Sherali Zeadally

According to our database1, Sherali Zeadally authored at least 291 papers between 1994 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 





Data analytics for Cooperative Intelligent Transport Systems.
Vehicular Communications, 2019

Fog Computing for 5G Tactile Industrial Internet of Things: QoE-Aware Resource Allocation Model.
IEEE Trans. Industrial Informatics, 2019

A survey on privacy protection in blockchain system.
J. Network and Computer Applications, 2019

Healthcare Data Breaches: Implications for Digital Forensic Readiness.
J. Medical Systems, 2019

Lightweight Access Control System for Wearable Devices.
IT Professional, 2019

Efficient Task Scheduling With Stochastic Delay Cost in Mobile Edge Computing.
IEEE Communications Letters, 2019

Toward efficient smartification of the Internet of Things (IoT) services.
Future Generation Comp. Syst., 2019

An empirical investigation of botnet as a service for cyberattacks.
Trans. Emerging Telecommunications Technologies, 2019

Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions.
Computer Networks, 2019

A Communication Architecture for Crowd Management in Emergency and Disruptive Scenarios.
IEEE Communications Magazine, 2019

Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions.
IEEE Consumer Electronics Magazine, 2019

Data collection using unmanned aerial vehicles for Internet of Things platforms.
Computers & Electrical Engineering, 2019

Is DNS Ready for Ubiquitous Internet of Things?
IEEE Access, 2019

Privacy-preserving auditing scheme for shared data in public clouds.
The Journal of Supercomputing, 2018

Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things.
IEEE Trans. Industrial Informatics, 2018

Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems.
IEEE Trans. Industrial Informatics, 2018

Deploying Fog Computing in Industrial Internet of Things and Industry 4.0.
IEEE Trans. Industrial Informatics, 2018

A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommunication Systems, 2018

An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage.
Soft Comput., 2018

Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks.
IEEE Systems Journal, 2018

Performance Evaluation of Energy-Autonomous Sensors Using Power-Harvesting Beacons for Environmental Monitoring in Internet of Things (IoT).
Sensors, 2018

Sensor Technologies for Intelligent Transportation Systems.
Sensors, 2018

Wireless energy harvesting: Empirical results and practical considerations for Internet of Things.
J. Network and Computer Applications, 2018

Mobile cloud computing: Challenges and future research directions.
J. Network and Computer Applications, 2018

Security and Privacy in Ubiquitous Sensor Networks.
JIPS, 2018

Privacy Issues and Solutions for Consumer Wearables.
IT Professional, 2018

Autonomous Cars: Social and Economic Implications.
IT Professional, 2018

Internet of Things Forensics: The Need, Process Models, and Open Issues.
IT Professional, 2018

Ransomware behavioural analysis on windows platforms.
J. Inf. Sec. Appl., 2018

Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
IEEE Internet of Things Journal, 2018

Internet of Vehicles: Architecture, Protocols, and Security.
IEEE Internet of Things Journal, 2018

Internet of Things (IoT): Research, Simulators, and Testbeds.
IEEE Internet of Things Journal, 2018

A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks.
IJWIN, 2018

IoT technologies for smart cities.
IET Networks, 2018

Privacy and Civilian Drone Use: The Need for Further Regulation.
IEEE Security & Privacy, 2018

Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment.
Future Generation Comp. Syst., 2018

Taxonomy and analysis of security protocols for Internet of Things.
Future Generation Comp. Syst., 2018

Offloading in fog computing for IoT: Review, enabling technologies, and research opportunities.
Future Generation Comp. Syst., 2018

Fog computing job scheduling optimization based on bees swarm.
Enterprise IS, 2018

RepGuide: Reputation-Based Route Guidance Using Internet of Vehicles.
IEEE Communications Standards Magazine, 2018

A Survey of Device-to-Device Communications: Research Issues and Challenges.
IEEE Communications Surveys and Tutorials, 2018

Trust-based security adaptation mechanism for Vehicular Sensor Networks.
Computer Networks, 2018

