Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Zeadally, Sherali
add a person with the name Zeadally, Sherali
 

Other publications of authors with the same name

RFID enabled traceability networks: a survey., , , , and . Distributed and Parallel Databases, 29 (5-6): 397-443 (2011)Performance modeling of MPEG-4 video streaming over IEEE 802.11 using distribution coordination function., , , and . Wireless Communications and Mobile Computing, 11 (9): 1312-1322 (2011)Wireless multimedia delivery over 802.11e with cross-layer optimization techniques., , , and . Multimedia Tools Appl., 47 (1): 189-205 (2010)A dynamic network discovery and selection method for heterogeneous wireless networks., , , and . IJIPT, 4 (2): 99-114 (2009)An Improved Privacy Solution for the Smart Grid., and . I. J. Network Security, 18 (3): 529-537 (2016)Guest editorial., , and . Telecommunication Systems, 42 (1-2): 1-3 (2009)J2EE support for wireless services., and . Journal of Systems and Software, 75 (1-2): 215-226 (2005)Attribute-based authorization for structured Peer-to-Peer (P2P) networks., , , and . Computer Standards & Interfaces, (2015)Editorial: Cloud computing service and architecture models., , and . Inf. Sci., (2014)TMS-RFID: Temporal management of large-scale RFID applications., , , , and . Information Systems Frontiers, 13 (4): 481-500 (2011)