Match!
Sherali Zeadally
University of Kentucky
The InternetDistributed computingComputer networkComputer securityComputer science
454Publications
50H-index
9,467Citations
What is this?
Publications 449
Newest
#1D. Manivannan (UK: University of Kentucky)H-Index: 18
#2Shafika Showkat Moni (UK: University of Kentucky)H-Index: 2
Last. Sherali Zeadally (UK: University of Kentucky)H-Index: 50
view all 3 authors...
Abstract In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks (VANETs). Today car manufacturers have already started to equip vehicles with sophisticated sensors that can provide many assistive features such as front collision avoidance, automatic lane tracking, partial autonomous driving, suggestive lane changing, and so on. Such technological advancements are enabling the adoption of VANETs not only to provide safer and more comfortable driving experience but also p...
Source
#1SK Hafizul Islam (IIIT: Indian Institutes of Information Technology)H-Index: 20
#2Sherali Zeadally (UK: University of Kentucky)H-Index: 50
Abstract The two-party authenticated key agreement (2PAKA) protocol establishes a secure channel over the Internet between two users. This secure channel helps to transfer messages between them in the presence of an adversary. The invention of Shor’s algorithms makes current 2PAKA protocols vulnerable to quantum attacks. To mitigate quantum attacks, we designed an identity-based two-party authenticated key agreement (LB-ID-2PAKA) protocol on a lattice L ( B ) of dimension n. Besides, to avoid th...
Source
#1Vikas Hassija (JIIT: Jaypee Institute of Information Technology)H-Index: 5
#2Vinay Chamola (BITS: Birla Institute of Technology and Science)H-Index: 9
Last. Sherali Zeadally (UK: University of Kentucky)H-Index: 50
view all 3 authors...
Abstract The rapid growth in information technology and related talent has let to a competition among the investors to look for the best available talent. Additionally, the diverse range of directions in technology, gives a lot of options to the applicants to choose from. In such a scenario, it is imperative to link the most appropriate investors and developers in a secure and cost optimal way. Blockchain technology helps in creating a decentralized network of users where the transactions are re...
Source
#1Sherali Zeadally (UK: University of Kentucky)H-Index: 50
#2Faisal Karim Shaikh (Mehran University of Engineering and Technology)H-Index: 12
Last. Quan Z. Sheng (Macquarie University)H-Index: 37
view all 4 authors...
Abstract An increasing number of objects (things) are being connected to the Internet as they become more advanced, compact, and affordable. These Internet-connected objects are paving the way toward the emergence of the Internet of Things (IoT). The IoT is a distributed network of low-powered, low-storage, light-weight and scalable nodes. Most low-power IoT sensors and embedded IoT devices are powered by batteries with limited lifespans, which need replacement every few years. This replacement ...
Source
#1Hesham El Sayed (College of Information Technology)
#2Sherali Zeadally (UK: University of Kentucky)H-Index: 50
Last. Deepak Puthal (UTS: University of Technology, Sydney)H-Index: 19
view all 3 authors...
Abstract In vehicular networks, vehicles communicate with each other and transfer messages to enhance the safety of both commuters and vehicles. Trust management in these networks has become a key issue because of the selfish behavior that is frequently exhibited by some vehicles. Most of the existing trust management schemes for vehicular networks schemes have adopted cryptographic techniques, which require high computation time and high network resource utilization. We propose a Hierarchical T...
Source
#1Badis HammiH-Index: 5
#2Sherali Zeadally (UK: University of Kentucky)H-Index: 50
Last. Lyes KhoukhiH-Index: 15
view all 6 authors...
Abstract In numerous Internet of Things (IoT) scenarios (such as Intelligent Transportation System (ITS) or environment sensing), the ad hoc mode is widely used. Ad-hoc networks have several benefits including infrastructureless and spontaneous deployment, and the opportunity to set up temporary and dynamic networks cost-effectively. However, some of their characteristics such as the unreliability of wireless links, dynamic topology and resource constraints in energy and processing power of obje...
Source
#1Qi Feng (WHU: Wuhan University)H-Index: 4
#2He Debiao (WHU: Wuhan University)H-Index: 41
Last. Kaitai Liang (University of Surrey)H-Index: 20
view all 4 authors...
If all vehicles are connected together through a wireless communication channel, vehicular ad-hoc networks (VANETs) can support a wide range of real-time traffic information services such as intelligent routing, weather monitoring, emergency call. However, the accuracy and credibility of the transmitted messages among the VANETs is of paramount importance as life may depend on it. We introduce a novel framework called blockchain-assisted privacy-preserving authentication system (BPAS) that provi...
4 CitationsSource
#1Gerasimos Razis (UTH: University of Thessaly)H-Index: 5
#2Ioannis Anagnostopoulos (UTH: University of Thessaly)H-Index: 14
Last. Sherali Zeadally (UK: University of Kentucky)H-Index: 50
view all 3 authors...
1 CitationsSource
#1Erwin AdiH-Index: 7
#2Adnan AnwarH-Index: 10
Last. Sherali ZeadallyH-Index: 50
view all 4 authors...
Source
#1Wenyu Zhang (Beijing Jiaotong University)H-Index: 8
#2Zhenjiang Zhang (Beijing Jiaotong University)H-Index: 12
Last. Victor C. M. Leung (SZU: Shenzhen University)H-Index: 70
view all 5 authors...
Energy efficiency is one of the most important concerns in cloud/edge computing systems. A major benefit of the Dynamic Voltage and Frequency Scaling (DVFS) technique is that a Virtual Machine (VM) can dynamically scale its computation frequency on an on-demand basis, which is helpful in reducing the energy cost of computation when dealing with stochastic workloads. In this paper, we study the joint workload allocation and computation resource configuration problem in distributed cloud/edge comp...
Source
12345678910