5G for Vehicular Communications.
IEEE Communications Magazine, 2018

Securing Internet of Things with Software Defined Networking.
IEEE Communications Magazine, 2018

Interference-Aided Vehicular Networks: Future Research Opportunities and Challenges.
IEEE Communications Magazine, 2018

Fog Computing Architecture, Evaluation, and Future Research Directions.
IEEE Communications Magazine, 2018

Structural analysis and classification of search interfaces for the deep web.
Comput. J., 2018

Crowd social media computing: Applying crowd computing techniques to social media.
Appl. Soft Comput., 2018

A Hierarchical Spectrum Access Scheme for TV White Space Coexistence in Heterogeneous Networks.
IEEE Access, 2018

Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks.
IEEE Access, 2018

Approaches for Preventing Honeypot Detection and Compromise.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

Mobile Payment Systems - Secure Network Architectures and Protocols
Computer Communications and Networks, Springer, ISBN: 978-3-319-23032-0, 2017

Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography.
Wireless Communications and Mobile Computing, 2017

Container-as-a-Service at the Edge: Trade-off between Energy Efficiency and Service Availability at Fog Nano Data Centers.
IEEE Wireless Commun., 2017

Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries.
IEEE Trans. Smart Grid, 2017

Introduction to the topical issue on semantic social networks and media applications.
Social Netw. Analys. Mining, 2017

Exploiting Trust: Stealthy Attacks Through Socioware and Insider Threats.
IEEE Systems Journal, 2017

Enabling Technologies for Green Internet of Things.
IEEE Systems Journal, 2017

Cloud-Assisted Context-Aware Vehicular Cyber-Physical System for PHEVs in Smart Grid.
IEEE Systems Journal, 2017

Anonymous Authentication for Wireless Body Area Networks With Provable Security.
IEEE Systems Journal, 2017

A seven-layered model architecture for Internet of Vehicles.
J. Information Telecommunication, 2017

Bystanders' Privacy.
IT Professional, 2017

Mobile Forensics: Advances, Challenges, and Research Opportunities.
IEEE Security & Privacy, 2017

FASPM: Fuzzy logic-based adaptive security protocol for multihop data dissemination in intelligent transport systems.
Trans. Emerging Telecommunications Technologies, 2017

A brief overview of intelligent mobility management for future wireless mobile networks.
EURASIP J. Wireless Comm. and Networking, 2017

Special Issue: Foundations and Practice of Security in Emerging ICT Applications.
Comput. Syst. Sci. Eng., 2017

A ReRAM Physically Unclonable Function (ReRAM PUF)-based Approach to Enhance Authentication Security in Software Defined Wireless Networks.
CoRR, 2017

Viral content propagation in Online Social Networks.
CoRR, 2017

A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture.
IEEE Computer, 2017

Special Issue on 5G Wireless Networks for IoT and Body Sensors.
Computer Networks, 2017

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography.
Computer Networks, 2017

Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels.
IEEE Communications Magazine, 2017

Cybersecurity and Privacy Solutions in Smart Cities.
IEEE Communications Magazine, 2017

Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges.
IEEE Communications Magazine, 2017

Lightweight authentication protocols for wearable devices.
Computers & Electrical Engineering, 2017

Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT).
Ad Hoc Networks, 2017

Lightweight and efficient privacy-preserving data aggregation approach for the Smart Grid.
Ad Hoc Networks, 2017

Multiple Attributes Decision Fusion for Wireless Sensor Networks Based on Intuitionistic Fuzzy Set.
IEEE Access, 2017

Distributed All-IP Mobility Management Architecture Supported by the NDN Overlay.
IEEE Access, 2017

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks.
IEEE Access, 2017

Efficient Revocable ID-Based Signature With Cloud Revocation Server.
IEEE Access, 2017

PEAR: A Privacy-Enabled Architecture for Crowdsensing.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017

Multi-agent architecture for reliable Cyber-Physical Systems (CPS).
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Investigating Security for Ubiquitous Sensor Networks.
Proceedings of the 8th International Conference on Ambient Systems, 2017

Distributed mobility management in named data networking.
Wireless Communications and Mobile Computing, 2016

Mobile cloud networking for efficient energy management in smart grid cyber-physical systems.
IEEE Wireless Commun., 2016

Handling big data: research challenges and future directions.
The Journal of Supercomputing, 2016

Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.
IEEE Trans. Information Forensics and Security, 2016

An Empirical Study of HTTP-based Financial Botnets.
IEEE Trans. Dependable Sec. Comput., 2016

Privacy Policy Analysis of Popular Web Platforms.
IEEE Technol. Soc. Mag., 2016

Intelligent Device-to-Device Communication in the Internet of Things.
IEEE Systems Journal, 2016

Attribution in cyberspace: techniques and legal implications.
Security and Communication Networks, 2016

Security Attacks and Solutions in Electronic Health (E-health) Systems.
J. Medical Systems, 2016

Analysis of Security Protocols for Mobile Healthcare.
J. Medical Systems, 2016

Wearable Computing for Health Care.
J. Medical Systems, 2016

The Challenge of Improving Credibility of User-Generated Content in Online Social Networks.
J. Data and Information Quality, 2016

Drive-By Download Attacks: A Comparative Study.
IT Professional, 2016

Interventions in Cyberspace: Status and Trends.
IT Professional, 2016

An Improved Privacy Solution for the Smart Grid.
I. J. Network Security, 2016

A Classification and Characterization of Security Threats in Cloud Computing.
IJNGC, 2016

Solving vehicular ad hoc network challenges with Big Data solutions.
IET Networks, 2016

A Taxonomy of Domain-Generation Algorithms.
IEEE Security & Privacy, 2016

Performance analysis of data intensive cloud systems based on data management and replication: a survey.
Distributed and Parallel Databases, 2016

A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems.
Computing, 2016

Managing Trust in the Cloud: State of the Art and Research Challenges.
IEEE Computer, 2016

Vehicular delay-tolerant networks for smart grid data management using mobile edge computing.
IEEE Communications Magazine, 2016

Bio-inspired cybersecurity for wireless sensor networks.
IEEE Communications Magazine, 2016

Smart cities: concepts, architectures, research opportunities.
Commun. ACM, 2016

Cognitive radio spectrum sensing framework based on multi-agent arc hitecture for 5G networks.
IEEE Wireless Commun., 2015

Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies.
IEEE Wireless Commun., 2015

Toward self-authenticable wearable devices.
IEEE Wireless Commun., 2015

VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks.
IEEE Wireless Commun., 2015

Teaching Cybersecurity Using the Cloud.
TLT, 2015

Sustainable Transportation Management System for a Fleet of Electric Vehicles.
IEEE Trans. Intelligent Transportation Systems, 2015

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Information Forensics and Security, 2015

QoS-Aware Hierarchical Web Caching Scheme for Online Video Streaming Applications in Internet-Based Vehicular Ad Hoc Networks.
IEEE Trans. Industrial Electronics, 2015

Special issue on recent developments in Cognitive Radio Sensor Networks.
Pervasive and Mobile Computing, 2015

Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud.
IEEE Network, 2015

Enabling Cyber Physical Systems with Wireless Sensor Networking Technologies, Multiagent System Paradigm, and Natural Ecosystems.
Mobile Information Systems, 2015

Gigabit Wireless Networking with IEEE 802.11ac: Technical Overview and Challenges.
JNW, 2015

Integration of Cognitive Radio Technology with unmanned aerial vehicles: Issues, opportunities, and future research challenges.
J. Network and Computer Applications, 2015

Lifespan and propagation of information in On-line Social Networks: A case study based on Reddit.
J. Network and Computer Applications, 2015

Data Quality Challenges in Cyber-Physical Systems.
J. Data and Information Quality, 2015

An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography.
IEEE Internet of Things Journal, 2015

Detecting and Preventing Online Identity Deception in Social Networking Services.
IEEE Internet Computing, 2015

Ancillary Impacts of Multipath TCP on Current and Future Network Security.
IEEE Internet Computing, 2015

