2007 |
20 | EE | Xueqin Hao,
Zhiguo Wang,
Fan Yang,
Ying Wang,
Yanru Guo,
Kan Zhang:
The Effect of Traffic on Situation Awareness and Mental Workload: Simulator-Based Study.
HCI (13) 2007: 288-296 |
19 | EE | Yan Ge,
Ronggang Zhou,
Xi Liu,
Kan Zhang:
Chinese Color Preference in Software Design.
HCI (13) 2007: 62-68 |
18 | EE | Huiyang Li,
Xianghong Sun,
Kan Zhang:
Voice Alarm System in Emergency Evacuation.
HCI (13) 2007: 723-730 |
17 | EE | Ronggang Zhou,
Kan Zhang:
Impact of Mental Rotation Strategy on Absolute Direction Judgments: Supplementing Conventional Measures with Eye Movement Data.
HCI (3) 2007: 789-798 |
16 | EE | Huiyang Li,
Xianghong Sun,
Kan Zhang:
Culture-Centered Design: Cultural Factors in Interface Usability and Usability tests.
SNPD (3) 2007: 1084-1088 |
2006 |
15 | EE | Qiping Zhang,
Thippaya Chintakovid,
Xiaoning Sun,
Yan Ge,
Kan Zhang:
Saving Face or Sharing Personal Information? A Cross-Cultural Study on Knowledge Sharing.
JIKM 5(1): 73-79 (2006) |
2004 |
14 | | Kan Zhang,
Yuliang Zheng:
Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings
Springer 2004 |
13 | EE | Denis Bohm,
Mik Lamming,
Robert N. Mayo,
Jeff Morgan,
Kan Zhang:
Controlling Who Tracks Me.
Security Protocols Workshop 2004: 151-154 |
2003 |
12 | EE | Tim Kindberg,
Kan Zhang:
Validating and Securing Spontaneous Associations between Wireless Devices.
ISC 2003: 44-53 |
11 | EE | Tim Kindberg,
Kan Zhang:
Secure Spontaneous Device Association.
Ubicomp 2003: 124-131 |
10 | EE | Changxu Wu,
Kan Zhang,
Yongge Hu:
Human performance modeling in temporary segmentation Chinese character handwriting recognizers.
Int. J. Hum.-Comput. Stud. 58(4): 483-508 (2003) |
2002 |
9 | EE | Prakash Reddy,
Venky Krishnan,
Kan Zhang,
Devaraj Das:
Authentication and Authorization of Mobile Clients in Public Data Networks.
InfraSec 2002: 115-128 |
8 | EE | Kan Zhang,
Tim Kindberg:
An authorization infrastructure for nomadic computing.
SACMAT 2002: 107-113 |
7 | EE | Tim Kindberg,
Kan Zhang,
Narendar Shankar:
Context Authentication Using Constrained Channels.
WMCSA 2002: 14-21 |
1998 |
6 | EE | Kan Zhang:
Efficient Protocols for Signing Routing Messages.
NDSS 1998 |
5 | EE | Fabien A. P. Petitcolas,
Kan Zhang:
WebGroup: A Secure Group Access Control Tool for the World-Wide Web.
WETICE 1998: 301-305 |
1997 |
4 | EE | Kan Zhang:
A Theory for System Security.
CSFW 1997: 148-155 |
3 | | Kan Zhang:
IRI: A Quantitative Approach to Inference Analysis in Relational Databases.
DBSec 1997: 279-290 |
2 | | Kan Zhang:
On Rough Sets and Inference Analysis.
ISW 1997: 256-265 |
1 | | Kan Zhang:
Threshold Proxy Signature Schemes.
ISW 1997: 282-290 |