H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 68 Citations 18,885 377 World Ranking 933 National Ranking 560


What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Operating system

His primary areas of investigation include Computer security, Computer network, The Internet, Cloud computing and Wireless sensor network. He is interested in Authentication, which is a branch of Computer security. Sherali Zeadally has included themes like Wireless, Wireless network and Vehicular ad hoc network in his Computer network study.

His work deals with themes such as Identity management and Web service, which intersect with The Internet. His Cloud computing research is multidisciplinary, relying on both Middleware, Distributed computing and Server. His Wireless sensor network study combines topics in areas such as Cryptography, Scope, Key distribution in wireless sensor networks, Embedded system and Node.

His most cited work include:

  • Vehicular ad hoc networks (VANETS): status, results, and challenges (792 citations)
  • Energy harvesting in wireless sensor networks: A comprehensive review (514 citations)
  • An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks (315 citations)

What are the main themes of his work throughout his whole career to date?

His primary scientific interests are in Computer network, Computer security, The Internet, Wireless and Cloud computing. His Computer network study integrates concerns from other disciplines, such as Wireless network, Heterogeneous network and Distributed computing. His Computer security research includes elements of Smart grid and Internet privacy.

His Wireless research is under the purview of Telecommunications. Many of his studies on Telecommunications apply to Software deployment as well. His study of Cloud computing security is a part of Cloud computing.

He most often published in these fields:

  • Computer network (42.03%)
  • Computer security (27.12%)
  • The Internet (14.49%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (27.12%)
  • Computer network (42.03%)
  • The Internet (14.49%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Computer security, Computer network, The Internet, Authentication and Wireless. He has researched Computer security in several fields, including Scalability and Vehicular ad hoc network. His Scalability research includes themes of Wireless ad hoc network and Distributed computing.

His Computer network study deals with Cloud computing intersecting with Data analysis. His research in The Internet intersects with topics in Middleware and Automation. He combines subjects such as Password, Cryptography and Access control with his study of Authentication.

Between 2017 and 2021, his most popular works were:

  • A Survey of Device-to-Device Communications: Research Issues and Challenges (177 citations)
  • Internet of Vehicles: Architecture, Protocols, and Security (174 citations)
  • A survey on privacy protection in blockchain system (171 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Computer network
  • Operating system

Sherali Zeadally mainly focuses on Computer security, The Internet, Cloud computing, Data science and Scalability. His studies in Computer security integrate themes in fields like Ledger and Vehicular ad hoc network. His studies deal with areas such as Cryptographic protocol, Energy management, Energy harvesting, Identity management and Middleware as well as The Internet.

The Cloud computing study combines topics in areas such as Computer network, Server, Application layer and Data management. The study of Computer network is intertwined with the study of Security analysis in a number of ways. The concepts of his Scalability study are interwoven with issues in Routing, Distributed computing, Role-based access control, Network security and Efficient energy use.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Vehicular ad hoc networks (VANETS): status, results, and challenges

Sherali Zeadally;Ray Hunt;Yuh-Shyan Chen;Angela Irwin.
Telecommunication Systems (2012)

1315 Citations

Energy harvesting in wireless sensor networks: A comprehensive review

Faisal Karim Shaikh;Faisal Karim Shaikh;Sherali Zeadally.
Renewable & Sustainable Energy Reviews (2016)

723 Citations

Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey

Elias Z. Tragos;Sherali Zeadally;Alexandros G. Fragkiadakis;Vasilios A. Siris.
IEEE Communications Surveys and Tutorials (2013)

435 Citations

Intelligent Device-to-Device Communication in the Internet of Things

Oladayo Bello;Sherali Zeadally.
IEEE Systems Journal (2016)

428 Citations

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks

Debiao He;Sherali Zeadally;Baowen Xu;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2015)

413 Citations

Anonymous Authentication for Wireless Body Area Networks With Provable Security

Debiao He;Sherali Zeadally;Neeraj Kumar;Jong-Hyouk Lee.
IEEE Systems Journal (2017)

341 Citations

Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies

Juan Antonio Guerrero-Ibanez;Sherali Zeadally;Juan Contreras-Castillo.
IEEE Wireless Communications (2015)

304 Citations

Smart cities: concepts, architectures, research opportunities

Rida Khatoun;Sherali Zeadally.
Communications of The ACM (2016)

290 Citations

An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

Debiao He;Sherali Zeadally.
IEEE Internet of Things Journal (2015)

285 Citations

A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems

Abdul Hameed;Alireza Khoshkbarforoushha;Rajiv Ranjan;Prem Prakash Jayaraman.
Computing (2016)

283 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Sherali Zeadally

Neeraj Kumar

Neeraj Kumar

Thapar University

Publications: 89

Debiao He

Debiao He

Wuhan University

Publications: 63

Joel J. P. C. Rodrigues

Joel J. P. C. Rodrigues

Federal University of Piauí

Publications: 47

Quan Z. Sheng

Quan Z. Sheng

Macquarie University

Publications: 43

Mohsen Guizani

Mohsen Guizani

Qatar University

Publications: 42

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 41

Nadeem Javaid

Nadeem Javaid

COMSATS University Islamabad

Publications: 39

Muhammad Khurram Khan

Muhammad Khurram Khan

King Saud University

Publications: 35

Azzedine Boukerche

Azzedine Boukerche

University of Ottawa

Publications: 33

Saru Kumari

Saru Kumari

Chaudhary Charan Singh University

Publications: 32

Athanasios V. Vasilakos

Athanasios V. Vasilakos

Luleå University of Technology

Publications: 31

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 29

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 29

Samee U. Khan

Samee U. Khan

Mississippi State University

Publications: 25

Yan Zhang

Yan Zhang

Chinese Academy of Sciences

Publications: 24

Something went wrong. Please try again later.