His primary areas of investigation include Computer security, Computer network, The Internet, Cloud computing and Wireless sensor network. He is interested in Authentication, which is a branch of Computer security. Sherali Zeadally has included themes like Wireless, Wireless network and Vehicular ad hoc network in his Computer network study.
His work deals with themes such as Identity management and Web service, which intersect with The Internet. His Cloud computing research is multidisciplinary, relying on both Middleware, Distributed computing and Server. His Wireless sensor network study combines topics in areas such as Cryptography, Scope, Key distribution in wireless sensor networks, Embedded system and Node.
His primary scientific interests are in Computer network, Computer security, The Internet, Wireless and Cloud computing. His Computer network study integrates concerns from other disciplines, such as Wireless network, Heterogeneous network and Distributed computing. His Computer security research includes elements of Smart grid and Internet privacy.
His Wireless research is under the purview of Telecommunications. Many of his studies on Telecommunications apply to Software deployment as well. His study of Cloud computing security is a part of Cloud computing.
His scientific interests lie mostly in Computer security, Computer network, The Internet, Authentication and Wireless. He has researched Computer security in several fields, including Scalability and Vehicular ad hoc network. His Scalability research includes themes of Wireless ad hoc network and Distributed computing.
His Computer network study deals with Cloud computing intersecting with Data analysis. His research in The Internet intersects with topics in Middleware and Automation. He combines subjects such as Password, Cryptography and Access control with his study of Authentication.
Sherali Zeadally mainly focuses on Computer security, The Internet, Cloud computing, Data science and Scalability. His studies in Computer security integrate themes in fields like Ledger and Vehicular ad hoc network. His studies deal with areas such as Cryptographic protocol, Energy management, Energy harvesting, Identity management and Middleware as well as The Internet.
The Cloud computing study combines topics in areas such as Computer network, Server, Application layer and Data management. The study of Computer network is intertwined with the study of Security analysis in a number of ways. The concepts of his Scalability study are interwoven with issues in Routing, Distributed computing, Role-based access control, Network security and Efficient energy use.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Vehicular ad hoc networks (VANETS): status, results, and challenges
Sherali Zeadally;Ray Hunt;Yuh-Shyan Chen;Angela Irwin.
Telecommunication Systems (2012)
Energy harvesting in wireless sensor networks: A comprehensive review
Faisal Karim Shaikh;Faisal Karim Shaikh;Sherali Zeadally.
Renewable & Sustainable Energy Reviews (2016)
Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey
Elias Z. Tragos;Sherali Zeadally;Alexandros G. Fragkiadakis;Vasilios A. Siris.
IEEE Communications Surveys and Tutorials (2013)
Intelligent Device-to-Device Communication in the Internet of Things
Oladayo Bello;Sherali Zeadally.
IEEE Systems Journal (2016)
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
Debiao He;Sherali Zeadally;Baowen Xu;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2015)
Anonymous Authentication for Wireless Body Area Networks With Provable Security
Debiao He;Sherali Zeadally;Neeraj Kumar;Jong-Hyouk Lee.
IEEE Systems Journal (2017)
Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies
Juan Antonio Guerrero-Ibanez;Sherali Zeadally;Juan Contreras-Castillo.
IEEE Wireless Communications (2015)
Smart cities: concepts, architectures, research opportunities
Rida Khatoun;Sherali Zeadally.
Communications of The ACM (2016)
An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography
Debiao He;Sherali Zeadally.
IEEE Internet of Things Journal (2015)
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems
Abdul Hameed;Alireza Khoshkbarforoushha;Rajiv Ranjan;Prem Prakash Jayaraman.
Computing (2016)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Wuhan University
La Trobe University
Thapar University
Macquarie University
National Dong Hwa University
International Institute of Information Technology, Hyderabad
Khalifa University of Science and Technology
University of Sydney
Zayed University
Illinois Institute of Technology
Roma Tre University
University of Palermo
China University of Mining and Technology
Carnegie Institution for Science
Southwest Jiaotong University
Yale University
Emory University
Kyushu University
University of St Andrews
University of Potsdam
Kiel University
Université de Sherbrooke
United States Geological Survey
Stanford University
University of Giessen
George Washington University