Ning Zhang

Orcid: 0000-0001-9519-9128

Affiliations:
  • The University of Manchester, UK


According to our database1, Ning Zhang authored at least 112 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Survey on Routing Solutions for Low-Power and Lossy Networks: Toward a Reliable Path-Finding Approach.
Network, January, 2024

A Problem Analysis of Smart Home Automation: Toward Secure and Usable Communication-Based Authorization.
IEEE Access, 2024

Efficient Privacy-Friendly and Flexible Wearable Data Processing With User-Centric Access Control.
IEEE Access, 2024

A Swarm Intelligence-Based Path Selection for Low-Power and Lossy Networks.
IEEE Access, 2024

2023
An Effective, Efficient and Scalable Link Discovery (EESLD) Framework for Hybrid Multi-Controller SDN Networks.
IEEE Access, 2023

Secure, ID Privacy and Inference Threat Prevention Mechanisms for Distributed Systems.
IEEE Access, 2023

2022
IoT-BDA Botnet Analysis Dataset.
Dataset, May, 2022

Privacy-Friendly Flexible IoT Health Data Processing with User-Centric Access Control.
CoRR, 2022

A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications.
CoRR, 2022

LINK-GUARD: An Effective and Scalable Security Framework for Link Discovery in SDN Networks.
IEEE Access, 2022

Trajectory-Based Authenticated Key Establishment for Dynamic Internet of Things.
IEEE Access, 2022

A Multifactor Multilevel and Interaction Based (M2I) Authentication Framework for Internet of Things (IoT) Applications.
IEEE Access, 2022

2021
A Survey on Smart Home Authentication: Toward Secure, Multi-Level and Interaction-Based Identification.
IEEE Access, 2021

2020
Strengthen user authentication on mobile devices by using user's touch dynamics pattern.
J. Ambient Intell. Humaniz. Comput., 2020

Communication Pattern Based Data Authentication (CPDA) Designed for Big Data Processing in a Multiple Public Cloud Environment.
IEEE Access, 2020

A GPS-Less Localization and Mobility Modelling (LMM) System for Wildlife Tracking.
IEEE Access, 2020

A Secure and Privacy-Preserving Data Collection (SPDC) Framework for IoT Applications.
Proceedings of the Critical Information Infrastructures Security, 2020

2019
Sensing Your Touch: Strengthen User Authentication via Touch Dynamic Biometrics.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

Competition: Adaptive Software Defined Scheduling of Low Power Wireless Networks.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

Competition: Alternating Multicast with Aggregated Data Collection in Wireless Sensor Networks.
Proceedings of the 2019 International Conference on Embedded Wireless Systems and Networks, 2019

2017
Identifying Energy Holes in Randomly Deployed Hierarchical Wireless Sensor Networks.
IEEE Access, 2017

Mobile Cloud Computing: Security Analysis.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

2016
TDAS: a touch dynamics based multi-factor authentication solution for mobile devices.
Int. J. Pervasive Comput. Commun., 2016

A survey on touch dynamics authentication in mobile devices.
Comput. Secur., 2016

Impact of hash value truncation on ID anonymity in Wireless Sensor Networks.
Ad Hoc Networks, 2016

Towards a Virtual Domain Based Authentication on MapReduce.
IEEE Access, 2016

An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNs.
IEEE Access, 2016

A Comparative Study of Data Aggregation Approaches for Wireless Sensor Networks.
Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2016

2015
Fair signature exchange via delegation on ubiquitous networks.
J. Comput. Syst. Sci., 2015

TADL-V2: An Improved Trust-Aware Dynamic Location-based Adaptation Protocol For Discovering Multiple Paths in MANETs.
EAI Endorsed Trans. Ambient Syst., 2015

DEP2SA: A Decentralized Efficient Privacy-Preserving and Selective Aggregation Scheme in Advanced Metering Infrastructure.
IEEE Access, 2015

Recognizing Your Touch: Towards Strengthening Mobile Device Authentication via Touch Dynamics Integration.
Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia, 2015

MapReduce: A critical analysis of existing authentication methods.
Proceedings of the 10th International Conference for Internet Technology and Secured Transactions, 2015

TADL: A Trust-Aware Dynamic Location-Based Protocol Suite For Discovering Multiple Paths in MANETs.
Proceedings of the 2015 International Conference on Distributed Computing and Networking, 2015

MUSP: Multi-service, User Self-controllable and Privacy-preserving system for smart metering.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Access Control Models for Pervasive Environments: A Survey.
Proceedings of the 1st International Conference on Advanced Intelligent System and Informatics, 2015

2014
Roaming electric vehicle charging and billing: An anonymous multi-user protocol.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

MapReduce: MR Model Abstraction for Future Security Study.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

A copula-based risk evaluation method (C-REM) in a corporate mobile banking context.
Proceedings of the Symposium on Applied Computing, 2014

DESA: A decentralized, efficient and selective aggregation scheme in AMI.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2014

Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol.
Proceedings of the Information and Communication Technology, 2014

An Enhanced Linkable Anonymous Access Protocol of the Distributed Electronic Patient Records.
Proceedings of the Ninth International Conference on Availability, 2014

2013
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks.
J. Parallel Distributed Comput., 2013

Smart electric vehicle charging: Security analysis.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

Security issues relating to inadequate authentication in MapReduce applications.
Proceedings of the International Conference on High Performance Computing & Simulation, 2013

A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

2012
Efficient autonomous signature exchange on ubiquitous networks.
J. Netw. Comput. Appl., 2012

A License Revocation Protocol Supporting Digital License Reselling in a Consumer-to-Consumer Model.
Int. J. Online Mark., 2012

A Risk-Aware Workload scheduler to support secure and efficient collaborative data transfer in mobile communities.
Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services, 2012

A 2-dimensional approach to QoS provisioning in adversarial mobile ad hoc network environments.
Proceedings of the 15th ACM International Conference on Modeling, 2012

A study on reservation-based adaptation for QoS in adversarial MANET environments.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

2011
Achieving autonomous fair exchange in ubiquitous network settings.
J. Netw. Comput. Appl., 2011

Fair exchange of valuable information: A generalised framework.
J. Comput. Syst. Sci., 2011

An Enhanced Approach to Supporting Controlled Access to EPRs with Three Levels of Identity Privacy Preservations.
Proceedings of the Information Quality in e-Health, 2011

Fair and Abuse-Free Contract Signing Protocol Supporting Fair License Reselling.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

A countermeasure to black hole attacks in mobile ad hoc networks.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2011

Towards an Integration of Security and Quality of Service in IP-Based Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2011

Support Access to Distributed EPRs with Three Levels of Identity Privacy Preservation.
Proceedings of the Sixth International Conference on Availability, 2011

2010
A context-constrained authorisation (CoCoA) framework for pervasive grid computing.
Wirel. Networks, 2010

Towards the realisation of context-risk-aware access control in pervasive computing.
Telecommun. Syst., 2010

An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation.
Proceedings of the Fourth International Conference on Emerging Security Information Systems and Technologies, 2010

A Novel Scheme for Supporting Location Authentication of Mobile Nodes.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2010

Quantifying authentication Levels of Assurance in grid environments.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
A Generic Authentication LoA Derivation Model.
Proceedings of the Emerging Challenges for Security, 2009

A Flexible Routing Decision Framework to Support Diversified Application-Level Data Types in MANETs.
Proceedings of the NTMS 2009, 2009

2008
A Context-Risk-Aware Access Control model for Ubiquitous environments.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2008

A New Secure Binding Management Protocol for Mobile IPv6 Networks.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Achieving fine-grained access control in virtual organizations.
Concurr. Comput. Pract. Exp., 2007

Towards Context Constrained Authorisation for Pervasive Grid Computing.
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

A Purpose-Based Access Control Model.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Levels of Authentication Assurance: an Investigation.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

Secure M-commerce Transactions: A Third Party Based Signature Protocol.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Practical and efficient fair document exchange over networks.
J. Netw. Comput. Appl., 2006

Reputation management and signature delegation: A distributed approach.
Electron. Commer. Res., 2006

A mobility monitoring based advance reservation protocol.
Proceedings of the Q2SWinet'06, 2006

Using Automated Banking Certificates to Detect Unauthorised Financial Transactions.
Proceedings of the Financial Cryptography and Data Security, 2006

FAME: Adding Multi-Level Authentication to Shibboleth.
Proceedings of the Second International Conference on e-Science and Grid Technologies (e-Science 2006), 2006

2005
RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption.
J. Univers. Comput. Sci., 2005

Revocation of privacy-enhanced public-key certificates.
J. Syst. Softw., 2005

RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery.
J. Comput. Secur., 2005

Plugging a Scalable Authentication Framework into Shibboleth.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

Certified E-Mail Delivery with DSA Receipts.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Schem.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A Linkable Identity Privacy Algorithm for HealthGrid.
Proceedings of the From Grid to Healthgrid, 2005

DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

A Distributed Reputation Management Scheme for Mobile Agent-Based E-Commerce Applications .
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2004
A unified approach to a fair document exchange system.
J. Syst. Softw., 2004

Autonomous mobile agent based fair exchange.
Comput. Networks, 2004

Security enhanced accountable anonymous PKI certificates for mobile e-commerce.
Comput. Networks, 2004

Fair certified e-mail delivery.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

A new signature scheme: joint-signature.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

A secure method for signature delegation to mobile agents.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

A Security Protocol for Certified E-Goods Delivery.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Achieving Distributed Trusted Services.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A secure and fair DSA-based signature exchange protocol.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Revocation invocation for accountable anonymous PKI certificate trees.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

A secure proxy signature protocol for agent-based M-commerce applications.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

Towards an Authentication Middleware to Support Ubiquitous Web Access.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
An efficient protocol for anonymous and fair document exchange.
Comput. Networks, 2003

An Asymmetric Authentication Protocol for M-Commerce Applications.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Non-Repudiation and Fairness in Electronic Data Exchange.
Proceedings of the ICEIS 2003, 2003

Towards a Secure Mobile Agent Based M-Commerce System.
Proceedings of the ICEIS 2003, 2003

2002
A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

1999
A Flexible Approach to Secure and Fair Document Exchange.
Comput. J., 1999

1998
An effective model for composition of secure systems.
J. Syst. Softw., 1998

1996
Achieving Non-Repudiation of Receipt.
Comput. J., 1996

A general approach to secure components composition.
Proceedings of the 1st High-Assurance Systems Engineering Workshop (HASE '96), 1996

Applying Composable Security Properties to Assessment of Information Systems.
Proceedings of the COMPSAC '96, 1996

Security Issues in an EDI Environment.
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

1995
A General Approach to Evaluation of Secure Systems.
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995

1994
On analysis of secure information systems: a case study.
Proceedings of the Eighteenth Annual International Computer Software and Applications Conference, 1994


  Loading...