dblp.uni-trier.dewww.uni-trier.de

Kan Zhang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
20EEXueqin Hao, Zhiguo Wang, Fan Yang, Ying Wang, Yanru Guo, Kan Zhang: The Effect of Traffic on Situation Awareness and Mental Workload: Simulator-Based Study. HCI (13) 2007: 288-296
19EEYan Ge, Ronggang Zhou, Xi Liu, Kan Zhang: Chinese Color Preference in Software Design. HCI (13) 2007: 62-68
18EEHuiyang Li, Xianghong Sun, Kan Zhang: Voice Alarm System in Emergency Evacuation. HCI (13) 2007: 723-730
17EERonggang Zhou, Kan Zhang: Impact of Mental Rotation Strategy on Absolute Direction Judgments: Supplementing Conventional Measures with Eye Movement Data. HCI (3) 2007: 789-798
16EEHuiyang Li, Xianghong Sun, Kan Zhang: Culture-Centered Design: Cultural Factors in Interface Usability and Usability tests. SNPD (3) 2007: 1084-1088
2006
15EEQiping Zhang, Thippaya Chintakovid, Xiaoning Sun, Yan Ge, Kan Zhang: Saving Face or Sharing Personal Information? A Cross-Cultural Study on Knowledge Sharing. JIKM 5(1): 73-79 (2006)
2004
14 Kan Zhang, Yuliang Zheng: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings Springer 2004
13EEDenis Bohm, Mik Lamming, Robert N. Mayo, Jeff Morgan, Kan Zhang: Controlling Who Tracks Me. Security Protocols Workshop 2004: 151-154
2003
12EETim Kindberg, Kan Zhang: Validating and Securing Spontaneous Associations between Wireless Devices. ISC 2003: 44-53
11EETim Kindberg, Kan Zhang: Secure Spontaneous Device Association. Ubicomp 2003: 124-131
10EEChangxu Wu, Kan Zhang, Yongge Hu: Human performance modeling in temporary segmentation Chinese character handwriting recognizers. Int. J. Hum.-Comput. Stud. 58(4): 483-508 (2003)
2002
9EEPrakash Reddy, Venky Krishnan, Kan Zhang, Devaraj Das: Authentication and Authorization of Mobile Clients in Public Data Networks. InfraSec 2002: 115-128
8EEKan Zhang, Tim Kindberg: An authorization infrastructure for nomadic computing. SACMAT 2002: 107-113
7EETim Kindberg, Kan Zhang, Narendar Shankar: Context Authentication Using Constrained Channels. WMCSA 2002: 14-21
1998
6EEKan Zhang: Efficient Protocols for Signing Routing Messages. NDSS 1998
5EEFabien A. P. Petitcolas, Kan Zhang: WebGroup: A Secure Group Access Control Tool for the World-Wide Web. WETICE 1998: 301-305
1997
4EEKan Zhang: A Theory for System Security. CSFW 1997: 148-155
3 Kan Zhang: IRI: A Quantitative Approach to Inference Analysis in Relational Databases. DBSec 1997: 279-290
2 Kan Zhang: On Rough Sets and Inference Analysis. ISW 1997: 256-265
1 Kan Zhang: Threshold Proxy Signature Schemes. ISW 1997: 282-290

Coauthor Index

1Denis Bohm [13]
2Thippaya Chintakovid [15]
3Devaraj Das [9]
4Yan Ge [15] [19]
5Yanru Guo [20]
6Xueqin Hao [20]
7Yongge Hu [10]
8Tim Kindberg [7] [8] [11] [12]
9Venky Krishnan [9]
10Mik Lamming [13]
11Huiyang Li [16] [18]
12Xi Liu [19]
13Robert N. Mayo [13]
14Jeff Morgan [13]
15Fabien A. P. Petitcolas [5]
16Prakash Reddy [9]
17Narendar Shankar [7]
18Xianghong Sun [16] [18]
19Xiaoning Sun [15]
20Ying Wang [20]
21Zhiguo Wang [20]
22Changxu Wu [10]
23Fan Yang [20]
24Qiping Zhang [15]
25Yuliang Zheng [14]
26Ronggang Zhou [17] [19]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)