Ning Zhang
Orcid: 0000-0001-9519-9128Affiliations:
- The University of Manchester, UK
According to our database1,
Ning Zhang
authored at least 112 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on d-nb.info
-
on cs.man.ac.uk
On csauthors.net:
Bibliography
2024
A Survey on Routing Solutions for Low-Power and Lossy Networks: Toward a Reliable Path-Finding Approach.
Network, January, 2024
A Problem Analysis of Smart Home Automation: Toward Secure and Usable Communication-Based Authorization.
IEEE Access, 2024
Efficient Privacy-Friendly and Flexible Wearable Data Processing With User-Centric Access Control.
IEEE Access, 2024
IEEE Access, 2024
2023
An Effective, Efficient and Scalable Link Discovery (EESLD) Framework for Hybrid Multi-Controller SDN Networks.
IEEE Access, 2023
Secure, ID Privacy and Inference Threat Prevention Mechanisms for Distributed Systems.
IEEE Access, 2023
2022
Privacy-Friendly Flexible IoT Health Data Processing with User-Centric Access Control.
CoRR, 2022
A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications.
CoRR, 2022
LINK-GUARD: An Effective and Scalable Security Framework for Link Discovery in SDN Networks.
IEEE Access, 2022
IEEE Access, 2022
A Multifactor Multilevel and Interaction Based (M2I) Authentication Framework for Internet of Things (IoT) Applications.
IEEE Access, 2022
2021
A Survey on Smart Home Authentication: Toward Secure, Multi-Level and Interaction-Based Identification.
IEEE Access, 2021
2020
Strengthen user authentication on mobile devices by using user's touch dynamics pattern.
J. Ambient Intell. Humaniz. Comput., 2020
Communication Pattern Based Data Authentication (CPDA) Designed for Big Data Processing in a Multiple Public Cloud Environment.
IEEE Access, 2020
IEEE Access, 2020
A Secure and Privacy-Preserving Data Collection (SPDC) Framework for IoT Applications.
Proceedings of the Critical Information Infrastructures Security, 2020
2019
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019
Competition: Alternating Multicast with Aggregated Data Collection in Wireless Sensor Networks.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019
2017
IEEE Access, 2017
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017
2016
TDAS: a touch dynamics based multi-factor authentication solution for mobile devices.
Int. J. Pervasive Comput. Commun., 2016
Ad Hoc Networks, 2016
IEEE Access, 2016
Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2016
2015
J. Comput. Syst. Sci., 2015
TADL-V2: An Improved Trust-Aware Dynamic Location-based Adaptation Protocol For Discovering Multiple Paths in MANETs.
EAI Endorsed Trans. Ambient Syst., 2015
DEP2SA: A Decentralized Efficient Privacy-Preserving and Selective Aggregation Scheme in Advanced Metering Infrastructure.
IEEE Access, 2015
Recognizing Your Touch: Towards Strengthening Mobile Device Authentication via Touch Dynamics Integration.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015
TADL: A Trust-Aware Dynamic Location-Based Protocol Suite For Discovering Multiple Paths in MANETs.
Proceedings of the 2015 International Conference on Distributed Computing and Networking, 2015
MUSP: Multi-service, User Self-controllable and Privacy-preserving system for smart metering.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 1st International Conference on Advanced Intelligent System and Informatics, 2015
2014
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014
Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol.
Proceedings of the Information and Communication Technology, 2014
An Enhanced Linkable Anonymous Access Protocol of the Distributed Electronic Patient Records.
Proceedings of the Ninth International Conference on Availability, 2014
2013
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks.
J. Parallel Distributed Comput., 2013
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013
Proceedings of the International Conference on High Performance Computing & Simulation, 2013
A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
2012
J. Netw. Comput. Appl., 2012
A License Revocation Protocol Supporting Digital License Reselling in a Consumer-to-Consumer Model.
Int. J. Online Mark., 2012
A Risk-Aware Workload scheduler to support secure and efficient collaborative data transfer in mobile communities.
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012
A 2-dimensional approach to QoS provisioning in adversarial mobile ad hoc network environments.
Proceedings of the 15th ACM International Conference on Modeling, 2012
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012
2011
J. Netw. Comput. Appl., 2011
J. Comput. Syst. Sci., 2011
An Enhanced Approach to Supporting Controlled Access to EPRs with Three Levels of Identity Privacy Preservations.
Proceedings of the Information Quality in e-Health, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2011
Towards an Integration of Security and Quality of Service in IP-Based Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2011
Support Access to Distributed EPRs with Three Levels of Identity Privacy Preservation.
Proceedings of the Sixth International Conference on Availability, 2011
2010
Wirel. Networks, 2010
Telecommun. Syst., 2010
An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
A Flexible Routing Decision Framework to Support Diversified Application-Level Data Types in MANETs.
Proceedings of the NTMS 2009, 2009
2008
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008
2007
Concurr. Comput. Pract. Exp., 2007
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
J. Netw. Comput. Appl., 2006
Electron. Commer. Res., 2006
Proceedings of the Q2SWinet'06, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Second International Conference on e-Science and Grid Technologies (e-Science 2006), 2006
2005
RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption.
J. Univers. Comput. Sci., 2005
RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery.
J. Comput. Secur., 2005
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Schem.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Proceedings of the From Grid to Healthgrid, 2005
DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
A Distributed Reputation Management Scheme for Mobile Agent-Based E-Commerce Applications .
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005
2004
Comput. Networks, 2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004
2003
Comput. Networks, 2003
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003
Non-Repudiation and Fairness in Electronic Data Exchange.
Proceedings of the ICEIS 2003, 2003
Towards a Secure Mobile Agent Based M-Commerce System.
Proceedings of the ICEIS 2003, 2003
2002
A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
1999
1998
1996
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996
Proceedings of the COMPSAC '96, 1996
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996
1995
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995
1994
Proceedings of the Eighteenth Annual International Computer Software and Applications Conference, 1994