dblp.uni-trier.dewww.uni-trier.de

Vijay Varadharajan

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
184 Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 ACM 2009
183EEUdaya Kiran Tupakula, Vijay Varadharajan, Srini Rao Pandalaneni: DoSTRACK: a system for defending against DoS attacks. SAC 2009: 47-53
182EEEimear Gallery, Aarthi Nagarajan, Vijay Varadharajan: A Property-Dependent Agent Transfer Protocol. TRUST 2009: 240-263
2008
181EEAarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora: On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. DBSec 2008: 222-237
180EEJunqi Zhang, Vijay Varadharajan: A New Security Scheme for Wireless Sensor Networks. GLOBECOM 2008: 128-132
179EEWeiliang Zhao, Vijay Varadharajan: A Novel Approach of Web Search Based on Community Wisdom. ICIW 2008: 431-436
178EEWeiliang Zhao, Vijay Varadharajan: Trust Management for Web Services. ICWS 2008: 818-821
177EEYan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan: Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments. Inf. Syst. E-Business Management 6(1): 25-48 (2008)
2007
176EEVenkatesan Balakrishnan, Vijay Varadharajan, Phillip Lucs, Udaya Kiran Tupakula: Trust Enhanced Secure Mobile Ad-Hoc Network Routing. AINA Workshops (2) 2007: 27-33
175EEChing Lin, Vijay Varadharajan: A Hybrid Trust Model for Enhancing Security in Distributed Systems. ARES 2007: 35-42
174EEYan Wang, Vijay Varadharajan: Role-based Recommendation and Trust Evaluation. CEC/EEE 2007: 278-288
173EEYan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan: The Design of A Rule-based and Event-driven Trust Management Framework. ICEBE 2007: 97-104
172EEJunqi Zhang, Yan Wang, Vijay Varadharajan: A New Security Scheme for Integration of Mobile Agents and Web Services. ICIW 2007: 43
171EEVenkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula, Phillip Lucs: Trust and Recommendations in Mobile Ad hoc Networks. ICNS 2007: 64
170EEAarthi Nagarajan, Vijay Varadharajan, Michael Hitchens: Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services. PDCAT 2007: 453-460
169EEJunqi Zhang, Yan Wang, Vijay Varadharajan: Mobile Agent and Web Service Integration Security Architecture. SOCA 2007: 172-179
168EEAarthi Nagarajan, Vijay Varadharajan, Michael Hitchens: Trust management for trusted computing platforms in web services. STC 2007: 58-62
167EEDavid Foster, Vijay Varadharajan: Trust-enhanced secure mobile agent-based system design. IJAOSE 1(2): 205-224 (2007)
166EEUdaya Kiran Tupakula, Vijay Varadharajan, Ashok Kumar Gajam, Sunil Kumar Vuppala, Pandalaneni Naga Srinivasa Rao: DDoS: design, implementation and analysis of automated model. IJWMC 2(1): 72-85 (2007)
2006
165EEUdaya Kiran Tupakula, Vijay Varadharajan: Analysis of traceback techniques. ACSW Frontiers 2006: 115-124
164EEJunqi Zhang, Vijay Varadharajan, Yi Mu: A Scalable Multi-service Group Key Management Scheme. AICT/ICIW 2006: 172
163EEChing Lin, Vijay Varadharajan: Trust Based Risk Management for Distributed System Security - A New Approach. ARES 2006: 6-13
162EEChun Ruan, Vijay Varadharajan: Implementing Authorization Delegations Using Graph. DEXA 2006: 904-913
161EEChun Ruan, Vijay Varadharajan: Integration of Graph Based Authorization Policies. ISMIS 2006: 359-368
160EEVenkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula: Fellowship: Defense against Flooding and Packet Drop Attacks in MANET. NOMS 2006
159 Zaobin Gan, Vijay Varadharajan: Design and Implementation of a Practical Secure Distributed Healthcare Application. SECRYPT 2006: 431-436
158 Zaobin Gan, Dengwei Wei, Vijay Varadharajan: Improving Software Security Through an Integrated Approach. SECRYPT 2006: 437-442
157 Junqi Zhang, Vijay Varadharajan, Yi Mu: ID-based Secure PIM-SM Schemes. Wireless and Optical Communications 2006: 190-195
156EEWeiliang Zhao, Vijay Varadharajan, George Bryan: General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing. JCP 1(2): 42-53 (2006)
2005
155EEVenkatesan Balakrishnan, Vijay Varadharajan: Designing Secure Wireless Mobile Ad Hoc Networks. AINA 2005: 5-8
154EEChing Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi: Trust Enhanced Security for Mobile Agents. CEC 2005: 231-238
153EESarath Indrakanti, Vijay Varadharajan: An Authorization Architecture for Web Services. DBSec 2005: 222-236
152EEYan Wang, Vijay Varadharajan: Two-Phase Peer Evaluation in P2P E-Commerce Environments. EEE 2005: 654-657
151EEHuu Tran, Michael Hitchens, Vijay Varadharajan, Paul Andrew Watters: A Trust based Access Control Framework for P2P File-Sharing Systems. HICSS 2005
150EEYan Wang, Vijay Varadharajan: A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments. IAT 2005: 88-94
149 Weiliang Zhao, Vijay Varadharajan, George Bryan: Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments. ICEIS (3) 2005: 331-336
148EEVijay Varadharajan: Authorization and Trust Enhanced Security for Distributed Applications. ICISS 2005: 1-20
147EEWeiliang Zhao, Vijay Varadharajan, George Bryan: Analysis and Modelling of Trust in Distributed Information Systems. ICISS 2005: 106-119
146EEZaobin Gan, Deng-Wen Wei, Vijay Varadharajan: Evaluating the Performance and Scalability of Web Application Systems. ICITA (1) 2005: 111-114
145EED. Foster, Vijay Varadharajan: Security and Trust Enhanced Mobile Agent Based System Design. ICITA (1) 2005: 155-160
144EEZaobin Gan, Deng-Wen Wei, Jin-Long Zhang, Vijay Varadharajan: Business-Process-Oriented Software Requirements Automatic Generator. ICITA (1) 2005: 95-98
143EEZaobin Gan, Ching Lin, Vijay Varadharajan: A Middleware-Based Script Language. ICMB 2005: 690-693
142EEYan Wang, Vijay Varadharajan: Trust2: Developing Trust in Peer-to-Peer Environments. IEEE SCC 2005: 24-34
141EEChun Ruan, Vijay Varadharajan: Data Protection in Distributed Database Systems. ISMIS 2005: 191-199
140 Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens: Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture. ISWS 2005: 35-44
139EEWeiliang Zhao, Vijay Varadharajan: Efficient TTP-Free Mental Poker Protocols. ITCC (1) 2005: 745-750
138EEChing Lin, Vijay Varadharajan, Yan Wang: Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. TrustBus 2005: 151-160
137 Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens: Architectural Framework for Web Services Authorization. WSMDEIS 2005: 75-84
136EEJunqi Zhang, Vijay Varadharajan, Yi Mu: Secure distribution and access of XML documents. IJHPCN 3(5/6): 356-365 (2005)
135EEYun Bai, Yan Zhang, Vijay Varadharajan: On the sequence of authorization policy transformations. Int. J. Inf. Sec. 4(1-2): 120-131 (2005)
134EESarath Indrakanti, Vijay Varadharajan, Michael Hitchens: Authorization Service for Web Services and its Application in a Health Care Domain. Int. J. Web Service Res. 2(4): 94-119 (2005)
133EEYan Wang, Vijay Varadharajan: Secure route structures for parallel mobile agents based systems using fast binary dispatch. Mobile Information Systems 1(3): 185-205 (2005)
2004
132 Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings Springer 2004
131EEChun Ruan, Vijay Varadharajan: A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. ACISP 2004: 402-413
130EEJunqi Zhang, Vijay Varadharajan, Yi Mu: Securing XML Document Sources and Their Distribution. AINA (1) 2004: 562-567
129EEYan Wang, Vijay Varadharajan: Interaction Trust Evaluation in Decentralized Environments. EC-Web 2004: 144-153
128EESarath Indrakanti, Vijay Varadharajan, Michael Hitchens: Authorization Service for Web Services and its Implementation. ICWS 2004: 774-777
127EEChing Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi: Enhancing Grid Security with Trust Management. IEEE SCC 2004: 303-310
126 Michael Hitchens, Rajan Shankaran, Vijay Varadharajan: Securing the Ad-Hoc On-demand Distance Vector Protocol. ISCA PDCS 2004: 353-360
125EEJunqi Zhang, Vijay Varadharajan, Yi Mu: A Secure PIM-SM Multicast Routing Protocol. IWDC 2004: 276-288
124EEWeiliang Zhao, Vijay Varadharajan, George Bryan: Modelling Trust Relationships in Distributed Environments. TrustBus 2004: 40-49
123EEChing Lin, Vijay Varadharajan, Yan Wang, Yi Mu: On the Design of a New Trust Model for Mobile Agent Security. TrustBus 2004: 60-69
122EEVijay Varadharajan: Trustworthy Computing (Extended Abstract). WISE 2004: 13-16
121EEYan Wang, Vijay Varadharajan: A Time-Based Peer Trust Evaluation in P2P E-commerce Environments. WISE 2004: 730-735
120 Weiliang Zhao, Vijay Varadharajan, George Bryan: Fair Trading Protocol With Off-line Anonymous Credit Card Payment. WOSIS 2004: 186-195
119EEVijay Varadharajan, Rajan Shankaran, Michael Hitchens: Security for cluster based ad hoc networks. Computer Communications 27(5): 488-501 (2004)
118EEWeiliang Zhao, Vijay Varadharajan, George Bryan: Fair Trading Protocol with Offline Anonymous Credit Card Payment. Information Systems Security 13(3): 41-47 (2004)
117 Udaya Kiran Tupakula, Vijay Varadharajan: Tracing DoS Floods: An Automated Approach. J. Network Syst. Manage. 12(1): (2004)
116 Ghassan Chaddoud, Vijay Varadharajan, Isabelle Chrisment, André Schaff: Gestion efficace de la sécurité des communications de groupe pour le service SSM. Technique et Science Informatiques 23(9): 1107-1135 (2004)
2003
115EEChing Lin, Vijay Varadharajan: Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. ACNS 2003: 176-190
114EEChun Ruan, Vijay Varadharajan: An Authorization Model for E-consent Requirement in a Health Care Application. ACNS 2003: 191-205
113EEUdaya Kiran Tupakula, Vijay Varadharajan: A Practical Method to Counteract Denial of Service Attacks. ACSC 2003: 275-284
112EEWeiliang Zhao, Vijay Varadharajan, Yi Mu: A Secure Mental Poker Protocol Over The Internet. ACSW Frontiers 2003: 105-109
111 Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi: Secure Authorisation for Web Services. DBSec 2003: 163-175
110EEChun Ruan, Vijay Varadharajan: Decentralized Temporal Authorization Administration. DEXA 2003: 917-926
109EEGregory Saunders, Michael Hitchens, Vijay Varadharajan: Role-Based Access Control and the Access Control Matrix. ICICS 2003: 145-157
108 Sarath Indrakanti, Vijay Varadharajan, Rajat Kumar Todi: Authorisation Service in .Net My Services. ICWI 2003: 1115-1118
107 Chun Ruan, Vijay Varadharajan, Yan Zhang: Evaluation of Authorization with Delegation and Negation. IIS 2003: 547-551
106EEChun Ruan, Vijay Varadharajan, Yan Zhang: A Logic Model for Temporal Authorization Delegation with Negation. ISC 2003: 310-324
105EEChun Ruan, Vijay Varadharajan: Supporting E-consent on Health Data by Logic. ISMIS 2003: 392-396
104 Udaya Kiran Tupakula, Vijay Varadharajan: A Controller Agent Model to Counteract DoS Attacks in Multiple Domains. Integrated Network Management 2003: 113-116
103 Chun Ruan, Vijay Varadharajan, Yan Zhang: Delegatable Authorization Program and Its Application. Security and Management 2003: 267-273
102EEYun Bai, Vijay Varadharajan: On transformation of authorization policies. Data Knowl. Eng. 45(3): 333-357 (2003)
101 Hua Wang, Yanchun Zhang, Jinli Cao, Vijay Varadharajan: Achieving secure and flexible M-services through tickets. IEEE Transactions on Systems, Man, and Cybernetics, Part A 33(6): 697-708 (2003)
100EEChun Ruan, Vijay Varadharajan: A formal graph based framework for supporting authorization delegations and conflict resolutions. Int. J. Inf. Sec. 1(4): 211-222 (2003)
99 Vijay Varadharajan, D. Foster: A Security Architecture for Mobile Agent Based Applications. World Wide Web 6(1): 93-122 (2003)
2002
98EEChun Ruan, Vijay Varadharajan: Resolving Conflicts in Authorization Delegations. ACISP 2002: 271-285
97EEMichael Hitchens, Vijay Varadharajan, Gregory Saunders: Policy Administration Domains. ACISP 2002: 286-302
96EEYi Mu, Junqi Zhang, Vijay Varadharajan: m out of n Oblivious Transfer. ACISP 2002: 395-405
95 Michael Hitchens, Vijay Varadharajan, Gregory Saunders: Security Policy Management in Distributed Systems. IASTED PDCS 2002: 290-294
94 Rajan Shankaran, Vijay Varadharajan, Michael Hitchens: Secure Multicast Support for Mobile IP with Hierarchical Registration Approach. IASTED PDCS 2002: 851-856
93EEJunqi Zhang, Vijay Varadharajan, Yi Mu: A Secure Object Sharing Scheme for Java Card. ICICS 2002: 243-251
92EEChun Ruan, Vijay Varadharajan, Yan Zhang: Logic-Based Reasoning on Delegatable Authorizations. ISMIS 2002: 185-193
91EEYun Bai, Vijay Varadharajan: Object Oriented Database with Authorization Policies. Fundam. Inform. 53(3-4): 229-250 (2002)
90 Yi Mu, Vijay Varadharajan: Group Cryptography: Signature and Encryption. Informatica (Slovenia) 26(3): (2002)
89 Guangrong Chen, Vijay Varadharajan, Pradeep Ray, P. Zuluaga: Management for eBusiness in the New Millennium: A Report on APNOMS 2001. J. Network Syst. Manage. 10(2): (2002)
2001
88 Vijay Varadharajan, Yi Mu: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings Springer 2001
87EEVlad Ingar Wietrzyk, Makoto Takizawa, Vijay Varadharajan: A Strategy for MLS Workflow. ACISP 2001: 159-175
86EEYan Zhang, Vijay Varadharajan: A Logic for Modeling the Dynamics of Beliefs in Cryptographic Protocols. ACSC 2001: 215-222
85 Pascal Molli, Hala Skaf-Molli, Claude Godart, Pradeep Ray, Rajan Shankaran, Vijay Varadharajan: Integrating Network Services for Virtual Teams. ICEIS (2) 2001: 1034-1039
84EEMichael Hitchens, Vijay Varadharajan: RBAC for XML Document Stores. ICICS 2001: 131-143
83EEChuan-Kun Wu, Vijay Varadharajan: Fair Exchange of Digital Signatures with Offline Trusted Third Party. ICICS 2001: 466-470
82 Vlad Ingar Wietrzyk, Makoto Takizawa, Mehmet A. Orgun, Vijay Varadharajan: A Secure Transaction Environment for Workflows in Distributed Systems. ICPADS 2001: 198-208
81 Rajan Shankaran, Vijay Varadharajan, Michael Hitchens: A Distributed Location Management Scheme for Mobile Hosts. ICPADS 2001: 297-304
80EEYi Mu, Vijay Varadharajan: Robust and Secure Broadcasting. INDOCRYPT 2001: 223-231
79EEYi Mu, Khanh Quoc Nguyen, Vijay Varadharajan: A Fair Electronic Cash Scheme. ISEC 2001: 20-32
78EERajan Shankaran, Vijay Varadharajan, Michael Hitchens: Secure Distributed Location Management Scheme for Mobile Hosts. LCN 2001: 296-323
77EEVijay Varadharajan: Secure Networked Computing. MMM-ACNS 2001: 27
76EEMichael Hitchens, Vijay Varadharajan: Tower: A Language for Role Based Access Control. POLICY 2001: 88-106
75 Gregory Saunders, Michael Hitchens, Vijay Varadharajan: Role-Based Access Control and the Access Control Matrix. Operating Systems Review 35(4): 6-20 (2001)
2000
74 Yi Mu, Vijay Varadharajan: Fail-Stop Confirmer Signatures. ACISP 2000: 368-377
73EEVijay Varadharajan: Security enhanced mobile agents. ACM Conference on Computer and Communications Security 2000: 200-209
72EEWeiliang Zhao, Vijay Varadharajan, Yi Mu: Fair On-line Gambling. ACSAC 2000: 394-400
71EEVlad Ingar Wietrzyk, Mehmet A. Orgun, Vijay Varadharajan: On the Analysis of On-Line Database Reorganization. ADBIS-DASFAA 2000: 293-306
70EEYi Mu, Vijay Varadharajan: Towards a Protection Model for Supporting Multiple Access Control Policies. Australasian Database Conference 2000: 107-114
69 Hongxue Wang, Vijay Varadharajan, Yan Zhang: Towards a Generic Logic for Analysing Network Protocols. ICDCS Workshop on Internet 2000: A19-A26
68EEYi Mu, Vijay Varadharajan: An Internet Anonymous Auction Scheme. ICISC 2000: 171-182
67EEYi Mu, Vijay Varadharajan: Distributed Signcryption. INDOCRYPT 2000: 155-164
66 Michael Hitchens, Vijay Varadharajan: Elements of a Language for Role-Based Access Control. SEC 2000: 371-380
1999
65 Vijay Varadharajan, Yi Mu: Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings Springer 1999
64EEKhanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. ACISP 1999: 117-128
63EEYun Bai, Vijay Varadharajan: Authorization in Object Oriented Databases. ACISP 1999: 270-280
62EEGregory Saunders, Michael Hitchens, Vijay Varadharajan: An Analysis of Access Control Models. ACISP 1999: 281-293
61 Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan: How to Prove That a Committed Number Is Prime. ASIACRYPT 1999: 208-218
60 Yun Bai, Vijay Varadharajan: A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. DBSec 1999: 317-330
59EEKhanh Quoc Nguyen, Vijay Varadharajan, Yi Mu: Batching Proofs of Knowledge and Its Applications. DEXA Workshop 1999: 844-849
58EEFeng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan: Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. DEXA Workshop 1999: 858-863
57 Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan: Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. ICICS 1999: 103-118
56 Michael Hitchens, Vijay Varadharajan: Issues in the Design of a Language for Role Based Access Control. ICICS 1999: 22-38
55EEYuko Murayama, Vijay Varadharajan: Message from the IWSEC Workshop Co-Chairs. ICPP Workshops 1999: 132-
54EEChuan-Kun Wu, Vijay Varadharajan: Modified Chinese Remainder Theorem and Its Application to Proxy Signatures. ICPP Workshops 1999: 146-
53EEYi Mu, Vijay Varadharajan, Khanh Quoc Nguyen: Delegated Decryption. IMA Int. Conf. 1999: 258-269
52EEKhanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Undeniable Confirmer Signature. ISW 1999: 235-246
51EERajan Shankaran, Vijay Varadharajan, Michael Hitchens: Secure Multicast Extensions for Mobile Networks. LCN 1999: 106-116
50EEYun Bai, Vijay Varadharajan: On Formal Languages for Sequences of Authorization Transformations. SAFECOMP 1999: 375-384
49EEHongxue Wang, Vijay Varadharajan, John K. Slaney: Towards Perfect Objects. TOOLS (32) 1999: 115-126
48EEVijay Varadharajan, Rajan Shankaran, Michael Hitchens: On the design of secure ATM networks. Computer Communications 22(15-16): 1512-1525 (1999)
47EEVijay Varadharajan, Khanh Quoc Nguyen, Yi Mu: On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. Theor. Comput. Sci. 226(1-2): 173-184 (1999)
1998
46EEYun Bai, Vijay Varadharajan: A High Level Language for Conventional Access Control Models. ACISP 1998: 273-283
45EEVijay Varadharajan, C. Crall, Joe Pato: Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. ACSAC 1998: 178-189
44EERajan Shankaran, Vijay Varadharajan: Secure Signaling and Access Control for ATM Networks. ACSAC 1998: 212-222
43EEYi Mu, Vijay Varadharajan: Anonymous Secure E-Voting Over a Network. ACSAC 1998: 293-299
42EEYi Mu, Vijay Varadharajan: A New Scheme of Credit based Payment for Electronic Commerce. LCN 1998: 278-
41EEHongxue Wang, Vijay Varadharajan, Yan Zhang: A Secure Communication Scheme for Multiagent Systems. PRIMA 1998: 174-185
1997
40 Vijay Varadharajan, Josef Pieprzyk, Yi Mu: Information Security and Privacy, Second Australasian Conference, ACISP'97, Syndey, NSW, Australia, July 7-9, 1997, Proceedings Springer 1997
39 Yun Bai, Vijay Varadharajan: Analysis and Implementation of a Formal Authorisation Policy Design Approach. ACISP 1997: 14-25
38 Yi Mu, Vijay Varadharajan, Yan-Xia Lin: New Micropayment Schemes Based on PayWords. ACISP 1997: 283-293
37 Vijay Varadharajan, Rajan Shankaran, Michael Hitchens: Security Issues in Asynchronous Transfer Mode. ACISP 1997: 76-89
36EEKhanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Micro-Digital Money for Electronic Commerce. ACSAC 1997: 2-8
35EEKhanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Secure and Efficient Digital Coins. ACSAC 1997: 9-15
34EEYun Bai, Vijay Varadharajan: A Logic For State Transformations in Authorization Policies. CSFW 1997: 173-182
33 Yun Bai, Vijay Varadharajan: A language for specifying sequences of authorization transformations and its applications. ICICS 1997: 39-49
32 Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu: A New Efficient Off-line Anonymous Cash Scheme. ISAAC 1997: 193-201
31 Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. ISW 1997: 313-320
30EEVijay Varadharajan, Rajan Shankaran, Michael Hitchens: Security services and public key infrastructure for ATM networks. LCN 1997: 253-263
29EEVijay Varadharajan, Panos Katsavos: High-speed network security. I. SMDS and frame relay. Computer Communications 20(10): 832-847 (1997)
28 Vijay Varadharajan: Extending the Schematic Protection Model II: Revocation. Operating Systems Review 31(1): 64-77 (1997)
1996
27 Yi Mu, Vijay Varadharajan: On the design of security protocols for mobile communications. ACISP 1996: 134-145
26 Vijay Varadharajan, Phillip Allen: Support for joint action based security policies. ACISP 1996: 207-218
25EEMichael Hitchens, Vijay Varadharajan: esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. ACSAC 1996: 105-116
24EEVijay Varadharajan, Yi Mu: On The Design Of Secure Electronic Payment Schemes For Internet. ACSAC 1996: 78-87
23 Vijay Varadharajan, Yi Mu: Design of Secure End-toEnd Protocols for Mobile Systems. IFIP World Conference on Mobile Communications 1996: 258-266
22EEVijay Varadharajan: Security in High-Speed Networks. LCN 1996: 2-11
21 Vijay Varadharajan, Thomas Hardjono: Security model for distributed object framework and its applicability to CORBA. SEC 1996: 452-463
20EEVijay Varadharajan: Design of enterprise-wide secure networked system. WETICE 1996: 100-105
19EEVijay Varadharajan, Claudio Calvelli: Key management for a secure LAN-SMDS network. Computer Communications 19(9-10): 813-823 (1996)
18EEVijay Varadharajan, Claudio Calvelli: Extending the schematic protection model - II. Revocation. Computers & Security 15(6): 525-536 (1996)
17EEVijay Varadharajan, Claudio Calvelli: An Access Control Model and Its Use in Representing Mental Health Application Access Policy. IEEE Trans. Knowl. Data Eng. 8(1): 81-95 (1996)
16 Vijay Varadharajan, Phillip Allen: Joint Actions Based Authorization Schemes. Operating Systems Review 30(3): 32-45 (1996)
1994
15 Panos Katsavos, Vijay Varadharajan: A Secure Frame Relay Service. Computer Networks and ISDN Systems 26(12): 1539-1558 (1994)
1993
14 Claudio Calvelli, Vijay Varadharajan: Authentication and Revocation in SPM (Extended Abstract). Operating Systems Review 27(4): 42-57 (1993)
1992
13 Claudio Calvelli, Vijay Varadharajan: An Analysis of some Delegation Protocols for Distributed Systems. CSFW 1992: 92-110
1991
12 Vijay Varadharajan: Hook-Up Property of Information Flow Secure Nets. CSFW 1991: 154-175
11 Vijay Varadharajan, Phillip Allen, Stewart Black: An Analysis of the Proxy Problem in Distributed Systems. IEEE Symposium on Security and Privacy 1991: 255-277
10EEChris J. Mitchell, Vijay Varadharajan: Modified forms of cipher block chaining. Computers & Security 10(1): 37-40 (1991)
9EEVijay Varadharajan, Stewart Black: Multilevel security in a distributed object-oriented system. Computers & Security 10(1): 51-68 (1991)
8EEVijay Varadharajan: A petri net model for system design and refinement. Journal of Systems and Software 15(3): 239-250 (1991)
1990
7 Vijay Varadharajan: Network Security Policy Models. AUSCRYPT 1990: 74-95
6 Vijay Varadharajan: Petri Net Based Modelling of Information Flow Security Requirements. CSFW 1990: 51-61
5 Vijay Varadharajan: A Multilevel Security Policy for Networks. INFOCOM 1990: 710-718
1989
4EEVijay Varadharajan: Verification of network security protocols. Computers & Security 8(8): 693-708 (1989)
1987
3 Vijay Varadharajan, K. D. Baker: Net-Based System Design Representation and Analysis. Comput. Syst. Sci. Eng. 2(4): 167-178 (1987)
1985
2EEVijay Varadharajan: Trapdoor Rings and Their Use in Cryptography. CRYPTO 1985: 369-395
1EEVijay Varadharajan, P. W. Sanders: Practical secure electronic mail system with public key distribution. Computer Communications 8(3): 121-127 (1985)

Coauthor Index

1Phillip Allen [11] [16] [26]
2Saurabh Arora [181]
3Yun Bai [33] [34] [39] [46] [50] [60] [63] [91] [102] [135]
4K. D. Baker [3]
5Venkatesan Balakrishnan [155] [160] [171] [176]
6Feng Bao [57] [58]
7Stewart Black [9] [11]
8George Bryan [118] [120] [124] [147] [149] [156]
9Claudio Calvelli [13] [14] [17] [18] [19]
10Jinli Cao [101]
11Ghassan Chaddoud [116]
12Guangrong Chen [89]
13Isabelle Chrisment [116]
14C. Crall [45]
15Robert H. Deng (Robert Huijie Deng) [58]
16D. Foster [99] [145]
17David Foster [167]
18Ashok Kumar Gajam [166]
19Eimear Gallery [182]
20Zaobin Gan [143] [144] [146] [158] [159]
21Claude Godart [85]
22Thomas Hardjono [21]
23Michael Hitchens [25] [30] [37] [48] [51] [56] [62] [66] [75] [76] [78] [81] [84] [94] [95] [97] [109] [111] [119] [126] [128] [134] [137] [140] [151] [168] [170] [181]
24Sarath Indrakanti [108] [111] [128] [134] [137] [140] [153]
25Panos Katsavos [15] [29]
26Tri Van Le [61]
27Wanqing Li [184]
28Ching Lin [115] [123] [127] [138] [143] [154] [163] [175]
29Kwei-Jay Lin [173] [177]
30Yan-Xia Lin [38]
31Phillip Lucs [171] [176]
32Chris J. Mitchell [10]
33Pascal Molli [85]
34Yi Mu [23] [24] [27] [31] [32] [35] [36] [38] [40] [42] [43] [47] [52] [53] [57] [59] [64] [65] [67] [68] [70] [72] [74] [79] [80] [88] [90] [93] [96] [112] [123] [125] [130] [136] [157] [164]
35Yuko Murayama [55]
36Aarthi Nagarajan [168] [170] [181] [182]
37Khanh Quoc Nguyen [31] [32] [35] [36] [47] [52] [53] [57] [58] [59] [61] [64] [79]
38Mehmet A. Orgun [71] [82]
39Srini Rao Pandalaneni [183]
40Joe Pato [45]
41Josef Pieprzyk [40] [132]
42Vineet Pruthi [127] [154]
43Pandalaneni Naga Srinivasa Rao [166]
44Pradeep Ray [85] [89]
45Chun Ruan [92] [98] [100] [103] [105] [106] [107] [110] [114] [131] [141] [161] [162]
46Reihaneh Safavi-Naini [184]
47P. W. Sanders [1]
48Gregory Saunders [62] [75] [95] [97] [109]
49André Schaff [116]
50Rajan Shankaran [30] [37] [44] [48] [51] [78] [81] [85] [94] [119] [126]
51Hala Skaf-Molli (Hala Skaf) [85]
52John K. Slaney [49]
53Willy Susilo [184]
54Makoto Takizawa [82] [87]
55Rajat Kumar Todi [108] [111]
56Huu Tran [151]
57Udaya Kiran Tupakula [104] [113] [117] [160] [165] [166] [171] [176] [183] [184]
58Sunil Kumar Vuppala [166]
59Hongxue Wang [41] [49] [69]
60Hua Wang [101]
61Huaxiong Wang [132]
62Yan Wang [121] [123] [127] [129] [133] [138] [142] [150] [152] [154] [169] [172] [173] [174] [177]
63Paul Andrew Watters [151]
64Deng-Wen Wei [144] [146]
65Dengwei Wei [158]
66Vlad Ingar Wietrzyk [71] [82] [87]
67Duncan S. Wong [173] [177]
68Chuan-Kun Wu [54] [83]
69Jin-Long Zhang [144]
70Junqi Zhang [93] [96] [125] [130] [136] [157] [164] [169] [172] [180]
71Yan Zhang [41] [69] [86] [92] [103] [106] [107] [135]
72Yanchun Zhang [101]
73Weiliang Zhao [72] [112] [118] [120] [124] [139] [147] [149] [156] [178] [179]
74P. Zuluaga [89]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)