Остановите войну!
for scientists:
default search action
Sherali Zeadally
- > Home > Persons > Sherali Zeadally
Publications
- 2022
- [j344]Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar, Huaqun Wang, Kim-Kwang Raymond Choo:
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. ACM Comput. Surv. 54(8): 160:1-160:36 (2022) - [j337]Biwen Chen, Libing Wu, Sherali Zeadally, Debiao He:
Dual-Server Public-Key Authenticated Encryption with Keyword Search. IEEE Trans. Cloud Comput. 10(1): 322-333 (2022) - 2021
- [j292]Fushan Wei, Sherali Zeadally, Pandi Vijayakumar, Neeraj Kumar, Debiao He:
An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 22(7): 3939-3951 (2021) - [j289]Chao Lin, Debiao He, Sherali Zeadally, Xinyi Huang, Zhe Liu:
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities. ACM Trans. Internet Techn. 21(2): 40:1-40:21 (2021) - [j288]Jing Wang, Libing Wu, Sherali Zeadally, Muhammad Khurram Khan, Debiao He:
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid. ACM Trans. Sens. Networks 17(3): 25:1-25:25 (2021) - 2020
- [j283]Chao Lin, Debiao He, Sherali Zeadally, Neeraj Kumar, Kim-Kwang Raymond Choo:
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system. Sci. China Inf. Sci. 63(3) (2020) - [j264]Qi Feng, Debiao He, Sherali Zeadally, Kaitai Liang:
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks. IEEE Trans. Ind. Informatics 16(6): 4146-4155 (2020) - 2019
- [j239]Cong Peng, Jianhua Chen, Sherali Zeadally, Debiao He:
Isogeny-Based Cryptography: A Promising Post-Quantum Technique. IT Prof. 21(6): 27-32 (2019) - [j237]Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, Neeraj Kumar:
A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126: 45-58 (2019) - [j236]Libing Wu, Jing Wang, Sherali Zeadally, Debiao He:
Anonymous and Efficient Message Authentication Scheme for Smart Grid. Secur. Commun. Networks 2019: 4836016:1-4836016:12 (2019) - [j235]Qi Feng, Debiao He, Sherali Zeadally, Neeraj Kumar, Kaitai Liang:
Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices. IEEE Syst. J. 13(3): 2775-2785 (2019) - [c53]Jiaxi Hu, Zhiqiang Xu, Debiao He, Sherali Zeadally, Kim-Kwang Raymond Choo:
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps. CSS (1) 2019: 186-202 - 2018
- [j230]Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally:
Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks. IEEE Access 6: 40128-40136 (2018) - [j218]Qi Feng, Debiao He, Sherali Zeadally, Huaqun Wang:
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Gener. Comput. Syst. 84: 239-251 (2018) - [j216]Ashok Kumar Das, Sherali Zeadally, Debiao He:
Taxonomy and analysis of security protocols for Internet of Things. Future Gener. Comput. Syst. 89: 110-125 (2018) - [j210]Yudi Zhang, Debiao He, Sherali Zeadally, Ding Wang, Kim-Kwang Raymond Choo:
Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks. IEEE Internet Things J. 5(6): 5271-5280 (2018) - [j198]Debiao He, Sherali Zeadally, Libing Wu:
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks. IEEE Syst. J. 12(1): 64-73 (2018) - [j197]Libing Wu, Biwen Chen, Sherali Zeadally, Debiao He:
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Comput. 22(23): 7685-7696 (2018) - [j196]Vanga Odelu, Sherali Zeadally, Ashok Kumar Das, Mohammad Wazid, Debiao He:
A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks. Telecommun. Syst. 69(4): 431-445 (2018) - [j195]Debiao He, Neeraj Kumar, Sherali Zeadally, Huaqun Wang:
Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems. IEEE Trans. Ind. Informatics 14(3): 1232-1241 (2018) - [j194]Debiao He, Mimi Ma, Sherali Zeadally, Neeraj Kumar, Kaitai Liang:
Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(8): 3618-3627 (2018) - [j192]Libing Wu, Jing Wang, Sherali Zeadally, Debiao He:
Privacy-preserving auditing scheme for shared data in public clouds. J. Supercomput. 74(11): 6156-6183 (2018) - 2017
- [j190]Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li:
Efficient Revocable ID-Based Signature With Cloud Revocation Server. IEEE Access 5: 2945-2954 (2017) - [j189]Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He:
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks. IEEE Access 5: 3376-3392 (2017) - [j181]Debiao He, Sherali Zeadally, Libing Wu, Huaqun Wang:
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography. Comput. Networks 128: 154-163 (2017) - [j168]Debiao He, Sherali Zeadally, Neeraj Kumar, Jong-Hyouk Lee:
Anonymous Authentication for Wireless Body Area Networks With Provable Security. IEEE Syst. J. 11(4): 2590-2601 (2017) - [j166]Debiao He, Neeraj Kumar, Sherali Zeadally, Alexey V. Vinel, Laurence T. Yang:
Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries. IEEE Trans. Smart Grid 8(5): 2411-2419 (2017) - [j164]Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu:
Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography. Wirel. Commun. Mob. Comput. 2017 (2017) - 2016
- [j143]Debiao He, Sherali Zeadally, Neeraj Kumar, Wei Wu:
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. IEEE Trans. Inf. Forensics Secur. 11(9): 2052-2064 (2016) - 2015
- [j138]Debiao He, Sherali Zeadally:
Authentication protocol for an ambient assisted living system. IEEE Commun. Mag. 53(1): 71-77 (2015) - [j131]Debiao He, Sherali Zeadally:
An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography. IEEE Internet Things J. 2(1): 72-83 (2015) - [j122]Debiao He, Sherali Zeadally, Baowen Xu, Xinyi Huang:
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 10(12): 2681-2691 (2015)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-10 21:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint