A Survey on Touch Dynamics Authentication in Mobile Devices. Computers and Security PS Teh, N Zhang, ABJ Teoh, K Chen Computer & Security 59 (C), 210-235, 0 | 192* | |
Smart Electric Vehicle Charging: Security Analysis M Mustafa A., N Zhang, G Kalogridis, Zhong, Fan the Fourth Conference on Innovative Smart Grid Technologies (ISGT 2013), 2013 | 92 | 2013 |
Achieving non-repudiation of receipt N Zhang, Q Shi The Computer Journal 39 (10), 844-853, 1996 | 73 | 1996 |
DEP2SA: A Decentralized Efficient Privacy-Preserving and Selective Aggregation Scheme in Advanced Metering Infrastructure M Mustafa, N Zhang, G Kalogridis, Zhong, Fan IEEE Access 3, 2828-2846, 2015 | 55 | 2015 |
Roaming Electric Vehicle Charging and Billing: an Anonymous Multi-User Protocol M Mustafa A, N Zhang, G Kalogridis, Z Fan 2014 IEEE International Conference on Smart Grid Communications (IEEE …, 2014 | 55 | 2014 |
Fair certified e-mail delivery A Nenadić, N Zhang, S Barton Proceedings of the 2004 ACM symposium on Applied computing, 391-396, 2004 | 52 | 2004 |
A countermeasure to black hole attacks in mobile ad hoc networks K Osathanunkul, N Zhang 2011 International Conference on Networking, Sensing and Control, 508-513, 2011 | 42 | 2011 |
A security protocol for certified e-goods delivery A Nenadic, N Zhang, S Barton International Conference on Information Technology: Coding and Computing …, 2004 | 35 | 2004 |
An efficient protocol for anonymous and fair document exchange N Zhang, Q Shi, M Merabti Computer Networks 41 (1), 19-28, 2003 | 27 | 2003 |
RSA-based certified delivery of e-goods using verifiable and recoverable signature encryption A Nenadić, N Zhang, B Cheetham, C Goble Journal of Universal Computer Science 11 (1), 175-192, 2005 | 26 | 2005 |
A linkable identity privacy algorithm for healthgrid N Zhang, A Rector, I Buchan, Q Shi, D Kalra, J Rogers, C Goble, S Walker, ... Studies in health technology and informatics 112, 234-246, 2005 | 25 | 2005 |
An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNs2016 A Al-Riyami, N Zhang, J Keane IEEE Access 4, 4183-4206, 2016 | 24 | 2016 |
Recognizing Your Touch: Towards Strengthening Mobile Device Authentication via Touch Dynamics Integration PS Teh, N Zhang, T Andrew Beng Jin, K Chen the 13th International Conference on Advances in Mobile Computing …, 2015 | 24 | 2015 |
Practical and efficient fair document exchange over networks N Zhang, Q Shi, M Merabti, R Askwith Journal of network and computer applications 29 (1), 46-61, 2006 | 21 | 2006 |
Fides–a middleware e-commerce security solution A Nenadić, N Zhang, S Barton 3rd European Conference on Information Warfare and Security, 295, 2004 | 20 | 2004 |
MUSP: Multi-service, User Self-controllable and Privacy-preserving system for smart metering ZF Mustafa A. Mustafa, Ning Zhang, Georgios Kalogridis ICC 2015, 2015 | 17* | 2015 |
Towards an authentication middleware to support ubiquitous Web access N Zhang, J Chin, A Rector, C Goble, Y Li Proceedings of the 28th Annual International Computer Software and …, 2004 | 17 | 2004 |
A general approach to secure components composition Q Shi, N Zhang Proceedings. IEEE High-Assurance Systems Engineering Workshop (Cat. No …, 1996 | 17 | 1996 |
Towards a Virtual Domain based Authentication on MapReduce I Lahmer, N Zhang IEEE Access 4, 1658-1675, 2016 | 11 | 2016 |
Impact of Hash Value Truncation on ID Anonymity in Wireless Sensor Networks A Al-Riyami, N Zhang, J Keane Ad Hoc Networks 45, 80-103, 2016 | 10 | 2016 |