An analysis of tools for online anonymity.
Int. J. Pervasive Computing and Communications, 2015

Critical infrastructure protection: Requirements and challenges for the 21st century.
IJCIP, 2015

Attribute-based authorization for structured Peer-to-Peer (P2P) networks.
Computer Standards & Interfaces, 2015

Bio-Inspired Routing Algorithms Survey for Vehicular Ad Hoc Networks.
IEEE Communications Surveys and Tutorials, 2015

Authentication protocol for an ambient assisted living system.
IEEE Communications Magazine, 2015

Flexible architecture for cluster evolution in cloud computing.
Computers & Electrical Engineering, 2015

A Novel Architecture for Roaming between 3G and Wireless LANs.
Proceedings of the 1st International ICST Conference on Multimedia Services Access Networks, 2015

CloudNA 2015.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

A real-time video quality estimator for emerging wireless multimedia systems.
Wireless Networks, 2014

Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior.
IEEE Trans. Information Forensics and Security, 2014

Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy.
IEEE Trans. Information Forensics and Security, 2014

QoE-Based Server Selection for Content Distribution Networks.
IEEE Trans. Computers, 2014

Cyberwar: The What, When, Why, and How [Commentary].
IEEE Technol. Soc. Mag., 2014

IEEE Systems Journal, 2014

Secure Mobile Payment Systems.
IT Professional, 2014

Editorial: Cloud computing service and architecture models.
Inf. Sci., 2014

A Novel Vehicular Information Network Architecture Based on Named Data Networking (NDN).
IEEE Internet of Things Journal, 2014

Design, implementation, and performance analysis of a secure payment protocol in a payment gateway centric model.
Computing, 2014

Achieving Quality of Service (QoS) Using Resource Allocation and Adaptive Scheduling in Cloud Computing with Grid Support.
Comput. J., 2014

Introduction to the special issue on "Wireless systems: New technologies, resource optimization and security".
Computers & Electrical Engineering, 2014

Online deception in social media.
Commun. ACM, 2014

Performance analysis of a cross-layered incremental redundancy hybrid automatic repeat request (CL IR-HARQ) mechanism.
Ad Hoc Networks, 2014

Energy-aware sensor node relocation in mobile sensor networks.
Ad Hoc Networks, 2014

A Directional Geocast Warning Dissemination Protocol for Vehicular Ad Hoc NETworks (VANETs).
Proceedings of the Wired/Wireless Internet Communications - 12th International Conference, 2014

ABAMA: An Agent-based Architecture for Mapping Natural Ecosystems onto Wireless Sensor Networks.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Towards Privacy Protection in Smart Grid.
Wireless Personal Communications, 2013

Modeling Object Flows from Distributed and Federated RFID Data Streams for Efficient Tracking and Tracing.
IEEE Trans. Parallel Distrib. Syst., 2013

A state-dependent time evolving multi-constraint routing algorithm.
TAAS, 2013

Comparative study of trust and reputation systems for wireless sensor networks.
Security and Communication Networks, 2013

HyBR: A Hybrid Bio-inspired Bee swarm Routing protocol for safety applications in Vehicular Ad hoc NETworks (VANETs).
Journal of Systems Architecture - Embedded Systems Design, 2013

Using Cloud Computing to Implement a Security Overlay Network.
IEEE Security & Privacy, 2013

A dynamic QoE routing system for user-centric applications.
Trans. Emerging Telecommunications Technologies, 2013

Virtualization: Issues, security threats, and solutions.
ACM Comput. Surv., 2013

Trust management of services in cloud environments: Obstacles and solutions.
ACM Comput. Surv., 2013

Energy-efficient beaconless geographic routing in energy harvested wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2013

Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey.
IEEE Communications Surveys and Tutorials, 2013

Securing Cyberspace in the 21st Century.
IEEE Computer, 2013

Critical Control System Protection in the 21st Century.
IEEE Computer, 2013

Analyzing the security of Windows 7 and Linux for cloud computing.
Computers & Security, 2013

A survey on Green communications using Adaptive Link Rate.
Cluster Computing, 2013

Mobile social networking applications.
Commun. ACM, 2013

Impact of neighbor awareness at the MAC layer in a Vehicular Ad-Hoc Network (VANET).
Proceedings of the 5th IEEE International Symposium on Wireless Vehicular Communications, 2013

Key management solutions in the smart grid environment.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Energy-efficient networking: past, present, and future.
The Journal of Supercomputing, 2012

Green networks.
The Journal of Supercomputing, 2012

Vehicular ad hoc networks (VANETS): status, results, and challenges.
Telecommunication Systems, 2012

Foreword - Special issue on vehicular communications, networks and applications.
Telecommunication Systems, 2012

An Anonymous Secure Payment Protocol in a Payment Gateway Centric Model.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Guest editorial special issue on quality of experience for multimedia applications.
Multimedia Tools Appl., 2012

Mitigating starvation of Linux CPU-bound processes in the presence of network I/O.
Journal of Systems and Software, 2012

Mobile Multimedia Applications: Delivery Technologies.
IT Professional, 2012

Machine-to-Machine (M2M) Communications in Vehicular Networks.
TIIS, 2012

Detecting Insider Threats: Solutions and Trends.
Information Security Journal: A Global Perspective, 2012

Enabling Cyber Physical Systems with Wireless Sensor Networking Technologies.
IJDSN, 2012

Cyber Physical Systems Using Sensor Technologies.
IJDSN, 2012

Hop-based approach for holes and boundary detection in wireless sensor networks.
IET Wireless Sensor Systems, 2012

Performance comparison of media access control protocols for vehicular ad hoc networks.
IET Networks, 2012

Balancing energy consumption with mobile agents in wireless sensor networks.
Future Generation Comp. Syst., 2012

A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs).
Electronic Commerce Research, 2012

Network Forensics: An Analysis of Techniques, Tools, and Trends.
IEEE Computer, 2012

Zero Configuration Networking: Implementation, performance, and security.
Computers & Electrical Engineering, 2012

Improving Trust and Privacy Models in Social Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

A novel sensor node relocation approach to maintain connectivity with a center of interest.
Proceedings of the 15th ACM International Conference on Modeling, 2012

Smart Grid Privacy: Issues and Solutions.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

An assessment of U.S. legislation on cybersecurity.
Proceedings of the 2012 International Conference on Cyber Security, 2012

A Chain-Based Relocation Approach to Maintain Connectivity with a Center of Interest.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

Real-time QoE prediction for multimedia applications in Wireless Mesh Networks.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

Performance modeling of MPEG-4 video streaming over IEEE 802.11 using distribution coordination function.
Wireless Communications and Mobile Computing, 2011

Internet Protocol Television (IPTV): Architecture, Trends, and Challenges.
IEEE Systems Journal, 2011

Impact of denial of service solutions on network quality of service.
Security and Communication Networks, 2011

Service level agreements (SLAs) parameter negotiation between heterogeneous 4G wireless network operators.
Pervasive and Mobile Computing, 2011

Recent advances in multimedia networking.
Multimedia Tools Appl., 2011

Guest editorial special issue on "Future multimedia networking".
Multimedia Tools Appl., 2011

RFID technology, systems, and applications.
J. Network and Computer Applications, 2011

Multimedia applications over metropolitan area networks (MANs).
J. Network and Computer Applications, 2011

TMS-RFID: Temporal management of large-scale RFID applications.
Information Systems Frontiers, 2011

Survey of media access control protocols for vehicular ad hoc networks.
IET Communications, 2011

A Bio-Inspired Quality of Service (QoS) Routing Algorithm.
IEEE Communications Letters, 2011

RFID enabled traceability networks: a survey.
Distributed and Parallel Databases, 2011

Concurrent multipath transmission combining forward error correction and path interleaving for video streaming.
Computer Communications, 2011

Guest Editors' Introduction to the Special Issue on "Modern trends in applied security: Architectures, implementations and applications".
Computers & Electrical Engineering, 2011

