Name
Affiliation
Papers
NING ZHANG
University of Manchester, UK
47
Collaborators
Citations 
PageRank 
70
384
29.26
Referers 
Referees 
References 
861
1035
543
Search Limit
1001000
Title
Citations
PageRank
Year
Strengthen user authentication on mobile devices by using user's touch dynamics pattern.00.342020
Sensing Your Touch: Strengthen User Authentication Via Touch Dynamic Biometrics00.342019
Identifying Energy Holes in Randomly Deployed Hierarchical Wireless Sensor Networks.10.352017
Mobile Cloud Computing: Security Analysis00.342017
Towards a Virtual Domain Based Authentication on MapReduce.00.342016
Challenges and opportunities in next-generation cyberspace security00.342016
An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNs.30.372016
Tdas: A Touch Dynamics Based Multi-Factor Authentication Solution For Mobile Devices60.642016
A survey on touch dynamics authentication in mobile devices.210.802016
Impact of hash value truncation on ID anonymity in Wireless Sensor Networks.20.372016
TADL-V2: An Improved Trust-Aware Dynamic Location-based Adaptation Protocol For Discovering Multiple Paths in MANETs10.362015
Access Control Models for Pervasive Environments: A Survey.10.382015
Recognizing Your Touch: Towards Strengthening Mobile Device Authentication via Touch Dynamics Integration.50.452015
TADL: A Trust-Aware Dynamic Location-Based Protocol Suite For Discovering Multiple Paths in MANETs10.382015
MapReduce: MR Model Abstraction for Future Security Study30.572014
A copula-based risk evaluation method (C-REM) in a corporate mobile banking context00.342014
A 2-dimensional approach to QoS provisioning in adversarial mobile ad hoc network environments20.402012
Quantifying authentication Levels of Assurance in grid environments.10.412010
Achieving Fine-Grained Access Control In Virtual Organizations50.782007
Levels of Authentication Assurance: an Investigation50.842007
A Purpose-Based Access Control Model201.452007
Compact access control labeling for efficient secure XML query evaluation130.622007
Secure M-commerce Transactions: A Third Party Based Signature Protocol30.442007
A mobility monitoring based advance reservation protocol20.472006
FIX: feature-based indexing technique for XML documents210.892006
XSEED: Accurate and Fast Cardinality Estimation for XPath Queries371.132006
FAME: Adding Multi-Level Authentication to Shibboleth40.552006
InterJoin: Exploiting Indexes and Materialized Views in XPath Evaluation70.442006
Statistical learning techniques for costing XML queries421.722005
BlossomTree: Evaluating XPaths in FLWOR Expressions20.392005
RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption50.582005
Certified E-Mail Delivery with DSA Receipts20.352005
DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery20.372005
A Security Protocol for Certified E-Goods Delivery90.592004
A succinct physical storage scheme for efficient evaluation of path queries in XML591.982004
A secure method for signature delegation to mobile agents60.552004
Autonomous mobile agent based fair exchange20.372004
Fair certified e-mail delivery180.762004
A new signature scheme: joint-signature90.862004
Prediction of PTZ-induced seizures using wavelet-based residual entropy of cortical and subcortical field potentials40.532003
Towards a Secure Mobile Agent Based M-Commerce System00.342003
Non-Repudiation and Fairness in Electronic Data Exchange10.372003
An Asymmetric Authentication Protocol for M-Commerce Applications40.602003
Finding shortest paths in large network systems191.282001
A Flexible Approach to Secure and Fair Document Exchange20.381999
Study On Adaptive Job Assignment For Multiprocessor Implementation Of Mpeg2 Video Encoding50.701997
Achieving Non-Repudiation Of Receipt291.421996