning Zhang , Stephen Barton A secure and fair DSA-based signature exchange protocol. [Citation Graph (0, 0)][DBLP ] ISCC, 2004, pp:412-417 [Conf ] Omaima Bamasak , Ning Zhang Achieving Distributed Trusted Services. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:56-61 [Conf ] Aleksandra Nenadic , Ning Zhang , Stephen Barton A Security Protocol for Certified E-Goods Delivery. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2004, pp:22-0 [Conf ] Li-Sha He , Ning Zhang A new signature scheme: joint-signature. [Citation Graph (0, 0)][DBLP ] SAC, 2004, pp:807-812 [Conf ] Omaima Bamasak , Ning Zhang A secure method for signature delegation to mobile agents. [Citation Graph (0, 0)][DBLP ] SAC, 2004, pp:813-818 [Conf ] Aleksandra Nenadic , Ning Zhang , Stephen Barton Fair certified e-mail delivery. [Citation Graph (0, 0)][DBLP ] SAC, 2004, pp:391-396 [Conf ] D. Critchlow , Ning Zhang An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:411-422 [Conf ] Li-Sha He , Ning Zhang , Li-Rong He A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:239-250 [Conf ] José L. Encarnação , Geory Köberle , Ning Zhang Distributed Supercomputing for Graphics Applications: A Case Study on an Implementation of the Radiosity Approach. [Citation Graph (0, 0)][DBLP ] Supercomputer, 1989, pp:11-24 [Conf ] Ning Zhang , Xinggang Lin , Yujin Zhang L-8 constrained micronoise filtering for high-fidelity image compression. [Citation Graph (0, 0)][DBLP ] VCIP, 2000, pp:576-585 [Conf ] Junzhong Ji , Ning Zhang , Chunnian Liu , Ning Zhong An Ant Colony Optimization Algorithm for Learning Classification Rules. [Citation Graph (0, 0)][DBLP ] Web Intelligence, 2006, pp:1034-1037 [Conf ] Jia Zhang , Ning Zhang , Jen-Yao Chung Assisting Seller Pricing Strategy Selection for Electronic Auctions. [Citation Graph (0, 0)][DBLP ] CEC, 2004, pp:27-33 [Conf ] Ning Zhang , L. Yao , Jay Chin , Aleksandra Nenadic , A. McNab , Alan L. Rector , Carole A. Goble , Qi Shi Plugging a Scalable Authentication Framework into Shibboleth. [Citation Graph (0, 0)][DBLP ] WETICE, 2005, pp:271-276 [Conf ] Ning Zhang , Qi Shi Achieving Non-Repudiation of Receipt. [Citation Graph (0, 0)][DBLP ] Comput. J., 1996, v:39, n:10, pp:844-853 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti A Flexible Approach to Secure and Fair Document Exchange. [Citation Graph (0, 0)][DBLP ] Comput. J., 1999, v:42, n:7, pp:569-581 [Journal ] D. Critchlow , Ning Zhang Security enhanced accountable anonymous PKI certificates for mobile e-commerce. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:45, n:4, pp:483-503 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti An efficient protocol for anonymous and fair document exchange. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2003, v:41, n:1, pp:19-28 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti , Robert Askwith Autonomous mobile agent based fair exchange. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:46, n:6, pp:751-770 [Journal ] Omaima Bamasak , Ning Zhang Reputation management and signature delegation: A distributed approach. [Citation Graph (0, 0)][DBLP ] Electronic Commerce Research, 2006, v:6, n:3-4, pp:227-263 [Journal ] Aleksandra Nenadic , Ning Zhang , Qi Shi RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2005, v:13, n:5, pp:757-777 [Journal ] Ning Zhang , Gang Feng H2 Control design for fuzzy dynamic systems via LMI. [Citation Graph (0, 0)][DBLP ] Journal of Intelligent and Fuzzy Systems, 2000, v:8, n:4, pp:275-287 [Journal ] Qi Shi , Ning Zhang An effective model for composition of secure systems. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1998, v:43, n:3, pp:233-244 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti A unified approach to a fair document exchange system. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2004, v:72, n:1, pp:83-96 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti Revocation of privacy-enhanced public-key certificates. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2005, v:75, n:1-2, pp:205-214 [Journal ] Aleksandra Nenadic , Ning Zhang , Barry M. G. Cheetham , Carole A. Goble RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption. [Citation Graph (0, 0)][DBLP ] J. UCS, 2005, v:11, n:1, pp:175-192 [Journal ] Anneliese von Mayrhauser , Ning Zhang Automated regression testing using DBT and Sleuth . [Citation Graph (0, 0)][DBLP ] Journal of Software Maintenance, 1999, v:11, n:2, pp:93-116 [Journal ] Xiaolin Wu , Ning Zhang Primary-consistent soft-decision color demosaicking for digital cameras (patent pending). [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2004, v:13, n:9, pp:1263-1274 [Journal ] Xiaolin Wu , Sorina Dumitrescu , Ning Zhang On multirate optimality of JPEG2000 code stream. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2005, v:14, n:12, pp:2012-2023 [Journal ] Ning Zhang , Xiaolin Wu Lossless compression of color mosaic images. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Image Processing, 2006, v:15, n:6, pp:1379-1388 [Journal ] Ning Zhang , Solomon W. Golomb Sixty-phase generalized Barker sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1989, v:35, n:4, pp:911-0 [Journal ] Ning Zhang , Solomon W. Golomb A limit theorem for n-phase Barker sequences (corresp.). [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1990, v:36, n:4, pp:863-0 [Journal ] Ning Zhang , Solomon W. Golomb Uniqueness of the generalized Barker sequence of length 6. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1990, v:36, n:5, pp:1167-0 [Journal ] Ning Zhang , Solomon W. Golomb On the crosscorrelation of generalized Barker sequences. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1990, v:36, n:6, pp:1478-0 [Journal ] Ning Zhang , Solomon W. Golomb Polyphase sequence with low autocorrelations. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1993, v:39, n:3, pp:1085-0 [Journal ] Aleksandra Nenadic , Ning Zhang , Jay Chin , Carole A. Goble FAME: Adding Multi-Level Authentication to Shibboleth. [Citation Graph (0, 0)][DBLP ] e-Science, 2006, pp:157- [Conf ] Li Zhang , Xiaolin Wu , Ning Zhang , Wen Gao , Qiang Wang , Debin Zhao Context-based Arithmetic Coding Reexamined for DCT Video Compression. [Citation Graph (0, 0)][DBLP ] ISCAS, 2007, pp:3147-3150 [Conf ] Zhuo Song , Ning Zhang , Zhuo Yang , Tao Zhang Prediction of Helix, Strand Segments from Primary Protein Sequences by a Set of Neural Networks. [Citation Graph (0, 0)][DBLP ] ISNN (2), 2007, pp:1248-1253 [Conf ] Ning Zhang , Zhixiong Chen , Guozhen Xiao Efficient elliptic curve scalar multiplication algorithms resistant to power analysis. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:10, pp:2119-2129 [Journal ] My T. Thai , Ning Zhang , Ravi Tiwari , Xiaochun Xu On approximation algorithms of k-connected m-dominating sets in disk graphs. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2007, v:385, n:1-3, pp:49-59 [Journal ] Ning Zhang , Qi Shi , Madjid Merabti , Robert Askwith Practical and efficient fair document exchange over networks. [Citation Graph (0, 0)][DBLP ] J. Network and Computer Applications, 2006, v:29, n:1, pp:46-61 [Journal ] A tag recommendation system for folksonomy. [Citation Graph (, )][DBLP ] Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. [Citation Graph (, )][DBLP ] Towards Context Constrained Authorisation for Pervasive Grid Computing. [Citation Graph (, )][DBLP ] A Fast Algorithm for the Chirp Rate Estimation. [Citation Graph (, )][DBLP ] CRM Method for Power Supply Enterprises Based on Analysis of Utility and Customers_ Credit and Multistage Fuzzy Evaluation. [Citation Graph (, )][DBLP ] Fuzzy Comprehensive Evaluation for Power Network Operating Schemes. [Citation Graph (, )][DBLP ] Fuzzy Comprehensive Evaluation for Electromagnetic Loop in China Ultra-high Voltage