default search action
Vijay Varadharajan
Person information
- affiliation: Macquarie University, Sydney, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j129]Nazatul Haque Sultan, Shabnam Kasra Kermanshahi, Hong-Yen Tran, Shangqi Lai, Vijay Varadharajan, Surya Nepal, Xun Yi:
Securely sharing outsourced IoT data: A secure access and privacy preserving keyword search scheme. Ad Hoc Networks 158: 103478 (2024) - [j128]Avantika Gaur, Preeti Mishra, Vinod P., Arjun Singh, Vijay Varadharajan, Uday Kiran Tupakula, Mauro Conti:
vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment. Comput. Electr. Eng. 120: 109742 (2024) - [j127]Nazatul Haque Sultan, Vijay Varadharajan, Saurab Dulal, Seyit Camtepe, Surya Nepal:
NDN-RBE: An Accountable Privacy Aware Access Control Framework For NDN. Comput. J. 67(4): 1572-1589 (2024) - [j126]Kamran Shaukat, Suhuai Luo, Vijay Varadharajan:
A novel machine learning approach for detecting first-time-appeared malware. Eng. Appl. Artif. Intell. 131: 107801 (2024) - [j125]Gaurav Varshney, Rahul Kumawat, Vijay Varadharajan, Udaya Kiran Tupakula, Chandranshu Gupta:
Anti-phishing: A comprehensive perspective. Expert Syst. Appl. 238(Part F): 122199 (2024) - [j124]Vijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar:
Techniques for Enhancing Security in Industrial Control Systems. ACM Trans. Cyber Phys. Syst. 8(1): 6:1-6:36 (2024) - [j123]Cody Lewis, Vijay Varadharajan, Nasimul Noman, Udaya Kiran Tupakula:
Ensuring Fairness and Gradient Privacy in Personalized Heterogeneous Federated Learning. ACM Trans. Intell. Syst. Technol. 15(3): 56:1-56:30 (2024) - [c285]Cody Lewis, Vijay Varadharajan, Nasimul Noman, Udaya Kiran Tupakula, Nan Li:
Mitigation of Gradient Inversion Attacks in Federated Learning with Private Adaptive Optimization. ICDCS 2024: 833-845 - [c284]Nathaniel Li, Alexander Pan, Anjali Gopal, Summer Yue, Daniel Berrios, Alice Gatti, Justin D. Li, Ann-Kathrin Dombrowski, Shashwat Goel, Gabriel Mukobi, Nathan Helm-Burger, Rassin Lababidi, Lennart Justen, Andrew B. Liu, Michael Chen, Isabelle Barrass, Oliver Zhang, Xiaoyuan Zhu, Rishub Tamirisa, Bhrugu Bharathi, Ariel Herbert-Voss, Cort B. Breuer, Andy Zou, Mantas Mazeika, Zifan Wang, Palash Oswal, Weiran Lin, Adam A. Hunt, Justin Tienken-Harder, Kevin Y. Shih, Kemper Talley, John Guan, Ian Steneker, David Campbell, Brad Jokubaitis, Steven Basart, Stephen Fitz, Ponnurangam Kumaraguru, Kallol Krishna Karmakar, Uday Kiran Tupakula, Vijay Varadharajan, Yan Shoshitaishvili, Jimmy Ba, Kevin M. Esvelt, Alexandr Wang, Dan Hendrycks:
The WMDP Benchmark: Measuring and Reducing Malicious Use with Unlearning. ICML 2024 - [i15]Nathaniel Li, Alexander Pan, Anjali Gopal, Summer Yue, Daniel Berrios, Alice Gatti, Justin D. Li, Ann-Kathrin Dombrowski, Shashwat Goel, Long Phan, Gabriel Mukobi, Nathan Helm-Burger, Rassin Lababidi, Lennart Justen, Andrew B. Liu, Michael Chen, Isabelle Barrass, Oliver Zhang, Xiaoyuan Zhu, Rishub Tamirisa, Bhrugu Bharathi, Adam Khoja, Zhenqi Zhao, Ariel Herbert-Voss, Cort B. Breuer, Andy Zou, Mantas Mazeika, Zifan Wang, Palash Oswal, Weiran Liu, Adam A. Hunt, Justin Tienken-Harder, Kevin Y. Shih, Kemper Talley, John Guan, Russell Kaplan, Ian Steneker, David Campbell, Brad Jokubaitis, Alex Levinson, Jean Wang, William Qian, Kallol Krishna Karmakar, Steven Basart, Stephen Fitz, Mindy Levine, Ponnurangam Kumaraguru, Uday Kiran Tupakula, Vijay Varadharajan, Yan Shoshitaishvili, Jimmy Ba, Kevin M. Esvelt, Alexandr Wang, Dan Hendrycks:
The WMDP Benchmark: Measuring and Reducing Malicious Use With Unlearning. CoRR abs/2403.03218 (2024) - 2023
- [j122]Kallol Krishna Karmakar, Vijay Varadharajan, Michael Hitchens, Uday Kiran Tupakula, Prajna Sariputra:
A trust-aware openflow switching framework for software defined networks (SDN). Comput. Networks 237: 110109 (2023) - [j121]Kamran Shaukat, Suhuai Luo, Vijay Varadharajan:
A novel deep learning-based approach for malware detection. Eng. Appl. Artif. Intell. 122: 106030 (2023) - [j120]Cody Lewis, Nan Li, Vijay Varadharajan:
Targeted Context-Based Attacks on Trust Management Systems in IoT. IEEE Internet Things J. 10(14): 12186-12203 (2023) - [j119]Yamin Yan, Zhiyong Chen, Vijay Varadharajan:
Output feedback stabilization of large-scale networked cyberphysical systems using cryptographic techniques. J. Frankl. Inst. 360(12): 8954-8972 (2023) - [j118]Cody Lewis, Vijay Varadharajan, Nasimul Noman:
Attacks against Federated Learning Defense Systems and their Mitigation. J. Mach. Learn. Res. 24: 30:1-30:50 (2023) - [j117]Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan:
Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption. IEEE Trans. Cloud Comput. 11(1): 25-43 (2023) - [j116]Nazatul Haque Sultan, Vijay Varadharajan, Lan Zhou, Ferdous Ahmed Barbhuiya:
A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context. IEEE Trans. Serv. Comput. 16(3): 1647-1661 (2023) - [i14]Nazatul Haque Sultan, Shabnam Kasra Kermanshahi, Hong-Yen Tran, Shangqi Lai, Vijay Varadharajan, Surya Nepal, Xun Yi:
A Multi-Client Searchable Encryption Scheme for IoT Environment. CoRR abs/2305.09221 (2023) - 2022
- [j115]Kamran Shaukat, Suhuai Luo, Vijay Varadharajan:
A novel method for improving the robustness of deep learning-based malware detectors against adversarial attacks. Eng. Appl. Artif. Intell. 116: 105461 (2022) - [j114]Kallol Krishna Karmakar, Vijay Varadharajan, Pete Speirs, Michael Hitchens, Aron Robertson:
SDPM: A Secure Smart Device Provisioning and Monitoring Service Architecture for Smart Network Infrastructure. IEEE Internet Things J. 9(24): 25037-25051 (2022) - [j113]Vijay Varadharajan, Kallol Krishna Karmakar, Uday Kiran Tupakula, Michael Hitchens:
Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures. IEEE Trans. Netw. Serv. Manag. 19(2): 1065-1082 (2022) - [c283]Cornelius Paardekooper, Nasimul Noman, Raymond Chiong, Vijay Varadharajan:
Designing Deep Convolutional Neural Networks using a Genetic Algorithm for Image-based Malware Classification. CEC 2022: 1-8 - [c282]Uday Kiran Tupakula, Kallol Krishna Karmakar, Vijay Varadharajan, Ben Collins:
Implementation of Techniques for Enhancing Security of Southbound Infrastructure in SDN. NoF 2022: 1-5 - [i13]Vijay Varadharajan, Neeraj Suri:
Security Challenges when Space Merges with Cyberspace. CoRR abs/2207.10798 (2022) - 2021
- [j112]Kallol Krishna Karmakar, Vijay Varadharajan, Surya Nepal, Udaya Kiran Tupakula:
SDN-Enabled Secure IoT Architecture. IEEE Internet Things J. 8(8): 6549-6564 (2021) - [j111]Ladan Sadeghikhorami, Vijay Varadharajan, Ali Akbar Safavi:
A novel secure observer-based controller and attack detection scheme for Networked Control Systems. Inf. Sci. 575: 185-205 (2021) - [j110]Alberto Huertas Celdrán, Kallol Krishna Karmakar, Félix Gómez Mármol, Vijay Varadharajan:
Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments. Peer-to-Peer Netw. Appl. 14(5): 2719-2734 (2021) - [j109]Mahmood Yousefi-Azar, Vijay Varadharajan, Len Hamey, Shiping Chen:
Mutual Information and Feature Importance Gradient Boosting: Automatic byte n-gram feature reranking for Android malware detection. Softw. Pract. Exp. 51(7): 1518-1539 (2021) - [j108]Yamin Yan, Zhiyong Chen, Vijay Varadharajan, Md. Jahangir Hossain, Graham E. Town:
Distributed Consensus-Based Economic Dispatch in Power Grids Using the Paillier Cryptosystem. IEEE Trans. Smart Grid 12(4): 3493-3502 (2021) - [c281]Vijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar:
Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services. NetSoft 2021: 273-277 - [c280]Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdrán, Seyit Camtepe, Vijay Varadharajan, Surya Nepal:
FedDICE: A Ransomware Spread Detection in a Distributed Integrated Clinical Environment Using Federated Learning and SDN Based Mitigation. QSHINE 2021: 3-24 - [c279]Nazatul Haque Sultan, Vijay Varadharajan, Chandan Kumar Chaudhary, Seyit Camtepe, Surya Nepal:
A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks. SRDS 2021: 164-175 - [c278]Vijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar:
Techniques for Securing 5G Network Services from attacks. TrustCom 2021: 273-280 - [c277]Uday Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
Techniques for Securing Control Systems from Attacks. TrustCom 2021: 281-288 - [i12]Chandra Thapa, Kallol Krishna Karmakar, Alberto Huertas Celdrán, Seyit Camtepe, Vijay Varadharajan, Surya Nepal:
FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation. CoRR abs/2106.05434 (2021) - 2020
- [j107]Kamran Shaukat, Suhuai Luo, Vijay Varadharajan, Ibrahim A. Hameed, Min Xu:
A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access 8: 222310-222354 (2020) - [j106]Mahmood Yousefi-Azar, Len Hamey, Vijay Varadharajan, Shiping Chen:
Byte2vec: Malware Representation and Feature Selection for Android. Comput. J. 63(8): 1125-1138 (2020) - [j105]Yulei Wu, Weizhi Meng, Zheng Yan, Vijay Varadharajan:
Editorial: Special issue on blockchain and communication networks. Digit. Commun. Networks 6(2): 145-146 (2020) - [j104]B. M. Ruhul Amin, Seyedfoad Taghizadeh, Md. Shihanur Rahman, Md. Jahangir Hossain, Vijay Varadharajan, Zhiyong Chen:
Cyber attacks in smart grid - dynamic impacts, analyses and recommendations. IET Cyper-Phys. Syst.: Theory & Appl. 5(4): 321-329 (2020) - [j103]Shantanu Pal, Tahiry M. Rabehaja, Ambrose Hill, Michael Hitchens, Vijay Varadharajan:
On the Integration of Blockchain to the Internet of Things for Enabling Access Right Delegation. IEEE Internet Things J. 7(4): 2630-2639 (2020) - [j102]Keshav Sood, Kallol Krishna Karmakar, Shui Yu, Vijay Varadharajan, Shiva Raj Pokhrel, Yong Xiang:
Alleviating Heterogeneity in SDN-IoT Networks to Maintain QoS and Enhance Security. IEEE Internet Things J. 7(7): 5964-5975 (2020) - [j101]Preeti Mishra, Vijay Varadharajan, Emmanuel S. Pilli, Udaya Kiran Tupakula:
VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment. IEEE Trans. Cloud Comput. 8(3): 957-971 (2020) - [j100]Shantanu Pal, Tahiry M. Rabehaja, Michael Hitchens, Vijay Varadharajan, Ambrose Hill:
On the Design of a Flexible Delegation Model for the Internet of Things Using Blockchain. IEEE Trans. Ind. Informatics 16(5): 3521-3530 (2020) - [j99]Yulei Wu, Zheng Yan, F. Richard Yu, Robert H. Deng, Vijay Varadharajan, Wei Chen:
Guest Editorial: Blockchain and Healthcare Computing. IEEE J. Biomed. Health Informatics 24(8): 2144-2145 (2020) - [j98]Vijay Varadharajan, Udaya Kiran Tupakula:
Counteracting Attacks From Malicious End Hosts in Software Defined Networks. IEEE Trans. Netw. Serv. Manag. 17(1): 160-174 (2020) - [c276]Nazatul Haque Sultan, Vijay Varadharajan, Seyit Camtepe, Surya Nepal:
An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation. ESORICS (1) 2020: 569-590 - [c275]Kallol Krishna Karmakar, Vijay Varadharajan, Uday Kiran Tupakula, Surya Nepal, Chandra Thapa:
Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT). NetSoft 2020: 257-261 - [c274]Uday Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
Attack Detection on the Software Defined Networking Switches. NetSoft 2020: 262-266 - [c273]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Michael Hitchens:
Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure. NOMS 2020: 1-9 - [c272]Behzad Asadi, Vijay Varadharajan:
Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples. TrustCom 2020: 793-801 - [i11]Yamin Yan, Zhiyong Chen, Vijay Varadharajan:
Secure Networked Control of Large-Scale Cyberphysical Systems Using Cryptographic Techniques. CoRR abs/2002.03470 (2020) - [i10]Jnanamurthy H. K, Vijay Varadharajan:
Formal Modelling and Verification of Software Defined Network. CoRR abs/2004.04425 (2020) - [i9]Nazatul Haque Sultan, Vijay Varadharajan, Lan Zhou, Ferdous Ahmed Barbhuiya:
A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context. CoRR abs/2004.05419 (2020) - [i8]Nazatul Haque Sultan, Maryline Laurent, Vijay Varadharajan:
Securing Organization's Data: A Role-Based Authorized Keyword Search Scheme with Efficient Decryption. CoRR abs/2004.10952 (2020) - [i7]Vijay Varadharajan, Kallol Krishna Karmakar, Udaya Kiran Tupakula, Michael Hitchens:
Towards a Trust Aware Network Slice based End to End Services for Virtualised Infrastructures. CoRR abs/2006.03205 (2020) - [i6]Vijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar:
Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services. CoRR abs/2006.15270 (2020) - [i5]Uday Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
Software Enabled Security Architecture for Counteracting Attacks in Control Systems. CoRR abs/2006.15272 (2020)
2010 – 2019
- 2019
- [j97]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula:
Mitigating attacks in software defined networks. Clust. Comput. 22(4): 1143-1157 (2019) - [j96]Preeti Mishra, Vijay Varadharajan, Udaya Kiran Tupakula, Emmanuel S. Pilli:
A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection. IEEE Commun. Surv. Tutorials 21(1): 686-728 (2019) - [j95]Keshav Sood, Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Shui Yu:
Analysis of Policy-Based Security Management System in Software-Defined Networks. IEEE Commun. Lett. 23(4): 612-615 (2019) - [j94]Udaya Kiran Tupakula, Vijay Varadharajan, Preeti Mishra:
Securing SDN controller and switches from attacks. Int. J. High Perform. Comput. Netw. 14(1): 77-91 (2019) - [j93]Shantanu Pal, Michael Hitchens, Vijay Varadharajan, Tahiry M. Rabehaja:
Policy-based access control for constrained healthcare resources in the context of the Internet of Things. J. Netw. Comput. Appl. 139: 57-74 (2019) - [j92]Vijay Varadharajan, Kallol Krishna Karmakar, Udaya Kiran Tupakula, Michael Hitchens:
A Policy-Based Security Architecture for Software-Defined Networks. IEEE Trans. Inf. Forensics Secur. 14(4): 897-912 (2019) - [c271]Udaya Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
Access Control Based Dynamic Path Establishment for Securing Flows from the User Devices with Different Security Clearance. AINA 2019: 1303-1315 - [c270]Keshav Sood, Shiva Raj Pokhrel, Kallol Krishna Karmakar, Vijay Varadharajan, Shui Yu:
SDN-Capable IoT Last-Miles: Design Challenges. GLOBECOM 2019: 1-6 - [c269]Nan Li, Vijay Varadharajan, Surya Nepal:
Context-Aware Trust Management System for IoT Applications with Multiple Domains. ICDCS 2019: 1138-1148 - [c268]Shantanu Pal, Michael Hitchens, Vijay Varadharajan:
Towards the Design of a Trust Management Framework for the Internet of Things. ICST 2019: 1-7 - [c267]Kallol Krishna Karmakar, Vijay Varadharajan, Surya Nepal, Udaya Kiran Tupakula:
SDN Enabled Secure IoT Architecture. IM 2019: 581-585 - [i4]Behzad Asadi, Vijay Varadharajan:
An MDL-Based Classifier for Transactional Datasets with Application in Malware Detection. CoRR abs/1910.03751 (2019) - [i3]Behzad Asadi, Vijay Varadharajan:
Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples. CoRR abs/1912.05945 (2019) - 2018
- [j91]Vijay Varadharajan, Udaya Kiran Tupakula, Kallol Krishna Karmakar:
Secure Monitoring of Patients With Wandering Behavior in Hospital Environments. IEEE Access 6: 11523-11533 (2018) - [j90]Mahmood Yousefi-Azar, Leonard G. C. Hamey, Vijay Varadharajan, Shiping Chen:
Malytics: A Malware Detection Scheme. IEEE Access 6: 49418-49431 (2018) - [j89]Shantanu Pal, Michael Hitchens, Vijay Varadharajan, Tahiry M. Rabehaja:
Fine-Grained Access Control for Smart Healthcare Systems in the Internet of Things. EAI Endorsed Trans. Ind. Networks Intell. Syst. 4(13): e5 (2018) - [j88]Vijay Varadharajan, Udaya Kiran Tupakula:
Securing Services in Networked Cloud Infrastructures. IEEE Trans. Cloud Comput. 6(4): 1149-1163 (2018) - [c266]Keshav Sood, Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Shui Yu:
Towards QoS and Security in Software-Driven Heterogeneous Autonomous Networks. GLOBECOM 2018: 1-6 - [c265]Mahmood Yousefi-Azar, Len Hamey, Vijay Varadharajan, Shiping Chen:
Learning Latent Byte-Level Feature Representation for Malware Detection. ICONIP (4) 2018: 568-578 - [c264]Shantanu Pal, Michael Hitchens, Vijay Varadharajan:
Modeling Identity for the Internet of Things: Survey, Classification and Trends. ICST 2018: 45-51 - [c263]Shantanu Pal, Michael Hitchens, Vijay Varadharajan, Tahiry M. Rabehaja:
Policy-Based Access Control for Constrained Healthcare Resources. WOWMOM 2018: 588-599 - [i2]Mahmood Yousefi-Azar, Len Hamey, Vijay Varadharajan, Shiping Chen:
Malytics: A Malware Detection Scheme. CoRR abs/1803.03465 (2018) - [i1]Vijay Varadharajan, Kallol Krishna Karmakar, Udaya Kiran Tupakula, Michael Hitchens:
A Policy based Security Architecture for Software Defined Networks. CoRR abs/1806.02053 (2018) - 2017
- [j87]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud. Concurr. Comput. Pract. Exp. 29(12) (2017) - [j86]Zheng Yan, Robert H. Deng, Vijay Varadharajan:
Cryptography and Data Security in Cloud Computing. Inf. Sci. 387: 53-55 (2017) - [j85]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud. J. Intell. Fuzzy Syst. 32(4): 2909-2921 (2017) - [j84]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
Intrusion detection techniques in cloud environment: A survey. J. Netw. Comput. Appl. 77: 18-47 (2017) - [j83]Vijay Varadharajan, Udaya Kiran Tupakula:
On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience. IEEE Trans. Cloud Comput. 5(3): 375-389 (2017) - [j82]Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan:
Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Secur. Comput. 14(2): 211-220 (2017) - [j81]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
Privacy-Preserving Mutual Authentication in RFID with Designated Readers. Wirel. Pers. Commun. 96(3): 4819-4845 (2017) - [c262]Fan Jin, Vijay Varadharajan, Udaya Kiran Tupakula:
A trust model based energy detection for cognitive radio networks. ACSW 2017: 68:1-68:8 - [c261]Shu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo:
An efficient and provably secure RFID grouping proof protocol. ACSW 2017: 71:1-71:7 - [c260]Mahmood Yousefi-Azar, Len Hamey, Vijay Varadharajan, Mark D. McDonnell:
Fast, Automatic and Scalable Learning to Detect Android Malware. ICONIP (5) 2017: 848-857 - [c259]Shantanu Pal, Michael Hitchens, Vijay Varadharajan:
On the design of security mechanisms for the Internet of Things. ICST 2017: 1-6 - [c258]Mahmood Yousefi-Azar, Vijay Varadharajan, Len Hamey, Udaya Kiran Tupakula:
Autoencoder-based feature learning for cyber security applications. IJCNN 2017: 3854-3861 - [c257]Vijay Varadharajan, Kallol Krishna Karmakar, Udaya Kiran Tupakula:
Securing communication in multiple Autonomous System domains with Software Defined Networking. IM 2017: 195-203 - [c256]Shantanu Pal, Michael Hitchens, Vijay Varadharajan:
Towards a Secure Access Control Architecture for the Internet of Things. LCN 2017: 219-222 - [c255]Shantanu Pal, Michael Hitchens, Vijay Varadharajan, Tahiry M. Rabehaja:
On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems. MobiQuitous 2017: 432-441 - [c254]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula:
Mitigating attacks in Software Defined Network (SDN). SDS 2017: 112-117 - [c253]Fan Jin, Vijay Varadharajan, Udaya Kiran Tupakula:
An Eclat Algorithm Based Energy Detection for Cognitive Radio Networks. TrustCom/BigDataSE/ICESS 2017: 1096-1102 - [c252]Udaya Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
SDN-based Dynamic Policy Specification and Enforcement for Provisioning SECaaS in Cloud. WISE (2) 2017: 550-561 - [e9]Dong Seong Kim, Masato Kitakami, Vijay Varadharajan:
22nd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2017, Christchurch, New Zealand, January 22-25, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-5652-1 [contents] - 2016
- [j80]Lan Zhou, Vijay Varadharajan, K. Gopinath:
A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records. Comput. J. 59(11): 1593-1611 (2016) - [j79]Byungho Min, Vijay Varadharajan:
Rethinking Software Component Security: Software Component Level Integrity and Cross Verification. Comput. J. 59(11): 1735-1748 (2016) - [j78]Byungho Min, Vijay Varadharajan:
A novel malware for subversion of self-protection in anti-virus. Softw. Pract. Exp. 46(3): 361-379 (2016) - [j77]Xun Yi, Russell Paulet, Elisa Bertino, Vijay Varadharajan:
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy. IEEE Trans. Knowl. Data Eng. 28(6): 1546-1559 (2016) - [c251]Udaya Kiran Tupakula, Vijay Varadharajan:
Securing Big Data Environments from Attacks. BigDataSecurity/HPSC/IDS 2016: 109-112 - [c250]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula:
On the Design and Implementation of a Security Architecture for Software Defined Networks. HPCC/SmartCity/DSS 2016: 671-678 - [c249]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
Securing Virtual Machines from Anomalies Using Program-Behavior Analysis in Cloud Environment. HPCC/SmartCity/DSS 2016: 991-998 - [c248]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment. ICACCI 2016: 56-62 - [c247]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula:
On the Design and Implementation of a Security Architecture for End to End Services in Software Defined Networks. LCN 2016: 519-522 - [c246]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Michael Hitchens:
Policy based security architecture for software defined networks. SAC 2016: 658-663 - [c245]Byungho Min, Vijay Varadharajan:
Cascading attacks against smart grid using control command disaggregation and services. SAC 2016: 2142-2147 - [c244]Dilshan Jayarathna, Vijay Varadharajan, Udaya Kiran Tupakula:
Integrated Security for Services Hosted in Virtual Environments. Trustcom/BigDataSE/ISPA 2016: 82-89 - 2015
- [j76]Udaya Kiran Tupakula, Vijay Varadharajan:
Trust Enhanced Security for Tenant Transactions in the Cloud Environment. Comput. J. 58(10): 2388-2403 (2015) - [j75]Vijay Varadharajan, Udaya Kiran Tupakula:
Securing wireless mobile nodes from distributed denial-of-service attacks. Concurr. Comput. Pract. Exp. 27(15): 3794-3815 (2015) - [j74]Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan:
Shared RFID ownership transfer protocols. Comput. Stand. Interfaces 42: 95-104 (2015) - [j73]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Generic constructions for role-based encryption. Int. J. Inf. Sec. 14(5): 417-430 (2015) - [j72]Sepehr Damavandinejadmonfared, Vijay Varadharajan:
A New Extension to Kernel Entropy Component Analysis for Image-based Authentication Systems. J. WSCG 23(1): 1-8 (2015) - [j71]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
Vulnerabilities of an ECC-based RFID authentication scheme. Secur. Commun. Networks 8(17): 3262-3270 (2015) - [j70]Mohammad Sayad Haghighi, Yang Xiang, Vijay Varadharajan, Barry G. Quinn:
A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks. IEEE Trans. Computers 64(3): 627-639 (2015) - [j69]Jia Yu, Kui Ren, Cong Wang, Vijay Varadharajan:
Enabling Cloud Storage Auditing With Key-Exposure Resistance. IEEE Trans. Inf. Forensics Secur. 10(6): 1167-1179 (2015) - [j68]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage. IEEE Trans. Inf. Forensics Secur. 10(11): 2381-2395 (2015) - [c243]Sepehr Damavandinejadmonfared, Vijay Varadharajan:
A New Extension of Kernel Principal Component Analysis for Finger Vein Authentication. ACSC 2015: 59-63 - [c242]Udaya Wijesinghe, Udaya Kiran Tupakula, Vijay Varadharajan:
An Enhanced Model for Network Flow Based Botnet Detection. ACSC 2015: 101-110 - [c241]Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan:
Hypervisor-based Security Architecture to Protect Web Applications. AISC 2015: 15-24 - [c240]Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan:
Anonymous Yoking-Group Proofs. AsiaCCS 2015: 615-620 - [c239]Byungho Min, Vijay Varadharajan:
Secure Dynamic Software Loading and Execution Using Cross Component Verification. DSN 2015: 113-124 - [c238]Byungho Min, Vijay Varadharajan:
Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT). ICECCS 2015: 80-89 - [c237]Udaya Wijesinghe, Udaya Kiran Tupakula, Vijay Varadharajan:
Botnet detection using software defined networking. ICT 2015: 219-224 - [c236]Xinyu Fan, Vijay Varadharajan, Michael Hitchens:
Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage. ISC 2015: 283-298 - [c235]Fan Jin, Vijay Varadharajan, Udaya Kiran Tupakula:
Improved detection of primary user emulation attacks in cognitive radio networks. ITNAC 2015: 274-279 - [c234]Byungho Min, Vijay Varadharajan:
Design, implementation and evaluation of a novel anti-virus parasitic malware. SAC 2015: 2127-2133 - 2014
- [j67]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
Server-Aided Signature Verification for Lightweight Devices. Comput. J. 57(4): 481-493 (2014) - [j66]Chun Ruan, Vijay Varadharajan:
Dynamic delegation framework for role based access control in distributed data management systems. Distributed Parallel Databases 32(2): 245-269 (2014) - [j65]Aarthi Nagarajan, Vijay Varadharajan, Nathan Tarr:
Trust enhanced distributed authorisation for web services. J. Comput. Syst. Sci. 80(5): 916-934 (2014) - [j64]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Secure administration of cryptographic role-based access control for large-scale cloud storage systems. J. Comput. Syst. Sci. 80(8): 1518-1533 (2014) - [j63]Vijay Varadharajan, Udaya Kiran Tupakula:
Counteracting security attacks in virtual machines in the cloud using property based attestation. J. Netw. Comput. Appl. 40: 31-45 (2014) - [j62]Byungho Min, Vijay Varadharajan, Udaya Kiran Tupakula, Michael Hitchens:
Antivirus security: naked during updates. Softw. Pract. Exp. 44(10): 1201-1222 (2014) - [j61]Steffen Schulz, Vijay Varadharajan, Ahmad-Reza Sadeghi:
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. IEEE Trans. Inf. Forensics Secur. 9(2): 221-232 (2014) - [j60]Fuchun Guo, Yi Mu, Willy Susilo, Duncan S. Wong, Vijay Varadharajan:
CP-ABE With Constant-Size Keys for Lightweight Devices. IEEE Trans. Inf. Forensics Secur. 9(5): 763-771 (2014) - [j59]Vijay Varadharajan, Udaya Kiran Tupakula:
Security as a Service Model for Cloud Environment. IEEE Trans. Netw. Serv. Manag. 11(1): 60-75 (2014) - [c233]Byungho Min, Vijay Varadharajan:
A New Technique for Counteracting Web Browser Exploits. Australian Software Engineering Conference 2014: 132-141 - [c232]Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan:
Hypervisor-based Security Architecture for Validating DNS Services (Poster). AISC 2014: 83-86 - [c231]Xiaofei Hou, Ashwin Kumar T. K, Johnson P. Thomas, Vijay Varadharajan:
Dynamic Workload Balancing for Hadoop MapReduce. BDCloud 2014: 56-62 - [c230]Byungho Min, Vijay Varadharajan:
Feature-Distributed Malware Attack: Risk and Defence. ESORICS (2) 2014: 457-474 - [c229]Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, Vijay Varadharajan:
TrustLite: a security architecture for tiny embedded devices. EuroSys 2014: 10:1-10:14 - [c228]Udaya Kiran Tupakula, Vijay Varadharajan:
Techniques for detecting attacks on critical infrastructure. ICNC 2014: 48-52 - [c227]Xun Yi, Russell Paulet, Elisa Bertino, Vijay Varadharajan:
Practical k nearest neighbor queries with location privacy. ICDE 2014: 640-651 - [c226]Byungho Min, Vijay Varadharajan:
Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures. ICECCS 2014: 59-68 - [c225]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
Privacy-Preserving Authorized RFID Authentication Protocols. RFIDSec 2014: 108-122 - [c224]Udaya Kiran Tupakula, Vijay Varadharajan:
Secure monitoring for dementia patients. SAC 2014: 14-19 - [c223]Byungho Min, Vijay Varadharajan:
A Simple and Novel Technique for Counteracting Exploit Kits. SecureComm (1) 2014: 259-277 - [c222]Udaya Kiran Tupakula, Vijay Varadharajan:
Trust Enhanced Cloud Security for Healthcare Services. TrustCom 2014: 344-351 - [c221]Byungho Min, Vijay Varadharajan:
Design and Analysis of a New Feature-Distributed Malware. TrustCom 2014: 457-464 - 2013
- [j58]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage. IEEE Trans. Inf. Forensics Secur. 8(12): 1947-1960 (2013) - [c220]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
Membership Encryption and Its Applications. ACISP 2013: 219-234 - [c219]Alan Lee, Vijay Varadharajan, Udaya Kiran Tupakula:
On Malware Characterization and Attack Classification. AWC 2013: 43-48 - [c218]Vijay Varadharajan, Udaya Kiran Tupakula:
On the Security of Tenant Transactions in the Cloud. CloudCom (1) 2013: 525-530 - [c217]Udaya Kiran Tupakula, Vijay Varadharajan:
Securing Mobile Devices from DoS Attacks. CSE 2013: 34-41 - [c216]Udaya Kiran Tupakula, Vijay Varadharajan:
Security Techniques for Counteracting Attacks in Mobile Healthcare Services. EUSPN/ICTH 2013: 374-381 - [c215]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control. ICETE (Selected Papers) 2013: 226-251 - [c214]Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan:
Secure RFID Ownership Transfer Protocols. ISPEC 2013: 189-203 - [c213]Byungho Min, Vijay Varadharajan:
Design and Analysis of a Sophisticated Malware Attack Against Smart Grid. ISC 2013: 130-139 - [c212]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
On RFID Authentication Protocols with Wide-Strong Privacy. RFIDSec Asia 2013: 3-16 - [c211]Shu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo:
A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation. RFIDSec Asia 2013: 31-43 - [c210]Sheikh Mahbub Habib, Vijay Varadharajan, Max Mühlhäuser:
A framework for evaluating trust of service providers in cloud marketplaces. SAC 2013: 1963-1965 - [c209]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control. SECRYPT 2013: 62-73 - [c208]Vijay Varadharajan, Udaya Kiran Tupakula:
Integrated Security Architecture for Virtual Machines. SecureComm 2013: 140-153 - [c207]Sheikh Mahbub Habib, Vijay Varadharajan, Max Mühlhäuser:
A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces. TrustCom/ISPA/IUCC 2013: 459-468 - [c206]Aarthi Krishna, Vijay Varadharajan, Nathan Tarr:
On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures. TrustCom/ISPA/IUCC 2013: 517-524 - [c205]Udaya Kiran Tupakula, Vijay Varadharajan:
Trust Enhanced Security Architecture for Detecting Insider Threats. TrustCom/ISPA/IUCC 2013: 552-559 - [c204]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage. TrustCom/ISPA/IUCC 2013: 560-569 - [e8]Tanveer A. Zia, Albert Y. Zomaya, Vijay Varadharajan, Zhuoqing Morley Mao:
Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 127, Springer 2013, ISBN 978-3-319-04282-4 [contents] - 2012
- [j57]Udaya Kiran Tupakula, Vijay Varadharajan:
Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines. Comput. J. 55(4): 397-409 (2012) - [j56]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
A flexible cryptographic approach for secure data storage in the cloud using role-based access control. Int. J. Cloud Comput. 1(2/3): 201-220 (2012) - [c203]Vijay Varadharajan:
Security and Trust in the Web. APWeb 2012: 20-21 - [c202]Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan:
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. ESORICS 2012: 253-270 - [c201]Udaya Kiran Tupakula, Vijay Varadharajan, Dipankar Dutta:
Intrusion detection techniques for virtual domains. HiPC 2012: 1-9 - [c200]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
A Pre-computable Signature Scheme with Efficient Verification for RFID. ISPEC 2012: 1-16 - [c199]Udaya Kiran Tupakula, Vijay Varadharajan:
Distributed service control technique for detecting security attacks. NOMS 2012: 574-577 - [c198]Vijay Varadharajan, Udaya Kiran Tupakula:
TREASURE: Trust Enhanced Security for Cloud Environments. TrustCom 2012: 145-152 - [c197]Huawei Zhao, Jiankun Hu, Jing Qin, Vijay Varadharajan, Haishan Wan:
Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks. TrustCom 2012: 706-713 - [c196]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems. TrustCom 2012: 714-721 - [c195]Steffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova, Hossen Asiful Mustafa, Wenyuan Xu, Vijay Varadharajan:
Tetherway: a framework for tethering camouflage. WISEC 2012: 149-160 - 2011
- [j55]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Enforcing Role-Based Access Control for Secure Data Storage in the Cloud. Comput. J. 54(10): 1675-1687 (2011) - [j54]Aarthi Nagarajan, Vijay Varadharajan:
Dynamic trust enhanced security model for trusted platform based services. Future Gener. Comput. Syst. 27(5): 564-573 (2011) - [j53]Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan, Barry G. Quinn:
Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 6(4): 1185-1199 (2011) - [c194]Caglar Ulucenk, Vijay Varadharajan, Venkatesan Balakrishnan, Udaya Kiran Tupakula:
Techniques for Analysing PDF Malware. APSEC 2011: 41-48 - [c193]Udaya Kiran Tupakula, Vijay Varadharajan, Naveen Akku:
Intrusion Detection Techniques for Infrastructure as a Service Cloud. DASC 2011: 744-751 - [c192]Chun Ruan, Vijay Varadharajan:
Reasoning about Dynamic Delegation in Role Based Access Control Systems. DASFAA (1) 2011: 239-253 - [c191]Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala:
Security Techniques for Beyond 3G Wireless Mobile Networks. EUC 2011: 136-143 - [c190]Udaya Kiran Tupakula, Vijay Varadharajan, Abhishek Bichhawat:
Security Architecture for Virtual Machines. ICA3PP (1) 2011: 218-229 - [c189]Udaya Kiran Tupakula, Vijay Varadharajan:
On the design of Virtual machine Intrusion detection system. Integrated Network Management 2011: 682-685 - [c188]Udaya Kiran Tupakula, Vijay Varadharajan:
Security techniques for zero day attacks. IWCMC 2011: 442-447 - [c187]Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan:
Analysis of packet loss for batch traffic arrivals in IEEE 802.15.4-based networks. LCN 2011: 117-122 - [c186]Vijay Varadharajan:
Rethinking cyber security. SIN 2011: 3-4 - [c185]Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala:
Counteracting DDoS attacks in WLAN. SIN 2011: 119-126 - [c184]Sebastian Ries, Sheikh Mahbub Habib, Max Mühlhäuser, Vijay Varadharajan:
CertainLogic: A Logic for Modeling Trust and Uncertainty - (Short Paper). TRUST 2011: 254-261 - [c183]Aarthi Krishna, Vijay Varadharajan:
A Hybrid Trust Model for Authorisation Using Trusted Platforms. TrustCom 2011: 288-295 - [c182]Udaya Kiran Tupakula, Vijay Varadharajan:
TVLAN: Trusted and Virtualised Local Area Networks. TrustCom 2011: 606-612 - [c181]Udaya Kiran Tupakula, Vijay Varadharajan:
TVDSEC: Trusted Virtual Domain Security. UCC 2011: 57-64 - 2010
- [j52]Chun Ruan, Vijay Varadharajan:
A graph theoretic approach to authorization delegation and conflict resolution in decentralised systems. Distributed Parallel Databases 27(1): 1-29 (2010) - [j51]Vijay Varadharajan:
Internet Filtering Issues and Challenges. IEEE Secur. Priv. 8(4): 62-65 (2010) - [j50]Ching Lin, Vijay Varadharajan:
MobileTrust: a trust enhanced security architecture for mobile agent systems. Int. J. Inf. Sec. 9(3): 153-178 (2010) - [j49]Junqi Zhang, Vijay Varadharajan:
Wireless sensor network key management survey and taxonomy. J. Netw. Comput. Appl. 33(2): 63-75 (2010) - [c180]Aarthi Nagarajan, Vijay Varadharajan:
Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms. DBSec 2010: 257-272 - [c179]Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Vijay Varadharajan, Abdul Sattar:
A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks. EUC 2010: 484-491 - [c178]Udaya Kiran Tupakula, Vijay Varadharajan:
Detecting Security Attacks in Trusted Virtual Domains. EUC 2010: 529-535 - [c177]Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens:
Analysis of Property Based Attestation in Trusted Platforms. EUC 2010: 833-840 - [c176]Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Vijay Varadharajan, Abdul Sattar:
A trust management architecture for hierarchical wireless sensor networks. LCN 2010: 264-267 - [c175]Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Abdul Sattar, Vijay Varadharajan:
A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks. MobiQuitous 2010: 186-197 - [c174]Hua Wang, Lili Sun, Vijay Varadharajan:
Purpose-Based Access Control Policies and Conflicting Analysis. SEC 2010: 217-228 - [c173]Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan, Alireza Mohammadi-Nodooshan:
Overhearing Gain Analysis in Low-Traffic CDMA Wireless Sensor Networks. SUTC/UMC 2010: 89-94 - [e7]Kai Rannenberg, Vijay Varadharajan, Christian Weber:
Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings. IFIP Advances in Information and Communication Technology 330, Springer 2010, ISBN 978-3-642-15256-6 [contents] - [e6]Oleg B. Makarevich, Atilla Elçi, Mehmet A. Orgun, Sorin A. Huss, Ludmila K. Babenko, Alexander G. Chefranov, Vijay Varadharajan:
Proceedings of the 3rd International Conference on Security of Information and Networks, SIN 2010, Rostov-on-Don, Russian Federation, September 7-11, 2010. ACM 2010, ISBN 978-1-4503-0234-0 [contents]
2000 – 2009
- 2009
- [j48]Vijay Varadharajan:
A Note on Trust-Enhanced Security. IEEE Secur. Priv. 7(3): 57-59 (2009) - [j47]Yan Wang, Kwei-Jay Lin, Duncan S. Wong, Vijay Varadharajan:
Trust management towards service-oriented applications. Serv. Oriented Comput. Appl. 3(2): 129-146 (2009) - [c172]Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens:
ALOPA: Authorization Logic for Property Attestation in Trusted Platforms. ATC 2009: 134-148 - [c171]Lei Li, Yan Wang, Vijay Varadharajan:
Fuzzy Regression Based Trust Prediction in Service-Oriented Applications. ATC 2009: 221-235 - [c170]Zaobin Gan, Juxia He, Qian Ding, Vijay Varadharajan:
Trust Relationship Modelling in E-commerce-Based Social Network. CIS (1) 2009: 206-210 - [c169]Rajan Shankaran, Vijay Varadharajan, Mehmet A. Orgun, Michael Hitchens:
Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks. COMPSAC (2) 2009: 188-193 - [c168]Chun Ruan, Vijay Varadharajan:
Reasoning on Weighted Delegatable Authorizations. DEXA 2009: 279-286 - [c167]Chun Ruan, Vijay Varadharajan:
Trust Enhanced Authorization for Mobile Agents. EC-Web 2009: 84-95 - [c166]Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala:
SBAC: Service Based Access Control. ICECCS 2009: 202-209 - [c165]Rajan Shankaran, Vijay Varadharajan, Mehmet A. Orgun, Michael Hitchens:
Critical Issues in Trust Management for Mobile Ad-Hoc Networks. IRI 2009: 97-100 - [c164]Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma:
Secure Interoperation in Multidomain Environments Employing UCON Policies. ISC 2009: 395-402 - [c163]Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Eimear Gallery:
Property Based Attestation and Trusted Computing: Analysis and Challenges. NSS 2009: 278-285 - [c162]Udaya Kiran Tupakula, Vijay Varadharajan, Srini Rao Pandalaneni:
DoSTRACK: a system for defending against DoS attacks. SAC 2009: 47-53 - [c161]Vijay Varadharajan:
Evolution and challenges in trust and security in information system infrastructures. SIN 2009: 1-2 - [c160]Eimear Gallery, Aarthi Nagarajan, Vijay Varadharajan:
A Property-Dependent Agent Transfer Protocol. TRUST 2009: 240-263 - [p2]Venkat Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula:
Trust Management in Mobile Ad Hoc Networks. Guide to Wireless Ad Hoc Networks 2009: 473-502 - [e5]Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan:
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009. ACM 2009, ISBN 978-1-60558-394-5 [contents] - 2008
- [j46]Udaya Kiran Tupakula, Vijay Varadharajan:
A hybrid model against TCP. SYN and reflection DDoS attacks. Comput. Syst. Sci. Eng. 23(3) (2008) - [j45]Yan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan:
Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments. Inf. Syst. E Bus. Manag. 6(1): 25-48 (2008) - [c159]Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora:
On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. DBSec 2008: 222-237 - [c158]Junqi Zhang, Vijay Varadharajan:
A New Security Scheme for Wireless Sensor Networks. GLOBECOM 2008: 128-132 - [c157]Weiliang Zhao, Vijay Varadharajan:
A Novel Approach of Web Search Based on Community Wisdom. ICIW 2008: 431-436 - [c156]Weiliang Zhao, Vijay Varadharajan:
Trust Management for Web Services. ICWS 2008: 818-821 - [c155]Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula:
Subjective logic based trust model for mobile ad hoc networks. SecureComm 2008: 30 - 2007
- [j44]David Foster, Vijay Varadharajan:
Trust-enhanced secure mobile agent-based system design. Int. J. Agent Oriented Softw. Eng. 1(2): 205-224 (2007) - [j43]Sarath Indrakanti, Vijay Varadharajan, Ritesh Agarwal:
On the design, implementation and application of an authorisation architecture for web services. Int. J. Inf. Comput. Secur. 1(1/2): 64-108 (2007) - [j42]Udaya Kiran Tupakula, Vijay Varadharajan, Ashok Kumar Gajam, Sunil Kumar Vuppala, Pandalaneni Naga Srinivasa Rao:
DDoS: design, implementation and analysis of automated model. Int. J. Wirel. Mob. Comput. 2(1): 72-85 (2007) - [c154]Ching Lin, Vijay Varadharajan:
A Hybrid Trust Model for Enhancing Security in Distributed Systems. ARES 2007: 35-42 - [c153]Venkatesan Balakrishnan, Vijay Varadharajan, Phillip Lucs, Udaya Kiran Tupakula:
Trust Enhanced Secure Mobile Ad-Hoc Network Routing. AINA Workshops (2) 2007: 27-33 - [c152]Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens:
Trust management for trusted computing platforms in web services. STC 2007: 58-62 - [c151]Zaobin Gan, Jiufei Tang, Ping Wu, Vijay Varadharajan:
A Novel Security Risk Evaluation for Information Systems. FCST 2007: 67-73 - [c150]Yan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan:
The Design of A Rule-based and Event-driven Trust Management Framework. ICEBE 2007: 97-104 - [c149]Junqi Zhang, Yan Wang, Vijay Varadharajan:
A New Security Scheme for Integration of Mobile Agents and Web Services. ICIW 2007: 43 - [c148]Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula, Phillip Lucs:
Trust and Recommendations in Mobile Ad hoc Networks. ICNS 2007: 64 - [c147]Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula, Phillip Lucs:
TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks. ICON 2007: 182-187 - [c146]Venkat Balakrishnan, Vijay Varadharajan, Uday Kiran Tupakula, Phillip Lucs:
Trust Integrated Cooperation Architecture for Mobile Ad-hoc Networks. ISWCS 2007: 592-596 - [c145]Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens:
Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services. PDCAT 2007: 453-460 - [c144]Junqi Zhang, Yan Wang, Vijay Varadharajan:
Mobile Agent and Web Service Integration Security Architecture. SOCA 2007: 172-179 - [c143]Yan Wang, Vijay Varadharajan:
Role-based Recommendation and Trust Evaluation. CEC/EEE 2007: 278-288 - 2006
- [j41]Weiliang Zhao, Vijay Varadharajan, George Bryan:
General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing. J. Comput. 1(2): 42-53 (2006) - [c142]Ching Lin, Vijay Varadharajan:
Trust Based Risk Management for Distributed System Security - A New Approach. ARES 2006: 6-13 - [c141]Udaya Kiran Tupakula, Vijay Varadharajan:
Analysis of traceback techniques. ACSW 2006: 115-124 - [c140]Junqi Zhang, Vijay Varadharajan, Yi Mu:
A Scalable Multi-service Group Key Management Scheme. AICT/ICIW 2006: 172 - [c139]Ching Lin, Vijay Varadharajan:
Trust Enhanced Security - A New Philosophy for Secure Collaboration of Mobile Agents. CollaborateCom 2006 - [c138]Chun Ruan, Vijay Varadharajan:
Implementing Authorization Delegations Using Graph. DEXA 2006: 904-913 - [c137]Chun Ruan, Vijay Varadharajan:
Integration of Graph Based Authorization Policies. ISMIS 2006: 359-368 - [c136]Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula:
Fellowship: Defense against Flooding and Packet Drop Attacks in MANET. NOMS 2006 - [c135]Zaobin Gan, Vijay Varadharajan:
Design and Implementation of a Practical Secure Distributed Healthcare Application. SECRYPT 2006: 431-436 - [c134]Zaobin Gan, Dengwei Wei, Vijay Varadharajan:
Improving Software Security Through an Integrated Approach. SECRYPT 2006: 437-442 - [c133]Weiliang Zhao, Vijay Varadharajan, George Bryan:
A Unified Framework for Trust Management. SecureComm 2006: 1-8 - [c132]Junqi Zhang, Vijay Varadharajan, Yi Mu:
ID-based Secure PIM-SM Schemes. Wireless and Optical Communications 2006: 190-195 - 2005
- [j40]Junqi Zhang, Vijay Varadharajan, Yi Mu:
Secure distribution and access of XML documents. Int. J. High Perform. Comput. Netw. 3(5/6): 356-365 (2005) - [j39]Yun Bai, Yan Zhang, Vijay Varadharajan:
On the sequence of authorization policy transformations. Int. J. Inf. Sec. 4(1-2): 120-131 (2005) - [j38]Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens:
Authorization Service for Web Services and its Application in a Health Care Domain. Int. J. Web Serv. Res. 2(4): 94-119 (2005) - [j37]Yan Wang, Vijay Varadharajan:
Secure route structures for parallel mobile agents based systems using fast binary dispatch. Mob. Inf. Syst. 1(3): 185-205 (2005) - [c131]Yan Wang, Vijay Varadharajan:
Trust2: Developing Trust in Peer-to-Peer Environments. IEEE SCC 2005: 24-34 - [c130]Venkatesan Balakrishnan, Vijay Varadharajan:
Designing Secure Wireless Mobile Ad Hoc Networks. AINA 2005: 5-8 - [c129]Sarath Indrakanti, Vijay Varadharajan:
An Authorization Architecture for Web Services. DBSec 2005: 222-236 - [c128]Yan Wang, Vijay Varadharajan:
Two-Phase Peer Evaluation in P2P E-Commerce Environments. EEE 2005: 654-657 - [c127]Huu Tran, Michael Hitchens, Vijay Varadharajan, Paul Andrew Watters:
A Trust based Access Control Framework for P2P File-Sharing Systems. HICSS 2005 - [c126]Yan Wang, Vijay Varadharajan:
A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments. IAT 2005: 88-94 - [c125]Weiliang Zhao, Vijay Varadharajan, George Bryan:
Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments. ICEIS (3) 2005: 331-336 - [c124]Vijay Varadharajan:
Authorization and Trust Enhanced Security for Distributed Applications. ICISS 2005: 1-20 - [c123]Weiliang Zhao, Vijay Varadharajan, George Bryan:
Analysis and Modelling of Trust in Distributed Information Systems. ICISS 2005: 106-119 - [c122]Zaobin Gan, Dengwen Wei, Jin-Long Zhang, Vijay Varadharajan:
Business-Process-Oriented Software Requirements Automatic Generator. ICITA (1) 2005: 95-98 - [c121]Zaobin Gan, Dengwen Wei, Vijay Varadharajan:
Evaluating the Performance and Scalability of Web Application Systems. ICITA (1) 2005: 111-114 - [c120]David Foster, Vijay Varadharajan:
Security and Trust Enhanced Mobile Agent Based System Design. ICITA (1) 2005: 155-160 - [c119]Zaobin Gan, Ching Lin, Vijay Varadharajan:
A Middleware-Based Script Language. ICMB 2005: 690-693 - [c118]Huu Tran, Paul A. Watters, Michael Hitchens, Vijay Varadharajan:
Trust and authorization in the grid: a recommendation model. ICPS 2005: 433-436 - [c117]Chun Ruan, Vijay Varadharajan:
Data Protection in Distributed Database Systems. ISMIS 2005: 191-199 - [c116]Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens:
Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture. ISWS 2005: 35-44 - [c115]Weiliang Zhao, Vijay Varadharajan:
Efficient TTP-Free Mental Poker Protocols. ITCC (1) 2005: 745-750 - [c114]Venkatesan Balakrishnan, Vijay Varadharajan:
Short Paper: Fellowship in Mobile Ad hoc Networks. SecureComm 2005: 225-227 - [c113]Ching Lin, Vijay Varadharajan, Yan Wang:
Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. TrustBus 2005: 151-160 - [c112]Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi:
Trust Enhanced Security for Mobile Agents. CEC 2005: 231-238 - [c111]Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens:
Architectural Framework for Web Services Authorization. WSMDEIS 2005: 75-84 - 2004
- [j36]Vijay Varadharajan, Rajan Shankaran, Michael Hitchens:
Security for cluster based ad hoc networks. Comput. Commun. 27(5): 488-501 (2004) - [j35]Weiliang Zhao, Vijay Varadharajan, George Bryan:
Fair Trading Protocol with Offline Anonymous Credit Card Payment. Inf. Secur. J. A Glob. Perspect. 13(3): 41-47 (2004) - [j34]Udaya Kiran Tupakula, Vijay Varadharajan:
Tracing DoS Floods: An Automated Approach. J. Netw. Syst. Manag. 12(1): 111-135 (2004) - [j33]Ghassan Chaddoud, Vijay Varadharajan, Isabelle Chrisment, André Schaff:
Gestion efficace de la sécurité des communications de groupe pour le service SSM. Tech. Sci. Informatiques 23(9): 1107-1135 (2004) - [c110]Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi:
Enhancing Grid Security with Trust Management. IEEE SCC 2004: 303-310 - [c109]Michael Hitchens, Rajan Shankaran, Vijay Varadharajan:
Securing the Ad-Hoc On-demand Distance Vector Protocol. PDCS 2004: 353-360 - [c108]Chun Ruan, Vijay Varadharajan:
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. ACISP 2004: 402-413 - [c107]Junqi Zhang, Vijay Varadharajan, Yi Mu:
Securing XML Document Sources and Their Distribution. AINA (1) 2004: 562-567 - [c106]Yan Wang, Vijay Varadharajan:
Interaction Trust Evaluation in Decentralized Environments. EC-Web 2004: 144-153 - [c105]Udaya Kiran Tupakula, Vijay Varadharajan, Ashok Kumar Gajam:
Counteracting TCP SYN DDoS attacks using automated model. GLOBECOM 2004: 2240-2244 - [c104]Ghassan Chaddoud, Vijay Varadharajan:
Efficient secure group management for SSM. ICC 2004: 1436-1440 - [c103]Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens:
Authorization Service for Web Services and its Implementation. ICWS 2004: 774-777 - [c102]Junqi Zhang, Vijay Varadharajan, Yi Mu:
A Secure PIM-SM Multicast Routing Protocol. IWDC 2004: 276-288 - [c101]Weiliang Zhao, Vijay Varadharajan, George Bryan:
Fair Trading Protocol With Off-line Anonymous Credit Card Payment. WOSIS 2004: 186-195 - [c100]Weiliang Zhao, Vijay Varadharajan, George Bryan:
Modelling Trust Relationships in Distributed Environments. TrustBus 2004: 40-49 - [c99]Ching Lin, Vijay Varadharajan, Yan Wang, Yi Mu:
On the Design of a New Trust Model for Mobile Agent Security. TrustBus 2004: 60-69 - [c98]Vijay Varadharajan:
Trustworthy Computing (Extended Abstract). WISE 2004: 13-16 - [c97]Yan Wang, Vijay Varadharajan:
A Time-Based Peer Trust Evaluation in P2P E-commerce Environments. WISE 2004: 730-735 - [e4]Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan:
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings. Lecture Notes in Computer Science 3108, Springer 2004, ISBN 3-540-22379-7 [contents] - 2003
- [j32]Yun Bai, Vijay Varadharajan:
On transformation of authorization policies. Data Knowl. Eng. 45(3): 333-357 (2003) - [j31]Yi Mu, Junqi Zhang, Vijay Varadharajan, Yan-Xia Lin:
Robust non-interactive oblivious transfer. IEEE Commun. Lett. 7(4): 153-155 (2003) - [j30]Chun Ruan, Vijay Varadharajan:
A formal graph based framework for supporting authorization delegations and conflict resolutions. Int. J. Inf. Sec. 1(4): 211-222 (2003) - [j29]Hua Wang, Yanchun Zhang, Jinli Cao, Vijay Varadharajan:
Achieving secure and flexible M-services through tickets. IEEE Trans. Syst. Man Cybern. Part A 33(6): 697-708 (2003) - [j28]Vijay Varadharajan, David Foster:
A Security Architecture for Mobile Agent Based Applications. World Wide Web 6(1): 93-122 (2003) - [c96]Ching Lin, Vijay Varadharajan:
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. ACNS 2003: 176-190 - [c95]Chun Ruan, Vijay Varadharajan:
An Authorization Model for E-consent Requirement in a Health Care Application. ACNS 2003: 191-205 - [c94]Udaya Kiran Tupakula, Vijay Varadharajan:
A Practical Method to Counteract Denial of Service Attacks. ACSC 2003: 275-284 - [c93]Weiliang Zhao, Vijay Varadharajan, Yi Mu:
A Secure Mental Poker Protocol Over The Internet. ACSW 2003: 105-109 - [c92]Chun Ruan, Vijay Varadharajan, Yan Zhang:
Delegatable Authorization Program and Its Application. Security and Management 2003: 267-273 - [c91]Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi:
Secure Authorisation for Web Services. DBSec 2003: 163-175 - [c90]Chun Ruan, Vijay Varadharajan:
Decentralized Temporal Authorization Administration. DEXA 2003: 917-926 - [c89]Munirul Islam, Johnson P. Thomas, Vijay Varadharajan:
Reducing the scope of denial of service attacks in QoS routing. GLOBECOM 2003: 1368-1373 - [c88]Sarath Indrakanti, Vijay Varadharajan, Rajat Kumar Todi:
Authorisation Service in .Net My Services. ICWI 2003: 1115-1118 - [c87]Gregory Saunders, Michael Hitchens, Vijay Varadharajan:
Role-Based Access Control and the Access Control Matrix. ICICS 2003: 145-157 - [c86]Junqi Zhang, Vijay Varadharajan, Yi Mu:
A novel dynamic key management scheme for secure multicasting. ICON 2003: 391-395 - [c85]Udaya Kiran Tupakula, Vijay Varadharajan:
Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture. ICON 2003: 455-460 - [c84]Chun Ruan, Vijay Varadharajan, Yan Zhang:
Evaluation of Authorization with Delegation and Negation. IIS 2003: 547-551 - [c83]Udaya Kiran Tupakula, Vijay Varadharajan:
A Controller Agent Model to Counteract DoS Attacks in Multiple Domains. Integrated Network Management 2003: 113-116 - [c82]Chun Ruan, Vijay Varadharajan:
Supporting E-consent on Health Data by Logic. ISMIS 2003: 392-396 - [c81]Chun Ruan, Vijay Varadharajan, Yan Zhang:
A Logic Model for Temporal Authorization Delegation with Negation. ISC 2003: 310-324 - [c80]Rajan Shankaran, Vijay Varadharajan, Michael Hitchens:
A secure multicast support framework for Mobile IP. WCNC 2003: 2114-2119 - 2002
- [j27]Yun Bai, Vijay Varadharajan:
Object Oriented Database with Authorization Policies. Fundam. Informaticae 53(3-4): 229-250 (2002) - [j26]Yi Mu, Vijay Varadharajan:
Group Cryptography: Signature and Encryption. Informatica (Slovenia) 26(3) (2002) - [j25]Guangrong Chen, Vijay Varadharajan, Pradeep Ray, P. Zuluaga:
Management for eBusiness in the New Millennium: A Report on APNOMS 2001. J. Netw. Syst. Manag. 10(2): 255-259 (2002) - [c79]Chun Ruan, Vijay Varadharajan:
Resolving Conflicts in Authorization Delegations. ACISP 2002: 271-285 - [c78]Michael Hitchens, Vijay Varadharajan, Gregory Saunders:
Policy Administration Domains. ACISP 2002: 286-302 - [c77]Yi Mu, Junqi Zhang, Vijay Varadharajan:
m out of n Oblivious Transfer. ACISP 2002: 395-405 - [c76]Junqi Zhang, Vijay Varadharajan, Yi Mu:
A Secure Object Sharing Scheme for Java Card. ICICS 2002: 243-251 - [c75]Chun Ruan, Vijay Varadharajan, Yan Zhang:
Logic-Based Reasoning on Delegatable Authorizations. ISMIS 2002: 185-193 - [c74]Michael Hitchens, Vijay Varadharajan, Gregory Saunders:
Security Policy Management in Distributed Systems. IASTED PDCS 2002: 290-294 - [c73]Rajan Shankaran, Vijay Varadharajan, Michael Hitchens:
Secure Multicast Support for Mobile IP with Hierarchical Registration Approach. IASTED PDCS 2002: 851-856 - 2001
- [j24]Gregory Saunders, Michael Hitchens, Vijay Varadharajan:
Role-Based Access Control and the Access Control Matrix. ACM SIGOPS Oper. Syst. Rev. 35(4): 6-20 (2001) - [c72]Vlad Ingar Wietrzyk, Makoto Takizawa, Vijay Varadharajan:
A Strategy for MLS Workflow. ACISP 2001: 159-175 - [c71]Yan Zhang, Vijay Varadharajan:
A Logic for Modeling the Dynamics of Beliefs in Cryptographic Protocols. ACSC 2001: 215-222 - [c70]Pascal Molli, Hala Skaf-Molli, Claude Godart, Pradeep Ray, Rajan Shankaran, Vijay Varadharajan:
Integrating Network Services for Virtual Teams. ICEIS (2) 2001: 1034-1039 - [c69]Michael Hitchens, Vijay Varadharajan:
RBAC for XML Document Stores. ICICS 2001: 131-143 - [c68]Chuan-Kun Wu, Vijay Varadharajan:
Fair Exchange of Digital Signatures with Offline Trusted Third Party. ICICS 2001: 466-470 - [c67]Vlad Ingar Wietrzyk, Makoto Takizawa, Mehmet A. Orgun, Vijay Varadharajan:
A Secure Transaction Environment for Workflows in Distributed Systems. ICPADS 2001: 198-208 - [c66]Rajan Shankaran, Vijay Varadharajan, Michael Hitchens:
A Distributed Location Management Scheme for Mobile Hosts. ICPADS 2001: 297-304 - [c65]Yi Mu, Vijay Varadharajan:
Robust and Secure Broadcasting. INDOCRYPT 2001: 223-231 - [c64]Yi Mu, Khanh Quoc Nguyen, Vijay Varadharajan:
A Fair Electronic Cash Scheme. ISEC 2001: 20-32 - [c63]Rajan Shankaran, Vijay Varadharajan, Michael Hitchens:
Secure Distributed Location Management Scheme for Mobile Hosts. LCN 2001: 296-305 - [c62]Vijay Varadharajan:
Secure Networked Computing. MMM-ACNS 2001: 27 - [c61]Michael Hitchens, Vijay Varadharajan:
Tower: A Language for Role Based Access Control. POLICY 2001: 88-106 - [p1]Hongxue Wang, Vijay Varadharajan, Yan Zhang:
A New Approach to Reasoning About Accountability in Cryptographic Protocols for E-Commerce. E-Commerce Security and Privacy 2001: 113-131 - [e3]Vijay Varadharajan, Yi Mu:
Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings. Lecture Notes in Computer Science 2119, Springer 2001, ISBN 3-540-42300-1 [contents] - 2000
- [j23]Michael Hitchens, Vijay Varadharajan:
Design and specification of role based access control policies. IEE Proc. Softw. 147(4): 117-129 (2000) - [j22]Vijay Varadharajan, Chuan-Kun Wu:
Public key cryptosystems based on boolean permutations and their applications. Int. J. Comput. Math. 74(2): 167-184 (2000) - [c60]Yi Mu, Vijay Varadharajan:
Fail-Stop Confirmer Signatures. ACISP 2000: 368-377 - [c59]Weiliang Zhao, Vijay Varadharajan, Yi Mu:
Fair On-line Gambling. ACSAC 2000: 394-400 - [c58]Vlad Ingar Wietrzyk, Mehmet A. Orgun, Vijay Varadharajan:
On the Analysis of On-Line Database Reorganization. ADBIS-DASFAA 2000: 293-306 - [c57]Yi Mu, Vijay Varadharajan:
Towards a Protection Model for Supporting Multiple Access Control Policies. Australasian Database Conference 2000: 107-114 - [c56]Vijay Varadharajan:
Security enhanced mobile agents. CCS 2000: 200-209 - [c55]Hongxue Wang, Vijay Varadharajan, Yan Zhang:
Towards a Generic Logic for Analysing Network Protocols. ICDCS Workshop on Internet 2000: A19-A26 - [c54]Yi Mu, Vijay Varadharajan:
An Internet Anonymous Auction Scheme. ICISC 2000: 171-182 - [c53]Yi Mu, Vijay Varadharajan:
Distributed Signcryption. INDOCRYPT 2000: 155-164 - [c52]Michael Hitchens, Vijay Varadharajan:
Elements of a Language for Role-Based Access Control. SEC 2000: 371-380
1990 – 1999
- 1999
- [j21]Vijay Varadharajan, Rajan Shankaran, Michael Hitchens:
On the design of secure ATM networks. Comput. Commun. 22(15-16): 1512-1525 (1999) - [j20]Vijay Varadharajan, Khanh Quoc Nguyen, Yi Mu:
On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. Theor. Comput. Sci. 226(1-2): 173-184 (1999) - [c51]Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:
Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. ACISP 1999: 117-128 - [c50]Yun Bai, Vijay Varadharajan:
Authorization in Object Oriented Databases. ACISP 1999: 270-280 - [c49]Gregory Saunders, Michael Hitchens, Vijay Varadharajan:
An Analysis of Access Control Models. ACISP 1999: 281-293 - [c48]Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan:
How to Prove That a Committed Number Is Prime. ASIACRYPT 1999: 208-218 - [c47]Yun Bai, Vijay Varadharajan:
A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. DBSec 1999: 317-330 - [c46]Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu:
Batching Proofs of Knowledge and Its Applications. DEXA Workshop 1999: 844-849 - [c45]Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan:
Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. DEXA Workshop 1999: 858-863 - [c44]Michael Hitchens, Vijay Varadharajan:
Issues in the Design of a Language for Role Based Access Control. ICICS 1999: 22-38 - [c43]Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan:
Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. ICICS 1999: 103-118 - [c42]Yuko Murayama, Vijay Varadharajan:
Message from the IWSEC Workshop Co-Chairs. ICPP Workshops 1999: 132-133 - [c41]Chuan-Kun Wu, Vijay Varadharajan:
Modified Chinese Remainder Theorem and Its Application to Proxy Signatures. ICPP Workshops 1999: 146-153 - [c40]Yi Mu, Vijay Varadharajan, Khanh Quoc Nguyen:
Delegated Decryption. IMACC 1999: 258-269 - [c39]Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:
Undeniable Confirmer Signature. ISW 1999: 235-246 - [c38]Rajan Shankaran, Vijay Varadharajan, Michael Hitchens:
Secure Multicast Extensions for Mobile Networks. LCN 1999: 106-116 - [c37]Yun Bai, Vijay Varadharajan:
On Formal Languages for Sequences of Authorization Transformations. SAFECOMP 1999: 375-384 - [c36]Hongxue Wang, Vijay Varadharajan, John K. Slaney:
Towards Perfect Objects. TOOLS (32) 1999: 115-126 - [e2]Vijay Varadharajan, Yi Mu:
Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings. Lecture Notes in Computer Science 1726, Springer 1999, ISBN 3-540-66682-6 [contents] - 1998
- [c35]Yun Bai, Vijay Varadharajan:
A High Level Language for Conventional Access Control Models. ACISP 1998: 273-283 - [c34]Vijay Varadharajan, Chris Crall, Joe Pato:
Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. ACSAC 1998: 178-189 - [c33]Rajan Shankaran, Vijay Varadharajan:
Secure Signaling and Access Control for ATM Networks. ACSAC 1998: 212-222 - [c32]Yi Mu, Vijay Varadharajan:
Anonymous Secure E-Voting Over a Network. ACSAC 1998: 293-299 - [c31]Yi Mu, Vijay Varadharajan:
A New Scheme of Credit based Payment for Electronic Commerce. LCN 1998: 278-284 - [c30]Hongxue Wang, Vijay Varadharajan, Yan Zhang:
A Secure Communication Scheme for Multiagent Systems. PRIMA 1998: 174-185 - 1997
- [j19]Vijay Varadharajan, Panos Katsavos:
High-speed network security. I. SMDS and frame relay. Comput. Commun. 20(10): 832-847 (1997) - [j18]Vijay Varadharajan:
Extending the Schematic Protection Model II: Revocation. ACM SIGOPS Oper. Syst. Rev. 31(1): 64-77 (1997) - [c29]Yun Bai, Vijay Varadharajan:
Analysis and Implementation of a Formal Authorisation Policy Design Approach. ACISP 1997: 14-25 - [c28]Vijay Varadharajan, Rajan Shankaran, Michael Hitchens:
Security Issues in Asynchronous Transfer Mode. ACISP 1997: 76-89 - [c27]Yi Mu, Vijay Varadharajan, Yan-Xia Lin:
New Micropayment Schemes Based on PayWords. ACISP 1997: 283-293 - [c26]Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:
Micro-Digital Money for Electronic Commerce. ACSAC 1997: 2-8 - [c25]Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:
Secure and Efficient Digital Coins. ACSAC 1997: 9-15 - [c24]Yun Bai, Vijay Varadharajan:
A Logic For State Transformations in Authorization Policies. CSFW 1997: 173-182 - [c23]Yun Bai, Vijay Varadharajan:
A language for specifying sequences of authorization transformations and its applications. ICICS 1997: 39-49 - [c22]Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu:
A New Efficient Off-line Anonymous Cash Scheme. ISAAC 1997: 193-201 - [c21]Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan:
A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. ISW 1997: 313-320 - [c20]Vijay Varadharajan, Rajan Shankaran, Michael Hitchens:
Security services and public key infrastructure for ATM networks. LCN 1997: 253-262 - [c19]Yun Bai, Vijay Varadharajan:
A Formal Security Design Approach for Transformation of Authorizations in Information Systems. PACIS 1997: 81 - [e1]Vijay Varadharajan, Josef Pieprzyk, Yi Mu:
Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings. Lecture Notes in Computer Science 1270, Springer 1997, ISBN 3-540-63232-8 [contents] - 1996
- [j17]Vijay Varadharajan, Claudio Calvelli:
Key management for a secure LAN-SMDS network. Comput. Commun. 19(9-10): 813-823 (1996) - [j16]Vijay Varadharajan, Claudio Calvelli:
Extending the schematic protection model - II. Revocation. Comput. Secur. 15(6): 525-536 (1996) - [j15]Vijay Varadharajan, Phillip Allen:
Joint Actions Based Authorization Schemes. ACM SIGOPS Oper. Syst. Rev. 30(3): 32-45 (1996) - [j14]Vijay Varadharajan, Claudio Calvelli:
An Access Control Model and Its Use in Representing Mental Health Application Access Policy. IEEE Trans. Knowl. Data Eng. 8(1): 81-95 (1996) - [c18]Yi Mu, Vijay Varadharajan:
On the design of security protocols for mobile communications. ACISP 1996: 134-145 - [c17]Vijay Varadharajan, Phillip Allen:
Support for joint action based security policies. ACISP 1996: 207-218 - [c16]Vijay Varadharajan, Yi Mu:
On The Design Of Secure Electronic Payment Schemes For Internet. ACSAC 1996: 78-87 - [c15]Michael Hitchens, Vijay Varadharajan:
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. ACSAC 1996: 105-116 - [c14]Vijay Varadharajan, Yi Mu:
Design of Secure End-toEnd Protocols for Mobile Systems. IFIP World Conference on Mobile Communications 1996: 258-266 - [c13]Vijay Varadharajan:
Security in High-Speed Networks. LCN 1996: 2-11 - [c12]Vijay Varadharajan, Thomas Hardjono:
Security model for distributed object framework and its applicability to CORBA. SEC 1996: 452-463 - [c11]Vijay Varadharajan:
Design of enterprise-wide secure networked system. WETICE 1996: 100-105 - 1994
- [j13]Panos Katsavos, Vijay Varadharajan:
A Secure Frame Relay Service. Comput. Networks ISDN Syst. 26(12): 1539-1558 (1994) - [c10]Vijay Varadharajan, Claudio Calvelli:
Extending the schematic protection model. I. Conditional tickets and authentication. S&P 1994: 213-229 - 1993
- [j12]Panagiotis Katsavos, Vijay Varadharajan:
Security protocol for Frame Relay. Comput. Commun. Rev. 23(5): 17-35 (1993) - [j11]Claudio Calvelli, Vijay Varadharajan:
Authentication and Revocation in SPM (Extended Abstract). ACM SIGOPS Oper. Syst. Rev. 27(4): 42-57 (1993) - [c9]Claudio Calvelli, Vijay Varadharajan:
Representation of mental health application access policy in a monotonic model. ACSAC 1993: 195-209 - 1992
- [c8]Claudio Calvelli, Vijay Varadharajan:
An Analysis of some Delegation Protocols for Distributed Systems. CSFW 1992: 92-110 - 1991
- [j10]Chris J. Mitchell, Vijay Varadharajan:
Modified forms of cipher block chaining. Comput. Secur. 10(1): 37-40 (1991) - [j9]Vijay Varadharajan, Stewart Black:
Multilevel security in a distributed object-oriented system. Comput. Secur. 10(1): 51-68 (1991) - [j8]Vijay Varadharajan:
A petri net model for system design and refinement. J. Syst. Softw. 15(3): 239-250 (1991) - [c7]Vijay Varadharajan:
Hook-Up Property of Information Flow Secure Nets. CSFW 1991: 154-175 - [c6]Vijay Varadharajan, Phillip Allen, Stewart Black:
An Analysis of the Proxy Problem in Distributed Systems. S&P 1991: 255-277 - 1990
- [j7]Vijay Varadharajan:
A mathematical model for system design and refinement. Int. J. Comput. Math. 34(1-2): 13-31 (1990) - [c5]Vijay Varadharajan, Stewart Black:
A multilevel security model for a distributed object-oriented system. ACSAC 1990: 68-78 - [c4]Vijay Varadharajan:
Network Security Policy Models. AUSCRYPT 1990: 74-95 - [c3]Vijay Varadharajan:
Petri Net Based Modelling of Information Flow Security Requirements. CSFW 1990: 51-61 - [c2]Vijay Varadharajan:
A Multilevel Security Policy for Networks. INFOCOM 1990: 710-718
1980 – 1989
- 1989
- [j6]Vijay Varadharajan:
Verification of network security protocols. Comput. Secur. 8(8): 693-708 (1989) - 1987
- [j5]Vijay Varadharajan, Keith D. Baker:
Net-Based System Design Representation and Analysis. Comput. Syst. Sci. Eng. 2(4): 167-178 (1987) - [j4]Vijay Varadharajan, Keith D. Baker:
Directed graph based representation for software system design. Softw. Eng. J. 2(1): 21-28 (1987) - 1985
- [j3]Vijay Varadharajan, Peter W. Sanders:
Practical secure electronic mail system with public key distribution. Comput. Commun. 8(3): 121-127 (1985) - [j2]Vijay Varadharajan, Robert W. K. Odoni:
Extension of RSA Cryptosystems to Matrix Rings. Cryptologia 9(2): 140-153 (1985) - [c1]Vijay Varadharajan:
Trapdoor Rings and Their Use in Cryptography. CRYPTO 1985: 369-395 - 1983
- [j1]Peter W. Sanders, Vijay Varadharajan:
Secure communications between microcomputer systems. Comput. Commun. 6(5): 245-252 (1983)
Coauthor Index
aka: Venkat Balakrishnan
aka: Uday Kiran Tupakula
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint