


Остановите войну!
for scientists:
Sherali Zeadally
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j334]Ouadoudi Zytoune, Hacène Fouchal, Sherali Zeadally:
A realistic relay selection scheme for cooperative MIMO networks. Ad Hoc Networks 124: 102706 (2022) - [j333]Mario Collotta, Ilsun You, Sherali Zeadally, Fei Song:
Introduction to the special section on Smart Green Applications: QoS and Security-aware solutions in collaborative wireless networks (VSI-cwn). Comput. Electr. Eng. 97: 107656 (2022) - [j332]Badis Hammi
, Sherali Zeadally, Rida Khatoun, Jamel Nebhen
:
Survey on smart homes: Vulnerabilities, risks, and countermeasures. Comput. Secur. 117: 102677 (2022) - [j331]Alfredo J. Perez
, Sherali Zeadally:
Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions. Comput. Sci. Rev. 43: 100450 (2022) - [j330]Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar, Huaqun Wang, Kim-Kwang Raymond Choo:
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. ACM Comput. Surv. 54(8): 160:1-160:36 (2022) - [j329]Faisal Karim Shaikh
, Mohsin Ali Memon, Naeem Ahmed Mahoto, Sherali Zeadally
, Jamel Nebhen
:
Artificial Intelligence Best Practices in Smart Agriculture. IEEE Micro 42(1): 17-24 (2022) - [j328]Biwen Chen, Libing Wu
, Sherali Zeadally
, Debiao He
:
Dual-Server Public-Key Authenticated Encryption with Keyword Search. IEEE Trans. Cloud Comput. 10(1): 322-333 (2022) - [j327]Abir Mchergui
, Tarek Moulahi, Sherali Zeadally:
Survey on Artificial Intelligence (AI) techniques for Vehicular Ad-hoc Networks (VANETs). Veh. Commun. 34: 100403 (2022) - [j326]Jean Moraes
, Helder M. N. S. Oliveira, Eduardo Cerqueira
, Cristiano Both
, Sherali Zeadally, Denis Rosário
:
Evaluation of an Adaptive Resource Allocation for LoRaWAN. J. Signal Process. Syst. 94(1): 65-79 (2022) - [i12]Sabah Suhail, Sherali Zeadally, Raja Jurdak, Rasheed Hussain, Raimundas Matulevicius, Davor Svetinovic:
Security Attacks and Solutions for Digital Twins. CoRR abs/2202.12501 (2022) - [i11]Varun Kohli, Sombuddha Chakravarty, Vinay Chamola, Kuldip Singh Sangwan, Sherali Zeadally:
An Analysis of Energy Consumption and Carbon Footprints of Cryptocurrencies and Possible Solutions. CoRR abs/2203.03717 (2022) - 2021
- [j325]Bushra Feroz
, Amjad Mehmood
, Hafsa Maryam
, Sherali Zeadally
, Carsten Maple
, Munam Ali Shah
:
Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles. IEEE Access 9: 7402-7420 (2021) - [j324]Teodora Sanislav
, George Dan Mois
, Sherali Zeadally
, Silviu C. Folea
:
Energy Harvesting Techniques for Internet of Things (IoT). IEEE Access 9: 39530-39549 (2021) - [j323]Chun-Wei Tsai
, Mu-Yen Chen, Francesco Piccialli, Tie Qiu, Jason J. Jung, Patrick C. K. Hung, Sherali Zeadally:
IEEE Access Special Section Editorial: Data Mining for Internet of Things. IEEE Access 9: 90418-90427 (2021) - [j322]Felipe Sampaio Dantas da Silva
, Emidio P. Neto
, Helder M. N. S. Oliveira, Denis do Rosário
, Eduardo Cerqueira
, Cristiano Both
, Sherali Zeadally
, Augusto José Venâncio Neto
:
A Survey on Long-Range Wide-Area Network Technology Optimizations. IEEE Access 9: 106079-106106 (2021) - [j321]Eduardo Lima
, Jean Moraes, Helder M. N. S. Oliveira, Eduardo Cerqueira, Sherali Zeadally, Denis do Rosário:
Adaptive priority-aware LoRaWAN resource allocation for Internet of Things applications. Ad Hoc Networks 122: 102598 (2021) - [j320]Mohammad Aazam
, Sherali Zeadally, Eduardo Feo Flushing
:
Task offloading in edge computing for machine learning-based smart healthcare. Comput. Networks 191: 108019 (2021) - [j319]Yves-Christian Adja Elloh, Badis Hammi, Ahmed Serhrouchni, Sherali Zeadally:
A blockchain-based certificate revocation management and status verification system. Comput. Secur. 104: 102209 (2021) - [j318]Malcolm Shore, Sherali Zeadally, Astha Keshariya:
Zero Trust: The What, How, Why, and When. Computer 54(11): 26-35 (2021) - [j317]Maxim Chernyshev, Zubair Ahmed Baig, Sherali Zeadally:
Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface. Computer 54(11): 47-57 (2021) - [j316]Qinwen Hu, Muhammad Rizwan Asghar
, Sherali Zeadally:
Blockchain-based public ecosystem for auditing security of software applications. Computing 103(11): 2643-2665 (2021) - [j315]Rasheed Hussain, Fatima Hussain, Sherali Zeadally, JooYoung Lee:
On the Adequacy of 5G Security for Vehicular Ad Hoc Networks. IEEE Commun. Stand. Mag. 5(1): 32-39 (2021) - [j314]Juan Antonio Guerrero Ibáñez, Juan Contreras-Castillo
, Sherali Zeadally:
Deep learning support for intelligent transportation systems. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - [j313]Vikas Hassija, Sherali Zeadally, Ishan Jain, Aman Tahiliani, Vinay Chamola
, Shashank Gupta:
Framework for determining the suitability of blockchain: Criteria and issues to consider. Trans. Emerg. Telecommun. Technol. 32(10) (2021) - [j312]Matthew Carter, Michail Tsikerdekis
, Sherali Zeadally
:
Approaches for Fake Content Detection: Strengths and Weaknesses to Adversarial Attacks. IEEE Internet Comput. 25(2): 73-83 (2021) - [j311]Sherali Zeadally, Oladayo Bello:
Harnessing the power of Internet of Things based connectivity to improve healthcare. Internet Things 14: 100074 (2021) - [j310]Sherali Zeadally, Ashok Kumar Das, Nicolas Sklavos:
Cryptographic technologies and protocol standards for Internet of Things. Internet Things 14: 100075 (2021) - [j309]Farhan Siddiqui, Jake Beley, Sherali Zeadally, Grant Braught:
Secure and lightweight communication in heterogeneous IoT environments. Internet Things 14: 100093 (2021) - [j308]Joel J. P. C. Rodrigues, Korhan Cengiz, Muhammad Awais Javed, Sudeep Tanwar, Zhaolong Ning, Sherali Zeadally:
GUEST EDITORIAL: Internet of Medical Things in the Context of COVID-19. IEEE Internet Things Mag. 4(2): 2-3 (2021) - [j307]Rajesh Gupta, Pronaya Bhattacharya, Sudeep Tanwar, Neeraj Kumar, Sherali Zeadally:
GaRuDa: A Blockchain-Based Delivery Scheme Using Drones for Healthcare 5.0 Applications. IEEE Internet Things Mag. 4(4): 60-66 (2021) - [j306]Jacques Bou Abdo, Sherali Zeadally:
Neural network-based blockchain decision scheme. Inf. Secur. J. A Glob. Perspect. 30(3): 173-187 (2021) - [j305]Nimish Mishra
, SK Hafizul Islam
, Sherali Zeadally:
A comprehensive review on collision-resistant hash functions on lattices. J. Inf. Secur. Appl. 58: 102782 (2021) - [j304]Leila Ismail
, Sherali Zeadally
:
Healthcare Insurance Frauds: Taxonomy and Blockchain-Based Detection Framework (Block-HI). IT Prof. 23(4): 36-43 (2021) - [j303]Adnan Akhunzada
, Sherali Zeadally
, Saif ul Islam
:
Power and Performance Efficient SDN-Enabled Fog Architecture. IT Prof. 23(6): 24-30 (2021) - [j302]Shumaila Javaid
, Zhenqiang Wu, Zara Hamid, Sherali Zeadally, Hamza Fahim
:
Temperature-aware routing protocol for Intrabody Nanonetworks. J. Netw. Comput. Appl. 183-184: 103057 (2021) - [j301]Insaf Ullah, Sherali Zeadally, Noor Ul Amin, Muhammad Asghar Khan
, Hizbullah Khattak:
Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN). Microprocess. Microsystems 81: 103477 (2021) - [j300]Hesham El-Sayed, Sherali Zeadally, Manzoor Ahmed Khan, Henry Alexander Ignatious:
Edge-centric trust management in vehicular networks. Microprocess. Microsystems 84: 104271 (2021) - [j299]Muhammad Awais Javed, Sherali Zeadally:
AI-Empowered Content Caching in Vehicular Edge Computing: Opportunities and Challenges. IEEE Netw. 35(3): 109-115 (2021) - [j298]Alfredo J. Perez
, Sherali Zeadally
:
Recent Advances in Wearable Sensing Technologies. Sensors 21(20): 6828 (2021) - [j297]Rajesh Gupta
, Mohil Maheshkumar Patel
, Sudeep Tanwar
, Neeraj Kumar
, Sherali Zeadally
:
Blockchain-Based Data Dissemination Scheme for 5G-Enabled Softwarized UAV Networks. IEEE Trans. Green Commun. Netw. 5(4): 1712-1721 (2021) - [j296]Shidrokh Goudarzi
, Mohammad Hossein Anisi
, Seyed Ahmad Soleymani
, Masri Ayob
, Sherali Zeadally
:
An IoT-Based Prediction Technique for Efficient Energy Consumption in Buildings. IEEE Trans. Green Commun. Netw. 5(4): 2076-2088 (2021) - [j295]Waleed Ejaz
, Muhammad Naeem
, Sherali Zeadally
:
On-Demand Sensing and Wireless Power Transfer for Self-Sustainable Industrial Internet of Things Networks. IEEE Trans. Ind. Informatics 17(10): 7075-7084 (2021) - [j294]Rasheed Hussain
, JooYoung Lee, Sherali Zeadally
:
Trust in VANET: A Survey of Current Solutions and Future Research Opportunities. IEEE Trans. Intell. Transp. Syst. 22(5): 2553-2571 (2021) - [j293]Fushan Wei
, Sherali Zeadally
, Pandi Vijayakumar
, Neeraj Kumar
, Debiao He
:
An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 22(7): 3939-3951 (2021) - [j292]Furqan Jameel
, Muhammad Awais Javed
, Sherali Zeadally
, Riku Jäntti
:
Efficient Mining Cluster Selection for Blockchain-Based Cellular V2X Communications. IEEE Trans. Intell. Transp. Syst. 22(7): 4064-4072 (2021) - [j291]Kuljeet Kaur
, Georges Kaddoum
, Sherali Zeadally
:
Blockchain-Based Cyber-Physical Security for Electrical Vehicle Aided Smart Grid Ecosystem. IEEE Trans. Intell. Transp. Syst. 22(8): 5178-5189 (2021) - [j290]Chao Lin, Debiao He, Sherali Zeadally, Xinyi Huang, Zhe Liu:
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities. ACM Trans. Internet Techn. 21(2): 40:1-40:21 (2021) - [j289]Jing Wang, Libing Wu, Sherali Zeadally, Muhammad Khurram Khan, Debiao He:
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid. ACM Trans. Sens. Networks 17(3): 25:1-25:25 (2021) - [i10]Adnan Akhunzada, Sherali Zeadally, Saif ul Islam:
Power and Performance Efficient SDN-Enabled Fog Architecture. CoRR abs/2105.14607 (2021) - 2020
- [j288]Sherali Zeadally
, Erwin Adi
, Zubair A. Baig
, Imran A. Khan
:
Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity. IEEE Access 8: 23817-23837 (2020) - [j287]Badis Hammi, Sherali Zeadally, Houda Labiod, Rida Khatoun, Youcef Begriche, Lyes Khoukhi:
A secure multipath reactive protocol for routing in IoT and HANETs. Ad Hoc Networks 103: 102118 (2020) - [j286]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally:
A survey on congestion detection and control in connected vehicles. Ad Hoc Networks 108: 102277 (2020) - [j285]Mohammad Aazam
, Sherali Zeadally, Khaled A. Harras:
Health Fog for Smart Healthcare. IEEE Consumer Electron. Mag. 9(2): 96-102 (2020) - [j284]Chao Lin, Debiao He, Sherali Zeadally, Neeraj Kumar, Kim-Kwang Raymond Choo
:
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system. Sci. China Inf. Sci. 63(3) (2020) - [j283]Alireza Shamsoshoara, Ashwija Korenda, Fatemeh Afghah, Sherali Zeadally:
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things. Comput. Networks 183: 107593 (2020) - [j282]Arzoo Miglani, Neeraj Kumar, Vinay Chamola, Sherali Zeadally:
Blockchain for Internet of Energy management: Review, solutions, and challenges. Comput. Commun. 151: 395-418 (2020) - [j281]Tejasvi Alladi
, Vinay Chamola, Sherali Zeadally:
Industrial Control Systems: Cyberattack trends and countermeasures. Comput. Commun. 155: 1-8 (2020) - [j280]Sherali Zeadally, Muhammad Awais Javed, Elyes Ben Hamida:
Vehicular Communications for ITS: Standardization and Challenges. IEEE Commun. Stand. Mag. 4(1): 11-17 (2020) - [j279]Gerasimos Razis
, Ioannis Anagnostopoulos, Sherali Zeadally:
Modeling Influence with Semantics in Social Networks: A Survey. ACM Comput. Surv. 53(1): 7:1-7:38 (2020) - [j278]Max Ismailov, Michail Tsikerdekis
, Sherali Zeadally
:
Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation. Future Internet 12(9): 148 (2020) - [j277]Sherali Zeadally
, Michail Tsikerdekis:
Securing Internet of Things (IoT) with machine learning. Int. J. Commun. Syst. 33(1) (2020) - [j276]Sudeep Tanwar
, Shriya Kaneriya, Neeraj Kumar
, Sherali Zeadally
:
ElectroBlocks: A blockchain-based energy trading scheme for smart grid systems. Int. J. Commun. Syst. 33(15) (2020) - [j275]Kayhan Zrar Ghafoor
, Linghe Kong, Sherali Zeadally
, Ali Safaa Sadiq, Gregory Epiphaniou
, Mohammad Hammoudeh
, Ali Kashif Bashir
, Shahid Mumtaz
:
Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives. IEEE Internet Things J. 7(9): 8525-8546 (2020) - [j274]SK Hafizul Islam, Sherali Zeadally:
Provably secure identity-based two-party authenticated key agreement protocol based on CBi-ISIS and Bi-ISIS problems on lattices. J. Inf. Secur. Appl. 54: 102540 (2020) - [j273]Michail Tsikerdekis, Sherali Zeadally:
Detecting Online Content Deception. IT Prof. 22(2): 35-44 (2020) - [j272]Hai Lin, Sherali Zeadally, Zhihong Chen, Houda Labiod, Lusheng Wang:
A survey on computation offloading modeling for edge computing. J. Netw. Comput. Appl. 169: 102781 (2020) - [j271]Wenyu Zhang
, Zhenjiang Zhang
, Sherali Zeadally
, Han-Chieh Chao
, Victor C. M. Leung
:
Energy-efficient Workload Allocation and Computation Resource Configuration in Distributed Cloud/Edge Computing Systems With Stochastic Workloads. IEEE J. Sel. Areas Commun. 38(6): 1118-1132 (2020) - [j270]Erwin Adi
, Adnan Anwar, Zubair A. Baig
, Sherali Zeadally:
Machine learning and data analytics for the IoT. Neural Comput. Appl. 32(20): 16205-16233 (2020) - [j269]Adnan Akhunzada, Saif ul Islam, Sherali Zeadally:
Securing Cyberspace of Future Smart Cities with 5G Technologies. IEEE Netw. 34(4): 336-342 (2020) - [j268]Umair Sarfraz
, Sherali Zeadally
, Masoom Alam:
Outsourcing IOTA proof-of-work to volunteer public devices. Secur. Priv. 3(2) (2020) - [j267]Badis Hammi
, Achraf Fayad, Rida Khatoun, Sherali Zeadally
, Youcef Begriche:
A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT). IEEE Syst. J. 14(3): 3440-3450 (2020) - [j266]Sherali Zeadally
, Juan Antonio Guerrero Ibáñez, Juan Contreras-Castillo:
A tutorial survey on vehicle-to-vehicle communications. Telecommun. Syst. 73(3): 469-489 (2020) - [j265]Sehrish Shafeeq
, Sherali Zeadally
, Masoom Alam
, Abid Khan
:
Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach. IEEE Trans. Engineering Management 67(4): 1244-1255 (2020) - [j264]Qi Feng, Debiao He
, Sherali Zeadally
, Kaitai Liang
:
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks. IEEE Trans. Ind. Informatics 16(6): 4146-4155 (2020) - [j263]Honggang Wang
, Shui Yu
, Sherali Zeadally
, Danda B. Rawat
, Yue Gao
:
Introduction to the Special Section on Network Science for Internet of Things (IoT). IEEE Trans. Netw. Sci. Eng. 7(1): 237-238 (2020) - [j262]Hesham El-Sayed, Sherali Zeadally, Deepak Puthal:
Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks. Veh. Commun. 24: 100227 (2020) - [j261]D. Manivannan
, Shafika Showkat Moni, Sherali Zeadally:
Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs). Veh. Commun. 25: 100247 (2020) - [p1]Jawwad A. Shamsi, Muhammad Hanif, Sherali Zeadally:
Fog Computing: Data Analytics for Time-Sensitive Applications. Convergence of Artificial Intelligence and the Internet of Things 2020: 1-13 - [i9]Furqan Jameel, Muhammad Awais Javed, Sherali Zeadally, Riku Jäntti:
Efficient Mining Cluster Selection for Blockchain-based Cellular V2X Communications. CoRR abs/2007.01052 (2020) - [i8]Erwin Adi, Adnan Anwar, Zubair A. Baig, Sherali Zeadally:
Machine learning and data analytics for the IoT. CoRR abs/2007.04093 (2020) - [i7]Jacques Bou Abdo, Sherali Zeadally:
Multi-Utility Market: Framework for a Blockchain Exchange Platform for Sustainable Development. CoRR abs/2007.07096 (2020) - [i6]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally:
Survey on Congestion Detection and Control in Connected Vehicles. CoRR abs/2007.14896 (2020)
2010 – 2019
- 2019
- [j260]Zhiwei Yan
, Hongtao Li, Sherali Zeadally, Yu Zeng, Guanggang Geng
:
Is DNS Ready for Ubiquitous Internet of Things? IEEE Access 7: 28835-28846 (2019) - [j259]Hesham El-Sayed
, Moumena Chaqfeh, Sherali Zeadally, Deepak Puthal:
A Traffic-Aware Approach for Enabling Unmanned Aerial Vehicles (UAVs) in Smart City Scenarios. IEEE Access 7: 86297-86305 (2019) - [j258]Leila Ismail
, Huned Materwala
, Sherali Zeadally:
Lightweight Blockchain for Healthcare. IEEE Access 7: 149935-149951 (2019) - [j257]Sherali Zeadally
, Teodora Sanislav
, George Dan Mois
:
Self-Adaptation Techniques in Cyber-Physical Systems (CPSs). IEEE Access 7: 171126-171139 (2019) - [j256]Shidrokh Goudarzi
, Nazri Kama, Mohammad Hossein Anisi
, Sherali Zeadally, Shahid Mumtaz
:
Data collection using unmanned aerial vehicles for Internet of Things platforms. Comput. Electr. Eng. 75: 1-15 (2019) - [j255]Mohammad Wazid, Sherali Zeadally, Ashok Kumar Das
:
Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions. IEEE Consumer Electron. Mag. 8(2): 56-60 (2019) - [j254]Alfredo J. Perez
, Sherali Zeadally:
A Communication Architecture for Crowd Management in Emergency and Disruptive Scenarios. IEEE Commun. Mag. 57(4): 54-60 (2019) - [j253]Umair Sarfraz
, Masoom Alam, Sherali Zeadally, Abid Khan
:
Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions. Comput. Networks 148: 361-372 (2019) - [j252]Muhammad Rizwan Asghar, Qinwen Hu, Sherali Zeadally:
Cybersecurity in industrial control systems: Issues, technologies, and challenges. Comput. Networks 165 (2019) - [j251]Rasheed Hussain
, Sherali Zeadally
:
Autonomous Cars: Research Results, Issues, and Future Challenges. IEEE Commun. Surv. Tutorials 21(2): 1275-1313 (2019) - [j250]Teodora Sanislav
, Sherali Zeadally, George Dan Mois, Hacène Fouchal
:
Reliability, failure detection and prevention in cyber-physical systems (CPSs) with agents. Concurr. Comput. Pract. Exp. 31(24) (2019) - [j249]Badis Hammi
, Sherali Zeadally, Rida Khatoun:
An empirical investigation of botnet as a service for cyberattacks. Trans. Emerg. Telecommun. Technol. 30(3) (2019) - [j248]Oladayo Bello, Sherali Zeadally:
Toward efficient smartification of the Internet of Things (IoT) services. Future Gener. Comput. Syst. 92: 663-673 (2019) - [j247]Rasheed Hussain, Fatima Hussain, Sherali Zeadally:
Integration of VANET and 5G Security: A review of design and implementation issues. Future Gener. Comput. Syst. 101: 843-864 (2019) - [j246]Sherali Zeadally, Farhan Siddiqui, Zubair A. Baig
:
25 Years of Bluetooth Technology. Future Internet 11(9): 194 (2019) - [j245]Wenyu Zhang
, Zhenjiang Zhang
, Sherali Zeadally
, Han-Chieh Chao:
Efficient Task Scheduling With Stochastic Delay Cost in Mobile Edge Computing. IEEE Commun. Lett. 23(1): 4-7 (2019) - [j244]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally, Ajinkya Pawar, David Hicks:
GSTR: Secure multi-hop message dissemination in connected vehicles using social trust model. Internet Things 7 (2019) - [j243]Rajat Chaudhary
, Gagangeet Singh Aujla
, Neeraj Kumar
, Sherali Zeadally
:
Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions. IEEE Internet Things J. 6(3): 4897-4909 (2019) - [j242]Sherali Zeadally
, Jacques Bou Abdo:
Blockchain: Trends and future opportunities. Internet Technol. Lett. 2(6) (2019) - [j241]Fidel Paniagua Diez
, Diego Suarez Touceda, José María Sierra Camara, Sherali Zeadally:
Lightweight Access Control System for Wearable Devices. IT Prof. 21(1): 50-58 (2019) - [j240]Juan Contreras-Castillo, Sherali Zeadally, Juan Antonio Guerrero Ibáñez:
Autonomous Cars: Challenges and Opportunities. IT Prof. 21(6): 6-13 (2019) - [j239]Cong Peng, Jianhua Chen, Sherali Zeadally, Debiao He:
Isogeny-Based Cryptography: A Promising Post-Quantum Technique. IT Prof. 21(6): 27-32 (2019) - [j238]Maxim Chernyshev
, Sherali Zeadally, Zubair Ahmed Baig
:
Healthcare Data Breaches: Implications for Digital Forensic Readiness. J. Medical Syst. 43(1): 7:1-7:12 (2019) - [j237]Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, Neeraj Kumar
:
A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126: 45-58 (2019) - [j236]Libing Wu
, Jing Wang, Sherali Zeadally, Debiao He
:
Anonymous and Efficient Message Authentication Scheme for Smart Grid. Secur. Commun. Networks 2019: 4836016:1-4836016:12 (2019) - [j235]Qi Feng, Debiao He
, Sherali Zeadally
, Neeraj Kumar
, Kaitai Liang
:
Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices. IEEE Syst. J. 13(3): 2775-2785 (2019) - [j234]Mohammad Aazam
, Khaled A. Harras
, Sherali Zeadally
:
Fog Computing for 5G Tactile Industrial Internet of Things: QoE-Aware Resource Allocation Model. IEEE Trans. Ind. Informatics 15(5): 3085-3092 (2019) - [j233]Wenyu Zhang
, Zhenjiang Zhang
, Sherali Zeadally
, Han-Chieh Chao, Victor C. M. Leung
:
MASM: A Multiple-Algorithm Service Model for Energy-Delay Optimization in Edge Artificial Intelligence. IEEE Trans. Ind. Informatics 15(7): 4216-4224 (2019) - [j232]Shama Naz Islam
, Zubair A. Baig
, Sherali Zeadally
:
Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures. IEEE Trans. Ind. Informatics 15(12): 6522-6530 (2019) - [j231]Muhammad Awais Javed
, Sherali Zeadally, Elyes Ben Hamida:
Data analytics for Cooperative Intelligent Transport Systems. Veh. Commun. 15: 63-72 (2019) - [c53]Jiaxi Hu, Zhiqiang Xu, Debiao He, Sherali Zeadally, Kim-Kwang Raymond Choo
:
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps. CSS (1) 2019: 186-202 - [c52]