Grid. [Citation Graph (, )][DBLP ] Mining maximal frequent itemsets on graphics processors. [Citation Graph (, )][DBLP ] A Novel Algorithm for Faults Acquiring and Locating on Fiber Optic Cable Line. [Citation Graph (, )][DBLP ] Discovery-driven graph summarization. [Citation Graph (, )][DBLP ] A sample selection algorithm based on maximum entropy and contribution. [Citation Graph (, )][DBLP ] A General Fuzzified CMAC Controller with Eligibility. [Citation Graph (, )][DBLP ] An Analysis Framework of Factors Influencing China Software and Information Service Offshore Outsourcing. [Citation Graph (, )][DBLP ] Dynamic output feedback Hinfinity controller design of fuzzy dynamic systems using LMI techniques. [Citation Graph (, )][DBLP ] Automatic sports genre categorization and view-type classification over large-scale dataset. [Citation Graph (, )][DBLP ] Trade-off scheme for fault tolerant connected dominating sets on size and diameter. [Citation Graph (, )][DBLP ] A mobility monitoring based advance reservation protocol. [Citation Graph (, )][DBLP ] Characteristics of the Group Interest Network. [Citation Graph (, )][DBLP ] Graph Cuts in Content-Based Image Classification and Retrieval with Relevance Feedback. [Citation Graph (, )][DBLP ] A Generic Authentication LoA Derivation Model. [Citation Graph (, )][DBLP ] Research on Visualization Techniques for Web Usability Analysis. [Citation Graph (, )][DBLP ] Analysis of Sidelobe Elevation for Polyphase Complementary Codes through the Non-ideal System. [Citation Graph (, )][DBLP ] A Model of Implementing NETCONF Based on SOAP for Network Management. [Citation Graph (, )][DBLP ] New Approximation for Minimum-Weight Routing Backbone in Wireless Sensor Network. [Citation Graph (, )][DBLP ] A comprehensive simulation study of SWAN QoS model in MANETs with proactive and reactive routing. [Citation Graph (, )][DBLP ] Levels of Authentication Assurance: an Investigation. [Citation Graph (, )][DBLP ] A Purpose-Based Access Control Model. [Citation Graph (, )][DBLP ] Secure M-commerce Transactions: A Third Party Based Signature Protocol. [Citation Graph (, )][DBLP ] A New Secure Binding Management Protocol for Mobile IPv6 Networks. [Citation Graph (, )][DBLP ] E-learning and Its Information Technology. [Citation Graph (, )][DBLP ] A More Efficient Closest String Problem. [Citation Graph (, )][DBLP ] The Bipartite Network Study of the Library Book Lending System. [Citation Graph (, )][DBLP ] Topological Structure and Interest Spectrum of the Group Interest Network. [Citation Graph (, )][DBLP ] An Efficient Cloud Computing-Based Architecture for Freight System Application in China Railway. [Citation Graph (, )][DBLP ] Research on Distributed Data Mining Technology Based on Grid. [Citation Graph (, )][DBLP ] Analysis and Simulation Protocols Based on Slotted ALOHA for Plastic Optical Fiber Network. [Citation Graph (, )][DBLP ] Outlier Detection from Pooled Data for Image Retrieval System Evaluation. [Citation Graph (, )][DBLP ] A Flexible Routing Decision Framework to Support Diversified Application-Level Data Types in MANETs. [Citation Graph (, )][DBLP ] A Context-Risk-Aware Access Control model for Ubiquitous environments. [Citation Graph (, )][DBLP ] Self-Protection Model Based on Intelligent Agent. [Citation Graph (, )][DBLP ] MS-BID: a Java package for label-free LC-MS-based comparative proteomic analysis. [Citation Graph (, )][DBLP ] Corra: Computational framework and tools for LC-MS discovery and targeted mass spectrometry-based proteomics. [Citation Graph (, )][DBLP ] Achieving fine-grained access control in virtual organizations. [Citation Graph (, )][DBLP ] SHEETSPAIR: A Database of Amino Acid Pairs in Protein Sheet Structures. [Citation Graph (, )][DBLP ] ERPDB: An Integrated Database of ERP Data for Neuroinformatics Research. [Citation Graph (, )][DBLP ] Search in 0.043secs, Finished in 0.046secs