2009 |
184 | | Wanqing Li,
Willy Susilo,
Udaya Kiran Tupakula,
Reihaneh Safavi-Naini,
Vijay Varadharajan:
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009
ACM 2009 |
183 | EE | Udaya Kiran Tupakula,
Vijay Varadharajan,
Srini Rao Pandalaneni:
DoSTRACK: a system for defending against DoS attacks.
SAC 2009: 47-53 |
182 | EE | Eimear Gallery,
Aarthi Nagarajan,
Vijay Varadharajan:
A Property-Dependent Agent Transfer Protocol.
TRUST 2009: 240-263 |
2008 |
181 | EE | Aarthi Nagarajan,
Vijay Varadharajan,
Michael Hitchens,
Saurabh Arora:
On the Applicability of Trusted Computing in Distributed Authorization Using Web Services.
DBSec 2008: 222-237 |
180 | EE | Junqi Zhang,
Vijay Varadharajan:
A New Security Scheme for Wireless Sensor Networks.
GLOBECOM 2008: 128-132 |
179 | EE | Weiliang Zhao,
Vijay Varadharajan:
A Novel Approach of Web Search Based on Community Wisdom.
ICIW 2008: 431-436 |
178 | EE | Weiliang Zhao,
Vijay Varadharajan:
Trust Management for Web Services.
ICWS 2008: 818-821 |
177 | EE | Yan Wang,
Duncan S. Wong,
Kwei-Jay Lin,
Vijay Varadharajan:
Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments.
Inf. Syst. E-Business Management 6(1): 25-48 (2008) |
2007 |
176 | EE | Venkatesan Balakrishnan,
Vijay Varadharajan,
Phillip Lucs,
Udaya Kiran Tupakula:
Trust Enhanced Secure Mobile Ad-Hoc Network Routing.
AINA Workshops (2) 2007: 27-33 |
175 | EE | Ching Lin,
Vijay Varadharajan:
A Hybrid Trust Model for Enhancing Security in Distributed Systems.
ARES 2007: 35-42 |
174 | EE | Yan Wang,
Vijay Varadharajan:
Role-based Recommendation and Trust Evaluation.
CEC/EEE 2007: 278-288 |
173 | EE | Yan Wang,
Duncan S. Wong,
Kwei-Jay Lin,
Vijay Varadharajan:
The Design of A Rule-based and Event-driven Trust Management Framework.
ICEBE 2007: 97-104 |
172 | EE | Junqi Zhang,
Yan Wang,
Vijay Varadharajan:
A New Security Scheme for Integration of Mobile Agents and Web Services.
ICIW 2007: 43 |
171 | EE | Venkatesan Balakrishnan,
Vijay Varadharajan,
Udaya Kiran Tupakula,
Phillip Lucs:
Trust and Recommendations in Mobile Ad hoc Networks.
ICNS 2007: 64 |
170 | EE | Aarthi Nagarajan,
Vijay Varadharajan,
Michael Hitchens:
Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services.
PDCAT 2007: 453-460 |
169 | EE | Junqi Zhang,
Yan Wang,
Vijay Varadharajan:
Mobile Agent and Web Service Integration Security Architecture.
SOCA 2007: 172-179 |
168 | EE | Aarthi Nagarajan,
Vijay Varadharajan,
Michael Hitchens:
Trust management for trusted computing platforms in web services.
STC 2007: 58-62 |
167 | EE | David Foster,
Vijay Varadharajan:
Trust-enhanced secure mobile agent-based system design.
IJAOSE 1(2): 205-224 (2007) |
166 | EE | Udaya Kiran Tupakula,
Vijay Varadharajan,
Ashok Kumar Gajam,
Sunil Kumar Vuppala,
Pandalaneni Naga Srinivasa Rao:
DDoS: design, implementation and analysis of automated model.
IJWMC 2(1): 72-85 (2007) |
2006 |
165 | EE | Udaya Kiran Tupakula,
Vijay Varadharajan:
Analysis of traceback techniques.
ACSW Frontiers 2006: 115-124 |
164 | EE | Junqi Zhang,
Vijay Varadharajan,
Yi Mu:
A Scalable Multi-service Group Key Management Scheme.
