Recent Publications
-
Rima Addas and Ning Zhang, “Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol”, 2014 Asian Conference on Availability, Reliability and Security (AsiaARES 2014),
14–17 April 2014, Yogyakarta, Indonesia.
-
Rima Addas and Ning Zhang, “Security Analysis and Performance Evaluation of the Linkable Acess Protoocl of the EPRs”,
the Sixth International Conference on eHealth, Telemedicine, and Social Medicine (eTELEMED 2014),
March 23 - 27, 2014, Barcelona, Spain.
-
Mustafa A. Mustafa, Ning Zhang, Georgios Kalogridis and Zhong Fan, "DESA: A Decentralized, Efficient and Selective Aggregation Scheme in AMI",
2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014), Feb 19-22, 2014, Washington DC, USA
-
Abdullah A.I. Alnajem and Ning Zhang, “A Copula-based Risk Evaluation (C-REM) Method in a Corporate Mobile Banking Context”,
the 29th ACM Symposium on Applied Computing (ACM SAC 2014), March 24-28, 2014, Gyeongju, Korea.
-
Tarek Gaber and Ning Zhang, “Analyzing the Digital License Reselling Problem and Its Impact on E-Commerce”,
E-Marketing in Developed and Developing Countries: Emerging Practices,
Chapter 8, pp116-136, 2013, IGI Global, DOI: 10.4018/978-1-4666-3954-6.
-
Tarek Gaber, Ning Zhang and Aboul Ella Hassanien, “A Novel Approach to Allow Multiple Resales of DRM-Protected Contents”,
2013 the 8th International Conference on Computer Engineering & Systems (ICCES’2013), 26-28, Nov, 2013, Egypt.
-
James Dyer and Ning Zhang, “Security Issues Relating to Inadequate Authentication in MapReduce Applications”,
2013 Workshop on Security and High Performance Computing System (SHPCS 2013),
part of HPCS 2013 conference July 1 - July 5, 2013, in Helsinki, Finland.
-
Mustafa A. Mustafa, Ning Zhang, Georgios Kalogridis and Zhong Fan,
“Smart Electric Vehicle Charging: Security Analysis”, the Fourth Conference on Innovative Smart Grid Technologies (ISGT 2013),
sponsored by the IEEE Power & Energy Society (PES), February 24-27, 2013, Washington, District of Columbia, USA.
-
Peter J. J. McNerney and Ning Zhang,
"A 2-Dimensional Approach to QoS Provisioning in Adversarial Mobile Ad Hoc
Network Environments",
the 15th ACM International Conference on Modeling, Analysis and
Simulation of Wireless and Mobile Systems (MSWiM12), ACM 2012, pp. 143-150.
-
Tarek Gaber and Ning Zhang,
“A License Revocation Protocol Supporting Digital License Reselling in a
Consumer-to-Consumer Model”,
International Journal of Online Marketing (IJOM), Volume 2, Issue 1, 2012, pp.38-49.
-
Peter J. J. McNerney and Ning Zhang,
'A Study on Reservation-Based Adaptation for QoS in Adversarial MANET Environments',
the 8th International Wireless Communications and Mobile Computing Conference
(IWCMC 2012), August 27-31, 2012, Limassol, Cyprus.
-
Sadia Saleem and Ning Zhang,
“A Risk-Aware Workload Scheduler to Support Secure and Efficient Collaborative Data Transfer in Mobile Communities”,
the 9th International Conference on Wireless On-demand Network Systems and Services (WONS2012),
January 9-11, 2012, Courmayeur, Italy, pp 31-34, Print ISBN: 978-1-4577-1721-5.
-
Peter J. J. McNerney and Ning Zhang,
“Towards an Integration of Security and Quality of Service in IP-Based Mobile
Ad Hoc Networks”,
2011 IEEE Global Communications Conference (GLOBECOM 2011),
December 5-9, 2011, Houston, Texas, USA.
-
Rima Addas and Ning Zhang,
“Support Access to Distributed EPRs with Three Levels of Identity Privacy Preservation”,
the Sixth International Conference on Availability, Reliability and Security (ARES 2011),
August 22-26, 2011, Vienna, Austria.
- Kitisak Osathanunkul and Ning Zhang,
"A Countermeasure to Black Hole Attacks in Mobile Ad hoc Networks",
the Proceedings of the 2011 IEEE International Conference on Networking, Sensing and Control,
April 11-13, 2011, Delft, the Netherlands.
