2009 | ||
---|---|---|
184 | Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 ACM 2009 | |
183 | EE | Udaya Kiran Tupakula, Vijay Varadharajan, Srini Rao Pandalaneni: DoSTRACK: a system for defending against DoS attacks. SAC 2009: 47-53 |
182 | EE | Eimear Gallery, Aarthi Nagarajan, Vijay Varadharajan: A Property-Dependent Agent Transfer Protocol. TRUST 2009: 240-263 |
2008 | ||
181 | EE | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora: On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. DBSec 2008: 222-237 |
180 | EE | Junqi Zhang, Vijay Varadharajan: A New Security Scheme for Wireless Sensor Networks. GLOBECOM 2008: 128-132 |
179 | EE | Weiliang Zhao, Vijay Varadharajan: A Novel Approach of Web Search Based on Community Wisdom. ICIW 2008: 431-436 |
178 | EE | Weiliang Zhao, Vijay Varadharajan: Trust Management for Web Services. ICWS 2008: 818-821 |
177 | EE | Yan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan: Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments. Inf. Syst. E-Business Management 6(1): 25-48 (2008) |
2007 | ||
176 | EE | Venkatesan Balakrishnan, Vijay Varadharajan, Phillip Lucs, Udaya Kiran Tupakula: Trust Enhanced Secure Mobile Ad-Hoc Network Routing. AINA Workshops (2) 2007: 27-33 |
175 | EE | Ching Lin, Vijay Varadharajan: A Hybrid Trust Model for Enhancing Security in Distributed Systems. ARES 2007: 35-42 |
174 | EE | Yan Wang, Vijay Varadharajan: Role-based Recommendation and Trust Evaluation. CEC/EEE 2007: 278-288 |
173 | EE | Yan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan: The Design of A Rule-based and Event-driven Trust Management Framework. ICEBE 2007: 97-104 |
172 | EE | Junqi Zhang, Yan Wang, Vijay Varadharajan: A New Security Scheme for Integration of Mobile Agents and Web Services. ICIW 2007: 43 |
171 | EE | Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula, Phillip Lucs: Trust and Recommendations in Mobile Ad hoc Networks. ICNS 2007: 64 |
170 | EE | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens: Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services. PDCAT 2007: 453-460 |
169 | EE | Junqi Zhang, Yan Wang, Vijay Varadharajan: Mobile Agent and Web Service Integration Security Architecture. SOCA 2007: 172-179 |
168 | EE | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens: Trust management for trusted computing platforms in web services. STC 2007: 58-62 |
167 | EE | David Foster, Vijay Varadharajan: Trust-enhanced secure mobile agent-based system design. IJAOSE 1(2): 205-224 (2007) |
166 | EE | Udaya Kiran Tupakula, Vijay Varadharajan, Ashok Kumar Gajam, Sunil Kumar Vuppala, Pandalaneni Naga Srinivasa Rao: DDoS: design, implementation and analysis of automated model. IJWMC 2(1): 72-85 (2007) |
2006 | ||
165 | EE | Udaya Kiran Tupakula, Vijay Varadharajan: Analysis of traceback techniques. ACSW Frontiers 2006: 115-124 |
164 | EE | Junqi Zhang, Vijay Varadharajan, Yi Mu: A Scalable Multi-service Group Key Management Scheme. AICT/ICIW 2006: 172 |
163 | EE | Ching Lin, Vijay Varadharajan: Trust Based Risk Management for Distributed System Security - A New Approach. ARES 2006: 6-13 |
162 | EE | Chun Ruan, Vijay Varadharajan: Implementing Authorization Delegations Using Graph. DEXA 2006: 904-913 |
161 | EE | Chun Ruan, Vijay Varadharajan: Integration of Graph Based Authorization Policies. ISMIS 2006: 359-368 |
160 | EE | Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula: Fellowship: Defense against Flooding and Packet Drop Attacks in MANET. NOMS 2006 |
159 | Zaobin Gan, Vijay Varadharajan: Design and Implementation of a Practical Secure Distributed Healthcare Application. SECRYPT 2006: 431-436 | |
158 | Zaobin Gan, Dengwei Wei, Vijay Varadharajan: Improving Software Security Through an Integrated Approach. SECRYPT 2006: 437-442 | |
157 | Junqi Zhang, Vijay Varadharajan, Yi Mu: ID-based Secure PIM-SM Schemes. Wireless and Optical Communications 2006: 190-195 | |
156 | EE | Weiliang Zhao, Vijay Varadharajan, George Bryan: General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing. JCP 1(2): 42-53 (2006) |
2005 | ||
155 | EE | Venkatesan Balakrishnan, Vijay Varadharajan: Designing Secure Wireless Mobile Ad Hoc Networks. AINA 2005: 5-8 |
154 | EE | Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi: Trust Enhanced Security for Mobile Agents. CEC 2005: 231-238 |
153 | EE | Sarath Indrakanti, Vijay Varadharajan: An Authorization Architecture for Web Services. DBSec 2005: 222-236 |
152 | EE | Yan Wang, Vijay Varadharajan: Two-Phase Peer Evaluation in P2P E-Commerce Environments. EEE 2005: 654-657 |
151 | EE | Huu Tran, Michael Hitchens, Vijay Varadharajan, Paul Andrew Watters: A Trust based Access Control Framework for P2P File-Sharing Systems. HICSS 2005 |
150 | EE | Yan Wang, Vijay Varadharajan: A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments. IAT 2005: 88-94 |
149 | Weiliang Zhao, Vijay Varadharajan, George Bryan: Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments. ICEIS (3) 2005: 331-336 | |
148 | EE | Vijay Varadharajan: Authorization and Trust Enhanced Security for Distributed Applications. ICISS 2005: 1-20 |
147 | EE | Weiliang Zhao, Vijay Varadharajan, George Bryan: Analysis and Modelling of Trust in Distributed Information Systems. ICISS 2005: 106-119 |
146 | EE | Zaobin Gan, Deng-Wen Wei, Vijay Varadharajan: Evaluating the Performance and Scalability of Web Application Systems. ICITA (1) 2005: 111-114 |
145 | EE | D. Foster, Vijay Varadharajan: Security and Trust Enhanced Mobile Agent Based System Design. ICITA (1) 2005: 155-160 |
144 | EE | Zaobin Gan, Deng-Wen Wei, Jin-Long Zhang, Vijay Varadharajan: Business-Process-Oriented Software Requirements Automatic Generator. ICITA (1) 2005: 95-98 |
143 | EE | Zaobin Gan, Ching Lin, Vijay Varadharajan: A Middleware-Based Script Language. ICMB 2005: 690-693 |
142 | EE | Yan Wang, Vijay Varadharajan: Trust2: Developing Trust in Peer-to-Peer Environments. IEEE SCC 2005: 24-34 |
141 | EE | Chun Ruan, Vijay Varadharajan: Data Protection in Distributed Database Systems. ISMIS 2005: 191-199 |
140 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens: Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture. ISWS 2005: 35-44 | |
139 | EE | Weiliang Zhao, Vijay Varadharajan: Efficient TTP-Free Mental Poker Protocols. ITCC (1) 2005: 745-750 |
138 | EE | Ching Lin, Vijay Varadharajan, Yan Wang: Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. TrustBus 2005: 151-160 |
137 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens: Architectural Framework for Web Services Authorization. WSMDEIS 2005: 75-84 | |
136 | EE | Junqi Zhang, Vijay Varadharajan, Yi Mu: Secure distribution and access of XML documents. IJHPCN 3(5/6): 356-365 (2005) |
135 | EE | Yun Bai, Yan Zhang, Vijay Varadharajan: On the sequence of authorization policy transformations. Int. J. Inf. Sec. 4(1-2): 120-131 (2005) |
134 | EE | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens: Authorization Service for Web Services and its Application in a Health Care Domain. Int. J. Web Service Res. 2(4): 94-119 (2005) |
133 | EE | Yan Wang, Vijay Varadharajan: Secure route structures for parallel mobile agents based systems using fast binary dispatch. Mobile Information Systems 1(3): 185-205 (2005) |
2004 | ||
132 | Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings Springer 2004 | |
131 | EE | Chun Ruan, Vijay Varadharajan: A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. ACISP 2004: 402-413 |
130 | EE | Junqi Zhang, Vijay Varadharajan, Yi Mu: Securing XML Document Sources and Their Distribution. AINA (1) 2004: 562-567 |
129 | EE | Yan Wang, Vijay Varadharajan: Interaction Trust Evaluation in Decentralized Environments. EC-Web 2004: 144-153 |
128 | EE | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens: Authorization Service for Web Services and its Implementation. ICWS 2004: 774-777 |
127 | EE | Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi: Enhancing Grid Security with Trust Management. IEEE SCC 2004: 303-310 |
126 | Michael Hitchens, Rajan Shankaran, Vijay Varadharajan: Securing the Ad-Hoc On-demand Distance Vector Protocol. ISCA PDCS 2004: 353-360 | |
125 | EE | Junqi Zhang, Vijay Varadharajan, Yi Mu: A Secure PIM-SM Multicast Routing Protocol. IWDC 2004: 276-288 |
124 | EE | Weiliang Zhao, Vijay Varadharajan, George Bryan: Modelling Trust Relationships in Distributed Environments. TrustBus 2004: 40-49 |
123 | EE | Ching Lin, Vijay Varadharajan, Yan Wang, Yi Mu: On the Design of a New Trust Model for Mobile Agent Security. TrustBus 2004: 60-69 |
122 | EE | Vijay Varadharajan: Trustworthy Computing (Extended Abstract). WISE 2004: 13-16 |
121 | EE | Yan Wang, Vijay Varadharajan: A Time-Based Peer Trust Evaluation in P2P E-commerce Environments. WISE 2004: 730-735 |
120 | Weiliang Zhao, Vijay Varadharajan, George Bryan: Fair Trading Protocol With Off-line Anonymous Credit Card Payment. WOSIS 2004: 186-195 | |
119 | EE | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens: Security for cluster based ad hoc networks. Computer Communications 27(5): 488-501 (2004) |
118 | EE | Weiliang Zhao, Vijay Varadharajan, George Bryan: Fair Trading Protocol with Offline Anonymous Credit Card Payment. Information Systems Security 13(3): 41-47 (2004) |
117 | Udaya Kiran Tupakula, Vijay Varadharajan: Tracing DoS Floods: An Automated Approach. J. Network Syst. Manage. 12(1): (2004) | |
116 | Ghassan Chaddoud, Vijay Varadharajan, Isabelle Chrisment, André Schaff: Gestion efficace de la sécurité des communications de groupe pour le service SSM. Technique et Science Informatiques 23(9): 1107-1135 (2004) | |
2003 | ||
115 | EE | Ching Lin, Vijay Varadharajan: Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. ACNS 2003: 176-190 |
114 | EE | Chun Ruan, Vijay Varadharajan: An Authorization Model for E-consent Requirement in a Health Care Application. ACNS 2003: 191-205 |
113 | EE | Udaya Kiran Tupakula, Vijay Varadharajan: A Practical Method to Counteract Denial of Service Attacks. ACSC 2003: 275-284 |
112 | EE | Weiliang Zhao, Vijay Varadharajan, Yi Mu: A Secure Mental Poker Protocol Over The Internet. ACSW Frontiers 2003: 105-109 |
111 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi: Secure Authorisation for Web Services. DBSec 2003: 163-175 | |
110 | EE | Chun Ruan, Vijay Varadharajan: Decentralized Temporal Authorization Administration. DEXA 2003: 917-926 |
109 | EE | Gregory Saunders, Michael Hitchens, Vijay Varadharajan: Role-Based Access Control and the Access Control Matrix. ICICS 2003: 145-157 |
108 | Sarath Indrakanti, Vijay Varadharajan, Rajat Kumar Todi: Authorisation Service in .Net My Services. ICWI 2003: 1115-1118 | |
107 | Chun Ruan, Vijay Varadharajan, Yan Zhang: Evaluation of Authorization with Delegation and Negation. IIS 2003: 547-551 | |
106 | EE | Chun Ruan, Vijay Varadharajan, Yan Zhang: A Logic Model for Temporal Authorization Delegation with Negation. ISC 2003: 310-324 |
105 | EE | Chun Ruan, Vijay Varadharajan: Supporting E-consent on Health Data by Logic. ISMIS 2003: 392-396 |
104 | Udaya Kiran Tupakula, Vijay Varadharajan: A Controller Agent Model to Counteract DoS Attacks in Multiple Domains. Integrated Network Management 2003: 113-116 | |
103 | Chun Ruan, Vijay Varadharajan, Yan Zhang: Delegatable Authorization Program and Its Application. Security and Management 2003: 267-273 | |
102 | EE | Yun Bai, Vijay Varadharajan: On transformation of authorization policies. Data Knowl. Eng. 45(3): 333-357 (2003) |
101 | Hua Wang, Yanchun Zhang, Jinli Cao, Vijay Varadharajan: Achieving secure and flexible M-services through tickets. IEEE Transactions on Systems, Man, and Cybernetics, Part A 33(6): 697-708 (2003) | |
100 | EE | Chun Ruan, Vijay Varadharajan: A formal graph based framework for supporting authorization delegations and conflict resolutions. Int. J. Inf. Sec. 1(4): 211-222 (2003) |
99 | Vijay Varadharajan, D. Foster: A Security Architecture for Mobile Agent Based Applications. World Wide Web 6(1): 93-122 (2003) | |
2002 | ||
98 | EE | Chun Ruan, Vijay Varadharajan: Resolving Conflicts in Authorization Delegations. ACISP 2002: 271-285 |
97 | EE | Michael Hitchens, Vijay Varadharajan, Gregory Saunders: Policy Administration Domains. ACISP 2002: 286-302 |
96 | EE | Yi Mu, Junqi Zhang, Vijay Varadharajan: m out of n Oblivious Transfer. ACISP 2002: 395-405 |
95 | Michael Hitchens, Vijay Varadharajan, Gregory Saunders: Security Policy Management in Distributed Systems. IASTED PDCS 2002: 290-294 | |
94 | Rajan Shankaran, Vijay Varadharajan, Michael Hitchens: Secure Multicast Support for Mobile IP with Hierarchical Registration Approach. IASTED PDCS 2002: 851-856 | |
93 | EE | Junqi Zhang, Vijay Varadharajan, Yi Mu: A Secure Object Sharing Scheme for Java Card. ICICS 2002: 243-251 |
92 | EE | Chun Ruan, Vijay Varadharajan, Yan Zhang: Logic-Based Reasoning on Delegatable Authorizations. ISMIS 2002: 185-193 |
91 | EE | Yun Bai, Vijay Varadharajan: Object Oriented Database with Authorization Policies. Fundam. Inform. 53(3-4): 229-250 (2002) |
90 | Yi Mu, Vijay Varadharajan: Group Cryptography: Signature and Encryption. Informatica (Slovenia) 26(3): (2002) | |
89 | Guangrong Chen, Vijay Varadharajan, Pradeep Ray, P. Zuluaga: Management for eBusiness in the New Millennium: A Report on APNOMS 2001. J. Network Syst. Manage. 10(2): (2002) | |
2001 | ||
88 | Vijay Varadharajan, Yi Mu: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings Springer 2001 | |
87 | EE | Vlad Ingar Wietrzyk, Makoto Takizawa, Vijay Varadharajan: A Strategy for MLS Workflow. ACISP 2001: 159-175 |
86 | EE | Yan Zhang, Vijay Varadharajan: A Logic for Modeling the Dynamics of Beliefs in Cryptographic Protocols. ACSC 2001: 215-222 |
85 | Pascal Molli, Hala Skaf-Molli, Claude Godart, Pradeep Ray, Rajan Shankaran, Vijay Varadharajan: Integrating Network Services for Virtual Teams. ICEIS (2) 2001: 1034-1039 | |
84 | EE | Michael Hitchens, Vijay Varadharajan: RBAC for XML Document Stores. ICICS 2001: 131-143 |
83 | EE | Chuan-Kun Wu, Vijay Varadharajan: Fair Exchange of Digital Signatures with Offline Trusted Third Party. ICICS 2001: 466-470 |
82 | Vlad Ingar Wietrzyk, Makoto Takizawa, Mehmet A. Orgun, Vijay Varadharajan: A Secure Transaction Environment for Workflows in Distributed Systems. ICPADS 2001: 198-208 | |
81 | Rajan Shankaran, Vijay Varadharajan, Michael Hitchens: A Distributed Location Management Scheme for Mobile Hosts. ICPADS 2001: 297-304 | |
80 | EE | Yi Mu, Vijay Varadharajan: Robust and Secure Broadcasting. INDOCRYPT 2001: 223-231 |
79 | EE | Yi Mu, Khanh Quoc Nguyen, Vijay Varadharajan: A Fair Electronic Cash Scheme. ISEC 2001: 20-32 |
78 | EE | Rajan Shankaran, Vijay Varadharajan, Michael Hitchens: Secure Distributed Location Management Scheme for Mobile Hosts. LCN 2001: 296-323 |
77 | EE | Vijay Varadharajan: Secure Networked Computing. MMM-ACNS 2001: 27 |
76 | EE | Michael Hitchens, Vijay Varadharajan: Tower: A Language for Role Based Access Control. POLICY 2001: 88-106 |
75 | Gregory Saunders, Michael Hitchens, Vijay Varadharajan: Role-Based Access Control and the Access Control Matrix. Operating Systems Review 35(4): 6-20 (2001) | |
2000 | ||
74 | Yi Mu, Vijay Varadharajan: Fail-Stop Confirmer Signatures. ACISP 2000: 368-377 | |
73 | EE | Vijay Varadharajan: Security enhanced mobile agents. ACM Conference on Computer and Communications Security 2000: 200-209 |
72 | EE | Weiliang Zhao, Vijay Varadharajan, Yi Mu: Fair On-line Gambling. ACSAC 2000: 394-400 |
71 | EE | Vlad Ingar Wietrzyk, Mehmet A. Orgun, Vijay Varadharajan: On the Analysis of On-Line Database Reorganization. ADBIS-DASFAA 2000: 293-306 |
70 | EE | Yi Mu, Vijay Varadharajan: Towards a Protection Model for Supporting Multiple Access Control Policies. Australasian Database Conference 2000: 107-114 |
69 | Hongxue Wang, Vijay Varadharajan, Yan Zhang: Towards a Generic Logic for Analysing Network Protocols. ICDCS Workshop on Internet 2000: A19-A26 | |
68 | EE | Yi Mu, Vijay Varadharajan: An Internet Anonymous Auction Scheme. ICISC 2000: 171-182 |
67 | EE | Yi Mu, Vijay Varadharajan: Distributed Signcryption. INDOCRYPT 2000: 155-164 |
66 | Michael Hitchens, Vijay Varadharajan: Elements of a Language for Role-Based Access Control. SEC 2000: 371-380 | |
1999 | ||
65 | Vijay Varadharajan, Yi Mu: Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings Springer 1999 | |
64 | EE | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. ACISP 1999: 117-128 |
63 | EE | Yun Bai, Vijay Varadharajan: Authorization in Object Oriented Databases. ACISP 1999: 270-280 |
62 | EE | Gregory Saunders, Michael Hitchens, Vijay Varadharajan: An Analysis of Access Control Models. ACISP 1999: 281-293 |
61 | Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan: How to Prove That a Committed Number Is Prime. ASIACRYPT 1999: 208-218 | |
60 | Yun Bai, Vijay Varadharajan: A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. DBSec 1999: 317-330 | |
59 | EE | Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu: Batching Proofs of Knowledge and Its Applications. DEXA Workshop 1999: 844-849 |
58 | EE | Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan: Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. DEXA Workshop 1999: 858-863 |
57 | Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan: Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. ICICS 1999: 103-118 | |
56 | Michael Hitchens, Vijay Varadharajan: Issues in the Design of a Language for Role Based Access Control. ICICS 1999: 22-38 | |
55 | EE | Yuko Murayama, Vijay Varadharajan: Message from the IWSEC Workshop Co-Chairs. ICPP Workshops 1999: 132- |
54 | EE | Chuan-Kun Wu, Vijay Varadharajan: Modified Chinese Remainder Theorem and Its Application to Proxy Signatures. ICPP Workshops 1999: 146- |
53 | EE | Yi Mu, Vijay Varadharajan, Khanh Quoc Nguyen: Delegated Decryption. IMA Int. Conf. 1999: 258-269 |
52 | EE | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Undeniable Confirmer Signature. ISW 1999: 235-246 |
51 | EE | Rajan Shankaran, Vijay Varadharajan, Michael Hitchens: Secure Multicast Extensions for Mobile Networks. LCN 1999: 106-116 |
50 | EE | Yun Bai, Vijay Varadharajan: On Formal Languages for Sequences of Authorization Transformations. SAFECOMP 1999: 375-384 |
49 | EE | Hongxue Wang, Vijay Varadharajan, John K. Slaney: Towards Perfect Objects. TOOLS (32) 1999: 115-126 |
48 | EE | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens: On the design of secure ATM networks. Computer Communications 22(15-16): 1512-1525 (1999) |
47 | EE | Vijay Varadharajan, Khanh Quoc Nguyen, Yi Mu: On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. Theor. Comput. Sci. 226(1-2): 173-184 (1999) |
1998 | ||
46 | EE | Yun Bai, Vijay Varadharajan: A High Level Language for Conventional Access Control Models. ACISP 1998: 273-283 |
45 | EE | Vijay Varadharajan, C. Crall, Joe Pato: Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. ACSAC 1998: 178-189 |
44 | EE | Rajan Shankaran, Vijay Varadharajan: Secure Signaling and Access Control for ATM Networks. ACSAC 1998: 212-222 |
43 | EE | Yi Mu, Vijay Varadharajan: Anonymous Secure E-Voting Over a Network. ACSAC 1998: 293-299 |
42 | EE | Yi Mu, Vijay Varadharajan: A New Scheme of Credit based Payment for Electronic Commerce. LCN 1998: 278- |
41 | EE | Hongxue Wang, Vijay Varadharajan, Yan Zhang: A Secure Communication Scheme for Multiagent Systems. PRIMA 1998: 174-185 |
1997 | ||
40 | Vijay Varadharajan, Josef Pieprzyk, Yi Mu: Information Security and Privacy, Second Australasian Conference, ACISP'97, Syndey, NSW, Australia, July 7-9, 1997, Proceedings Springer 1997 | |
39 | Yun Bai, Vijay Varadharajan: Analysis and Implementation of a Formal Authorisation Policy Design Approach. ACISP 1997: 14-25 | |
38 | Yi Mu, Vijay Varadharajan, Yan-Xia Lin: New Micropayment Schemes Based on PayWords. ACISP 1997: 283-293 | |
37 | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens: Security Issues in Asynchronous Transfer Mode. ACISP 1997: 76-89 | |
36 | EE | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Micro-Digital Money for Electronic Commerce. ACSAC 1997: 2-8 |
35 | EE | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Secure and Efficient Digital Coins. ACSAC 1997: 9-15 |
34 | EE | Yun Bai, Vijay Varadharajan: A Logic For State Transformations in Authorization Policies. CSFW 1997: 173-182 |
33 | Yun Bai, Vijay Varadharajan: A language for specifying sequences of authorization transformations and its applications. ICICS 1997: 39-49 | |
32 | Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu: A New Efficient Off-line Anonymous Cash Scheme. ISAAC 1997: 193-201 | |
31 | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. ISW 1997: 313-320 | |
30 | EE | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens: Security services and public key infrastructure for ATM networks. LCN 1997: 253-263 |
29 | EE | Vijay Varadharajan, Panos Katsavos: High-speed network security. I. SMDS and frame relay. Computer Communications 20(10): 832-847 (1997) |
28 | Vijay Varadharajan: Extending the Schematic Protection Model II: Revocation. Operating Systems Review 31(1): 64-77 (1997) | |
1996 | ||
27 | Yi Mu, Vijay Varadharajan: On the design of security protocols for mobile communications. ACISP 1996: 134-145 | |
26 | Vijay Varadharajan, Phillip Allen: Support for joint action based security policies. ACISP 1996: 207-218 | |
25 | EE | Michael Hitchens, Vijay Varadharajan: esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. ACSAC 1996: 105-116 |
24 | EE | Vijay Varadharajan, Yi Mu: On The Design Of Secure Electronic Payment Schemes For Internet. ACSAC 1996: 78-87 |
23 | Vijay Varadharajan, Yi Mu: Design of Secure End-toEnd Protocols for Mobile Systems. IFIP World Conference on Mobile Communications 1996: 258-266 | |
22 | EE | Vijay Varadharajan: Security in High-Speed Networks. LCN 1996: 2-11 |
21 | Vijay Varadharajan, Thomas Hardjono: Security model for distributed object framework and its applicability to CORBA. SEC 1996: 452-463 | |
20 | EE | Vijay Varadharajan: Design of enterprise-wide secure networked system. WETICE 1996: 100-105 |
19 | EE | Vijay Varadharajan, Claudio Calvelli: Key management for a secure LAN-SMDS network. Computer Communications 19(9-10): 813-823 (1996) |
18 | EE | Vijay Varadharajan, Claudio Calvelli: Extending the schematic protection model - II. Revocation. Computers & Security 15(6): 525-536 (1996) |
17 | EE | Vijay Varadharajan, Claudio Calvelli: An Access Control Model and Its Use in Representing Mental Health Application Access Policy. IEEE Trans. Knowl. Data Eng. 8(1): 81-95 (1996) |
16 | Vijay Varadharajan, Phillip Allen: Joint Actions Based Authorization Schemes. Operating Systems Review 30(3): 32-45 (1996) | |
1994 | ||
15 | Panos Katsavos, Vijay Varadharajan: A Secure Frame Relay Service. Computer Networks and ISDN Systems 26(12): 1539-1558 (1994) | |
1993 | ||
14 | Claudio Calvelli, Vijay Varadharajan: Authentication and Revocation in SPM (Extended Abstract). Operating Systems Review 27(4): 42-57 (1993) | |
1992 | ||
13 | Claudio Calvelli, Vijay Varadharajan: An Analysis of some Delegation Protocols for Distributed Systems. CSFW 1992: 92-110 | |
1991 | ||
12 | Vijay Varadharajan: Hook-Up Property of Information Flow Secure Nets. CSFW 1991: 154-175 | |
11 | Vijay Varadharajan, Phillip Allen, Stewart Black: An Analysis of the Proxy Problem in Distributed Systems. IEEE Symposium on Security and Privacy 1991: 255-277 | |
10 | EE | Chris J. Mitchell, Vijay Varadharajan: Modified forms of cipher block chaining. Computers & Security 10(1): 37-40 (1991) |
9 | EE | Vijay Varadharajan, Stewart Black: Multilevel security in a distributed object-oriented system. Computers & Security 10(1): 51-68 (1991) |
8 | EE | Vijay Varadharajan: A petri net model for system design and refinement. Journal of Systems and Software 15(3): 239-250 (1991) |
1990 | ||
7 | Vijay Varadharajan: Network Security Policy Models. AUSCRYPT 1990: 74-95 | |
6 | Vijay Varadharajan: Petri Net Based Modelling of Information Flow Security Requirements. CSFW 1990: 51-61 | |
5 | Vijay Varadharajan: A Multilevel Security Policy for Networks. INFOCOM 1990: 710-718 | |
1989 | ||
4 | EE | Vijay Varadharajan: Verification of network security protocols. Computers & Security 8(8): 693-708 (1989) |
1987 | ||
3 | Vijay Varadharajan, K. D. Baker: Net-Based System Design Representation and Analysis. Comput. Syst. Sci. Eng. 2(4): 167-178 (1987) | |
1985 | ||
2 | EE | Vijay Varadharajan: Trapdoor Rings and Their Use in Cryptography. CRYPTO 1985: 369-395 |
1 | EE | Vijay Varadharajan, P. W. Sanders: Practical secure electronic mail system with public key distribution. Computer Communications 8(3): 121-127 (1985) |