AICT/ICIW 2006: 172 |
163 | EE | Ching Lin,
Vijay Varadharajan:
Trust Based Risk Management for Distributed System Security - A New Approach.
ARES 2006: 6-13 |
162 | EE | Chun Ruan,
Vijay Varadharajan:
Implementing Authorization Delegations Using Graph.
DEXA 2006: 904-913 |
161 | EE | Chun Ruan,
Vijay Varadharajan:
Integration of Graph Based Authorization Policies.
ISMIS 2006: 359-368 |
160 | EE | Venkatesan Balakrishnan,
Vijay Varadharajan,
Udaya Kiran Tupakula:
Fellowship: Defense against Flooding and Packet Drop Attacks in MANET.
NOMS 2006 |
159 | | Zaobin Gan,
Vijay Varadharajan:
Design and Implementation of a Practical Secure Distributed Healthcare Application.
SECRYPT 2006: 431-436 |
158 | | Zaobin Gan,
Dengwei Wei,
Vijay Varadharajan:
Improving Software Security Through an Integrated Approach.
SECRYPT 2006: 437-442 |
157 | | Junqi Zhang,
Vijay Varadharajan,
Yi Mu:
ID-based Secure PIM-SM Schemes.
Wireless and Optical Communications 2006: 190-195 |
156 | EE | Weiliang Zhao,
Vijay Varadharajan,
George Bryan:
General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing.
JCP 1(2): 42-53 (2006) |
2005 |
155 | EE | Venkatesan Balakrishnan,
Vijay Varadharajan:
Designing Secure Wireless Mobile Ad Hoc Networks.
AINA 2005: 5-8 |
154 | EE | Ching Lin,
Vijay Varadharajan,
Yan Wang,
Vineet Pruthi:
Trust Enhanced Security for Mobile Agents.
CEC 2005: 231-238 |
153 | EE | Sarath Indrakanti,
Vijay Varadharajan:
An Authorization Architecture for Web Services.
DBSec 2005: 222-236 |
152 | EE | Yan Wang,
Vijay Varadharajan:
Two-Phase Peer Evaluation in P2P E-Commerce Environments.
EEE 2005: 654-657 |
151 | EE | Huu Tran,
Michael Hitchens,
Vijay Varadharajan,
Paul Andrew Watters:
A Trust based Access Control Framework for P2P File-Sharing Systems.
HICSS 2005 |
150 | EE | Yan Wang,
Vijay Varadharajan:
A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments.
IAT 2005: 88-94 |
149 | | Weiliang Zhao,
Vijay Varadharajan,
George Bryan:
Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments.
ICEIS (3) 2005: 331-336 |
148 | EE | Vijay Varadharajan:
Authorization and Trust Enhanced Security for Distributed Applications.
ICISS 2005: 1-20 |
147 | EE | Weiliang Zhao,
Vijay Varadharajan,
George Bryan:
Analysis and Modelling of Trust in Distributed Information Systems.
ICISS 2005: 106-119 |
146 | EE | Zaobin Gan,
Deng-Wen Wei,
Vijay Varadharajan:
Evaluating the Performance and Scalability of Web Application Systems.
ICITA (1) 2005: 111-114 |
145 | EE | D. Foster,
Vijay Varadharajan:
Security and Trust Enhanced Mobile Agent Based System Design.
ICITA (1) 2005: 155-160 |
144 | EE | Zaobin Gan,
Deng-Wen Wei,
Jin-Long Zhang,
Vijay Varadharajan:
Business-Process-Oriented Software Requirements Automatic Generator.
ICITA (1) 2005: 95-98 |
143 | EE | Zaobin Gan,
Ching Lin,
Vijay Varadharajan:
A Middleware-Based Script Language.
ICMB 2005: 690-693 |
142 | EE | Yan Wang,
Vijay Varadharajan:
Trust2: Developing Trust in Peer-to-Peer Environments.
IEEE SCC 2005: 24-34 |
141 | EE | Chun Ruan,
Vijay Varadharajan:
Data Protection in Distributed Database Systems.
