2010 | ||
---|---|---|
197 | Chun Ruan, Vijay Varadharajan: A graph theoretic approach to authorization delegation and conflict resolution in decentralised systems. Distributed and Parallel Databases 27(1): 1-29 (2010) | |
2009 | ||
196 | Wanqing Li, Willy Susilo, Udaya Kiran Tupakula, Reihaneh Safavi-Naini, Vijay Varadharajan: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 ACM 2009 | |
195 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens: ALOPA: Authorization Logic for Property Attestation in Trusted Platforms. ATC 2009: 134-148 | |
194 | Lei Li, Yan Wang, Vijay Varadharajan: Fuzzy Regression Based Trust Prediction in Service-Oriented Applications. ATC 2009: 221-235 | |
193 | Zaobin Gan, Juxia He, Qian Ding, Vijay Varadharajan: Trust Relationship Modelling in E-commerce-Based Social Network. CIS (1) 2009: 206-210 | |
192 | Rajan Shankaran, Vijay Varadharajan, Mehmet A. Orgun, Michael Hitchens: Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks. COMPSAC (2) 2009: 188-193 | |
191 | Chun Ruan, Vijay Varadharajan: Reasoning on Weighted Delegatable Authorizations. DEXA 2009: 279-286 | |
190 | Chun Ruan, Vijay Varadharajan: Trust Enhanced Authorization for Mobile Agents. EC-Web 2009: 84-95 | |
189 | Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala: SBAC: Service Based Access Control. ICECCS 2009: 202-209 | |
188 | Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma: Secure Interoperation in Multidomain Environments Employing UCON Policies. ISC 2009: 395-402 | |
187 | Udaya Kiran Tupakula, Vijay Varadharajan, Srini Rao Pandalaneni: DoSTRACK: a system for defending against DoS attacks. SAC 2009: 47-53 | |
186 | Vijay Varadharajan: Evolution and challenges in trust and security in information system infrastructures. SIN 2009: 1-2 | |
185 | Eimear Gallery, Aarthi Nagarajan, Vijay Varadharajan: A Property-Dependent Agent Transfer Protocol. TRUST 2009: 240-263 | |
184 | Vijay Varadharajan: A Note on Trust-Enhanced Security. IEEE Security & Privacy 7(3): 57-59 (2009) | |
183 | Yan Wang, Kwei-Jay Lin, Duncan S. Wong, Vijay Varadharajan: Trust management towards service-oriented applications. Service Oriented Computing and Applications 3(2): 129-146 (2009) | |
2008 | ||
182 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora: On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. DBSec 2008: 222-237 | |
181 | Junqi Zhang, Vijay Varadharajan: A New Security Scheme for Wireless Sensor Networks. GLOBECOM 2008: 128-132 | |
180 | Weiliang Zhao, Vijay Varadharajan: A Novel Approach of Web Search Based on Community Wisdom. ICIW 2008: 431-436 | |
179 | Weiliang Zhao, Vijay Varadharajan: Trust Management for Web Services. ICWS 2008: 818-821 | |
178 | Yan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan: Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments. Inf. Syst. E-Business Management 6(1): 25-48 (2008) | |
2007 | ||
177 | Venkatesan Balakrishnan, Vijay Varadharajan, Phillip Lucs, Udaya Kiran Tupakula: Trust Enhanced Secure Mobile Ad-Hoc Network Routing. AINA Workshops (2) 2007: 27-33 | |
176 | Ching Lin, Vijay Varadharajan: A Hybrid Trust Model for Enhancing Security in Distributed Systems. ARES 2007: 35-42 | |
175 | Yan Wang, Vijay Varadharajan: Role-based Recommendation and Trust Evaluation. CEC/EEE 2007: 278-288 | |
174 | Yan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan: The Design of A Rule-based and Event-driven Trust Management Framework. ICEBE 2007: 97-104 | |
173 | Junqi Zhang, Yan Wang, Vijay Varadharajan: A New Security Scheme for Integration of Mobile Agents and Web Services. ICIW 2007: 43 | |
172 | Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula, Phillip Lucs: Trust and Recommendations in Mobile Ad hoc Networks. ICNS 2007: 64 | |
171 | Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula, Phillip Lucs: TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks. ICON 2007: 182-187 | |
170 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens: Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services. PDCAT 2007: 453-460 | |
169 | Junqi Zhang, Yan Wang, Vijay Varadharajan: Mobile Agent and Web Service Integration Security Architecture. SOCA 2007: 172-179 | |
168 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens: Trust management for trusted computing platforms in web services. STC 2007: 58-62 | |
167 | David Foster, Vijay Varadharajan: Trust-enhanced secure mobile agent-based system design. IJAOSE 1(2): 205-224 (2007) | |
166 | Udaya Kiran Tupakula, Vijay Varadharajan, Ashok Kumar Gajam, Sunil Kumar Vuppala, Pandalaneni Naga Srinivasa Rao: DDoS: design, implementation and analysis of automated model. IJWMC 2(1): 72-85 (2007) | |
2006 | ||
165 | Udaya Kiran Tupakula, Vijay Varadharajan: Analysis of traceback techniques. ACSW Frontiers 2006: 115-124 | |
164 | Junqi Zhang, Vijay Varadharajan, Yi Mu: A Scalable Multi-service Group Key Management Scheme. AICT/ICIW 2006: 172 | |
163 | Ching Lin, Vijay Varadharajan: Trust Based Risk Management for Distributed System Security - A New Approach. ARES 2006: 6-13 | |
162 | Chun Ruan, Vijay Varadharajan: Implementing Authorization Delegations Using Graph. DEXA 2006: 904-913 | |
161 | Chun Ruan, Vijay Varadharajan: Integration of Graph Based Authorization Policies. ISMIS 2006: 359-368 | |
160 | Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula: Fellowship: Defense against Flooding and Packet Drop Attacks in MANET. NOMS 2006 | |
159 | Zaobin Gan, Vijay Varadharajan: Design and Implementation of a Practical Secure Distributed Healthcare Application. SECRYPT 2006: 431-436 | |
158 | Zaobin Gan, Dengwei Wei, Vijay Varadharajan: Improving Software Security Through an Integrated Approach. SECRYPT 2006: 437-442 | |
157 | Junqi Zhang, Vijay Varadharajan, Yi Mu: ID-based Secure PIM-SM Schemes. Wireless and Optical Communications 2006: 190-195 | |
156 | Weiliang Zhao, Vijay Varadharajan, George Bryan: General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing. JCP 1(2): 42-53 (2006) | |
2005 | ||
155 | Venkatesan Balakrishnan, Vijay Varadharajan: Designing Secure Wireless Mobile Ad Hoc Networks. AINA 2005: 5-8 | |
154 | Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi: Trust Enhanced Security for Mobile Agents. CEC 2005: 231-238 | |
153 | Sarath Indrakanti, Vijay Varadharajan: An Authorization Architecture for Web Services. DBSec 2005: 222-236 | |
152 | Yan Wang, Vijay Varadharajan: Two-Phase Peer Evaluation in P2P E-Commerce Environments. EEE 2005: 654-657 | |
151 | Huu Tran, Michael Hitchens, Vijay Varadharajan, Paul Andrew Watters: A Trust based Access Control Framework for P2P File-Sharing Systems. HICSS 2005 | |
150 | Yan Wang, Vijay Varadharajan: A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments. IAT 2005: 88-94 | |
149 | Weiliang Zhao, Vijay Varadharajan, George Bryan: Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments. ICEIS (3) 2005: 331-336 | |
148 | Vijay Varadharajan: Authorization and Trust Enhanced Security for Distributed Applications. ICISS 2005: 1-20 | |
147 | Weiliang Zhao, Vijay Varadharajan, George Bryan: Analysis and Modelling of Trust in Distributed Information Systems. ICISS 2005: 106-119 | |
146 | Zaobin Gan, Dengwen Wei, Vijay Varadharajan: Evaluating the Performance and Scalability of Web Application Systems. ICITA (1) 2005: 111-114 | |
145 | D. Foster, Vijay Varadharajan: Security and Trust Enhanced Mobile Agent Based System Design. ICITA (1) 2005: 155-160 | |
144 | Zaobin Gan, Dengwen Wei, Jin-Long Zhang, Vijay Varadharajan: Business-Process-Oriented Software Requirements Automatic Generator. ICITA (1) 2005: 95-98 | |
143 | Zaobin Gan, Ching Lin, Vijay Varadharajan: A Middleware-Based Script Language. ICMB 2005: 690-693 | |
142 | Yan Wang, Vijay Varadharajan: Trust2: Developing Trust in Peer-to-Peer Environments. IEEE SCC 2005: 24-34 | |
141 | Chun Ruan, Vijay Varadharajan: Data Protection in Distributed Database Systems. ISMIS 2005: 191-199 | |
140 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens: Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture. ISWS 2005: 35-44 | |
139 | Weiliang Zhao, Vijay Varadharajan: Efficient TTP-Free Mental Poker Protocols. ITCC (1) 2005: 745-750 | |
138 | Ching Lin, Vijay Varadharajan, Yan Wang: Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. TrustBus 2005: 151-160 | |
137 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens: Architectural Framework for Web Services Authorization. WSMDEIS 2005: 75-84 | |
136 | Junqi Zhang, Vijay Varadharajan, Yi Mu: Secure distribution and access of XML documents. IJHPCN 3(5/6): 356-365 (2005) | |
135 | Yun Bai, Yan Zhang, Vijay Varadharajan: On the sequence of authorization policy transformations. Int. J. Inf. Sec. 4(1-2): 120-131 (2005) | |
134 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens: Authorization Service for Web Services and its Application in a Health Care Domain. Int. J. Web Service Res. 2(4): 94-119 (2005) | |
133 | Yan Wang, Vijay Varadharajan: Secure route structures for parallel mobile agents based systems using fast binary dispatch. Mobile Information Systems 1(3): 185-205 (2005) | |
2004 | ||
132 | Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings Springer 2004 | |
131 | Chun Ruan, Vijay Varadharajan: A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. ACISP 2004: 402-413 | |
130 | Junqi Zhang, Vijay Varadharajan, Yi Mu: Securing XML Document Sources and Their Distribution. AINA (1) 2004: 562-567 | |
129 | Yan Wang, Vijay Varadharajan: Interaction Trust Evaluation in Decentralized Environments. EC-Web 2004: 144-153 | |
128 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens: Authorization Service for Web Services and its Implementation. ICWS 2004: 774-777 | |
127 | Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi: Enhancing Grid Security with Trust Management. IEEE SCC 2004: 303-310 | |
126 | Michael Hitchens, Rajan Shankaran, Vijay Varadharajan: Securing the Ad-Hoc On-demand Distance Vector Protocol. ISCA PDCS 2004: 353-360 | |
125 | Junqi Zhang, Vijay Varadharajan, Yi Mu: A Secure PIM-SM Multicast Routing Protocol. IWDC 2004: 276-288 | |
124 | Weiliang Zhao, Vijay Varadharajan, George Bryan: Modelling Trust Relationships in Distributed Environments. TrustBus 2004: 40-49 | |
123 | Ching Lin, Vijay Varadharajan, Yan Wang, Yi Mu: On the Design of a New Trust Model for Mobile Agent Security. TrustBus 2004: 60-69 | |
122 | Vijay Varadharajan: Trustworthy Computing (Extended Abstract). WISE 2004: 13-16 | |
121 | Yan Wang, Vijay Varadharajan: A Time-Based Peer Trust Evaluation in P2P E-commerce Environments. WISE 2004: 730-735 | |
120 | Weiliang Zhao, Vijay Varadharajan, George Bryan: Fair Trading Protocol With Off-line Anonymous Credit Card Payment. WOSIS 2004: 186-195 | |
119 | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens: Security for cluster based ad hoc networks. Computer Communications 27(5): 488-501 (2004) | |
118 | Weiliang Zhao, Vijay Varadharajan, George Bryan: Fair Trading Protocol with Offline Anonymous Credit Card Payment. Information Systems Security 13(3): 41-47 (2004) | |
117 | Udaya Kiran Tupakula, Vijay Varadharajan: Tracing DoS Floods: An Automated Approach. J. Network Syst. Manage. 12(1): (2004) | |
116 | Ghassan Chaddoud, Vijay Varadharajan, Isabelle Chrisment, André Schaff: Gestion efficace de la sécurité des communications de groupe pour le service SSM. Technique et Science Informatiques 23(9): 1107-1135 (2004) | |
2003 | ||
115 | Ching Lin, Vijay Varadharajan: Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. ACNS 2003: 176-190 | |
114 | Chun Ruan, Vijay Varadharajan: An Authorization Model for E-consent Requirement in a Health Care Application. ACNS 2003: 191-205 | |
113 | Udaya Kiran Tupakula, Vijay Varadharajan: A Practical Method to Counteract Denial of Service Attacks. ACSC 2003: 275-284 | |
112 | Weiliang Zhao, Vijay Varadharajan, Yi Mu: A Secure Mental Poker Protocol Over The Internet. ACSW Frontiers 2003: 105-109 | |
111 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi: Secure Authorisation for Web Services. DBSec 2003: 163-175 | |
110 | Chun Ruan, Vijay Varadharajan: Decentralized Temporal Authorization Administration. DEXA 2003: 917-926 | |
109 | Gregory Saunders, Michael Hitchens, Vijay Varadharajan: Role-Based Access Control and the Access Control Matrix. ICICS 2003: 145-157 | |
108 | Sarath Indrakanti, Vijay Varadharajan, Rajat Kumar Todi: Authorisation Service in .Net My Services. ICWI 2003: 1115-1118 | |
107 | Chun Ruan, Vijay Varadharajan, Yan Zhang: Evaluation of Authorization with Delegation and Negation. IIS 2003: 547-551 | |
106 | Chun Ruan, Vijay Varadharajan, Yan Zhang: A Logic Model for Temporal Authorization Delegation with Negation. ISC 2003: 310-324 | |
105 | Chun Ruan, Vijay Varadharajan: Supporting E-consent on Health Data by Logic. ISMIS 2003: 392-396 | |
104 | Udaya Kiran Tupakula, Vijay Varadharajan: A Controller Agent Model to Counteract DoS Attacks in Multiple Domains. Integrated Network Management 2003: 113-116 | |
103 | Chun Ruan, Vijay Varadharajan, Yan Zhang: Delegatable Authorization Program and Its Application. Security and Management 2003: 267-273 | |
102 | Yun Bai, Vijay Varadharajan: On transformation of authorization policies. Data Knowl. Eng. 45(3): 333-357 (2003) | |
101 | Hua Wang, Yanchun Zhang, Jinli Cao, Vijay Varadharajan: Achieving secure and flexible M-services through tickets. IEEE Transactions on Systems, Man, and Cybernetics, Part A 33(6): 697-708 (2003) | |
100 | Chun Ruan, Vijay Varadharajan: A formal graph based framework for supporting authorization delegations and conflict resolutions. Int. J. Inf. Sec. 1(4): 211-222 (2003) | |
99 | Vijay Varadharajan, D. Foster: A Security Architecture for Mobile Agent Based Applications. World Wide Web 6(1): 93-122 (2003) | |
2002 | ||
98 | Chun Ruan, Vijay Varadharajan: Resolving Conflicts in Authorization Delegations. ACISP 2002: 271-285 | |
97 | Michael Hitchens, Vijay Varadharajan, Gregory Saunders: Policy Administration Domains. ACISP 2002: 286-302 | |
96 | Yi Mu, Junqi Zhang, Vijay Varadharajan: m out of n Oblivious Transfer. ACISP 2002: 395-405 | |
95 | Michael Hitchens, Vijay Varadharajan, Gregory Saunders: Security Policy Management in Distributed Systems. IASTED PDCS 2002: 290-294 | |
94 | Rajan Shankaran, Vijay Varadharajan, Michael Hitchens: Secure Multicast Support for Mobile IP with Hierarchical Registration Approach. IASTED PDCS 2002: 851-856 | |
93 | Junqi Zhang, Vijay Varadharajan, Yi Mu: A Secure Object Sharing Scheme for Java Card. ICICS 2002: 243-251 | |
92 | Chun Ruan, Vijay Varadharajan, Yan Zhang: Logic-Based Reasoning on Delegatable Authorizations. ISMIS 2002: 185-193 | |
91 | Yun Bai, Vijay Varadharajan: Object Oriented Database with Authorization Policies. Fundam. Inform. 53(3-4): 229-250 (2002) | |
90 | Yi Mu, Vijay Varadharajan: Group Cryptography: Signature and Encryption. Informatica (Slovenia) 26(3): (2002) | |
89 | Guangrong Chen, Vijay Varadharajan, Pradeep Ray, P. Zuluaga: Management for eBusiness in the New Millennium: A Report on APNOMS 2001. J. Network Syst. Manage. 10(2): (2002) | |
2001 | ||
88 | Vijay Varadharajan, Yi Mu: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings Springer 2001 | |
87 | Vlad Ingar Wietrzyk, Makoto Takizawa, Vijay Varadharajan: A Strategy for MLS Workflow. ACISP 2001: 159-175 | |
86 | Yan Zhang, Vijay Varadharajan: A Logic for Modeling the Dynamics of Beliefs in Cryptographic Protocols. ACSC 2001: 215-222 | |
85 | Pascal Molli, Hala Skaf-Molli, Claude Godart, Pradeep Ray, Rajan Shankaran, Vijay Varadharajan: Integrating Network Services for Virtual Teams. ICEIS (2) 2001: 1034-1039 | |
84 | Michael Hitchens, Vijay Varadharajan: RBAC for XML Document Stores. ICICS 2001: 131-143 | |
83 | Chuan-Kun Wu, Vijay Varadharajan: Fair Exchange of Digital Signatures with Offline Trusted Third Party. ICICS 2001: 466-470 | |
82 | Vlad Ingar Wietrzyk, Makoto Takizawa, Mehmet A. Orgun, Vijay Varadharajan: A Secure Transaction Environment for Workflows in Distributed Systems. ICPADS 2001: 198-208 | |
81 | Rajan Shankaran, Vijay Varadharajan, Michael Hitchens: A Distributed Location Management Scheme for Mobile Hosts. ICPADS 2001: 297-304 | |
80 | Yi Mu, Vijay Varadharajan: Robust and Secure Broadcasting. INDOCRYPT 2001: 223-231 | |
79 | Yi Mu, Khanh Quoc Nguyen, Vijay Varadharajan: A Fair Electronic Cash Scheme. ISEC 2001: 20-32 | |
78 | Rajan Shankaran, Vijay Varadharajan, Michael Hitchens: Secure Distributed Location Management Scheme for Mobile Hosts. LCN 2001: 296-323 | |
77 | Vijay Varadharajan: Secure Networked Computing. MMM-ACNS 2001: 27 | |
76 | Michael Hitchens, Vijay Varadharajan: Tower: A Language for Role Based Access Control. POLICY 2001: 88-106 | |
75 | Gregory Saunders, Michael Hitchens, Vijay Varadharajan: Role-Based Access Control and the Access Control Matrix. Operating Systems Review 35(4): 6-20 (2001) | |
2000 | ||
74 | Yi Mu, Vijay Varadharajan: Fail-Stop Confirmer Signatures. ACISP 2000: 368-377 | |
73 | Vijay Varadharajan: Security enhanced mobile agents. ACM Conference on Computer and Communications Security 2000: 200-209 | |
72 | Weiliang Zhao, Vijay Varadharajan, Yi Mu: Fair On-line Gambling. ACSAC 2000: 394-400 | |
71 | Vlad Ingar Wietrzyk, Mehmet A. Orgun, Vijay Varadharajan: On the Analysis of On-Line Database Reorganization. ADBIS-DASFAA 2000: 293-306 | |
70 | Yi Mu, Vijay Varadharajan: Towards a Protection Model for Supporting Multiple Access Control Policies. Australasian Database Conference 2000: 107-114 | |
69 | Hongxue Wang, Vijay Varadharajan, Yan Zhang: Towards a Generic Logic for Analysing Network Protocols. ICDCS Workshop on Internet 2000: A19-A26 | |
68 | Yi Mu, Vijay Varadharajan: An Internet Anonymous Auction Scheme. ICISC 2000: 171-182 | |
67 | Yi Mu, Vijay Varadharajan: Distributed Signcryption. INDOCRYPT 2000: 155-164 | |
66 | Michael Hitchens, Vijay Varadharajan: Elements of a Language for Role-Based Access Control. SEC 2000: 371-380 | |
1999 | ||
65 | Vijay Varadharajan, Yi Mu: Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings Springer 1999 | |
64 | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. ACISP 1999: 117-128 | |
63 | Yun Bai, Vijay Varadharajan: Authorization in Object Oriented Databases. ACISP 1999: 270-280 | |
62 | Gregory Saunders, Michael Hitchens, Vijay Varadharajan: An Analysis of Access Control Models. ACISP 1999: 281-293 | |
61 | Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan: How to Prove That a Committed Number Is Prime. ASIACRYPT 1999: 208-218 | |
60 | Yun Bai, Vijay Varadharajan: A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. DBSec 1999: 317-330 | |
59 | Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu: Batching Proofs of Knowledge and Its Applications. DEXA Workshop 1999: 844-849 | |
58 | Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan: Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. DEXA Workshop 1999: 858-863 | |
57 | Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan: Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. ICICS 1999: 103-118 | |
56 | Michael Hitchens, Vijay Varadharajan: Issues in the Design of a Language for Role Based Access Control. ICICS 1999: 22-38 | |
55 | Yuko Murayama, Vijay Varadharajan: Message from the IWSEC Workshop Co-Chairs. ICPP Workshops 1999: 132- | |
54 | Chuan-Kun Wu, Vijay Varadharajan: Modified Chinese Remainder Theorem and Its Application to Proxy Signatures. ICPP Workshops 1999: 146- | |
53 | Yi Mu, Vijay Varadharajan, Khanh Quoc Nguyen: Delegated Decryption. IMA Int. Conf. 1999: 258-269 | |
52 | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Undeniable Confirmer Signature. ISW 1999: 235-246 | |
51 | Rajan Shankaran, Vijay Varadharajan, Michael Hitchens: Secure Multicast Extensions for Mobile Networks. LCN 1999: 106-116 | |
50 | Yun Bai, Vijay Varadharajan: On Formal Languages for Sequences of Authorization Transformations. SAFECOMP 1999: 375-384 | |
49 | Hongxue Wang, Vijay Varadharajan, John K. Slaney: Towards Perfect Objects. TOOLS (32) 1999: 115-126 | |
48 | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens: On the design of secure ATM networks. Computer Communications 22(15-16): 1512-1525 (1999) | |
47 | Vijay Varadharajan, Khanh Quoc Nguyen, Yi Mu: On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. Theor. Comput. Sci. 226(1-2): 173-184 (1999) | |
1998 | ||
46 | Yun Bai, Vijay Varadharajan: A High Level Language for Conventional Access Control Models. ACISP 1998: 273-283 | |
45 | Vijay Varadharajan, C. Crall, Joe Pato: Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. ACSAC 1998: 178-189 | |
44 | Rajan Shankaran, Vijay Varadharajan: Secure Signaling and Access Control for ATM Networks. ACSAC 1998: 212-222 | |
43 | Yi Mu, Vijay Varadharajan: Anonymous Secure E-Voting Over a Network. ACSAC 1998: 293-299 | |
42 | Yi Mu, Vijay Varadharajan: A New Scheme of Credit based Payment for Electronic Commerce. LCN 1998: 278- | |
41 | Hongxue Wang, Vijay Varadharajan, Yan Zhang: A Secure Communication Scheme for Multiagent Systems. PRIMA 1998: 174-185 | |
1997 | ||
40 | Vijay Varadharajan, Josef Pieprzyk, Yi Mu: Information Security and Privacy, Second Australasian Conference, ACISP'97, Syndey, NSW, Australia, July 7-9, 1997, Proceedings Springer 1997 | |
39 | Yun Bai, Vijay Varadharajan: Analysis and Implementation of a Formal Authorisation Policy Design Approach. ACISP 1997: 14-25 | |
38 | Yi Mu, Vijay Varadharajan, Yan-Xia Lin: New Micropayment Schemes Based on PayWords. ACISP 1997: 283-293 | |
37 | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens: Security Issues in Asynchronous Transfer Mode. ACISP 1997: 76-89 | |
36 | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Micro-Digital Money for Electronic Commerce. ACSAC 1997: 2-8 | |
35 | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: Secure and Efficient Digital Coins. ACSAC 1997: 9-15 | |
34 | Yun Bai, Vijay Varadharajan: A Logic For State Transformations in Authorization Policies. CSFW 1997: 173-182 | |
33 | Yun Bai, Vijay Varadharajan: A language for specifying sequences of authorization transformations and its applications. ICICS 1997: 39-49 | |
32 | Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu: A New Efficient Off-line Anonymous Cash Scheme. ISAAC 1997: 193-201 | |
31 | Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan: A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. ISW 1997: 313-320 | |
30 | Vijay Varadharajan, Rajan Shankaran, Michael Hitchens: Security services and public key infrastructure for ATM networks. LCN 1997: 253-263 | |
29 | Vijay Varadharajan, Panos Katsavos: High-speed network security. I. SMDS and frame relay. Computer Communications 20(10): 832-847 (1997) | |
28 | Vijay Varadharajan: Extending the Schematic Protection Model II: Revocation. Operating Systems Review 31(1): 64-77 (1997) | |
1996 | ||
27 | Yi Mu, Vijay Varadharajan: On the design of security protocols for mobile communications. ACISP 1996: 134-145 | |
26 | Vijay Varadharajan, Phillip Allen: Support for joint action based security policies. ACISP 1996: 207-218 | |
25 | Michael Hitchens, Vijay Varadharajan: esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. ACSAC 1996: 105-116 | |
24 | Vijay Varadharajan, Yi Mu: On The Design Of Secure Electronic Payment Schemes For Internet. ACSAC 1996: 78-87 | |
23 | Vijay Varadharajan, Yi Mu: Design of Secure End-toEnd Protocols for Mobile Systems. IFIP World Conference on Mobile Communications 1996: 258-266 | |
22 | Vijay Varadharajan: Security in High-Speed Networks. LCN 1996: 2-11 | |
21 | Vijay Varadharajan, Thomas Hardjono: Security model for distributed object framework and its applicability to CORBA. SEC 1996: 452-463 | |
20 | Vijay Varadharajan: Design of enterprise-wide secure networked system. WETICE 1996: 100-105 | |
19 | Vijay Varadharajan, Claudio Calvelli: Key management for a secure LAN-SMDS network. Computer Communications 19(9-10): 813-823 (1996) | |
18 | Vijay Varadharajan, Claudio Calvelli: Extending the schematic protection model - II. Revocation. Computers & Security 15(6): 525-536 (1996) | |
17 | Vijay Varadharajan, Claudio Calvelli: An Access Control Model and Its Use in Representing Mental Health Application Access Policy. IEEE Trans. Knowl. Data Eng. 8(1): 81-95 (1996) | |
16 | Vijay Varadharajan, Phillip Allen: Joint Actions Based Authorization Schemes. Operating Systems Review 30(3): 32-45 (1996) | |
1994 | ||
15 | Panos Katsavos, Vijay Varadharajan: A Secure Frame Relay Service. Computer Networks and ISDN Systems 26(12): 1539-1558 (1994) | |
1993 | ||
14 | Claudio Calvelli, Vijay Varadharajan: Authentication and Revocation in SPM (Extended Abstract). Operating Systems Review 27(4): 42-57 (1993) | |
1992 | ||
13 | Claudio Calvelli, Vijay Varadharajan: An Analysis of some Delegation Protocols for Distributed Systems. CSFW 1992: 92-110 | |
1991 | ||
12 | Vijay Varadharajan: Hook-Up Property of Information Flow Secure Nets. CSFW 1991: 154-175 | |
11 | Vijay Varadharajan, Phillip Allen, Stewart Black: An Analysis of the Proxy Problem in Distributed Systems. IEEE Symposium on Security and Privacy 1991: 255-277 | |
10 | Chris J. Mitchell, Vijay Varadharajan: Modified forms of cipher block chaining. Computers & Security 10(1): 37-40 (1991) | |
9 | Vijay Varadharajan, Stewart Black: Multilevel security in a distributed object-oriented system. Computers & Security 10(1): 51-68 (1991) | |
8 | Vijay Varadharajan: A petri net model for system design and refinement. Journal of Systems and Software 15(3): 239-250 (1991) | |
1990 | ||
7 | Vijay Varadharajan: Network Security Policy Models. AUSCRYPT 1990: 74-95 | |
6 | Vijay Varadharajan: Petri Net Based Modelling of Information Flow Security Requirements. CSFW 1990: 51-61 | |
5 | Vijay Varadharajan: A Multilevel Security Policy for Networks. INFOCOM 1990: 710-718 | |
1989 | ||
4 | Vijay Varadharajan: Verification of network security protocols. Computers & Security 8(8): 693-708 (1989) | |
1987 | ||
3 | Vijay Varadharajan, K. D. Baker: Net-Based System Design Representation and Analysis. Comput. Syst. Sci. Eng. 2(4): 167-178 (1987) | |
1985 | ||
2 | Vijay Varadharajan: Trapdoor Rings and Their Use in Cryptography. CRYPTO 1985: 369-395 | |
1 | Vijay Varadharajan, P. W. Sanders: Practical secure electronic mail system with public key distribution. Computer Communications 8(3): 121-127 (1985) |