![]() ![]() ![]() | ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Note: Links lead to the DBLP on the Web. Vijay Varadharajan Ching Lin , Vijay Varadharajan: Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. ACNS 2003 : 176-190 Chun Ruan , Vijay Varadharajan: An Authorization Model for E-consent Requirement in a Health Care Application. ACNS 2003 : 191-205 Chun Ruan , Vijay Varadharajan: Decentralized Temporal Authorization Administration. DEXA 2003 : 917-926 Gregory Saunders , Michael Hitchens , Vijay Varadharajan: Role-Based Access Control and the Access Control Matrix. ICICS 2003 : 145-157 Sarath Indrakanti , Vijay Varadharajan, Rajat Kumar Todi : Authorisation Service in .Net My Services. ICWI 2003 : 1115-1118 Chun Ruan , Vijay Varadharajan, Yan Zhang : A Logic Model for Temporal Authorization Delegation with Negation. ISC 2003 : 310-324 Chun Ruan , Vijay Varadharajan: Supporting E-consent on Health Data by Logic. ISMIS 2003 : 392-396 Udaya Kiran Tupakula , Vijay Varadharajan: A Controller Agent Model to Counteract DoS Attacks in Multiple Domains. Integrated Network Management 2003 : 113-116 Chun Ruan , Vijay Varadharajan, Yan Zhang : Delegatable Authorization Program and Its Application. Security and Management 2003 : 267-273 Yun Bai , Vijay Varadharajan: On transformation of authorization policies. Data Knowl. Eng. 45 (3): 333-357 (2003) Hua Wang , Yanchun Zhang , Jinli Cao , Vijay Varadharajan: Achieving secure and flexible M-services through tickets. IEEE Transactions on Systems, Man, and Cybernetics, Part A 33 (6): 697-708 (2003) Vijay Varadharajan, D. Foster : A Security Architecture for Mobile Agent Based Applications. World Wide Web 6 (1): 93-122 (2003) Chun Ruan , Vijay Varadharajan: Resolving Conflicts in Authorization Delegations. ACISP 2002 : 271-285 Michael Hitchens , Vijay Varadharajan, Gregory Saunders : Policy Administration Domains. ACISP 2002 : 286-302 Yi Mu , Junqi Zhang , Vijay Varadharajan: m out of n Oblivious Transfer. ACISP 2002 : 395-405 Junqi Zhang , Vijay Varadharajan, Yi Mu : A Secure Object Sharing Scheme for Java Card. ICICS 2002 : 243-251 Chun Ruan , Vijay Varadharajan, Yan Zhang : Logic-Based Reasoning on Delegatable Authorizations. ISMIS 2002 : 185-193 Yun Bai , Vijay Varadharajan: Object Oriented Database with Authorization Policies. Fundam. Inform. 53 (3-4): 229-250 (2002) Yi Mu , Vijay Varadharajan: Group Cryptography: Signature and Encryption. Informatica (Slovenia) 26 (3): (2002) Vijay Varadharajan, Yi Mu : Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings Springer 2001 Vlad Ingar Wietrzyk , Makoto Takizawa , Vijay Varadharajan: A Strategy for MLS Workflow. ACISP 2001 : 159-175 Pascal Molli , Hala Skaf-Molli , Claude Godart , Pradeep Ray , Rajan Shankaran , Vijay Varadharajan: Integrating Network Services for Virtual Teams. ICEIS (2) 2001 : 1034-1039 Michael Hitchens , Vijay Varadharajan: RBAC for XML Document Stores. ICICS 2001 : 131-143 Chuan-Kun Wu , Vijay Varadharajan: Fair Exchange of Digital Signatures with Offline Trusted Third Party. ICICS 2001 : 466-470 Vlad Ingar Wietrzyk , Makoto Takizawa , Mehmet A. Orgun , Vijay Varadharajan: A Secure Transaction Environment for Workflows in Distributed Systems. ICPADS 2001 : 198-208 Rajan Shankaran , Vijay Varadharajan, Michael Hitchens : A Distributed Location Management Scheme for Mobile Hosts. ICPADS 2001 : 297-304 Yi Mu , Vijay Varadharajan: Robust and Secure Broadcasting. INDOCRYPT 2001 : 223-231 Yi Mu , Khanh Quoc Nguyen , Vijay Varadharajan: A Fair Electronic Cash Scheme. ISEC 2001 : 20-32 Rajan Shankaran , Vijay Varadharajan, Michael Hitchens : Secure Distributed Location Management Scheme for Mobile Hosts. LCN 2001 : 296-323 Vijay Varadharajan: Secure Networked Computing. MMM-ACNS 2001 : 27 Michael Hitchens , Vijay Varadharajan: Tower: A Language for Role Based Access Control. POLICY 2001 : 88-106 Gregory Saunders , Michael Hitchens , Vijay Varadharajan: Role-Based Access Control and the Access Control Matrix. Operating Systems Review 35 (4): 6-20 (2001) Yi Mu , Vijay Varadharajan: Fail-Stop Confirmer Signatures. ACISP 2000 : 368-377 Vijay Varadharajan: Security enhanced mobile agents. ACM Conference on Computer and Communications Security 2000 : 200-209 Weiling Zhao , Vijay Varadharajan, Yi Mu : Fair On-line Gambling. ACSAC 2000 : 394-400 Vlad Ingar Wietrzyk , Mehmet A. Orgun , Vijay Varadharajan: On the Analysis of On-Line Database Reorganization. ADBIS-DASFAA 2000 : 293-306 Yi Mu , Vijay Varadharajan: Towards a Protection Model for Supporting Multiple Access Control Policies. Australasian Database Conference 2000 : 107-114 Hongxue Wang , Vijay Varadharajan, Yan Zhang : Towards a Generic Logic for Analysing Network Protocols. ICDCS Workshop on Internet 2000 : A19-A26 Yi Mu , Vijay Varadharajan: An Internet Anonymous Auction Scheme. ICISC 2000 : 171-182 Yi Mu , Vijay Varadharajan: Distributed Signcryption. INDOCRYPT 2000 : 155-164 Michael Hitchens , Vijay Varadharajan: Elements of a Language for Role-Based Access Control. SEC 2000 : 371-380 Vijay Varadharajan, Yi Mu : Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings Springer 1999 Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan: Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. ACISP 1999 : 117-128 Yun Bai , Vijay Varadharajan: Authorization in Object Oriented Databases. ACISP 1999 : 270-280 Gregory Saunders , Michael Hitchens , Vijay Varadharajan: An Analysis of Access Control Models. ACISP 1999 : 281-293 Tri Van Le , Khanh Quoc Nguyen , Vijay Varadharajan: How to Prove That a Committed Number Is Prime. ASIACRYPT 1999 : 208-218 Yun Bai , Vijay Varadharajan: A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. DBSec 1999 : 317-330 Khanh Quoc Nguyen , Vijay Varadharajan, Yi Mu : Batching Proofs of Knowledge and Its Applications. DEXA Workshop 1999 : 844-849 Feng Bao , Robert H. Deng , Khanh Quoc Nguyen , Vijay Varadharajan: Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. DEXA Workshop 1999 : 858-863 Khanh Quoc Nguyen , Feng Bao , Yi Mu , Vijay Varadharajan: Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. ICICS 1999 : 103-118 Michael Hitchens , Vijay Varadharajan: Issues in the Design of a Language for Role Based Access Control. ICICS 1999 : 22-38 Yuko Murayama , Vijay Varadharajan: Message from the IWSEC Workshop Co-Chairs. ICPP Workshops 1999 : 132- Chuan-Kun Wu , Vijay Varadharajan: Modified Chinese Remainder Theorem and Its Application to Proxy Signatures. ICPP Workshops 1999 : 146- Yi Mu , Vijay Varadharajan, Khanh Quoc Nguyen : Delegated Decryption. IMA Int. Conf. 1999 : 258-269 Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan: Undeniable Confirmer Signature. ISW 1999 : 235-246 Rajan Shankaran , Vijay Varadharajan, Michael Hitchens : Secure Multicast Extensions for Mobile Networks. LCN 1999 : 106-116 Yun Bai , Vijay Varadharajan: On Formal Languages for Sequences of Authorization Transformations. SAFECOMP 1999 : 375-384 Vijay Varadharajan, Khanh Quoc Nguyen , Yi Mu : On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. Theor. Comput. Sci. 226 (1-2): 173-184 (1999) Yun Bai , Vijay Varadharajan: A High Level Language for Conventional Access Control Models. ACISP 1998 : 273-283 Vijay Varadharajan, C. Crall , Joe Pato : Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. ACSAC 1998 : 178-189 Rajan Shankaran , Vijay Varadharajan: Secure Signaling and Access Control for ATM Networks. ACSAC 1998 : 212-222 Yi Mu , Vijay Varadharajan: Anonymous Secure E-Voting Over a Network. ACSAC 1998 : 293-299 Yi Mu , Vijay Varadharajan: A New Scheme of Credit based Payment for Electronic Commerce. LCN 1998 : 278- Hongzue Wang , Vijay Varadharajan, Yan Zhang : A Secure Communication Scheme for Multiagent Systems. PRIMA 1998 : 174-185 Vijay Varadharajan, Josef Pieprzyk , Yi Mu : Information Security and Privacy, Second Australasian Conference, ACISP'97, Syndey, NSW, Australia, July 7-9, 1997, Proceedings Springer 1997 Yun Bai , Vijay Varadharajan: Analysis and Implementation of a Formal Authorisation Policy Design Approach. ACISP 1997 : 14-25 Yi Mu , Vijay Varadharajan, Yan-Xia Lin : New Micropayment Schemes Based on PayWords. ACISP 1997 : 283-293 Vijay Varadharajan, Rajan Shankaran , Michael Hitchens : Security Issues in Asynchronous Transfer Mode. ACISP 1997 : 76-89 Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan: Micro-Digital Money for Electronic Commerce. ACSAC 1997 : 2-8 Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan: Secure and Efficient Digital Coins. ACSAC 1997 : 9-15 Yun Bai , Vijay Varadharajan: A Logic For State Transformations in Authorization Policies. CSFW 1997 : 173-182 Yun Bai , Vijay Varadharajan: A language for specifying sequences of authorization transformations and its applications. ICICS 1997 : 39-49 Khanh Quoc Nguyen , Vijay Varadharajan, Yi Mu : A New Efficient Off-line Anonymous Cash Scheme. ISAAC 1997 : 193-201 Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan: A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. ISW 1997 : 313-320 Vijay Varadharajan, Rajan Shankaran , Michael Hitchens : Security services and public key infrastructure for ATM networks. LCN 1997 : 253-263 Vijay Varadharajan: Extending the Schematic Protection Model II: Revocation. Operating Systems Review 31 (1): 64-77 (1997) Yi Mu , Vijay Varadharajan: On the design of security protocols for mobile communications. ACISP 1996 : 134-145 Vijay Varadharajan, Phillip Allen : Support for joint action based security policies. ACISP 1996 : 207-218 Michael Hitchens , Vijay Varadharajan: esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. ACSAC 1996 : 105-116 Vijay Varadharajan, Yi Mu : On The Design Of Secure Electronic Payment Schemes For Internet. ACSAC 1996 : 78-87 Vijay Varadharajan, Yi Mu : Design of Secure End-toEnd Protocols for Mobile Systems. IFIP World Conference on Mobile Communications 1996 : 258-266 Vijay Varadharajan: Security in High-Speed Networks. LCN 1996 : 2-11 Vijay Varadharajan, Thomas Hardjono : Security model for distributed object framework and its applicability to CORBA. SEC 1996 : 452-463 Vijay Varadharajan: Design of enterprise-wide secure networked system. WETICE 1996 : 100-105 Vijay Varadharajan, Claudio Calvelli : An Access Control Model and Its Use in Representing Mental Health Application Access Policy. IEEE Trans. Knowl. Data Eng. 8 (1): 81-95 (1996) Vijay Varadharajan, Phillip Allen : Joint Actions Based Authorization Schemes. Operating Systems Review 30 (3): 32-45 (1996) Panos Katsavos , Vijay Varadharajan: A Secure Frame Relay Service. Computer Networks and ISDN Systems 26 (12): 1539-1558 (1994) Claudio Calvelli , Vijay Varadharajan: Authentication and Revocation in SPM (Extended Abstract). Operating Systems Review 27 (4): 42-57 (1993) Claudio Calvelli , Vijay Varadharajan: An Analysis of some Delegation Protocols for Distributed Systems. CSFW 1992 : 92-110 Vijay Varadharajan: Hook-Up Property of Information Flow Secure Nets. CSFW 1991 : 154-175 Vijay Varadharajan, Phillip Allen , S. Black : An Analysis of the Proxy Problem in Distributed Systems. IEEE Symposium on Security and Privacy 1991 : 255-277 Vijay Varadharajan: Network Security Policy Models. AUSCRYPT 1990 : 74-95 Vijay Varadharajan: Petri Net Based Modelling of Information Flow Security Requirements. CSFW 1990 : 51-61 Vijay Varadharajan: A Multilevel Security Policy for Networks. INFOCOM 1990 : 710-718 Vijay Varadharajan, K. D. Baker : Net-Based System Design Representation and Analysis. Comput. Syst. Sci. Eng. 2 (4): 167-178 (1987) Vijay Varadharajan: Trapdoor Rings and Their Use in Cryptography. CRYPTO 1985 : 369-395 1 [ 6 ] [ 11 ] [ 19 ] 2 [ 25 ] [ 26 ] [ 31 ] [ 38 ] [ 40 ] [ 50 ] [ 53 ] [ 79 ] [ 87 ] 3 [ 2 ] 4 [ 47 ] [ 48 ] 5 [ 6 ] 6 [ 8 ] [ 9 ] [ 12 ] 7 [ 86 ] 8 [ 37 ] 9 [ 48 ] 10 [ 85 ] 11 [ 75 ] 12 [ 14 ] 13 [ 18 ] [ 22 ] [ 29 ] [ 41 ] [ 46 ] [ 52 ] [ 56 ] [ 65 ] [ 66 ] [ 68 ] [ 71 ] [ 74 ] [ 83 ] [ 93 ] 14 [ 92 ] 15 [ 10 ] 16 [ 51 ] 17 [ 96 ] 18 [ 30 ] 19 [ 75 ] 20 [ 16 ] [ 17 ] [ 20 ] [ 23 ] [ 24 ] [ 27 ] [ 28 ] [ 30 ] [ 32 ] [ 34 ] [ 35 ] [ 39 ] [ 42 ] [ 43 ] [ 47 ] [ 49 ] [ 54 ] [ 55 ] [ 57 ] [ 58 ] [ 60 ] [ 62 ] [ 64 ] [ 69 ] [ 70 ] [ 77 ] [ 78 ] [ 81 ] [ 82 ] 21 [ 45 ] 22 [ 23 ] [ 24 ] [ 27 ] [ 28 ] [ 39 ] [ 42 ] [ 43 ] [ 47 ] [ 48 ] [ 49 ] [ 51 ] [ 54 ] [ 69 ] 23 [ 61 ] [ 72 ] 24 [ 37 ] 25 [ 32 ] 26 [ 75 ] 27 [ 80 ] [ 84 ] [ 88 ] [ 90 ] [ 91 ] [ 94 ] [ 95 ] 28 [ 52 ] [ 65 ] [ 83 ] [ 93 ] 29 [ 22 ] [ 29 ] [ 36 ] [ 41 ] [ 68 ] [ 71 ] [ 75 ] 30 [ 75 ] 31 [ 72 ] [ 76 ] 32 [ 92 ] 33 [ 89 ] 34 [ 59 ] 35 [ 33 ] 36 [ 86 ] 37 [ 61 ] [ 72 ] [ 76 ] 38 [ 44 ] [ 73 ] 39 [ 81 ] [ 82 ] 40 [ 33 ] [ 59 ] [ 80 ] [ 88 ] [ 91 ] 41 [ 86 ] 42 [ 62 ] ![]() ©2004 Association for Computing Machinery |