2013
242Secure RFID Ownership Transfer Protocols. Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan. ISPEC 2013, 189-203. Web SearchBibTeXDownload
241A framework for evaluating trust of service providers in cloud marketplaces. Sheikh Mahbub Habib, Vijay Varadharajan, Max Mühlhäuser. SAC 2013, 1963-1965. Web SearchBibTeXDownload
2012
240Security and Trust in the Web. Vijay Varadharajan. APWeb 2012, 20-21. Web SearchBibTeXDownload
239Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines. Udaya Kiran Tupakula, Vijay Varadharajan. Comput. J. (55): 397-409 (2012). Web SearchBibTeXDownload
238The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan. ESORICS 2012, 253-270. Web SearchBibTeXDownload
237Intrusion detection techniques for virtual domains. Udaya Kiran Tupakula, Vijay Varadharajan, Dipankar Dutta. HiPC 2012, 1-9. Web SearchBibTeXDownload
236A flexible cryptographic approach for secure data storage in the cloud using role-based access control. Lan Zhou, Vijay Varadharajan, Michael Hitchens. IJCC (1): 201-220 (2012). Web SearchBibTeXDownload
235A Pre-computable Signature Scheme with Efficient Verification for RFID. Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan. ISPEC 2012, 1-16. Web SearchBibTeXDownload
234Distributed service control technique for detecting security attacks. Udaya Kiran Tupakula, Vijay Varadharajan. NOMS 2012, 574-577. Web SearchBibTeXDownload
233Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems. Lan Zhou, Vijay Varadharajan, Michael Hitchens. TrustCom 2012, 714-721. Web SearchBibTeXDownload
232Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks. Huawei Zhao, Jiankun Hu, Jing Qin, Vijay Varadharajan, Haishan Wan. TrustCom 2012, 706-713. Web SearchBibTeXDownload
231TREASURE: Trust Enhanced Security for Cloud Environments. Vijay Varadharajan, Udaya Kiran Tupakula. TrustCom 2012, 145-152. Web SearchBibTeXDownload
230Tetherway: a framework for tethering camouflage. Steffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova, Hossen A. Mustafa, Wenyuan Xu, Vijay Varadharajan. WISEC 2012, 149-160. Web SearchBibTeXDownload
2011
229Techniques for Analysing PDF Malware. Caglar Ulucenk, Vijay Varadharajan, Venkatesan Balakrishnan, Udaya Kiran Tupakula. APSEC 2011, 41-48. Web SearchBibTeXDownload
228Enforcing Role-Based Access Control for Secure Data Storage in the Cloud. Lan Zhou, Vijay Varadharajan, Michael Hitchens. Comput. J. (54): 1675-1687 (2011). Web SearchBibTeXDownload
227Intrusion Detection Techniques for Infrastructure as a Service Cloud. Udaya Kiran Tupakula, Vijay Varadharajan, Naveen Akku. DASC 2011, 744-751. Web SearchBibTeXDownload
226Reasoning about Dynamic Delegation in Role Based Access Control Systems. Chun Ruan, Vijay Varadharajan. DASFAA (1) 2011, 239-253. Web SearchBibTeXDownload
225Security Techniques for Beyond 3G Wireless Mobile Networks. Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala. EUC 2011, 136-143. Web SearchBibTeXDownload
224Dynamic trust enhanced security model for trusted platform based services. Aarthi Nagarajan, Vijay Varadharajan. Future Generation Comp. Syst. (27): 564-573 (2011). Web SearchBibTeXDownload
223Security Architecture for Virtual Machines. Udaya Kiran Tupakula, Vijay Varadharajan, Abhishek Bichhawat. ICA3PP (1) 2011, 218-229. Web SearchBibTeXDownload
222Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks. Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan, Barry G. Quinn. IEEE Transactions on Information Forensics and Security (6): 1185-1199 (2011). Web SearchBibTeXDownload
221On the design of Virtual machine Intrusion detection system. Udaya Kiran Tupakula, Vijay Varadharajan. Integrated Network Management 2011, 682-685. Web SearchBibTeXDownload
220Security techniques for zero day attacks. Udaya Kiran Tupakula, Vijay Varadharajan. IWCMC 2011, 442-447. Web SearchBibTeXDownload
219Analysis of packet loss for batch traffic arrivals in IEEE 802.15.4-based networks. Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan. LCN 2011, 117-122. Web SearchBibTeXDownload
218Counteracting DDoS attacks in WLAN. Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala. SIN 2011, 119-126. Web SearchBibTeXDownload
217Rethinking cyber security. Vijay Varadharajan. SIN 2011, 3-4. Web SearchBibTeXDownload
216CertainLogic: A Logic for Modeling Trust and Uncertainty - (Short Paper). Sebastian Ries, Sheikh Mahbub Habib, Max Mühlhäuser, Vijay Varadharajan. TRUST 2011, 254-261. Web SearchBibTeXDownload
215TVDSEC: Trusted Virtual Domain Security. Udaya Kiran Tupakula, Vijay Varadharajan. UCC 2011, 57-64. Web SearchBibTeXDownload
2010
214Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms. Aarthi Nagarajan, Vijay Varadharajan. DBSec 2010, 257-272. Web SearchBibTeXDownload
213A graph theoretic approach to authorization delegation and conflict resolution in decentralised systems. Chun Ruan, Vijay Varadharajan. Distributed and Parallel Databases (27): 1-29 (2010). Web SearchBibTeXDownload
212A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks. Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Vijay Varadharajan, Abdul Sattar. EUC 2010, 484-491. Web SearchBibTeXDownload
211Analysis of Property Based Attestation in Trusted Platforms. Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens. EUC 2010, 833-840. Web SearchBibTeXDownload
210Detecting Security Attacks in Trusted Virtual Domains. Udaya Kiran Tupakula, Vijay Varadharajan. EUC 2010, 529-535. Web SearchBibTeXDownload
209Internet Filtering Issues and Challenges. Vijay Varadharajan. IEEE Security & Privacy (8): 62-65 (2010). Web SearchBibTeXDownload
208MobileTrust: a trust enhanced security architecture for mobile agent systems. Ching Lin, Vijay Varadharajan. Int. J. Inf. Sec. (9): 153-178 (2010). Web SearchBibTeXDownload
207Wireless sensor network key management survey and taxonomy. Junqi Zhang, Vijay Varadharajan. J. Network and Computer Applications (33): 63-75 (2010). Web SearchBibTeXDownload
206A trust management architecture for hierarchical wireless sensor networks. Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Vijay Varadharajan, Abdul Sattar. LCN 2010, 264-267. Web SearchBibTeXDownload
205A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks. Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Abdul Sattar, Vijay Varadharajan. MobiQuitous 2010, 186-197. Web SearchBibTeXDownload
204Purpose-Based Access Control Policies and Conflicting Analysis. Hua Wang, Lili Sun, Vijay Varadharajan. SEC 2010, 217-228. Web SearchBibTeXDownload
203Overhearing Gain Analysis in Low-Traffic CDMA Wireless Sensor Networks. Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan, Alireza Mohammadi-Nodooshan. SUTC/UMC 2010, 89-94. Web SearchBibTeXDownload
2009
202Fuzzy Regression Based Trust Prediction in Service-Oriented Applications. Lei Li, Yan Wang, Vijay Varadharajan. ATC 2009, 221-235. Web SearchBibTeXDownload
201ALOPA: Authorization Logic for Property Attestation in Trusted Platforms. Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens. ATC 2009, 134-148. Web SearchBibTeXDownload
200Trust Relationship Modelling in E-commerce-Based Social Network. Zaobin Gan, Juxia He, Qian Ding, Vijay Varadharajan. CIS (1) 2009, 206-210. Web SearchBibTeXDownload
199Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks. Rajan Shankaran, Vijay Varadharajan, Mehmet A. Orgun, Michael Hitchens. COMPSAC (2) 2009, 188-193. Web SearchBibTeXDownload
198Reasoning on Weighted Delegatable Authorizations. Chun Ruan, Vijay Varadharajan. DEXA 2009, 279-286. Web SearchBibTeXDownload
197Trust Enhanced Authorization for Mobile Agents. Chun Ruan, Vijay Varadharajan. EC-Web 2009, 84-95. Web SearchBibTeXDownload
196SBAC: Service Based Access Control. Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala. ICECCS 2009, 202-209. Web SearchBibTeXDownload
195A Note on Trust-Enhanced Security. Vijay Varadharajan. IEEE Security & Privacy (7): 57-59 (2009). Web SearchBibTeXDownload
194Critical Issues in Trust Management for Mobile Ad-Hoc Networks. Rajan Shankaran, Vijay Varadharajan, Mehmet A. Orgun, Michael Hitchens. IRI 2009, 97-100. Web SearchBibTeXDownload
193Secure Interoperation in Multidomain Environments Employing UCON Policies. Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma. ISC 2009, 395-402. Web SearchBibTeXDownload
192Property Based Attestation and Trusted Computing: Analysis and Challenges. Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Eimear Gallery. NSS 2009, 278-285. Web SearchBibTeXDownload
191DoSTRACK: a system for defending against DoS attacks. Udaya Kiran Tupakula, Vijay Varadharajan, Srini Rao Pandalaneni. SAC 2009, 47-53. Web SearchBibTeXDownload
190Trust management towards service-oriented applications. Yan Wang, Kwei-Jay Lin, Duncan S. Wong, Vijay Varadharajan. Service Oriented Computing and Applications (3): 129-146 (2009). Web SearchBibTeXDownload
189Evolution and challenges in trust and security in information system infrastructures. Vijay Varadharajan. SIN 2009, 1-2. Web SearchBibTeXDownload
188A Property-Dependent Agent Transfer Protocol. Eimear Gallery, Aarthi Nagarajan, Vijay Varadharajan. TRUST 2009, 240-263. Web SearchBibTeXDownload
2008
187A hybrid model against TCP. SYN and reflection DDoS attacks. Udaya Kiran Tupakula, Vijay Varadharajan. Comput. Syst. Sci. Eng. (23) (2008). Web SearchBibTeX
186On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora. DBSec 2008, 222-237. Web SearchBibTeXDownload
185A New Security Scheme for Wireless Sensor Networks. Junqi Zhang, Vijay Varadharajan. GLOBECOM 2008, 128-132. Web SearchBibTeXDownload
184A Novel Approach of Web Search Based on Community Wisdom. Weiliang Zhao, Vijay Varadharajan. ICIW 2008, 431-436. Web SearchBibTeXDownload
183Trust Management for Web Services. Weiliang Zhao, Vijay Varadharajan. ICWS 2008, 818-821. Web SearchBibTeXDownload
182Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments. Yan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan. Inf. Syst. E-Business Management (6): 25-48 (2008). Web SearchBibTeXDownload
2007
181Trust Enhanced Secure Mobile Ad-Hoc Network Routing. Venkatesan Balakrishnan, Vijay Varadharajan, Phillip Lucs, Udaya Kiran Tupakula. AINA Workshops (2) 2007, 27-33. Web SearchBibTeXDownload
180A Hybrid Trust Model for Enhancing Security in Distributed Systems. Ching Lin, Vijay Varadharajan. ARES 2007, 35-42. Web SearchBibTeXDownload
179Role-based Recommendation and Trust Evaluation. Yan Wang, Vijay Varadharajan. CEC/EEE 2007, 278-288. Web SearchBibTeXDownload
178The Design of A Rule-based and Event-driven Trust Management Framework. Yan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan. ICEBE 2007, 97-104. Web SearchBibTeXDownload
177A New Security Scheme for Integration of Mobile Agents and Web Services. Junqi Zhang, Yan Wang, Vijay Varadharajan. ICIW 2007, 43. Web SearchBibTeXDownload
176Trust and Recommendations in Mobile Ad hoc Networks. Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula, Phillip Lucs. ICNS 2007, 64. Web SearchBibTeXDownload
175TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks. Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula, Phillip Lucs. ICON 2007, 182-187. Web SearchBibTeXDownload
174Trust-enhanced secure mobile agent-based system design. David Foster, Vijay Varadharajan. IJAOSE (1): 205-224 (2007). Web SearchBibTeXDownload
173DDoS: design, implementation and analysis of automated model. Udaya Kiran Tupakula, Vijay Varadharajan, Ashok Kumar Gajam, Sunil Kumar Vuppala, Pandalaneni Naga Srinivasa Rao. IJWMC (2): 72-85 (2007). Web SearchBibTeXDownload
172Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services. Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens. PDCAT 2007, 453-460. Web SearchBibTeXDownload
171Mobile Agent and Web Service Integration Security Architecture. Junqi Zhang, Yan Wang, Vijay Varadharajan. SOCA 2007, 172-179. Web SearchBibTeXDownload
170Trust management for trusted computing platforms in web services. Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens. STC 2007, 58-62. Web SearchBibTeXDownload
2006
169Analysis of traceback techniques. Udaya Kiran Tupakula, Vijay Varadharajan. ACSW Frontiers 2006, 115-124. Web SearchBibTeXDownload
168A Scalable Multi-service Group Key Management Scheme. Junqi Zhang, Vijay Varadharajan, Yi Mu. AICT/ICIW 2006, 172. Web SearchBibTeXDownload
167Trust Based Risk Management for Distributed System Security - A New Approach. Ching Lin, Vijay Varadharajan. ARES 2006, 6-13. Web SearchBibTeXDownload
166Implementing Authorization Delegations Using Graph. Chun Ruan, Vijay Varadharajan. DEXA 2006, 904-913. Web SearchBibTeXDownload
165Integration of Graph Based Authorization Policies. Chun Ruan, Vijay Varadharajan. ISMIS 2006, 359-368. Web SearchBibTeXDownload
164General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing. Weiliang Zhao, Vijay Varadharajan, George Bryan. JCP (1): 42-53 (2006). Web SearchBibTeXDownload
163Fellowship: Defense against Flooding and Packet Drop Attacks in MANET. Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula. NOMS 2006. Web SearchBibTeXDownload
162Design and Implementation of a Practical Secure Distributed Healthcare Application. Zaobin Gan, Vijay Varadharajan. SECRYPT 2006, 431-436. Web SearchBibTeX
161Improving Software Security Through an Integrated Approach. Zaobin Gan, Dengwei Wei, Vijay Varadharajan. SECRYPT 2006, 437-442. Web SearchBibTeX
160A Unified Framework for Trust Management. Weiliang Zhao, Vijay Varadharajan, George Bryan. SecureComm 2006, 1-8. Web SearchBibTeXDownload
159ID-based Secure PIM-SM Schemes. Junqi Zhang, Vijay Varadharajan, Yi Mu. Wireless and Optical Communications 2006, 190-195. Web SearchBibTeX
2005
158Designing Secure Wireless Mobile Ad Hoc Networks. Venkatesan Balakrishnan, Vijay Varadharajan. AINA 2005, 5-8. Web SearchBibTeXDownload
157Trust Enhanced Security for Mobile Agents. Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi. CEC 2005, 231-238. Web SearchBibTeXDownload
156An Authorization Architecture for Web Services. Sarath Indrakanti, Vijay Varadharajan. DBSec 2005, 222-236. Web SearchBibTeXDownload
155Two-Phase Peer Evaluation in P2P E-Commerce Environments. Yan Wang, Vijay Varadharajan. EEE 2005, 654-657. Web SearchBibTeXDownload
154A Trust based Access Control Framework for P2P File-Sharing Systems. Huu Tran, Michael Hitchens, Vijay Varadharajan, Paul Andrew Watters. HICSS 2005. Web SearchBibTeXDownload
153A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments. Yan Wang, Vijay Varadharajan. IAT 2005, 88-94. Web SearchBibTeXDownload
152Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments. Weiliang Zhao, Vijay Varadharajan, George Bryan. ICEIS (3) 2005, 331-336. Web SearchBibTeX
151Authorization and Trust Enhanced Security for Distributed Applications. Vijay Varadharajan. ICISS 2005, 1-20. Web SearchBibTeXDownload
150Analysis and Modelling of Trust in Distributed Information Systems. Weiliang Zhao, Vijay Varadharajan, George Bryan. ICISS 2005, 106-119. Web SearchBibTeXDownload
149Evaluating the Performance and Scalability of Web Application Systems. Zaobin Gan, Dengwen Wei, Vijay Varadharajan. ICITA (1) 2005, 111-114. Web SearchBibTeXDownload
148Security and Trust Enhanced Mobile Agent Based System Design. David Foster, Vijay Varadharajan. ICITA (1) 2005, 155-160. Web SearchBibTeXDownload
147Business-Process-Oriented Software Requirements Automatic Generator. Zaobin Gan, Dengwen Wei, Jin-Long Zhang, Vijay Varadharajan. ICITA (1) 2005, 95-98. Web SearchBibTeXDownload
146A Middleware-Based Script Language. Zaobin Gan, Ching Lin, Vijay Varadharajan. ICMB 2005, 690-693. Web SearchBibTeXDownload
145Trust2: Developing Trust in Peer-to-Peer Environments. Yan Wang, Vijay Varadharajan. IEEE SCC 2005, 24-34. Web SearchBibTeXDownload
144Secure distribution and access of XML documents. Junqi Zhang, Vijay Varadharajan, Yi Mu. IJHPCN (3): 356-365 (2005). Web SearchBibTeXDownload
143On the sequence of authorization policy transformations. Yun Bai, Yan Zhang, Vijay Varadharajan. Int. J. Inf. Sec. (4): 120-131 (2005). Web SearchBibTeXDownload
142Authorization Service for Web Services and its Application in a Health Care Domain. Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens. Int. J. Web Service Res. (2): 94-119 (2005). Web SearchBibTeXDownload
141Data Protection in Distributed Database Systems. Chun Ruan, Vijay Varadharajan. ISMIS 2005, 191-199. Web SearchBibTeXDownload
140Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture. Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens. ISWS 2005, 35-44. Web SearchBibTeX
139Efficient TTP-Free Mental Poker Protocols. Weiliang Zhao, Vijay Varadharajan. ITCC (1) 2005, 745-750. Web SearchBibTeXDownload
138Secure route structures for parallel mobile agents based systems using fast binary dispatch. Yan Wang, Vijay Varadharajan. Mobile Information Systems (1): 185-205 (2005). Web SearchBibTeXDownload
137Short Paper: Fellowship in Mobile Ad hoc Networks. Venkatesan Balakrishnan, Vijay Varadharajan. SecureComm 2005, 225-227. Web SearchBibTeXDownload
136Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. Ching Lin, Vijay Varadharajan, Yan Wang. TrustBus 2005, 151-160. Web SearchBibTeXDownload
135Architectural Framework for Web Services Authorization. Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens. WSMDEIS 2005, 75-84. Web SearchBibTeX
2004
134A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. Chun Ruan, Vijay Varadharajan. ACISP 2004, 402-413. Web SearchBibTeXDownload
133Securing XML Document Sources and Their Distribution. Junqi Zhang, Vijay Varadharajan, Yi Mu. AINA (1) 2004, 562-567. Web SearchBibTeXDownload
132Security for cluster based ad hoc networks. Vijay Varadharajan, Rajan Shankaran, Michael Hitchens. Computer Communications (27): 488-501 (2004). Web SearchBibTeXDownload
131Interaction Trust Evaluation in Decentralized Environments. Yan Wang, Vijay Varadharajan. EC-Web 2004, 144-153. Web SearchBibTeXDownload
130Counteracting TCP SYN DDoS attacks using automated model. Udaya Kiran Tupakula, Vijay Varadharajan, Ashok Kumar Gajam. GLOBECOM 2004, 2240-2244. Web SearchBibTeXDownload
129Efficient secure group management for SSM. Ghassan Chaddoud, Vijay Varadharajan. ICC 2004, 1436-1440. Web SearchBibTeXDownload
128Authorization Service for Web Services and its Implementation. Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens. ICWS 2004, 774-777. Web SearchBibTeXDownload
127Enhancing Grid Security with Trust Management. Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi. IEEE SCC 2004, 303-310. Web SearchBibTeXDownload
126Fair Trading Protocol with Offline Anonymous Credit Card Payment. Weiliang Zhao, Vijay Varadharajan, George Bryan. Information Systems Security (13): 41-47 (2004). Web SearchBibTeXDownload
125Securing the Ad-Hoc On-demand Distance Vector Protocol. Michael Hitchens, Rajan Shankaran, Vijay Varadharajan. ISCA PDCS 2004, 353-360. Web SearchBibTeX
124A Secure PIM-SM Multicast Routing Protocol. Junqi Zhang, Vijay Varadharajan, Yi Mu. IWDC 2004, 276-288. Web SearchBibTeXDownload
123Tracing DoS Floods: An Automated Approach. Udaya Kiran Tupakula, Vijay Varadharajan. J. Network Syst. Manage. (12): 111-135 (2004). Web SearchBibTeXDownload
122Gestion efficace de la sécurité des communications de groupe pour le service SSM. Ghassan Chaddoud, Vijay Varadharajan, Isabelle Chrisment, André Schaff. Technique et Science Informatiques (23): 1107-1135 (2004). Web SearchBibTeXDownload
121Modelling Trust Relationships in Distributed Environments. Weiliang Zhao, Vijay Varadharajan, George Bryan. TrustBus 2004, 40-49. Web SearchBibTeXDownload
120On the Design of a New Trust Model for Mobile Agent Security. Ching Lin, Vijay Varadharajan, Yan Wang, Yi Mu. TrustBus 2004, 60-69. Web SearchBibTeXDownload
119Trustworthy Computing (Extended Abstract). Vijay Varadharajan. WISE 2004, 13-16. Web SearchBibTeXDownload
118A Time-Based Peer Trust Evaluation in P2P E-commerce Environments. Yan Wang, Vijay Varadharajan. WISE 2004, 730-735. Web SearchBibTeXDownload
117Fair Trading Protocol With Off-line Anonymous Credit Card Payment. Weiliang Zhao, Vijay Varadharajan, George Bryan. WOSIS 2004, 186-195. Web SearchBibTeX
2003
116Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. Ching Lin, Vijay Varadharajan. ACNS 2003, 176-190. Web SearchBibTeXDownload
115An Authorization Model for E-consent Requirement in a Health Care Application. Chun Ruan, Vijay Varadharajan. ACNS 2003, 191-205. Web SearchBibTeXDownload
114A Practical Method to Counteract Denial of Service Attacks. Udaya Kiran Tupakula, Vijay Varadharajan. ACSC 2003, 275-284. Web SearchBibTeXDownload
113A Secure Mental Poker Protocol Over The Internet. Weiliang Zhao, Vijay Varadharajan, Yi Mu. ACSW Frontiers 2003, 105-109. Web SearchBibTeXDownload
112On transformation of authorization policies. Yun Bai, Vijay Varadharajan. Data Knowl. Eng. (45): 333-357 (2003). Web SearchBibTeXDownload
111Secure Authorisation for Web Services. Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi. DBSec 2003, 163-175. Web SearchBibTeX
110Decentralized Temporal Authorization Administration. Chun Ruan, Vijay Varadharajan. DEXA 2003, 917-926. Web SearchBibTeXDownload
109Reducing the scope of denial of service attacks in QoS routing. Munirul Islam, Johnson Thomas, Vijay Varadharajan. GLOBECOM 2003, 1368-1373. Web SearchBibTeXDownload
108Role-Based Access Control and the Access Control Matrix. Gregory Saunders, Michael Hitchens, Vijay Varadharajan. ICICS 2003, 145-157. Web SearchBibTeXDownload
107Authorisation Service in .Net My Services. Sarath Indrakanti, Vijay Varadharajan, Rajat Kumar Todi. ICWI 2003, 1115-1118. Web SearchBibTeX
106Achieving secure and flexible M-services through tickets. Hua Wang, Yanchun Zhang, Jinli Cao, Vijay Varadharajan. IEEE Transactions on Systems, Man, and Cybernetics, Part A (33): 697-708 (2003). Cited by 22Web SearchBibTeXDownload
105Evaluation of Authorization with Delegation and Negation. Chun Ruan, Vijay Varadharajan, Yan Zhang. IIS 2003, 547-551. Web SearchBibTeX
104A Controller Agent Model to Counteract DoS Attacks in Multiple Domains. Udaya Kiran Tupakula, Vijay Varadharajan. Integrated Network Management 2003, 113-116. Web SearchBibTeX
103A formal graph based framework for supporting authorization delegations and conflict resolutions. Chun Ruan, Vijay Varadharajan. Int. J. Inf. Sec. (1): 211-222 (2003). Web SearchBibTeXDownload
102A Logic Model for Temporal Authorization Delegation with Negation. Chun Ruan, Vijay Varadharajan, Yan Zhang. ISC 2003, 310-324. Web SearchBibTeXDownload
101Supporting E-consent on Health Data by Logic. Chun Ruan, Vijay Varadharajan. ISMIS 2003, 392-396. Web SearchBibTeXDownload
100Delegatable Authorization Program and Its Application. Chun Ruan, Vijay Varadharajan, Yan Zhang. Security and Management 2003, 267-273. Web SearchBibTeX
99A secure multicast support framework for Mobile IP. Rajan Shankaran, Vijay Varadharajan, Michael Hitchens. WCNC 2003, 2114-2119. Web SearchBibTeXDownload
98A Security Architecture for Mobile Agent Based Applications. Vijay Varadharajan, David Foster. World Wide Web (6): 93-122 (2003). Web SearchBibTeX
2002
97Resolving Conflicts in Authorization Delegations. Chun Ruan, Vijay Varadharajan. ACISP 2002, 271-285. Web SearchBibTeXDownload
96m out of n Oblivious Transfer. Yi Mu, Junqi Zhang, Vijay Varadharajan. ACISP 2002, 395-405. Web SearchBibTeXDownload
95Policy Administration Domains. Michael Hitchens, Vijay Varadharajan, Gregory Saunders. ACISP 2002, 286-302. Web SearchBibTeXDownload
94Object Oriented Database with Authorization Policies. Yun Bai, Vijay Varadharajan. Fundam. Inform. (53): 229-250 (2002). Web SearchBibTeXDownload
93Security Policy Management in Distributed Systems. Michael Hitchens, Vijay Varadharajan, Gregory Saunders. IASTED PDCS 2002, 290-294. Web SearchBibTeX
92Secure Multicast Support for Mobile IP with Hierarchical Registration Approach. Rajan Shankaran, Vijay Varadharajan, Michael Hitchens. IASTED PDCS 2002, 851-856. Web SearchBibTeX
91A Secure Object Sharing Scheme for Java Card. Junqi Zhang, Vijay Varadharajan, Yi Mu. ICICS 2002, 243-251. Web SearchBibTeXDownload
90Group Cryptography: Signature and Encryption. Yi Mu, Vijay Varadharajan. Informatica (Slovenia) (26) (2002). Web SearchBibTeX
89Logic-Based Reasoning on Delegatable Authorizations. Chun Ruan, Vijay Varadharajan, Yan Zhang. ISMIS 2002, 185-193. Web SearchBibTeXDownload
88Management for eBusiness in the New Millennium: A Report on APNOMS 2001. Guangrong Chen, Vijay Varadharajan, Pradeep Ray, P. Zuluaga. J. Network Syst. Manage. (10): 255-259 (2002). Web SearchBibTeXDownload
2001
87A Strategy for MLS Workflow. Vlad Ingar Wietrzyk, Makoto Takizawa, Vijay Varadharajan. ACISP 2001, 159-175. Web SearchBibTeXDownload
86A Logic for Modeling the Dynamics of Beliefs in Cryptographic Protocols. Yan Zhang, Vijay Varadharajan. ACSC 2001, 215-222. Web SearchBibTeXDownload
85A New Approach to Reasoning About Accountability in Cryptographic Protocols for E-Commerce. Hongxue Wang, Vijay Varadharajan, Yan Zhang. E-Commerce Security and Privacy 2001, 113-131. Web SearchBibTeXDownload
84Integrating Network Services for Virtual Teams. Pascal Molli, Hala Skaf-Molli, Claude Godart, Pradeep Ray, Rajan Shankaran, Vijay Varadharajan. ICEIS (2) 2001, 1034-1039. Cited by 5Web SearchBibTeX
83RBAC for XML Document Stores. Michael Hitchens, Vijay Varadharajan. ICICS 2001, 131-143. Web SearchBibTeXDownload
82Fair Exchange of Digital Signatures with Offline Trusted Third Party. Chuan-Kun Wu, Vijay Varadharajan. ICICS 2001, 466-470. Web SearchBibTeXDownload
81A Secure Transaction Environment for Workflows in Distributed Systems. Vlad Ingar Wietrzyk, Makoto Takizawa, Mehmet A. Orgun, Vijay Varadharajan. ICPADS 2001, 198-208. Web SearchBibTeX
80A Distributed Location Management Scheme for Mobile Hosts. Rajan Shankaran, Vijay Varadharajan, Michael Hitchens. ICPADS 2001, 297-304. Web SearchBibTeX
79Robust and Secure Broadcasting. Yi Mu, Vijay Varadharajan. INDOCRYPT 2001, 223-231. Web SearchBibTeXDownload
78A Fair Electronic Cash Scheme. Yi Mu, Khanh Quoc Nguyen, Vijay Varadharajan. ISEC 2001, 20-32. Web SearchBibTeXDownload
77Secure Distributed Location Management Scheme for Mobile Hosts. Rajan Shankaran, Vijay Varadharajan, Michael Hitchens. LCN 2001, 296-323. Web SearchBibTeXDownload
76Secure Networked Computing. Vijay Varadharajan. MMM-ACNS 2001, 27. Web SearchBibTeXDownload
75Role-Based Access Control and the Access Control Matrix. Gregory Saunders, Michael Hitchens, Vijay Varadharajan. Operating Systems Review (35): 6-20 (2001). Web SearchBibTeXDownload
74Tower: A Language for Role Based Access Control. Michael Hitchens, Vijay Varadharajan. POLICY 2001, 88-106. Web SearchBibTeXDownload
2000
73Fail-Stop Confirmer Signatures. Yi Mu, Vijay Varadharajan. ACISP 2000, 368-377. Web SearchBibTeXDownload
72Security enhanced mobile agents. Vijay Varadharajan. ACM Conference on Computer and Communications Security 2000, 200-209. Web SearchBibTeXDownload
71Fair On-line Gambling. Weiliang Zhao, Vijay Varadharajan, Yi Mu. ACSAC 2000, 394-400. Web SearchBibTeXDownload
70On the Analysis of On-Line Database Reorganization. Vlad Ingar Wietrzyk, Mehmet A. Orgun, Vijay Varadharajan. ADBIS-DASFAA 2000, 293-306. Web SearchBibTeXDownload
69Towards a Protection Model for Supporting Multiple Access Control Policies. Yi Mu, Vijay Varadharajan. Australasian Database Conference 2000, 107-114. Web SearchBibTeXDownload
68Towards a Generic Logic for Analysing Network Protocols. Hongxue Wang, Vijay Varadharajan, Yan Zhang. ICDCS Workshop on Internet 2000, A19-A26. Web SearchBibTeX
67An Internet Anonymous Auction Scheme. Yi Mu, Vijay Varadharajan. ICISC 2000, 171-182. Web SearchBibTeXDownload
66Distributed Signcryption. Yi Mu, Vijay Varadharajan. INDOCRYPT 2000, 155-164. Web SearchBibTeXDownload
65Elements of a Language for Role-Based Access Control. Michael Hitchens, Vijay Varadharajan. SEC 2000, 371-380. Web SearchBibTeX
1999
64Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan. ACISP 1999, 117-128. Web SearchBibTeXDownload
63Authorization in Object Oriented Databases. Yun Bai, Vijay Varadharajan. ACISP 1999, 270-280. Web SearchBibTeXDownload
62An Analysis of Access Control Models. Gregory Saunders, Michael Hitchens, Vijay Varadharajan. ACISP 1999, 281-293. Web SearchBibTeXDownload
61How to Prove That a Committed Number Is Prime. Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan. ASIACRYPT 1999, 208-218. Web SearchBibTeXDownload
60On the design of secure ATM networks. Vijay Varadharajan, Rajan Shankaran, Michael Hitchens. Computer Communications (22): 1512-1525 (1999). Web SearchBibTeXDownload
59A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. Yun Bai, Vijay Varadharajan. DBSec 1999, 317-330. Web SearchBibTeX
58Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan. DEXA Workshop 1999, 858-863. Web SearchBibTeXDownload
57Batching Proofs of Knowledge and Its Applications. Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu. DEXA Workshop 1999, 844-849. Web SearchBibTeXDownload
56Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan. ICICS 1999, 103-118. Web SearchBibTeXDownload
55Issues in the Design of a Language for Role Based Access Control. Michael Hitchens, Vijay Varadharajan. ICICS 1999, 22-38. Web SearchBibTeXDownload
54Modified Chinese Remainder Theorem and Its Application to Proxy Signatures. Chuan-Kun Wu, Vijay Varadharajan. ICPP Workshops 1999, 146. Web SearchBibTeXDownload
53Message from the IWSEC Workshop Co-Chairs. Yuko Murayama, Vijay Varadharajan. ICPP Workshops 1999, 132. Web SearchBibTeXDownload
52Delegated Decryption. Yi Mu, Vijay Varadharajan, Khanh Quoc Nguyen. IMA Int. Conf. 1999, 258-269. Web SearchBibTeXDownload
51Undeniable Confirmer Signature. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan. ISW 1999, 235-246. Web SearchBibTeXDownload
50Secure Multicast Extensions for Mobile Networks. Rajan Shankaran, Vijay Varadharajan, Michael Hitchens. LCN 1999, 106-116. Web SearchBibTeXDownload
49On Formal Languages for Sequences of Authorization Transformations. Yun Bai, Vijay Varadharajan. SAFECOMP 1999, 375-384. Web SearchBibTeXDownload
48On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. Vijay Varadharajan, Khanh Quoc Nguyen, Yi Mu. Theor. Comput. Sci. (226): 173-184 (1999). Web SearchBibTeXDownload
47Towards Perfect Objects. Hongxue Wang, Vijay Varadharajan, John K. Slaney. TOOLS (32) 1999, 115-126. Web SearchBibTeXDownload
1998
46A High Level Language for Conventional Access Control Models. Yun Bai, Vijay Varadharajan. ACISP 1998, 273-283. Web SearchBibTeXDownload
45Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. Vijay Varadharajan, C. Crall, Joe Pato. ACSAC 1998, 178-189. Web SearchBibTeXDownload
44Anonymous Secure E-Voting Over a Network. Yi Mu, Vijay Varadharajan. ACSAC 1998, 293-299. Web SearchBibTeXDownload
43Secure Signaling and Access Control for ATM Networks. Rajan Shankaran, Vijay Varadharajan. ACSAC 1998, 212-222. Web SearchBibTeXDownload
42A New Scheme of Credit based Payment for Electronic Commerce. Yi Mu, Vijay Varadharajan. LCN 1998, 278. Web SearchBibTeXDownload
41A Secure Communication Scheme for Multiagent Systems. Hongxue Wang, Vijay Varadharajan, Yan Zhang. PRIMA 1998, 174-185. Web SearchBibTeXDownload
1997
40New Micropayment Schemes Based on PayWords. Yi Mu, Vijay Varadharajan, Yan-Xia Lin. ACISP 1997, 283-293. Web SearchBibTeXDownload
39Analysis and Implementation of a Formal Authorisation Policy Design Approach. Yun Bai, Vijay Varadharajan. ACISP 1997, 14-25. Web SearchBibTeXDownload
38Security Issues in Asynchronous Transfer Mode. Vijay Varadharajan, Rajan Shankaran, Michael Hitchens. ACISP 1997, 76-89. Web SearchBibTeXDownload
37Micro-Digital Money for Electronic Commerce. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan. ACSAC 1997, 2-8. Web SearchBibTeXDownload
36Secure and Efficient Digital Coins. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan. ACSAC 1997, 9-15. Web SearchBibTeXDownload
35High-speed network security. I. SMDS and frame relay. Vijay Varadharajan, Panos Katsavos. Computer Communications (20): 832-847 (1997). Web SearchBibTeXDownload
34A Logic For State Transformations in Authorization Policies. Yun Bai, Vijay Varadharajan. CSFW 1997, 173-182. Web SearchBibTeXDownload
33A language for specifying sequences of authorization transformations and its applications. Yun Bai, Vijay Varadharajan. ICICS 1997, 39-49. Web SearchBibTeXDownload
32A New Efficient Off-line Anonymous Cash Scheme. Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu. ISAAC 1997, 193-201. Web SearchBibTeXDownload
31A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan. ISW 1997, 313-320. Web SearchBibTeXDownload
30Security services and public key infrastructure for ATM networks. Vijay Varadharajan, Rajan Shankaran, Michael Hitchens. LCN 1997, 253-263. Web SearchBibTeXDownload
29Extending the Schematic Protection Model II: Revocation. Vijay Varadharajan. Operating Systems Review (31): 64-77 (1997). Web SearchBibTeXDownload
28A Formal Security Design Approach for Transformation of Authorizations in Information Systems. Yun Bai, Vijay Varadharajan. PACIS 1997, 81. Web SearchBibTeXDownload
1996
27On the design of security protocols for mobile communications. Yi Mu, Vijay Varadharajan. ACISP 1996, 134-145. Web SearchBibTeXDownload
26Support for joint action based security policies. Vijay Varadharajan, Phillip Allen. ACISP 1996, 207-218. Web SearchBibTeXDownload
25On The Design Of Secure Electronic Payment Schemes For Internet. Vijay Varadharajan, Yi Mu. ACSAC 1996, 78-87. Web SearchBibTeXDownload
24esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. Michael Hitchens, Vijay Varadharajan. ACSAC 1996, 105-116. Web SearchBibTeXDownload
23Key management for a secure LAN-SMDS network. Vijay Varadharajan, Claudio Calvelli. Computer Communications (19): 813-823 (1996). Web SearchBibTeXDownload
22Extending the schematic protection model - II. Revocation. Vijay Varadharajan, Claudio Calvelli. Computers & Security (15): 525-536 (1996). Web SearchBibTeXDownload
21An Access Control Model and Its Use in Representing Mental Health Application Access Policy. Vijay Varadharajan, Claudio Calvelli. IEEE Trans. Knowl. Data Eng. (8): 81-95 (1996). Web SearchBibTeXDownload
20Design of Secure End-toEnd Protocols for Mobile Systems. Vijay Varadharajan, Yi Mu. IFIP World Conference on Mobile Communications 1996, 258-266. Web SearchBibTeX
19Security in High-Speed Networks. Vijay Varadharajan. LCN 1996, 2-11. Web SearchBibTeXDownload
18Joint Actions Based Authorization Schemes. Vijay Varadharajan, Phillip Allen. Operating Systems Review (30): 32-45 (1996). Web SearchBibTeXDownload
17Security model for distributed object framework and its applicability to CORBA. Vijay Varadharajan, Thomas Hardjono. SEC 1996, 452-463. Web SearchBibTeX
16Design of enterprise-wide secure networked system. Vijay Varadharajan. WETICE 1996, 100-105. Web SearchBibTeXDownload
1994
15A Secure Frame Relay Service. Panos Katsavos, Vijay Varadharajan. Computer Networks and ISDN Systems (26): 1539-1558 (1994). Web SearchBibTeXDownload
1993
14Authentication and Revocation in SPM (Extended Abstract). Claudio Calvelli, Vijay Varadharajan. Operating Systems Review (27): 42-57 (1993). Web SearchBibTeXDownload
1992
13An Analysis of some Delegation Protocols for Distributed Systems. Claudio Calvelli, Vijay Varadharajan. CSFW 1992, 92-110. Web SearchBibTeX
1991
12Multilevel security in a distributed object-oriented system. Vijay Varadharajan, Stewart Black. Computers & Security (10): 51-68 (1991). Web SearchBibTeXDownload
11Modified forms of cipher block chaining. Chris J. Mitchell, Vijay Varadharajan. Computers & Security (10): 37-40 (1991). Web SearchBibTeXDownload
10Hook-Up Property of Information Flow Secure Nets. Vijay Varadharajan. CSFW 1991, 154-175. Web SearchBibTeX
9An Analysis of the Proxy Problem in Distributed Systems. Vijay Varadharajan, Phillip Allen, Stewart Black. IEEE Symposium on Security and Privacy 1991, 255-277. Web SearchBibTeX
8A petri net model for system design and refinement. Vijay Varadharajan. Journal of Systems and Software (15): 239-250 (1991). Web SearchBibTeXDownload
1990
7Network Security Policy Models. Vijay Varadharajan. AUSCRYPT 1990, 74-95. Web SearchBibTeXDownload
6Petri Net Based Modelling of Information Flow Security Requirements. Vijay Varadharajan. CSFW 1990, 51-61. Web SearchBibTeX
5A Multilevel Security Policy for Networks. Vijay Varadharajan. INFOCOM 1990, 710-718. Web SearchBibTeX
1989
4Verification of network security protocols. Vijay Varadharajan. Computers & Security (8): 693-708 (1989). Web SearchBibTeXDownload
1987
3Net-Based System Design Representation and Analysis. Vijay Varadharajan, K. D. Baker. Comput. Syst. Sci. Eng. (2): 167-178 (1987). Web SearchBibTeX
1985
2Practical secure electronic mail system with public key distribution. Vijay Varadharajan, P. W. Sanders. Computer Communications (8): 121-127 (1985). Web SearchBibTeXDownload
1Trapdoor Rings and Their Use in Cryptography. Vijay Varadharajan. CRYPTO 1985, 369-395. Web SearchBibTeXDownload
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research