


default search action
Chang N. Zhang
Person information
- affiliation: University of Regina, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j31]Qian Yu, Chang N. Zhang:
A new and fast cryptographic hash function based on RC4. Cryptologia 40(6): 522-540 (2016) - 2013
- [j30]Qian Yu, Wei Dong, Chang N. Zhang:
RCBM: a rough content-based image quality assessment metric. Int. J. Granul. Comput. Rough Sets Intell. Syst. 3(1): 44-58 (2013) - [j29]Chang N. Zhang, Qian Yu, Xiao Wei Liu:
A Hybrid Fault Tolerant Approach for AES. Int. J. Netw. Secur. 15(4): 291-297 (2013) - 2012
- [c38]Qian Yu, Chang N. Zhang, Mohammad Ali Orumiehchiha, Hua Li:
RC4-BHF: An Improved RC4-Based Hash Function. CIT 2012: 322-326 - [c37]Qian Yu, Chang N. Zhang:
A Secure Multicast Scheme for Wireless Sensor Networks. MUSIC 2012: 158-163 - 2011
- [c36]Qian Yu, Chang N. Zhang:
RC4 state and its applications. PST 2011: 264-269 - 2010
- [j28]Wei Dong, Yang Wang, Hua Li, Chang Nian Zhang:
A Novel Watermarking Scheme for Blind Objective Image Quality Assessment. Int. J. Comput. Their Appl. 17(1): 25-33 (2010) - [j27]Chang N. Zhang, Hua Li:
Design of Optimal Fault-Tolerant VLSI Systolic Array. Int. J. Comput. Their Appl. 17(2): 102-107 (2010) - [j26]Qian Yu, Chang N. Zhang:
A lightweight secure data transmission protocol for resource constrained devices. Secur. Commun. Networks 3(5): 362-370 (2010) - [c35]Chang N. Zhang, Qian Yu, Xiao Wei Liu:
An Algorithm Based Concurrent Error Detection Scheme for AES. CANS 2010: 31-42
2000 – 2009
- 2008
- [j25]Leon Pan, Chang N. Zhang:
A criterion-based multilayer access control approach for multimedia applications and the implementation considerations. ACM Trans. Multim. Comput. Commun. Appl. 5(2): 17:1-17:29 (2008) - [c34]Chang N. Zhang, Qian Yu, Xun Huang, Cungang Yang:
A Security Protocol for Wireless Sensor Networks. WSAN 2008: 113-124 - [p1]Chang Nian Zhang, Xiao Wei Liu:
Algorithm-Based Fault-Tolerant Cryptography. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2006
- [j24]Chang Nian Zhang, Leon Pan:
A Unified Data Secure and Fault Tolerant Approach for Distributed Computing. Int. J. Comput. Their Appl. 13(2): 81-93 (2006) - [j23]Hua Li, Chang Nian Zhang, Jianzhou Li:
A CAM Based Associative Processor Array for Parallel Implementation of AES. Int. J. Comput. Their Appl. 13(4): 176-181 (2006) - [j22]Leon Pan, Chang N. Zhang, Cungang Yang:
A Role-Based Multilevel Security Access Control Model. J. Comput. Inf. Syst. 46(3): 1-10 (2006) - [j21]Cungang Yang, Chang N. Zhang:
An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model. J. Inf. Sci. Eng. 22(1): 49-61 (2006) - [c33]Leon Pan, Chang N. Zhang:
A Criterion-Based Role-Based Multilayer Access Control Model for Multimedia Applications. ISM 2006: 145-152 - [c32]Chunren Lai, Chang N. Zhang:
Quantitative Analysis and Enforcement of the Principle of Least Privilege in Role-Based. SECRYPT 2006: 69-74 - [c31]Chang N. Zhang, Qian Yu:
An RC4 based Light Weight Secure Protocol for Sensor Networks. Wireless and Optical Communications 2006 - 2005
- [j20]Hua Li, Chang Nian Zhang, Qiang Wang:
Low Complexity Programmable Cellular Automata Based Reconfigurable General Modular Mutiplier in GF(2m). Int. J. Comput. Their Appl. 12(1): 2-8 (2005) - [c30]Cungang Yang, Chang N. Zhang:
A Privacy Enhanced Role-Based Access Control Model for Enterprises. ICCNMC 2005: 1012-1021 - [c29]Chang N. Zhang, Chunren Lai, Honglan Zhong:
An Efficient Authentication Scheme with Fault Tolerance for Database Systems. ICITA (2) 2005: 448-453 - 2004
- [j19]Hua Li, Chang N. Zhang:
A Cellular Automata Based Reconfigurable Architecture for Hybrid Cryptosystems. Comput. J. 47(3): 320-328 (2004) - [j18]Chang N. Zhang, Chunren Lai:
A systematic approach for encryption and authentication with fault tolerance. Comput. Networks 45(2): 143-154 (2004) - [j17]Cungang Yang, Celia Li, Chang N. Zhang:
An XML-Based Administration Method on Role-Based Access Control in Distributed Systems. Int. J. Comput. Their Appl. 11(2): 98-105 (2004) - [c28]Leon Pan, Chang N. Zhang:
Using Metadata to Protect the Audiovisual Contents in MPEG-7 Applications. Security and Management 2004: 287-293 - [c27]Chang N. Zhang, Zheng Li:
An Efficient Group Key Management Scheme for Secure Multicast with Multimedia Applications. EuroPKI 2004: 364-378 - [c26]Chang N. Zhang, Honglan Zhong:
An Integrated Approach for Database Security and Fault Tolerance. ITCC (1) 2004: 762-766 - 2003
- [j16]Chang N. Zhang, Hua Li:
Design of Reconfigurable VLSI Architecture for Hybrid Arithmetic in $GF(2^m)$. Comput. J. 46(4): 449-460 (2003) - [j15]Cungang Yang, Chang N. Zhang:
An XML-based administration method on role-based access control in the enterprise environment. Inf. Manag. Comput. Secur. 11(5): 249-257 (2003) - [j14]Chang N. Zhang, Cungang Yang:
Integrating Object Oriented Role-Based Access Control Model with Mandatory Access Control Principles. J. Comput. Inf. Syst. 43(3): 40-49 (2003) - [c25]Cungang Yang, Chang N. Zhang:
Secure Web-based Applications with XML and RBAC. IAW 2003: 276-281 - [c24]Cungang Yang, Chang N. Zhang:
An XML Based Administration Method on Role-Based Access Control in the Enterprise Environment. ICEIS (3) 2003: 646-649 - [c23]Cungang Yang, Chang N. Zhang:
An Approach to Secure Information Flow on Object Oriented Role-based Access Control Model. SAC 2003: 302-306 - [c22]Cungang Yang, Chang N. Zhang:
Designing Secure E-Commerce with Role-based Access Control. CEC 2003: 313-319 - 2002
- [j13]Hua Li, Chang Nian Zhang:
Low-Complexity Versatile Finite Field Multiplier in Normal Basis. EURASIP J. Adv. Signal Process. 2002(9): 954-960 (2002) - [j12]Chang Nian Zhang, Hua Li, Nuannuan Zhang, Jiesheng Xie:
A DSP Based POD Implementation for High Speed Multimedia Communications. EURASIP J. Adv. Signal Process. 2002(9): 975-980 (2002) - [j11]Chang N. Zhang, Cungang Yang:
Information flow analysis on role-based access control model. Inf. Manag. Comput. Secur. 10(5): 225-236 (2002) - [j10]Chang N. Zhang, Xiangyou Wu:
A hybrid approach of wavelet packet and directional decomposition for image compression. Int. J. Imaging Syst. Technol. 12(2): 51-55 (2002) - [j9]Hua Li, Chang N. Zhang:
Efficient Cellular Automata Based Versatile Multiplier for GF(2m). J. Inf. Sci. Eng. 18(4): 479-488 (2002) - [j8]Chang N. Zhang, Cungang Yang:
Designing a Complete Model of Role-based Access Control System for Distributed Networks. J. Inf. Sci. Eng. 18(6): 871-889 (2002) - 2001
- [c21]Chang Nian Zhang, W. K. Chou, Nuannuan Zhang, Jiesheng Xie:
A DSP Based POD Implementation for High Speed Multimedia Communication. PDCS 2001: 206-210 - [c20]Chang N. Zhang, Cungang Yang:
An Object-Oriented RBAC Model for Distributed System. WICSA 2001: 24- - 2000
- [j7]Chang Nian Zhang, Ming Zhao, Meng Wang:
Logic operations based on single neuron rational model. IEEE Trans. Neural Networks Learn. Syst. 11(3): 739-747 (2000) - [c19]J. H. Weston, Chang N. Zhang, Hua Li:
Some Space Considerations of VLSI Systolic Array Mappings. ICPADS 2000: 375-381 - [c18]Chang N. Zhang, Hua Li:
DCSA Systolic Array for Modular Multiplication and RSA Encryption. PDPTA 2000
1990 – 1999
- 1999
- [j6]Chang N. Zhang:
Single Neuron Rational Model of Arithmetic and Logic Operations. Connect. Sci. 11(1): 73-90 (1999) - [c17]Chang N. Zhang, Ming Y. Deng, Ralph Mason:
A VLSI Programmable Cellular Automata Array for Multiplication in GF (2n). PDPTA 1999: 1118-1123 - 1998
- [c16]Chang N. Zhang, Ming Y. Deng, Ralph Mason:
Two Improved Algorithms and Hardware Implementations for Key Distribution Using Extended Programmable Cellular Automata. ACSAC 1998: 244-249 - 1996
- [c15]Chang Nian Zhang, Meng Wang:
A Generalized Square-Multiply Algorithm and VLSI Array Implementation for RSA. PDPTA 1996: 1-12 - [c14]J. H. Weston, Chang N. Zhang, Y.-F. Yan:
Some Space Considerations of Space-Time Mappings into Systolic Array. PDPTA 1996: 65-68 - 1995
- [j5]Chang Nian Zhang, Meng Wang, Chien-Chao Tseng
:
Residue Systolic Implementations for Neural Networks. Neural Comput. Appl. 3(3): 149-156 (1995) - 1994
- [j4]Chang N. Zhang, J. H. Weston, Y.-F. Yan:
Determining objective functions in systolic array designs. IEEE Trans. Very Large Scale Integr. Syst. 2(3): 357-360 (1994) - [c13]Chang Nian Zhang, T. M. Bachtiar, W. K. Chou:
An Optimal Fault-Tolerant Design Approach for Array Processors. ICPADS 1994: 348-353 - 1993
- [j3]Chang Nian Zhang, Behrooz A. Shirazi, David Y. Y. Yun:
An Efficient Algorithm and Parallel Implementations for Binary and Residue Number Systems. J. Symb. Comput. 15(4): 451-462 (1993) - [j2]Chang Nian Zhang, Hon Fung Li, R. Jayakumar:
A Systematic Approach for Designing Concurrent Error-Detecting Systolic Arrays Using Redundancy. Parallel Comput. 19(7): 745-764 (1993) - [c12]Heng-Da Cheng, C. Xia, Chang N. Zhang:
Parallel approach to character recognition and its VLSI implementation. VCIP 1993 - 1992
- [j1]Alen George Law, Chang Nian Zhang, Ali Rezazadeh, Lucas Jódar
:
Evaluation of a rational function. Numer. Algorithms 3(1): 265-271 (1992) - [c11]Chang N. Zhang, Alen George Law, Ali Rezazadeh:
A systematic approach for designing systolic arrays. Great Lakes Symposium on VLSI 1992: 130-137 - 1991
- [c10]Chang N. Zhang, Alen George Law, Ali Rezazadeh:
Designing VLSI systolic arrays with complex processing elements. Great Lakes Symposium on VLSI 1991: 207-212 - [c9]Chang Nian Zhang, Heng-Da Cheng:
Mapping Multiple Problem Instances into a Single Systolic Array with Application to Concurrent Error Detection. ICPP (1) 1991: 668-669
1980 – 1989
- 1987
- [c8]David Y. Y. Yun, Y. Yun, Chang Nian Zhang:
Formal verification of systolic networks using theorem proving techniques (abstract only). ACM Conference on Computer Science 1987: 362 - [c7]Chang Nian Zhang, Behrooz A. Shirazi, David Y. Y. Yun:
Computing multiple modulo summation (abstract only): a new algorithm, its VLSI designs and applications. ACM Conference on Computer Science 1987: 438 - [c6]Chang N. Zhang, Behrooz A. Shirazi, D. Y. Y. Yun:
Residue number conversion. FJCC 1987: 390-396 - [c5]Chang Nian Zhang, Behrooz A. Shirazi, David Y. Y. Yun:
Parallel Designs for Chinese Remainder Conversion. ICPP 1987: 557-559 - 1986
- [c4]David Y. Y. Yun, Chang Nian Zhang:
A fast carry-free algorithm and hardware design for extended integer GCD computation. SYMSAC 1986: 82-84 - 1985
- [c3]David Y. Y. Yun, Chang N. Zhang:
Binary paradigm and systolic array implementation for residue arithmetic. IEEE Symposium on Computer Arithmetic 1985: 189-193 - [c2]David Y. Y. Yun, Chang Nian Zhang:
A Programmable Systolic Array for Arithmetic Operations in Galois Fields. ICPP 1985: 742-747 - 1984
- [c1]Chang Nian Zhang, David Y. Y. Yun:
Multi-Dimensional Systolic Networks for Discrete Fourier Transform. ISCA 1984: 215-222
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint