What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Vijay Varadharajan
Google Scholar
65
publications in security and cryptology related venues
Year
Venue
Title
2020
conf/esorics
An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation.
Nazatul Haque Sultan
Vijay Varadharajan
Seyit Camtepe
Surya Nepal
2019
journals/tifs
A Policy-Based Security Architecture for Software-Defined Networks.
Vijay Varadharajan
Kallol Krishna Karmakar
Udaya Kiran Tupakula
Michael Hitchens
2015
journals/tifs
Enabling Cloud Storage Auditing With Key-Exposure Resistance.
Jia Yu
Kui Ren
Cong Wang
Vijay Varadharajan
2015
journals/tifs
Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage.
Lan Zhou
Vijay Varadharajan
Michael Hitchens
2015
conf/ccs
Anonymous Yoking-Group Proofs.
Nan Li
Yi Mu
Willy Susilo
Vijay Varadharajan
2015
conf/dsn
Secure Dynamic Software Loading and Execution Using Cross Component Verification.
Byungho Min
Vijay Varadharajan
2014
journals/tifs
CP-ABE With Constant-Size Keys for Lightweight Devices.
Fuchun Guo
Yi Mu
Willy Susilo
Duncan S. Wong
Vijay Varadharajan
2014
journals/tifs
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
Steffen Schulz
Vijay Varadharajan
Ahmad-Reza Sadeghi
2014
conf/esorics
Feature-Distributed Malware Attack: Risk and Defence.
Byungho Min
Vijay Varadharajan
2013
journals/tifs
Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage.
Lan Zhou
Vijay Varadharajan
Michael Hitchens
2013
conf/acisp
Membership Encryption and Its Applications.
Fuchun Guo
Yi Mu
Willy Susilo
Vijay Varadharajan
2012
conf/esorics
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs.
Ahmad-Reza Sadeghi
Steffen Schulz
Vijay Varadharajan
2012
conf/wisec
Tetherway: a framework for tethering camouflage.
Steffen Schulz
Ahmad-Reza Sadeghi
Maria Zhdanova
Hossen Asiful Mustafa
Wenyuan Xu
Vijay Varadharajan
2011
journals/tifs
Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks.
Mohammad Sayad Haghighi
Kamal Mohamedpour
Vijay Varadharajan
Barry G. Quinn
2010
conf/sec
Purpose-Based Access Control Policies and Conflicting Analysis.
Hua Wang
Lili Sun
Vijay Varadharajan
2007
conf/ccs
Trust management for trusted computing platforms in web services.
Aarthi Nagarajan
Vijay Varadharajan
Michael Hitchens
2005
conf/iciss
Authorization and Trust Enhanced Security for Distributed Applications.
Vijay Varadharajan
2005
conf/iciss
Analysis and Modelling of Trust in Distributed Information Systems.
Weiliang Zhao
Vijay Varadharajan
George Bryan
2004
conf/acisp
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution.
Chun Ruan
Vijay Varadharajan
2003
conf/acns
An Authorization Model for E-consent Requirement in a Health Care Application.
Chun Ruan
Vijay Varadharajan
2003
conf/acns
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems.
Ching Lin
Vijay Varadharajan
2003
conf/icics
Role-Based Access Control and the Access Control Matrix.
Gregory Saunders
Michael Hitchens
Vijay Varadharajan
2002
conf/acisp
m out of n Oblivious Transfer.
Yi Mu
Junqi Zhang
Vijay Varadharajan
2002
conf/acisp
Resolving Conflicts in Authorization Delegations.
Chun Ruan
Vijay Varadharajan
2002
conf/acisp
Policy Administration Domains.
Michael Hitchens
Vijay Varadharajan
Gregory Saunders
2002
conf/icics
A Secure Object Sharing Scheme for Java Card.
Junqi Zhang
Vijay Varadharajan
Yi Mu
2001
conf/acisp
A Strategy for MLS Workflow.
Vlad Ingar Wietrzyk
Makoto Takizawa
Vijay Varadharajan
2001
conf/icics
RBAC for XML Document Stores.
Michael Hitchens
Vijay Varadharajan
2001
conf/icics
Fair Exchange of Digital Signatures with Offline Trusted Third Party.
Chuan-Kun Wu
Vijay Varadharajan
2000
conf/ccs
Security enhanced mobile agents.
Vijay Varadharajan
2000
conf/sec
Elements of a Language for Role-Based Access Control.
Michael Hitchens
Vijay Varadharajan
2000
conf/acisp
Fail-Stop Confirmer Signatures.
Yi Mu
Vijay Varadharajan
2000
conf/icisc
An Internet Anonymous Auction Scheme.
Yi Mu
Vijay Varadharajan
2000
conf/acsac
Fair On-line Gambling.
Weiliang Zhao
Vijay Varadharajan
Yi Mu
1999
conf/acisp
Authorization in Object Oriented Databases.
Yun Bai
Vijay Varadharajan
1999
conf/acisp
Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature.
Khanh Quoc Nguyen
Yi Mu
Vijay Varadharajan
1999
conf/acisp
An Analysis of Access Control Models.
Gregory Saunders
Michael Hitchens
Vijay Varadharajan
1999
conf/icics
Issues in the Design of a Language for Role Based Access Control.
Michael Hitchens
Vijay Varadharajan
1999
conf/icics
Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications.
Khanh Quoc Nguyen
Feng Bao
Yi Mu
Vijay Varadharajan
1999
conf/asiacrypt
How to Prove That a Committed Number Is Prime.
Tri Van Le
Khanh Quoc Nguyen
Vijay Varadharajan
1998
conf/acisp
A High Level Language for Conventional Access Control Models.
Yun Bai
Vijay Varadharajan
1998
conf/acsac
Anonymous Secure E-Voting Over a Network.
Yi Mu
Vijay Varadharajan
1998
conf/acsac
Secure Signaling and Access Control for ATM Networks.
Rajan Shankaran
Vijay Varadharajan
1998
conf/acsac
Authorization in Enterprise-Wide Distributed System: A Practical Design and Application.
Vijay Varadharajan
Chris Crall
Joe Pato
1997
conf/acisp
Analysis and Implementation of a Formal Authorisation Policy Design Approach.
Yun Bai
Vijay Varadharajan
1997
conf/acisp
Security Issues in Asynchronous Transfer Mode.
Vijay Varadharajan
Rajan Shankaran
Michael Hitchens
1997
conf/acisp
New Micropayment Schemes Based on PayWords.
Yi Mu
Vijay Varadharajan
Yan-Xia Lin
1997
conf/icics
A language for specifying sequences of authorization transformations and its applications.
Yun Bai
Vijay Varadharajan
1997
conf/acsac
Secure and Efficient Digital Coins.
Khanh Quoc Nguyen
Yi Mu
Vijay Varadharajan
1997
conf/acsac
Micro-Digital Money for Electronic Commerce.
Khanh Quoc Nguyen
Yi Mu
Vijay Varadharajan
1996
journals/compsec
Extending the schematic protection model - II. Revocation.
Vijay Varadharajan
Claudio Calvelli
1996
conf/sec
Security model for distributed object framework and its applicability to CORBA.
Vijay Varadharajan
Thomas Hardjono
1996
conf/acisp
On the design of security protocols for mobile communications.
Yi Mu
Vijay Varadharajan
1996
conf/acisp
Support for joint action based security policies.
Vijay Varadharajan
Phillip Allen
1996
conf/acsac
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems.
Michael Hitchens
Vijay Varadharajan
1996
conf/acsac
On The Design Of Secure Electronic Payment Schemes For Internet.
Vijay Varadharajan
Yi Mu
1994
conf/sp
Extending the schematic protection model. I. Conditional tickets and authentication.
Vijay Varadharajan
Claudio Calvelli
1993
conf/acsac
Representation of mental health application access policy in a monotonic model.
Claudio Calvelli
Vijay Varadharajan
1991
journals/compsec
Modified forms of cipher block chaining.
Chris J. Mitchell
Vijay Varadharajan
1991
journals/compsec
Multilevel security in a distributed object-oriented system.
Vijay Varadharajan
Stewart Black
1991
conf/sp
An Analysis of the Proxy Problem in Distributed Systems.
Vijay Varadharajan
Phillip Allen
Stewart Black
1990
conf/asiacrypt
Network Security Policy Models.
Vijay Varadharajan
1990
conf/acsac
A multilevel security model for a distributed object-oriented system.
Vijay Varadharajan
Stewart Black
1989
journals/compsec
Verification of network security protocols.
Vijay Varadharajan
1985
conf/crypto
Trapdoor Rings and Their Use in Cryptography.
Vijay Varadharajan
Coauthors
Aarthi Nagarajan
(1)
Ahmad-Reza Sadeghi
(3)
Barry G. Quinn
(1)
Byungho Min
(2)
Ching Lin
(1)
Chris Crall
(1)
Chris J. Mitchell
(1)
Chuan-Kun Wu
(1)
Chun Ruan
(3)
Claudio Calvelli
(3)
Cong Wang
(1)
Duncan S. Wong
(1)
Feng Bao
(1)
Fuchun Guo
(2)
George Bryan
(1)
Gregory Saunders
(3)
Hossen Asiful Mustafa
(1)
Hua Wang
(1)
Jia Yu
(1)
Joe Pato
(1)
Junqi Zhang
(2)
Kallol Krishna Karmakar
(1)
Kamal Mohamedpour
(1)
Khanh Quoc Nguyen
(5)
Kui Ren
(1)
Lan Zhou
(2)
Lili Sun
(1)
Makoto Takizawa
(1)
Maria Zhdanova
(1)
Michael Hitchens
(12)
Mohammad Sayad Haghighi
(1)
Nan Li
(1)
Nazatul Haque Sultan
(1)
Phillip Allen
(2)
Rajan Shankaran
(2)
Seyit Camtepe
(1)
Steffen Schulz
(3)
Stewart Black
(3)
Surya Nepal
(1)
Thomas Hardjono
(1)
Tri Van Le
(1)
Udaya Kiran Tupakula
(1)
Vijay Varadharajan
(65)
Vlad Ingar Wietrzyk
(1)
Weiliang Zhao
(2)
Wenyuan Xu
(1)
Willy Susilo
(3)
Yan-Xia Lin
(1)
Yi Mu
(16)
Yun Bai
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to