ISMIS 2005: 191-199 |
140 | | Sarath Indrakanti,
Vijay Varadharajan,
Michael Hitchens:
Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture.
ISWS 2005: 35-44 |
139 | EE | Weiliang Zhao,
Vijay Varadharajan:
Efficient TTP-Free Mental Poker Protocols.
ITCC (1) 2005: 745-750 |
138 | EE | Ching Lin,
Vijay Varadharajan,
Yan Wang:
Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security.
TrustBus 2005: 151-160 |
137 | | Sarath Indrakanti,
Vijay Varadharajan,
Michael Hitchens:
Architectural Framework for Web Services Authorization.
WSMDEIS 2005: 75-84 |
136 | EE | Junqi Zhang,
Vijay Varadharajan,
Yi Mu:
Secure distribution and access of XML documents.
IJHPCN 3(5/6): 356-365 (2005) |
135 | EE | Yun Bai,
Yan Zhang,
Vijay Varadharajan:
On the sequence of authorization policy transformations.
Int. J. Inf. Sec. 4(1-2): 120-131 (2005) |
134 | EE | Sarath Indrakanti,
Vijay Varadharajan,
Michael Hitchens:
Authorization Service for Web Services and its Application in a Health Care Domain.
Int. J. Web Service Res. 2(4): 94-119 (2005) |
133 | EE | Yan Wang,
Vijay Varadharajan:
Secure route structures for parallel mobile agents based systems using fast binary dispatch.
Mobile Information Systems 1(3): 185-205 (2005) |
2004 |
132 | | Huaxiong Wang,
Josef Pieprzyk,
Vijay Varadharajan:
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings
Springer 2004 |
131 | EE | Chun Ruan,
Vijay Varadharajan:
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution.
ACISP 2004: 402-413 |
130 | EE | Junqi Zhang,
Vijay Varadharajan,
Yi Mu:
Securing XML Document Sources and Their Distribution.
AINA (1) 2004: 562-567 |
129 | EE | Yan Wang,
Vijay Varadharajan:
Interaction Trust Evaluation in Decentralized Environments.
EC-Web 2004: 144-153 |
128 | EE | Sarath Indrakanti,
Vijay Varadharajan,
Michael Hitchens:
Authorization Service for Web Services and its Implementation.
ICWS 2004: 774-777 |
127 | EE | Ching Lin,
Vijay Varadharajan,
Yan Wang,
Vineet Pruthi:
Enhancing Grid Security with Trust Management.
IEEE SCC 2004: 303-310 |
126 | | Michael Hitchens,
Rajan Shankaran,
Vijay Varadharajan:
Securing the Ad-Hoc On-demand Distance Vector Protocol.
ISCA PDCS 2004: 353-360 |
125 | EE | Junqi Zhang,
Vijay Varadharajan,
Yi Mu:
A Secure PIM-SM Multicast Routing Protocol.
IWDC 2004: 276-288 |
124 | EE | Weiliang Zhao,
Vijay Varadharajan,
George Bryan:
Modelling Trust Relationships in Distributed Environments.
TrustBus 2004: 40-49 |
123 | EE | Ching Lin,
Vijay Varadharajan,
Yan Wang,
Yi Mu:
On the Design of a New Trust Model for Mobile Agent Security.
TrustBus 2004: 60-69 |
122 | EE | Vijay Varadharajan:
Trustworthy Computing (Extended Abstract).
WISE 2004: 13-16 |
121 | EE | Yan Wang,
Vijay Varadharajan:
A Time-Based Peer Trust Evaluation in P2P E-commerce Environments.
WISE 2004: 730-735 |
120 | | Weiliang Zhao,
Vijay Varadharajan,
George Bryan:
Fair Trading Protocol With Off-line Anonymous Credit Card Payment.
WOSIS 2004: 186-195 |
119 | EE | Vijay Varadharajan,
Rajan Shankaran,
Michael Hitchens:
Security for cluster based ad hoc networks.
Computer Communications 27(5): 488-501 (2004) |
118 | EE | Weiliang Zhao,
Vijay Varadharajan,
George Bryan:
Fair Trading Protocol with Offline Anonymous Credit Card Payment.
Information Systems Security 13(3): 41-47 (2004) |
117 | | Udaya Kiran Tupakula,
Vijay Varadharajan:
Tracing DoS Floods: An Automated Approach.
J. Network Syst. Manage. 12(1): (2004) |
116 | | Ghassan Chaddoud,
Vijay Varadharajan,
Isabelle Chrisment,
André Schaff:
Gestion efficace de la sécurité des communications de groupe pour le service SSM.
Technique et Science Informatiques 23(9): 1107-1135 (2004) |
2003 |
115 | EE | Ching Lin,
Vijay Varadharajan:
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems.
ACNS 2003: 176-190 |
114 | EE | Chun Ruan,
Vijay Varadharajan:
An Authorization Model for E-consent Requirement in a Health Care Application.
ACNS 2003: 191-205 |
113 | EE | Udaya Kiran Tupakula,
Vijay Varadharajan:
A Practical Method to Counteract Denial of Service Attacks.
ACSC 2003: 275-284 |
112 | EE | Weiliang Zhao,
Vijay Varadharajan,
Yi Mu:
A Secure Mental Poker Protocol Over The Internet.
ACSW Frontiers 2003: 105-109 |
111 | | Sarath Indrakanti,
Vijay Varadharajan,
Michael Hitchens,
Rajat Kumar Todi:
Secure Authorisation for Web Services.
DBSec 2003: 163-175 |
110 | EE | Chun Ruan,
Vijay Varadharajan:
Decentralized Temporal Authorization Administration.
DEXA 2003: 917-926 |
109 | EE | Gregory Saunders,
Michael Hitchens,
Vijay Varadharajan:
Role-Based Access Control and the Access Control Matrix.
ICICS 2003: 145-157 |
108 | | Sarath Indrakanti,
Vijay Varadharajan,
Rajat Kumar Todi:
Authorisation Service in .Net My Services.
ICWI 2003: 1115-1118 |
107 | | Chun Ruan,
Vijay Varadharajan,
Yan Zhang:
Evaluation of Authorization with Delegation and Negation.
IIS 2003: 547-551 |
106 | EE | Chun Ruan,
Vijay Varadharajan,
Yan Zhang:
A Logic Model for Temporal Authorization Delegation with Negation.
ISC 2003: 310-324 |
105 | EE | Chun Ruan,
Vijay Varadharajan:
Supporting E-consent on Health Data by Logic.
ISMIS 2003: 392-396 |
104 | | Udaya Kiran Tupakula,
Vijay Varadharajan:
A Controller Agent Model to Counteract DoS Attacks in Multiple Domains.
Integrated Network Management 2003: 113-116 |
103 | | Chun Ruan,
Vijay Varadharajan,
Yan Zhang:
Delegatable Authorization Program and Its Application.
Security and Management 2003: 267-273 |
102 | EE | Yun Bai,
Vijay Varadharajan:
On transformation of authorization policies.
Data Knowl. Eng. 45(3): 333-357 (2003) |
101 | | Hua Wang,
Yanchun Zhang,
Jinli Cao,
Vijay Varadharajan:
Achieving secure and flexible M-services through tickets.
IEEE Transactions on Systems, Man, and Cybernetics, Part A 33(6): 697-708 (2003) |
100 | EE | Chun Ruan,
Vijay Varadharajan:
A formal graph based framework for supporting authorization delegations and conflict resolutions.
Int. J. Inf. Sec. 1(4): 211-222 (2003) |
99 | | Vijay Varadharajan,
D. Foster:
A Security Architecture for Mobile Agent Based Applications.
World Wide Web 6(1): 93-122 (2003) |
2002 |
98 | EE | Chun Ruan,
Vijay Varadharajan:
Resolving Conflicts in Authorization Delegations.
ACISP 2002: 271-285 |
97 | EE | Michael Hitchens,
Vijay Varadharajan,
Gregory Saunders:
Policy Administration Domains.
ACISP 2002: 286-302 |
96 | EE | Yi Mu,
Junqi Zhang,
Vijay Varadharajan:
m out of n Oblivious Transfer.
ACISP 2002: 395-405 |
95 | | Michael Hitchens,
Vijay Varadharajan,
Gregory Saunders:
Security Policy Management in Distributed Systems.
IASTED PDCS 2002: 290-294 |
94 | | Rajan Shankaran,
Vijay Varadharajan,
Michael Hitchens:
Secure Multicast Support for Mobile IP with Hierarchical Registration Approach.
IASTED PDCS 2002: 851-856 |
93 | EE | Junqi Zhang,
Vijay Varadharajan,
Yi Mu:
A Secure Object Sharing Scheme for Java Card.
ICICS 2002: 243-251 |
92 | EE | Chun Ruan,
Vijay Varadharajan,
Yan Zhang:
Logic-Based Reasoning on Delegatable Authorizations.
ISMIS 2002: 185-193 |
91 | EE | Yun Bai,
Vijay Varadharajan:
Object Oriented Database with Authorization Policies.
Fundam. Inform. 53(3-4): 229-250 (2002) |
90 | | Yi Mu,
Vijay Varadharajan:
Group Cryptography: Signature and Encryption.
Informatica (Slovenia) 26(3): (2002) |
89 | | Guangrong Chen,
Vijay Varadharajan,
Pradeep Ray,
P. Zuluaga:
Management for eBusiness in the New Millennium: A Report on APNOMS 2001.
J. Network Syst. Manage. 10(2): (2002) |
2001 |
88 | | Vijay Varadharajan,
Yi Mu:
Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings
Springer 2001 |
87 | EE | Vlad Ingar Wietrzyk,
Makoto Takizawa,
Vijay Varadharajan:
A Strategy for MLS Workflow.
ACISP 2001: 159-175 |
86 | EE | Yan Zhang,
Vijay Varadharajan:
A Logic for Modeling the Dynamics of Beliefs in Cryptographic Protocols.
ACSC 2001: 215-222 |
85 | | Pascal Molli,
Hala Skaf-Molli,
Claude Godart,
Pradeep Ray,
Rajan Shankaran,
Vijay Varadharajan:
Integrating Network Services for Virtual Teams.
ICEIS (2) 2001: 1034-1039 |
84 | EE | Michael Hitchens,
Vijay Varadharajan:
RBAC for XML Document Stores.
ICICS 2001: 131-143 |
83 | EE | Chuan-Kun Wu,
Vijay Varadharajan:
Fair Exchange of Digital Signatures with Offline Trusted Third Party.
ICICS 2001: 466-470 |
82 | | Vlad Ingar Wietrzyk,
Makoto Takizawa,
Mehmet A. Orgun,
Vijay Varadharajan:
A Secure Transaction Environment for Workflows in Distributed Systems.
ICPADS 2001: 198-208 |
81 | | Rajan Shankaran,
Vijay Varadharajan,
Michael Hitchens:
A Distributed Location Management Scheme for Mobile Hosts.
ICPADS 2001: 297-304 |
80 | EE | Yi Mu,
Vijay Varadharajan:
Robust and Secure Broadcasting.
INDOCRYPT 2001: 223-231 |
79 | EE | Yi Mu,
Khanh Quoc Nguyen,
Vijay Varadharajan:
A Fair Electronic Cash Scheme.
ISEC 2001: 20-32 |
78 | EE | Rajan Shankaran,
Vijay Varadharajan,
Michael Hitchens:
Secure Distributed Location Management Scheme for Mobile Hosts.
LCN 2001: 296-323 |
77 | EE | Vijay Varadharajan:
Secure Networked Computing.
MMM-ACNS 2001: 27 |
76 | EE | Michael Hitchens,
Vijay Varadharajan:
Tower: A Language for Role Based Access Control.
POLICY 2001: 88-106 |
75 | | Gregory Saunders,
Michael Hitchens,
Vijay Varadharajan:
Role-Based Access Control and the Access Control Matrix.
Operating Systems Review 35(4): 6-20 (2001) |
2000 |
74 | | Yi Mu,
Vijay Varadharajan:
Fail-Stop Confirmer Signatures.
ACISP 2000: 368-377 |
73 | EE | Vijay Varadharajan:
Security enhanced mobile agents.
ACM Conference on Computer and Communications Security 2000: 200-209 |
72 | EE | Weiliang Zhao,
Vijay Varadharajan,
Yi Mu:
Fair On-line Gambling.
ACSAC 2000: 394-400 |
71 | EE | Vlad Ingar Wietrzyk,
Mehmet A. Orgun,
Vijay Varadharajan:
On the Analysis of On-Line Database Reorganization.
ADBIS-DASFAA 2000: 293-306 |
70 | EE | Yi Mu,
Vijay Varadharajan:
Towards a Protection Model for Supporting Multiple Access Control Policies.
Australasian Database Conference 2000: 107-114 |
69 | | Hongxue Wang,
Vijay Varadharajan,
Yan Zhang:
Towards a Generic Logic for Analysing Network Protocols.
ICDCS Workshop on Internet 2000: A19-A26 |
68 | EE | Yi Mu,
Vijay Varadharajan:
An Internet Anonymous Auction Scheme.
ICISC 2000: 171-182 |
67 | EE | Yi Mu,
Vijay Varadharajan:
Distributed Signcryption.
INDOCRYPT 2000: 155-164 |
66 | | Michael Hitchens,
Vijay Varadharajan:
Elements of a Language for Role-Based Access Control.
SEC 2000: 371-380 |
1999 |
65 | | Vijay Varadharajan,
Yi Mu:
Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings
Springer 1999 |
64 | EE | Khanh Quoc Nguyen,
Yi Mu,
Vijay Varadharajan:
Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature.
ACISP 1999: 117-128 |
63 | EE | Yun Bai,
Vijay Varadharajan:
Authorization in Object Oriented Databases.
ACISP 1999: 270-280 |
62 | EE | Gregory Saunders,
Michael Hitchens,
Vijay Varadharajan:
An Analysis of Access Control Models.
ACISP 1999: 281-293 |
61 | | Tri Van Le,
Khanh Quoc Nguyen,
Vijay Varadharajan:
How to Prove That a Committed Number Is Prime.
ASIACRYPT 1999: 208-218 |
60 | | Yun Bai,
Vijay Varadharajan:
A Logical Formalization for Specifying Authorizations in Object-Oriented Databases.
DBSec 1999: 317-330 |
59 | EE | Khanh Quoc Nguyen,
Vijay Varadharajan,
Yi Mu:
Batching Proofs of Knowledge and Its Applications.
DEXA Workshop 1999: 844-849 |
58 | EE | Feng Bao,
Robert H. Deng,
Khanh Quoc Nguyen,
Vijay Varadharajan:
Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party.
DEXA Workshop 1999: 858-863 |
57 | | Khanh Quoc Nguyen,
Feng Bao,
Yi Mu,
Vijay Varadharajan:
Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications.
ICICS 1999: 103-118 |
56 | | Michael Hitchens,
Vijay Varadharajan:
Issues in the Design of a Language for Role Based Access Control.
ICICS 1999: 22-38 |
55 | EE | Yuko Murayama,
Vijay Varadharajan:
Message from the IWSEC Workshop Co-Chairs.
ICPP Workshops 1999: 132- |
54 | EE | Chuan-Kun Wu,
Vijay Varadharajan:
Modified Chinese Remainder Theorem and Its Application to Proxy Signatures.
ICPP Workshops 1999: 146- |
53 | EE | Yi Mu,
Vijay Varadharajan,
Khanh Quoc Nguyen:
Delegated Decryption.
IMA Int. Conf. 1999: 258-269 |
52 | EE | Khanh Quoc Nguyen,
Yi Mu,
Vijay Varadharajan:
Undeniable Confirmer Signature.
ISW 1999: 235-246 |
51 | EE | Rajan Shankaran,
Vijay Varadharajan,
Michael Hitchens:
Secure Multicast Extensions for Mobile Networks.
LCN 1999: 106-116 |
50 | EE | Yun Bai,
Vijay Varadharajan:
On Formal Languages for Sequences of Authorization Transformations.
SAFECOMP 1999: 375-384 |
49 | EE | Hongxue Wang,
Vijay Varadharajan,
John K. Slaney:
Towards Perfect Objects.
TOOLS (32) 1999: 115-126 |
48 | EE | Vijay Varadharajan,
Rajan Shankaran,
Michael Hitchens:
On the design of secure ATM networks.
Computer Communications 22(15-16): 1512-1525 (1999) |
47 | EE | Vijay Varadharajan,
Khanh Quoc Nguyen,
Yi Mu:
On the Design of Efficient RSA-based Off-line Electronic Cash Schemes.
Theor. Comput. Sci. 226(1-2): 173-184 (1999) |
1998 |
46 | EE | Yun Bai,
Vijay Varadharajan:
A High Level Language for Conventional Access Control Models.
ACISP 1998: 273-283 |
45 | EE | Vijay Varadharajan,
C. Crall,
Joe Pato:
Authorization in Enterprise-Wide Distributed System: A Practical Design and Application.
ACSAC 1998: 178-189 |
44 | EE | Rajan Shankaran,
Vijay Varadharajan:
Secure Signaling and Access Control for ATM Networks.
ACSAC 1998: 212-222 |
43 | EE | Yi Mu,
Vijay Varadharajan:
Anonymous Secure E-Voting Over a Network.
ACSAC 1998: 293-299 |
42 | EE | Yi Mu,
Vijay Varadharajan:
A New Scheme of Credit based Payment for Electronic Commerce.
LCN 1998: 278- |
41 | EE | Hongxue Wang,
Vijay Varadharajan,
Yan Zhang:
A Secure Communication Scheme for Multiagent Systems.
PRIMA 1998: 174-185 |
1997 |
40 | | Vijay Varadharajan,
Josef Pieprzyk,
Yi Mu:
Information Security and Privacy, Second Australasian Conference, ACISP'97, Syndey, NSW, Australia, July 7-9, 1997, Proceedings
Springer 1997 |
39 | | Yun Bai,
Vijay Varadharajan:
Analysis and Implementation of a Formal Authorisation Policy Design Approach.
ACISP 1997: 14-25 |
38 | | Yi Mu,
Vijay Varadharajan,
Yan-Xia Lin:
New Micropayment Schemes Based on PayWords.
ACISP 1997: 283-293 |
37 | | Vijay Varadharajan,
Rajan Shankaran,
Michael Hitchens:
Security Issues in Asynchronous Transfer Mode.
ACISP 1997: 76-89 |
36 | EE | Khanh Quoc Nguyen,
Yi Mu,
Vijay Varadharajan:
Micro-Digital Money for Electronic Commerce.
ACSAC 1997: 2-8 |
35 | EE | Khanh Quoc Nguyen,
Yi Mu,
Vijay Varadharajan:
Secure and Efficient Digital Coins.
ACSAC 1997: 9-15 |
34 | EE | Yun Bai,
Vijay Varadharajan:
A Logic For State Transformations in Authorization Policies.
CSFW 1997: 173-182 |
33 | | Yun Bai,
Vijay Varadharajan:
A language for specifying sequences of authorization transformations and its applications.
ICICS 1997: 39-49 |
32 | | Khanh Quoc Nguyen,
Vijay Varadharajan,
Yi Mu:
A New Efficient Off-line Anonymous Cash Scheme.
ISAAC 1997: 193-201 |
31 | | Khanh Quoc Nguyen,
Yi Mu,
Vijay Varadharajan:
A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature.
ISW 1997: 313-320 |
30 | EE | Vijay Varadharajan,
Rajan Shankaran,
Michael Hitchens:
Security services and public key infrastructure for ATM networks.
LCN 1997: 253-263 |
29 | EE | Vijay Varadharajan,
Panos Katsavos:
High-speed network security. I. SMDS and frame relay.
Computer Communications 20(10): 832-847 (1997) |
28 | | Vijay Varadharajan:
Extending the Schematic Protection Model II: Revocation.
Operating Systems Review 31(1): 64-77 (1997) |
1996 |
27 | | Yi Mu,
Vijay Varadharajan:
On the design of security protocols for mobile communications.
ACISP 1996: 134-145 |
26 | | Vijay Varadharajan,
Phillip Allen:
Support for joint action based security policies.
ACISP 1996: 207-218 |
25 | EE | Michael Hitchens,
Vijay Varadharajan:
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems.
ACSAC 1996: 105-116 |
24 | EE | Vijay Varadharajan,
Yi Mu:
On The Design Of Secure Electronic Payment Schemes For Internet.
ACSAC 1996: 78-87 |
23 | | Vijay Varadharajan,
Yi Mu:
Design of Secure End-toEnd Protocols for Mobile Systems.
IFIP World Conference on Mobile Communications 1996: 258-266 |
22 | EE | Vijay Varadharajan:
Security in High-Speed Networks.
LCN 1996: 2-11 |
21 | | Vijay Varadharajan,
Thomas Hardjono:
Security model for distributed object framework and its applicability to CORBA.
SEC 1996: 452-463 |
20 | EE | Vijay Varadharajan:
Design of enterprise-wide secure networked system.
WETICE 1996: 100-105 |
19 | EE | Vijay Varadharajan,
Claudio Calvelli:
Key management for a secure LAN-SMDS network.
Computer Communications 19(9-10): 813-823 (1996) |
18 | EE | Vijay Varadharajan,
Claudio Calvelli:
Extending the schematic protection model - II. Revocation.
Computers & Security 15(6): 525-536 (1996) |
17 | EE | Vijay Varadharajan,
Claudio Calvelli:
An Access Control Model and Its Use in Representing Mental Health Application Access Policy.
IEEE Trans. Knowl. Data Eng. 8(1): 81-95 (1996) |
16 | | Vijay Varadharajan,
Phillip Allen:
Joint Actions Based Authorization Schemes.
Operating Systems Review 30(3): 32-45 (1996) |
1994 |
15 | | Panos Katsavos,
Vijay Varadharajan:
A Secure Frame Relay Service.
Computer Networks and ISDN Systems 26(12): 1539-1558 (1994) |
1993 |
14 | | Claudio Calvelli,
Vijay Varadharajan:
Authentication and Revocation in SPM (Extended Abstract).
Operating Systems Review 27(4): 42-57 (1993) |
1992 |
13 | | Claudio Calvelli,
Vijay Varadharajan:
An Analysis of some Delegation Protocols for Distributed Systems.
CSFW 1992: 92-110 |
1991 |
12 | | Vijay Varadharajan:
Hook-Up Property of Information Flow Secure Nets.
CSFW 1991: 154-175 |
11 | | Vijay Varadharajan,
Phillip Allen,
Stewart Black:
An Analysis of the Proxy Problem in Distributed Systems.
IEEE Symposium on Security and Privacy 1991: 255-277 |
10 | EE | Chris J. Mitchell,
Vijay Varadharajan:
Modified forms of cipher block chaining.
Computers & Security 10(1): 37-40 (1991) |
9 | EE | Vijay Varadharajan,
Stewart Black:
Multilevel security in a distributed object-oriented system.
Computers & Security 10(1): 51-68 (1991) |
8 | EE | Vijay Varadharajan:
A petri net model for system design and refinement.
Journal of Systems and Software 15(3): 239-250 (1991) |
1990 |
7 | | Vijay Varadharajan:
Network Security Policy Models.
AUSCRYPT 1990: 74-95 |
6 | | Vijay Varadharajan:
Petri Net Based Modelling of Information Flow Security Requirements.
CSFW 1990: 51-61 |
5 | | Vijay Varadharajan:
A Multilevel Security Policy for Networks.
INFOCOM 1990: 710-718 |
1989 |
4 | EE | Vijay Varadharajan:
Verification of network security protocols.
Computers & Security 8(8): 693-708 (1989) |
1987 |
3 | | Vijay Varadharajan,
K. D. Baker:
Net-Based System Design Representation and Analysis.
Comput. Syst. Sci. Eng. 2(4): 167-178 (1987) |
1985 |
2 | EE | Vijay Varadharajan:
Trapdoor Rings and Their Use in Cryptography.
CRYPTO 1985: 369-395 |
1 | EE | Vijay Varadharajan,
P. W. Sanders:
Practical secure electronic mail system with public key distribution.
Computer Communications 8(3): 121-127 (1985) |