On Linux starvation of CPU-bound processes in the presence of network I/O.
Computers & Electrical Engineering, 2011

Recent advances in wireless communications and networks.
Wireless Communications and Mobile Computing, 2010

A programmable network address translator: Design, implementation, and performance.
ACM Trans. Internet Techn., 2010

Wireless multimedia delivery over 802.11e with cross-layer optimization techniques.
Multimedia Tools Appl., 2010

Ubiquitous RFID: Where are we?
Information Systems Frontiers, 2010

Guest editorial: Advances in RFID technology.
Information Systems Frontiers, 2010

Assessing and Improving Authentication Confidence Management.
Inf. Manag. Comput. Security, 2010

Dynamic pricing for load-balancing in user-centric joint call admission control of next-generation wireless networks.
Int. J. Communication Systems, 2010

Next Generation Networks (NGNs).
Int. J. Communication Systems, 2010

Security attacks and solutions for vehicular ad hoc networks.
IET Communications, 2010

Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks.
Electronic Commerce Research, 2010

Editorial for special issue of Telecommunication Systems on "Mobility management and wireless access".
Telecommunication Systems, 2009

An adaptive cross-layer mapping algorithm for MPEG-4 video transmission over IEEE 802.11e WLAN.
Telecommunication Systems, 2009

Guest editorial.
Telecommunication Systems, 2009

A secure two-factor authentication scheme for single sign-on services.
Security and Communication Networks, 2009

Cross-Layer Support for Energy Efficient Routing in Wireless Sensor Networks.
J. Sensors, 2009

Design, implementation, and evaluation of a Programmable Bandwidth Aggregation System for home networks.
J. Network and Computer Applications, 2009

RFID Infrastructure Design: A Case Study of Two Australian RFID Projects.
IEEE Internet Computing, 2009

A dynamic network discovery and selection method for heterogeneous wireless networks.
IJIPT, 2009

Call for Papers: on 'Next Generation Networks (NGNs)'.
Int. J. Communication Systems, 2009

Green Networking for Major Components of Information Communication Technology Systems.
EURASIP J. Wireless Comm. and Networking, 2009

Enabling Wireless Technologies for Green Pervasive Computing.
EURASIP J. Wireless Comm. and Networking, 2009

Design and performance analysis of an inductive QoS routing algorithm.
Computer Communications, 2009

Message from the Workshop Co-Organizers.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

A Novel Distributed Sensor Positioning System Using the Dual of Target Tracking.
IEEE Trans. Computers, 2008

Ubiquitous Wireless Connectivity across Cellular and Wireless Local Area Networks.
J. Inf. Sci. Eng., 2008

An efficient wireless network discovery scheme for heterogeneous access environments.
Int. J. Pervasive Computing and Communications, 2008

Internet access to heterogeneous home area network devices with an OSGi-based residential gateway.
IJAHUC, 2008

An agent-based architecture for fast context transfers during handoffs.
IJAHUC, 2008

A novel centralised clustering algorithm for energy efficient wireless sensor networks.
IJAACS, 2008

Enabling Next-Generation RFID Applications: Solutions and Challenges.
IEEE Computer, 2008

End-to-end support over Heterogeneous Wired-Wireless Networks.
Computer Communications, 2008

A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks.
Computer Communications, 2008

Mobility protocols for ITS/VANET.
Computer Communications, 2008

Foreword: Routing and QoS over heterogeneous networks.
Annales des Télécommunications, 2008

Quality of service models for heterogeneous networks: overview and challenges.
Annales des Télécommunications, 2008

A Novel Distributed Authentication Framework for Single Sign-On Services.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

An enhanced uplink scheduling scheme for IEEE 802.16 metropolitan area networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Experimental Evaluation and Characterization of Long-Distance 802.11g Links.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

An Empirical Analysis of Handoff Performance for SIP, Mobile IP, and SCTP Protocols.
Wireless Personal Communications, 2007

End-to-End Security Across Wired-Wireless Networks for Mobile Users.
Information Systems Security, 2007

Enabling End-to-End QoS over Hybrid Wired-Wireless Networks.
Wireless Personal Communications, 2006

Mobility management across hybrid wireless networks: Trends and challenges.
Computer Communications, 2006

Fast Handover over Micro-MPLS-Based Wireless Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Mobility Protocols for Handoff Management in Heterogeneous Networks.
Proceedings of the Personal Wireless Communications, 2006

Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

SCTP Multihoming Support for Handoffs across Heterogeneous Networks.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

Adaptive Queue Management on Micro-MPLS-Based Wireless Networks for Multimedia Traffic.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

J2EE support for wireless services.
Journal of Systems and Software, 2005

Design, implementation, and evaluation of the audio/video distribution transport protocol (AVDTP) for high quality audio support over Bluetooth.
Computer Communications, 2005

Landscape: a high performance distributed positioning scheme for outdoor sensor networks.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

QoS Path Selection Exploiting Minimum Link Delays in MPLS-Based Networks.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005

Design Architectures for 3G and IEEE 802.11 WLAN Integration.
Proceedings of the Networking, 2005

Priority-Based Congestion Control in MPLS-Based Networks.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005

A framework for efficient resource management in IEEE 802.11 WLANs.
Wireless Communications and Mobile Computing, 2004

Enabling gigabit network access to end users.
Proceedings of the IEEE, 2004

Network application programming interfaces (APIs) performance on commodity operating systems.
Information & Software Technology, 2004

Using Wireless Sensor Networks to Narrow the Gap between Low-Level Information and Context-Awareness
CoRR, 2004

Improving Bluetooth performance in 802.11 interference environments.
Computer Communications, 2004

HARMONICA: Enhanced QoS Support with Admission Control for IEEE 802.11 Contention-based Access.
Proceedings of the 10th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2004), 2004

SIP and mobile IP integration to support seamless mobility.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

Design and Implementation of a Wireless Prescription System.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Seamless Bluetooth Connectivity to IPv6 Networks.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Design and Implementation of a SIP-based VoIP Architecture.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Evaluating IPv6 on Windows and Solaris.
IEEE Internet Computing, 2003

A Performance Comparison of Communication APIs on Solaris and Windows Operating Systems.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Enabling User Prioritization of Multimedia Applications.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Design and Implementation of a User-level Prioritization Service.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Using Wireless Sensor Networks to Narrow the Gap Between Low-Level Information and Context-Awareness.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

Application-to-Application Priority with STREAMS.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

Performance evaluation of a Java-based networking Application Programming Interface (API).
Inf. Process. Lett., 2000

Impact of ATM switch architectures on CBR video performance.
Computer Communications, 2000

Implementation and Performance of QoS-aware Java Applications over ATM Networks.
Comput. J., 2000

Design and Implementation of a QoS-aware Networking Application Programming Interface.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Towards native ATM services: Where are we?
Proceedings of the Computers and Their Applications (CATA-99), 1999

Experiences with multimedia applications over native ATM.
J. Network and Computer Applications, 1998

Best-effort delivery of live video across a local area ATM network.
Proceedings of the Computers and Their Applications (CATA-98), 1998

An Evaluation of the Real-Time Performance of SVR4.0 and SVR4.2.
Operating Systems Review, 1997

Improving End System Performance for Multimedia Applications over High Bandwidth Networks.
Multimedia Tools Appl., 1997

An ATM multimedia architecture: Design, implementation, and performance.
J. High Speed Networks, 1997

A UNIX-based ATM multimedia architecture.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

Throughout optimization for multimedia applications over high speed networks.
Proceedings of the High Performance Networking VII, IFIP TC6 Seventh International Conference on High Performance Networking (HPN'97), White Plains, New York, USA, 28th April, 1997

An Analysis of Process and Memory Models to Support High-Speed Networking in a UNIX Environment.
Proceedings of the USENIX Annual Technical Conference, 1996

The CHARISMA ATM Horst Interface.
Proceedings of the Broadband Islands '94, 1994