-
Q. Shi, N. Zhang, M. Merabti and R. Askwith,
"Achieving Autonomous Fair Exchange in Ubiquitous Network Settings",
Journal of Network and Computer Applications, Volume 34, Issue 2, March, 2011, pp. 653-667,
Academic Press Ltd. London, UK, DOI information: 10.1016/j.jnca.2010.11.002.
-
Q. Shi, N. Zhang and M. Merabti,
“Fair Exchange of Valuable Information: A Generalised Framework",
the Journal of Computer and System Sciences, Volume 77, Issue 2, March, 2011, Pages 348-371;
Academic Press, Inc. Orlando, FL, USA, DOI information: 10.1016/j.jcss.2010.04.013.
-
Tarek Gaber and Ning Zhang,
“Fair and Abuse-free Contract Signing Protocol Supporting Fair License Reselling”,
the 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS2011),
February 7 – 10, 2011, Paris, France.
-
Ali Ahmed and Ning Zhang,
“An Access Control Architecture for Context-Risk-Aware Access Control:
Architectural Design and Performance Evaluation”,
the Fourth International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2010,
July 18 - 25, 2010 - Venice/Mestre, Italy.
-
Meng-chang Liu and Ning Zhang,
“A Solution to Privacy-preserving Two-party Sign Test on Vertically Partitioned Data
(P22NSTv) Using Data Disguising Techniques”,
the International Conference on Computational and Statistical Science (ICCSS 2010),
June 11-13, 2010, Manila, Philippines.
-
Osama Elshakankiry, Andy Carpenter and Ning Zhang,
“A Novel Scheme for Supporting Location Authentication of Mobile Nodes”,
the Second International ICST Conference on Security and Privacy
in Mobile Information and Communication Systems (MobiSec2010),
May 27-28, 2010, Catania / Sicily, Italy.
-
Tarek Gaber and Ning Zhang,
“A Novel Method for Supporting Fairness in Digital License Reselling”,
the Fifth International Conference on Internet Monitoring and Protection (ICIMP 2010),
May 9 - 15, 2010, Barcelona, Spain.
-
Ali Ahmed and Ning Zhang,
“Towards the Realisation of Context-Risk-Aware Access Control in Pervasive Computing”,
the Telecommunication Systems journal, Springer US, DOI: 10.1007/s11235-009-9240-3,
SpringerLink Date: December 30, 2009.
-
Kitisak Osathanunkul, and Ning Zhang,
“A Flexible Routing Architecture to Support Diversified Application-level Data Types
in MANETs”, the Third International Conference on New Technologies, Mobility and Security,
technically Sponsored by IEEE COMSOC and IFIP TC6 WG,
December 20 - 23, 2009, Cairo – Egypt.
-
J. Chin, N. Zhang, A. Nenadic and O. Bamasak,
“A Context-constrained Authorisation (CoCoA) Framework for Pervasive Grid Computing”,
the Wireless Networks (WINET) Journal (the Journal of Mobile Communication,
Computation and Information); ISSN: 1022-0038 (print version);
ISSN: 1572-8196 (electronic version); Journal no. 11276;
Springer US.
-
Li Yao and Ning Zhang, “A Generic Authentication LoA Derivation Model”,
the 24th IFIP International Information Security Conference (SEC2009), May 18-20, 2009,
Coral Beach Hotel, Pafos, Cyprus,
IFIP series published by Springer, pp. 98-108.
-
Ali Ahmed and Ning Zhang,
“A Context-Risk-Aware Access Control Model for Ubiquitous Environments”,
the Proceedings of the 3rd International Workshop on Secure Information Systems (SIS'08),
IEEE CS Press, 20-22 October 2008, Wisla, Poland.
-
Osama Elshakankiry, Andy Carpenter and Ning Zhang,
“A New Secure Binding Management Protocol for Mobile IPv6 Networks”,
the Proceedings of the Fourth International Symposium on Information Assurance and Security,
IEEE CS Press, 8-10 Sept 2008, Naples, Italy.
-
Zhixin Yu and Ning Zhang,
“Achieving Privacy-preserving Data Computation on Data Grids”,
the Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC’07),
1-4 July 2007, Aveiro, Portugal.
-
He, Lisha; Zhang, Ning; He, Lirong; Rogers, Ian;
“A Network Assisted End-to-End Security Protocol for Mobile Applications,
the Journal of Information Assurance and Security (JIAS),
published by Dynamic Publishers Inc., USA.
-
J. S. Chin, N. Zhang, A. Nenadic, J. M. Brooke,
“Towards Context Constrained Authorisation for Pervasive Grid Computing”,
the 2nd IEEE/Create-Net/ICST International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE),
January 7-12, 2007, Bangalore, India.
-
Aleksandra Nenadic, Ning Zhang, Jay Chin, Carole Goble,
“FAME: Adding Multi-Level Authentication to Shibboleth”,
2nd IEEE International Conference on e-Science and Grid Computing,
Dec 4-6, 2006, Amsterdam, Netherlands, pp.157-164.
-
Bamasak, O.; and Zhang, N.; “Reputation Management and Signature Delegation:
A Distributed Approach”, the Electronic Commerce Research Journal, Springer Netherlands, ISSN 1389-5753,
Vol. 6, No. 3-4, Oct 2006, pp 227-263.
-
I. Featherstone, N. Zhang, “A Mobility Monitoring Based Advance Reservation Protocol”,
the Proceedings of the 2nd ACM International Workshop on QoS and Security for Wireless
and Mobile Networks (ACM Q2SWinet 2006),
October 2-6, 2006, Torremolinos, Malaga, Spain, pp. 111-118.
-
Corzo, C.; F. Corzo, S.; Zhang, N.; Carpenter, A.;
“Using Automated Banking Certificates to Detect Unauthorised Financial Transactions”,
proceedings of the 10th International Conference on Financial Cryptography and Data Security (FC’06),
the proceedings is also published
in the Springer-Verlag Lecture Notes in Computer Science (LNCS) series,
February 27 to March 2, 2006, Anguilla, British West Indies, Vol. 4107, ISBN: 978-3-540-46255-2, pp. 36-51.
-
Zhang, N.; Shi, Q.; Merabti, M.; and Askwith, R.; “Practical
and Efficient Fair Document Exchange over Networks”,
the Journal of Network and Computer Applications, the Elsevier Science Publisher,
Vol. 29, No. 1, January 2006, pp.46-61, ISSN 10848045.
-
Nenadic, A.; Zhang, N.; and Shi, Q.;
"RSA-based Verifiable and Recoverable Encryption of Signatures and its Application in
Certified E-mail", Journal of Computer Security, 13(5): 757-777, IOS Press, 2005.
-
J. Chin, M. Parkins, N. Zhang, A. Nenadic, and J. M. Brooke,
“GridFAME: Flexible Authentication Middleware Extension for Grids”,
2nd Workshop on Grid Computing & Applications, Biopolis, Singapore (GCA 2005),
5th May 2005, pp. 17–26.
-
N. Zhang, L. Yao, J. Chin, Q. Shia, A. Nenadic, A. McNabb, A. Rector and C. Goble,
"Plugging a Scalable Authentication Framework into Shibboleth",
14th IEEE International Workshops on Enabling Technologies:
Infrastructures for Collaborative Enterprises (WETICE 2005),
13-15 June 2005 in Linkoping, Sweden.
-
N. Zhang, Q. Shi, A. Nenadic, M. Merabti, and R. Askwith,
"Efficient Fair Exchange Based on Misbehaviour Penalisation",
IEE Proceedings – Communications,
Vol. 152, No. 3, June 2005, pp.257-261
-
Nenadic, A., Zhang, N., Cheetham, B., Goble, C.,
"RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature
Encryption", Volume 11, Issue 1, 2005, the Journal of Universal Computer Science,
published by Springer-Verlag, http://www.jucs.org/jucs_11_1/rsa_based_certified_delivery.
- N. Zhang, I. Buchan, A. Rector, C. Goble, Q. Shi, D. Kalra, D. Ingram,
P. Singleton, “A Linkable Identity Privacy Algorithm for HealthGrid”,
the 3rd European HealthGrid Conference,
7-9, April, 2005, Oxford, UK, by IOS Press.
-
O. Bamasak and N. Zhang,
“A Distributed Reputation Management Scheme for Mobile Agent based E-Commerce Applications”,
the Proceedings of the IEEE International Conference on e-Technology,
e-Commerce and e-Service, 29 March – 1 April, 2005, Hong Kong, pp.270-275.
-
A. Nenadic, N. Zhang, Q. Shi, and C. Goble,
“DSA-based Verifiable and Recoverable Encryption of Signatures and its Application in
Certified E-Goods Delivery”,
the Proceedings of the IEEE International Conference on e-Technology,
e-Commerce and e-Service, 29 March – 1 April, 2005, Hong Kong, pp.94-99.
-
O. Bamasak, N. Zhang, and D. Edwards,
“DiSigncryption: An Integration of Agent-based Signature Delegation with
Distributed Reputation Management Scheme”,
the Proceedings of the 1st International Workshop on Security in Systems and Networks
(SNS2005) held in conjunction with IEEE IPDPS2005, April 4-8 2005, Denver, Colorado, USA, pp. 293-300.
-
A. Nenadic, N. Zhang, Q. Shi, and C. Goble, “Certified E-Mail Delivery with DSA Receipts”,
the Proceedings of the 1st International Workshop on Security in Systems and Networks
(SNS2005) held in conjunction with IEEE IPDPS2005, April 4-8 2005, Denver, Colorado, USA, pp. 288-296.
-
N. Zhang, Q. Shi, and M. Merabti, "Revocation of Privacy-enhanced Public-Key Certificates",
the Journal of Systems and Software, the Elsevier Science Publisher,
Volume 75, Issues 1-2, 15 February 2005, pp. 205-214
(the pdf copy).
-
Ning Zhang, Qi Shi, Madjid Merabti and Robert Askwith,
"Autonomous Mobile Agent Based Fair Exchange",
Computer Networks, the Elsevier Science Publisher,
Vol. 46, No. 6, December 2004, pp. 751-770.
-
N. Zhang, J. Chin, A. Rector, C. Goble, and Y. Li,
“Towards an Authentication Middleware to Support Ubiquitous Web Access”,
The Proceedings of the 28th Annual International Computer Software and Application Conference (COMPSAC 2004), Volume: 2,
IEEE Computer Society, Hong Kong, September 28 – 30, 2004, pp. 36-38.
-
D. Critchlow and N. Zhang, "Security Enhanced Anonymous PKI Certificates for M-commerce",
45 (2004), Computer Networks Journal, the Elsevier Science Publisher, pp 483-503.
- N. Zhang, Q. Shi and M. Merabti, "A Unified Approach to a Fair Document Exchange System",
Vol. 72, No. 1, June 2004, Journal of Systems and Software, the Elsevier Science Publisher,
pp 83-96.
-
O. Bamasak and N. Zhang,
"A Secure Proxy Signature Protocol for Agent-Based M-Commerce Applications",
the 9th IEEE Symposium on Computers and Communications (ISCC'2004),
Alexandria, Egypt June 29-July 1, 2004, Vol. 1, pp. 399-406.
The paper has Won the Best Paper Award.
-
D. Critchlow and N. Zhang,
"Revocation Invocation for Accountable Anonymous PKI Certificate Trees",
the 9th IEEE Symposium on Computers and Communications (ISCC'2004),
Alexandria, Egypt June 29-July 1, 2004, Vol. 1, pp. 386-392.
-
A. Nenadic, N. Zhang, and S. K. Barton,
"A Secure and Fair DSA-based Signature Exchange Protocol ",
the 9th IEEE Symposium on Computers and Communications (ISCC'2004),
Alexandria, Egypt June 29-July 1, 2004, pp. 412-417.
-
C. Corzo, N. Zhang,
"Towards a Real-time Solution to the Concealment of Unauthorised E-trading by
Authorised Users ", the 3rd European Conference on Information Warfare and Security,
June 2004, London.
-
A. Nenadic, N. Zhang, and S. K. Barton,
"FIDES - A Middleware E-Commerce Security Solution",
the 3rd European Conference on Information Warfare and Security, June 2004, London, pp. 295-304.
-
O. Bamasak, and N. Zhang, "Achieving Distributed Trusted Services",
in the proceedings of the International Conference on Information Technology:
Coding and Computing (ITCC 2004) - the Information Assurance and Security (IAS 2004)
Track, sponsored by IEEE Computer Society, April 5-7, 2004,
Las Vegas, Nevada, pp. 56-61.
- A. Nenadic, and N. Zhang, and S. Barton,
"A Security Protocol for Certified E-Goods Delivery",
in the proceedings of the International Conference on Information Technology:
Coding and Computing (ITCC 2004) - the Information Assurance and Security (IAS 2004)
Track, sponsored by IEEE Computer Society,
April 5-7, 2004, Las Vegas, Nevada, pp. 22-28.
- A. Nenadic, N. Zhang, and S. K. Barton, "Fair Certified E-mail Delivery",
in the Proceedings of the 19th ACM Symposium on Applied Computing (SAC2004) -
the Security Track, 14-17 March 2004, Nicosia, Cyprus, pp. 391-396.
- O. Bamasak, N. Zhang, and D. Edwards,
"A Secure Method for Signature Delegation to Mobile Agents",
the Proceedings of the 19th ACM Symposium on Applied Computing (SAC2004) -
the E-Commerce Track, 14-17 March 2004, Nicosia, Cyprus, pp. 813-818.
- L. He, and N. Zhang, "A New Signature Scheme: the Joint Signature",
the proceedings of the 19th ACM Symposium on Applied Computing (SAC2004) -
the E-Commerce Track, 14-17 March 2004, Nicosia, Cyprus, pp. 807-812.
- L. He & N. Zhang,
"A New End-to-End Authentication Protocol for M-Commerce Applications",
the eighth IEEE Symposium on Computers and Communications (ISCC'2003), Kemer-Antalya,
Turkey, IEEE Computer Society & IEEE Communications Society, June 30-July 3, 2003,
pp. 244-250.
- C. Corzo & N. Zhang,
"An Analysis of Integrity drifts in E-trading Systems",
the Proceeding of the 4th Annual Postgraduate Symposium on the Convergence of
Telecommunications, Networking and Broadcasting (PGNet 2003), Liverpool, 16-17 June 2003,
pp. 60-64.
- A. Nenadic & N. Zhang, "On the Design of the Fair Integrated Data Exchange System
(FIDES)", IADIS International Conference e-Society 2003, Lisbon, Portugal, 3-6 June 2003.
- O. Bamasak, and N. Zhang, "Towards a Secure Mobile Agent Based M-Commerce System",
the Proceedings of the 5th International Conference on Enterprise Information Systems
(ICEIS2003), Angers, France, 23-26 April 2003, pp. 408-412.
- A. Nenadic & Ning Zhang, "Non-repudiation and Fairness in Electornic Data Exchange",
the Proceedings of the 5th International Conference on Enterprise Information Systems
(ICEIS2003), Angers, France, 23-26 April 2003, pp. 55-62.
- I. Featherstone and N. Zhang,
"Towards a Secure Videoconferencing System for Mobile Users",
the 5th European Personal Mobile Communications Conference, 22-25 April 2003, Glasgow,
Scotland, pp. 477-481.
- Shi, Q.; Zhang, N.; Merabti, M.; "Signature-based approach to fair document exchange"
Communications, IEE Proceedings-, Volume: 150, Issue: 1, Feb 2003, pp. 21-27.
- N. Zhang & Q. Shi,
"An Efficient Protocol for Anonymous and Fair Document Exchange",
Computer Networks Journal, 41 (2003), Elsevier Science Publisher, pp19-28.
- O. Bamasak, and N Zhang, "Mobile Agent-based M-commerce: Security Analysis",
Proceeding of 3rd Annual Post-Graduate Symposium on the Convergence of Telecommunications,
Networking and Broadcasting (PGNet 2002), Liverpool, UK, 17-18 June 2002, pp. 256-262.
- D. Critchlow, & N. Zhang, "An Insight into User Privacy and Accountable Anonymity
for Mobile E-commerce Transactions",
Proceedings of the IFIP/SEC2002 - Security in the Information Society:
Visions and Perspectives, May 6-8, 2002, Cairo, Egypt,
published by IFIP Kluwer Academic Publishers, ISBN: 1-4020-7030-6, pp411-422.
- Li-Sha He, N. Zhang, & Li-Rong He,
"A New End-To-End Authentication Protocol for Mobile Users to Access Internet Services",
Proceedings of the IFIP/SEC2002 - Security in the Information Society: Visions and Perspectives, May 6-8, 2002, Cairo, Egypt, published by IFIP Kluwer Academic Publishers, ISBN: 1-4020-7030-6, pp239-250.
- L. He, N. Zhang, "An Exposition of Authentication Services in Mobile Networks",
2nd Annual Post-Graduate Symposium on the Convergence of Telecommunications,
Networking and Broadcasting, Liverpool, 18-19th June 2001, pp.125-130.
- N. Zhang, Q. Shi and M. Merabti,
"Anonymous Public-Key Certificates for Anonymous and Fair Document Exchange",
IEE Proceedings-Communications, Vol. 147, No. 6, Dec 2000, pp 345-350.
For more recent publications, please visit:
This Webpage.