Vijay Kingswood Varadharajan
#117,291
Most Influential Person Now
Vijay Kingswood Varadharajan's AcademicInfluence.com Rankings
Vijay Kingswood Varadharajancomputer-science Degrees
Computer Science
#4619
World Rank
#4872
Historical Rank
Information Security
#13
World Rank
#13
Historical Rank
Database
#1826
World Rank
#1915
Historical Rank

Download Badge
Computer Science
Why Is Vijay Kingswood Varadharajan Influential?
(Suggest an Edit or Addition)Vijay Kingswood Varadharajan's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- The Computer Journal (1958) (1263)
- A Detailed Investigation and Analysis of Using Machine Learning Techniques for Intrusion Detection (2019) (326)
- Wireless sensor network key management survey and taxonomy (2010) (318)
- TrustLite: a security architecture for tiny embedded devices (2014) (311)
- Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage (2013) (270)
- Autoencoder-based feature learning for cyber security applications (2017) (218)
- Intrusion detection techniques in cloud environment: A survey (2017) (166)
- Enabling Cloud Storage Auditing With Key-Exposure Resistance (2015) (162)
- CP-ABE With Constant-Size Keys for Lightweight Devices (2014) (154)
- Security as a Service Model for Cloud Environment (2014) (152)
- An analysis of the proxy problem in distributed systems (1991) (143)
- A Trust based Access Control Framework for P2P File-Sharing Systems (2005) (114)
- Enhancing grid security with trust management (2004) (110)
- Enforcing Role-Based Access Control for Secure Data Storage in the Cloud (2011) (108)
- Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy (2016) (92)
- Practical k nearest neighbor queries with location privacy (2014) (83)
- Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity (2020) (82)
- A Survey on Machine Learning Techniques for Cyber Security in the Last Decade (2020) (74)
- A Policy-Based Security Architecture for Software-Defined Networks (2016) (71)
- Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage (2015) (71)
- A Practical Method to Counteract Denial of Service Attacks (2003) (70)
- Public Key distribution in matrix rings (1984) (69)
- Information and Communication Security (1999) (68)
- m out of n Oblivious Transfer (2002) (66)
- Intrusion Detection Techniques for Infrastructure as a Service Cloud (2011) (66)
- Survey on securing data storage in the cloud (2014) (65)
- CertainLogic: A Logic for Modeling Trust and Uncertainty - (Short Paper) (2011) (64)
- Dynamic trust enhanced security model for trusted platform based services (2011) (64)
- Security for cluster based ad hoc networks (2004) (61)
- Anonymous secure e-voting over a network (1998) (57)
- A New Security Scheme for Wireless Sensor Networks (2008) (55)
- Security enhanced mobile agents (2000) (54)
- A trust management architecture for hierarchical wireless sensor networks (2010) (54)
- Tower: A Language for Role Based Access Control (2001) (52)
- Trust and Recommendations in Mobile Ad hoc Networks (2007) (50)
- Role-based Recommendation and Trust Evaluation (2007) (48)
- Trust enhanced security for mobile agents (2005) (48)
- Trust management towards service-oriented applications (2009) (46)
- Achieving secure and flexible M-services through tickets (2003) (45)
- Policy-Based Access Control for Constrained Healthcare Resources (2018) (44)
- Interaction Trust Evaluation in Decentralized Environments (2004) (44)
- Subjective logic based trust model for mobile ad hoc networks (2008) (42)
- Trust/sup 2/: developing trust in peer-to-peer environments (2005) (42)
- A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces (2013) (42)
- VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment (2020) (41)
- On the design of security protocols for mobile communications (1996) (41)
- Distributed Signcryption (2000) (41)
- Trust Enhanced Secure Mobile Ad-Hoc Network Routing (2007) (39)
- Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments (2008) (39)
- A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks (2010) (37)
- Multi-party fair exchange with an off-line trusted neutral party (1999) (36)
- Property Based Attestation and Trusted Computing: Analysis and Challenges (2009) (36)
- Design and specification of role based access control policies (2000) (35)
- Malytics: A Malware Detection Scheme (2018) (34)
- Trust based risk management for distributed system security - a new approach (2006) (32)
- SDN Enabled Secure IoT Architecture (2019) (32)
- Verification of network security protocols (1989) (32)
- Fellowship: Defense against Flooding and Packet Drop Attacks in MANET (2006) (31)
- Mitigating Flooding Attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications (2007) (31)
- Improved detection of primary user emulation attacks in cognitive radio networks (2015) (30)
- On the Integration of Blockchain to the Internet of Things for Enabling Access Right Delegation (2020) (30)
- Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage (2013) (30)
- Role-based access control and the access control matrix (2001) (29)
- TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks (2007) (29)
- On the Design of a Flexible Delegation Model for the Internet of Things Using Blockchain (2020) (28)
- Counteracting security attacks in virtual machines in the cloud using property based attestation (2014) (28)
- Dynamic Workload Balancing for Hadoop MapReduce (2014) (28)
- A Secure Mental Poker Protocol Over The Internet (2003) (28)
- Robust and Secure Broadcasting (2001) (28)
- Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices (2017) (26)
- On the Design of a New Trust Model for Mobile Agent Security (2004) (26)
- Data Security and Privacy in the Internet of Things (IoT) Environment (2016) (25)
- Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT) (2015) (25)
- Secure administration of cryptographic role-based access control for large-scale cloud storage systems (2014) (25)
- Mitigating attacks in Software Defined Network (SDN) (2017) (25)
- Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks (2009) (25)
- Packet Drop Attack: A Serious Threat to Operational Mobile Ad hoc Networks (2005) (24)
- A Fair Electronic Cash Scheme (2001) (24)
- On the Design of Efficient RSA-based Off-line Electronic Cash Schemes (1999) (24)
- A Hybrid Trust Model for Enhancing Security in Distributed Systems (2007) (24)
- RBAC for XML Document Stores (2001) (24)
- Petri net based modelling of information flow security requirements (1990) (24)
- A Note on Trust-Enhanced Security (2009) (24)
- Use of a formal description technique in the specification of authentication protocols (1990) (24)
- Security and Privacy - Silver Linings in the Cloud - 25th IFIP TC-11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings (2010) (23)
- Authorization in enterprise-wide distributed system: a practical design and application (1998) (23)
- A logic for modeling the dynamics of beliefs in cryptographic protocols (2001) (23)
- Resolving Conflicts in Authorization Delegations (2002) (23)
- Trust Integrated Cooperation Architecture for Mobile Ad-hoc Networks (2007) (22)
- Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures (2014) (22)
- Antivirus security: naked during updates (2014) (22)
- Fuzzy Regression Based Trust Prediction in Service-Oriented Applications (2009) (22)
- Design of Secure End-toEnd Protocols for Mobile Systems (1996) (22)
- Trust management for trusted computing platforms in web services (2007) (22)
- A logic for state transformations in authorization policies (1997) (22)
- On Design of A Fine-Grained Access Control Architecture for Securing IoT-Enabled Smart Healthcare Systems (2017) (21)
- Trust Relationship Modelling in E-commerce-Based Social Network (2009) (21)
- Secure Monitoring of Patients With Wandering Behavior in Hospital Environments (2018) (21)
- The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (2012) (21)
- Designing secure wireless mobile ad hoc networks (2005) (21)
- MobileTrust: a trust enhanced security architecture for mobile agent systems (2010) (21)
- A multilevel security model for a distributed object-oriented system (1990) (21)
- A Security Architecture for Mobile Agent Based Applications (2003) (20)
- A framework for evaluating trust of service providers in cloud marketplaces (2013) (20)
- A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks (2010) (19)
- Modeling Identity for the Internet of Things: Survey, Classification and Trends (2018) (19)
- Logic-Based Reasoning on Delegatable Authorizations (2002) (19)
- Membership Encryption and Its Applications (2013) (19)
- TVDSEC: Trusted Virtual Domain Security (2011) (19)
- NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment (2016) (19)
- Alleviating Heterogeneity in SDN-IoT Networks to Maintain QoS and Enhance Security (2020) (18)
- An Enhanced Model for Network Flow Based Botnet Detection (2015) (18)
- Robust non-interactive oblivious transfer (2003) (18)
- Authorization Service for Web Services and its Application in a Health Care Domain (2005) (18)
- A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records (2016) (17)
- Mobile Agent and Web Service Integration Security Architecture (2007) (17)
- TREASURE: Trust Enhanced Security for Cloud Environments (2012) (17)
- Two-phase peer evaluation in P2P e-commerce environments (2005) (17)
- Trust and authorization in the grid: a recommendation model (2005) (17)
- Purpose-Based Access Control Policies and Conflicting Analysis (2010) (17)
- A Weighted Graph Approach to Authorization Delegation and Conflict Resolution (2004) (17)
- Fine-Grained Access Control for Smart Healthcare Systems in the Internet of Things (2018) (17)
- Out-VM monitoring for Malicious Network Packet Detection in cloud (2017) (17)
- Mitigating attacks in software defined networks (2019) (17)
- Securing Virtual Machines from Anomalies Using Program-Behavior Analysis in Cloud Environment (2016) (16)
- Internet filtering - Issues and challenges (2010) (16)
- Privacy-Preserving Authorized RFID Authentication Protocols (2014) (16)
- A novel method for improving the robustness of deep learning-based malware detectors against adversarial attacks (2022) (16)
- Modelling Trust Relationships in Distributed Environments (2004) (16)
- Multi-user Attribute Based Searchable Encryption (2013) (15)
- Trust Enhanced Security - A New Philosophy for Secure Collaboration of Mobile Agents (2006) (15)
- Dynamic delegation framework for role based access control in distributed data management systems (2014) (15)
- Towards a Secure Access Control Architecture for the Internet of Things (2017) (14)
- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems (2003) (14)
- New Micropayment Schemes Based on PayWords (1997) (14)
- Cryptography and Data Security in Cloud Computing (2017) (14)
- Trust Management for Web Services (2008) (14)
- Securing Services in Networked Cloud Infrastructures (2018) (14)
- A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks (2015) (14)
- On the design of security mechanisms for the Internet of Things (2017) (14)
- An Access Control Model and Its Use in Representing Mental Health Application Access Policy (1996) (13)
- Tracing DDoS Floods: An Automated Approach (2004) (13)
- SBAC: Service Based Access Control (2009) (13)
- Fair on-line gambling (2000) (13)
- Security and trust enhanced mobile agent based system design (2005) (13)
- An Internet Anonymous Auction Scheme (2000) (13)
- Trust Management in Mobile Ad Hoc Networks (2009) (13)
- An analysis of some delegation protocols for distributed systems (1992) (13)
- A Time-Based Peer Trust Evaluation in P2P E-commerce Environments (2004) (13)
- Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks (2011) (13)
- Joint actions based authorization schemes (1996) (12)
- VAED: VMI‐assisted evasion detection approach for infrastructure as a service cloud (2017) (12)
- The Design of A Rule-based and Event-driven Trust Management Framework (2007) (12)
- On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience (2017) (12)
- Report: Management for eBusiness in the New Millennium: A Report on APNOMS 2001 (2002) (12)
- Botnet detection using software defined networking (2015) (12)
- A mobile autonomous agent-based secure payment protocol supporting multiple payments (2005) (12)
- Security Agent Based Distributed Authorization : An Approach (1998) (12)
- On Malware Characterization and Attack Classification (2013) (12)
- Efficient TTP-free mental poker protocols (2005) (12)
- Business-process-oriented software requirements automatic generator (2005) (11)
- Public key cryptosystems based on boolean permutations and their applications (2000) (11)
- A Logic Model for Temporal Authorization Delegation with Negation (2003) (11)
- Analysis of traceback techniques (2006) (11)
- Cryptographic Role-Based Access Control for Secure Cloud Data Storage Systems (2014) (11)
- PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud (2017) (11)
- Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks (2012) (11)
- Security Techniques for Beyond 3G Wireless Mobile Networks (2011) (11)
- An efficient and provably secure RFID grouping proof protocol (2017) (11)
- An Authorization Architecture for Web Services (2005) (11)
- A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature (1997) (11)
- Delegated Decryption (1999) (11)
- Analysis of Policy-Based Security Management System in Software-Defined Networks (2019) (10)
- Fair Exchange of Digital Signatures with Offline Trusted Third Party (2001) (10)
- Security Techniques for Counteracting Attacks in Mobile Healthcare Services (2013) (10)
- Hook-up property for information flow secure nets (1991) (10)
- Shared RFID ownership transfer protocols (2015) (10)
- Extension of RSA Cryptosystems to Matrix Rings (1985) (10)
- A novel dynamic key management scheme for secure multicasting (2003) (10)
- Context-Aware Trust Management System for IoT Applications with Multiple Domains (2019) (10)
- Towards the Design of a Trust Management Framework for the Internet of Things (2019) (10)
- Vulnerabilities of an ECC-based RFID authentication scheme (2015) (10)
- Undeniable Confirmer Signature (1999) (10)
- Feature-Distributed Malware Attack: Risk and Defence (2014) (10)
- A novel malware for subversion of self‐protection in anti‐virus (2016) (10)
- Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature (1999) (9)
- On transformation of authorization policies (2003) (9)
- A Hybrid Trust Model for Authorisation Using Trusted Platforms (2011) (9)
- Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture (2003) (9)
- General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing (2006) (9)
- A new scheme of credit based payment for electronic commerce (1998) (9)
- A multilevel security policy model for networks (1990) (9)
- Distributed Authorization: principles and practice (2002) (9)
- A Property-Dependent Agent Transfer Protocol (2009) (8)
- Tetherway: a framework for tethering camouflage (2012) (8)
- A Unified Framework for Trust Management (2006) (8)
- Security of public key distribution in matrix rings (1986) (8)
- A formal graph based framework for supporting authorization delegations and conflict resolutions (2003) (8)
- Extending the schematic protection model. I. Conditional tickets and authentication (1994) (8)
- Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications (1999) (8)
- Analysis and Modelling of Trust in Distributed Information Systems (2005) (8)
- Efficient approaches for intrusion detection in cloud environment (2016) (8)
- Techniques for Analysing PDF Malware (2011) (8)
- A language for specifying sequences of authorization transformations and its applications (1997) (8)
- Implementing Authorization Delegations Using Graph (2006) (7)
- Security and Trust Management in Mobile Agents: A New Perspective (2009) (7)
- A distributed location management scheme for mobile hosts (2001) (7)
- Digital Coins based on Hash Chain (1997) (7)
- A Scalable Multi-service Group Key Management Scheme (2006) (7)
- Design and Analysis of a New Feature-Distributed Malware (2014) (7)
- A controller agent model to counteract DoS attacks in multiple domains (2003) (7)
- Policy based Role Centric Attribute Based Access Control model Policy RC-ABAC (2015) (7)
- An Analysis of Access Control Models (1999) (7)
- How to Prove That a Committed Number Is Prime (1999) (7)
- Authorization and Trust Enhanced Security for Distributed Applications (2005) (7)
- Securing communication in multiple Autonomous System domains with Software Defined Networking (2017) (7)
- Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems (2012) (7)
- Issues in the Design of a Language for Role Based Access Control (1999) (7)
- Counteracting Attacks From Malicious End Hosts in Software Defined Networks (2020) (7)
- Integrating Network Services for Virtual Teams (2001) (7)
- On the Applicability of Trusted Computing in Distributed Authorization Using Web Services (2008) (7)
- Counteracting TCP SYN DDoS attacks using automated model (2004) (7)
- Evolution and challenges in trust and security in information system infrastructures (2009) (6)
- A New Security Scheme for Integration of Mobile Agents and Web Services (2007) (6)
- DoSTRACK: a system for defending against DoS attacks (2009) (6)
- Micro-digital money for electronic commerce (1997) (6)
- A petri net model for system design and refinement (1991) (6)
- Learning Latent Byte-Level Feature Representation for Malware Detection (2018) (6)
- Access control for Internet of Things—enabled assistive technologies: an architecture, challenges and requirements (2020) (6)
- Distributed Object Systems Security (1995) (6)
- Cyber attacks in smart grid - dynamic impacts, analyses and recommendations (2020) (6)
- A secure transaction environment for workflows in distributed systems (2001) (6)
- Security model for distributed object framework and its applicability to CORBA (1996) (6)
- A Novel Security Risk Evaluation for Information Systems (2007) (6)
- Fast, Automatic and Scalable Learning to Detect Android Malware (2017) (6)
- On the design of secure electronic payment schemes for Internet (1996) (6)
- A Unified Taxonomy Framework of Trust (2007) (6)
- Multilevel security in a distributed object-oriented system (1991) (6)
- Short Paper: Fellowship in Mobile Ad hoc Networks (2005) (6)
- Authorization service for Web services and its implementation (2004) (6)
- Privacy-Preserving Mutual Authentication in RFID with Designated Readers (2017) (6)
- Efficient secure group management for SSM (2004) (6)
- Towards a Security Enhanced Virtualised Network Infrastructure for Internet of Medical Things (IoMT) (2020) (6)
- Security Issues in Asynchronous Transfer Mode (1997) (6)
- Securing XML document sources and their distribution (2004) (5)
- Support for joint action based security policies (1996) (5)
- Decentralized Temporal Authorization Administration (2003) (5)
- Directed graph based representation for software system design (1987) (5)
- Issues in the design of secure authorization service for distributed applications (1998) (5)
- Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (2009) (5)
- An approach to unified trust management framework (2010) (5)
- A Role-Based Encryption Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context (2020) (5)
- Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture (2005) (5)
- A Secure Frame Relay Service (1994) (5)
- Principles for the design of authorization framework for the Service Oriented Architecture (2005) (5)
- Securing Organization’s Data: A Role-Based Authorized Keyword Search Scheme With Efficient Decryption (2020) (5)
- On the Design and Implementation of a Security Architecture for Software Defined Networks (2016) (5)
- Trust Enhanced Security for Tenant Transactions in the Cloud Environment (2015) (5)
- Disease management: clustering–based disease prediction (2014) (5)
- Critical issues in trust management for Mobile Ad-Hoc Networks (2009) (5)
- On the design, implementation and application of an authorisation architecture for web services (2007) (5)
- High-speed network security. I. SMDS and frame relay (1997) (4)
- Editorial: Special issue on blockchain and communication networks (2020) (4)
- One-Response Off-Line Digital Coins (1997) (4)
- Network Security Policy Models (1990) (4)
- Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security (2005) (4)
- An Eclat Algorithm Based Energy Detection for Cognitive Radio Networks (2017) (4)
- Intrusion detection techniques for virtual domains (2012) (4)
- Trust enhanced distributed authorisation for web services (2014) (4)
- Secure RFID Ownership Transfer Protocols (2013) (4)
- Secure Interoperation in Multidomain Environments Employing UCON Policies (2009) (4)
- An Authorization Model for E-consent Requirement in a Health Care Application (2003) (4)
- A Comparative Analysis of the Social Graph Model and Multiparty Access Control Model for Online Social Networks (2015) (4)
- Anonymous Yoking-Group Proofs (2015) (4)
- Design, implementation and evaluation of a novel anti-virus parasitic malware (2015) (4)
- A Logical Formalization for Specifying Authorizations in Object-Oriented Databases (1999) (4)
- Some Cryptographic Techniques For Secure Data Communication (1984) (4)
- Generic constructions for role-based encryption (2015) (4)
- FedDICE: A ransomware spread detection in a distributed integrated clinical environment using federated learning and SDN based mitigation (2021) (4)
- CertainLogic: A Logic for Modeling Trust and Uncertainty (Full version) (2011) (4)
- A Secure Communication Scheme for Multiagent Systems (1998) (4)
- Batching proofs of knowledge and its applications (1999) (4)
- Data Protection and Privacy Preservation Using Searchable Encryption on Outsourced Databases (2012) (4)
- Proceedings of the 12th International Conference on Security of Information and Networks (2010) (4)
- Securing Mobile Devices from DoS Attacks (2013) (4)
- Server-Aided Signature Verification for Lightweight Devices (2014) (4)
- SDN-Capable IoT Last-Miles: Design Challenges (2019) (4)
- Detecting Security Attacks in Trusted Virtual Domains (2010) (4)
- Secure multicast extensions for mobile networks (1999) (4)
- DDoS: design, implementation and analysis of automated model (2007) (4)
- A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation (2013) (4)
- Counteracting DDoS attacks in WLAN (2011) (4)
- Cascading attacks against smart grid using control command disaggregation and services (2016) (4)
- Securing SDN controller and switches from attacks (2019) (3)
- Byte2vec: Malware Representation and Feature Selection for Android (2020) (3)
- Rethinking Software Component Security: Software Component Level Integrity and Cross Verification (2016) (3)
- Authentication and revocation in SPM extended abstract (1993) (3)
- Techniques for detecting attacks on critical infrastructure (2014) (3)
- A flexible cryptographic approach for secure data storage in the cloud using role-based access control (2012) (3)
- An approach to designing security model for mobile agent based systems (1998) (3)
- A novel deep learning-based approach for malware detection (2023) (3)
- Security services and public key infrastructure for ATM networks (1997) (3)
- Authentication in mobile distributed environment (1993) (3)
- Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments (2005) (3)
- Secure Dynamic Software Loading and Execution Using Cross Component Verification (2015) (3)
- On-the-fly Watermarking of Videos for Real-time Applications (2012) (3)
- Effective kernel mapping for one-dimensional Principal Component Analysis in finger vein recognition (2014) (3)
- Cryptosystems based on permutation polynomials (1988) (3)
- SDN-Enabled Secure IoT Architecture (2021) (3)
- Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial Examples (2019) (3)
- Robust transcoding resistant watermarking for H.264 standard (2014) (3)
- Secure and efficient digital coins (1997) (3)
- Metadata based forensic analysis of digital information in the web (2012) (3)
- Extending the Schematic Protection Model II: revocation (1997) (3)
- Secure distribution and access of XML documents (2005) (3)
- Active networks and security (1999) (3)
- On RFID Authentication Protocols with Wide-Strong Privacy (2013) (3)
- Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines (2012) (3)
- Evaluating the performance and scalability of Web application systems (2005) (3)
- A Strategy for MLS Workflow (2001) (2)
- Finger vein recognition in row and column directions using Two Dimensional Kernel Principal Component Analysis (2014) (2)
- Guest Editorial: Blockchain and Healthcare Computing (2020) (2)
- Coordination based Distributed Authorization for Business Processes in Service Oriented Architectures (2011) (2)
- Secure Authorisation for Web Services (2003) (2)
- Analysis of Property Based Attestation in Trusted Platforms (2010) (2)
- Analysis of Automated Model against DDoS Attacks (2003) (2)
- A practical approach to design and management of secure ATM networks (1997) (2)
- A secure multicast support framework for Mobile IP (2003) (2)
- On the design of Virtual machine Intrusion detection system (2011) (2)
- Supporting E-consent on Health Data by Logic (2003) (2)
- Tampering Resistant Dual Watermarking Method for Copyright Protection of Still Images (2011) (2)
- Anonymous Searchable Encryption Scheme for Multi-user Databases (2013) (2)
- Design of enterprise-wide secure networked system (1996) (2)
- Reputation-Based Trust Network Modelling and Simplification in Multiagent-Based E-Commerce Systems (2009) (2)
- Reasoning on Weighted Delegatable Authorizations (2009) (2)
- Security and Privacy in Communication Networks: 9th International ICST Conference, SecureComm 2013, Revised Selected Papers (2014) (2)
- One Time Trapdoor Based Searchable Encryption (2017) (2)
- Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms (2010) (2)
- Secure monitoring for dementia patients (2014) (2)
- Secure route structures for parallel mobile agents based systems using fast binary dispatch (2005) (2)
- Security in a distributed message handling system (1991) (2)
- A Multilevel Security Policy for Networks. (1990) (2)
- A trust model based energy detection for cognitive radio networks (2017) (2)
- Towards a Dynamic Policy Enhanced Integrated Security Architecture for SDN Infrastructure (2020) (2)
- Hypervisor-based Security Architecture for Validating DNS Services (Poster) (2014) (2)
- A Simple and Novel Technique for Counteracting Exploit Kits (2014) (2)
- An MDL-Based Classifier for Transactional Datasets with Application in Malware Detection (2019) (2)
- Security in high speed networks (1996) (2)
- Tampering resistant self recoverable watermarking method using error correction codes (2012) (2)
- SDN-based Dynamic Policy Specification and Enforcement for Provisioning SECaaS in Cloud (2017) (2)
- On the Design and Implementation of a Security Architecture for End to End Services in Software Defined Networks (2016) (2)
- MapReduce Based Framework for Searchable Encryption (2016) (2)
- A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks (2021) (2)
- Network Mobility Supported Proxy Mobile IPv6 (2014) (2)
- Modified forms of cipher block chaining (1991) (2)
- Trust-based secure cloud data storage with cryptographic role-based access control (2013) (2)
- Securing wireless mobile nodes from distributed denial‐of‐service attacks (2015) (2)
- Security Architecture for Virtual Machines (2011) (2)
- A New Extension of Kernel Principal Component Analysis for Finger Vein Authentication (2015) (2)
- Elements of a Language for Role-Based Access Control (2000) (2)
- A Secure Object Sharing Scheme for Java Card (2002) (2)
- On Formal Languages for Sequences of Authorization Transformations (1999) (2)
- An Accountable Access Control Scheme for Hierarchical Content in Named Data Networks with Revocation (2020) (2)
- Group Cryptography: Signature and Encryption (2002) (1)
- A New Technique for Counteracting Web Browser Exploits (2014) (1)
- Ensemble Learning Based Voting Model for Dynamic Profile Classification and Project Allotment (2018) (1)
- A graph theoretic approach to authorization delegation and conflict resolution in decentralised systems (2010) (1)
- Architectural Framework for Web Services Authorization (2017) (1)
- Rethinking cyber security (2011) (1)
- A middleware-based script language (2005) (1)
- Secure communications between microcomputer systems (1983) (1)
- Anonymous Internet Credit Cards (1998) (1)
- A Novel Approach of Web Search Based on Community Wisdom (2008) (1)
- TVLAN: Trusted and Virtualised Local Area Networks (2011) (1)
- Blockchain Reinventing the Healthcare Industry (2021) (1)
- Secure distributed location management scheme for mobile hosts (2001) (1)
- Integration of Graph Based Authorization Policies (2006) (1)
- Authorisation Service in .Net My Services (2003) (1)
- Security and Trust in the Web (2012) (1)
- A hybrid model against TCP. SYN and reflection DDoS attacks (2008) (1)
- Secure Networked Control of Large-Scale Cyberphysical Systems Using Cryptographic Techniques (2020) (1)
- Design and Implementation of a Practical Secure Distributed Healthcare Application (2006) (1)
- Access Control Based Dynamic Path Establishment for Securing Flows from the User Devices with Different Security Clearance (2019) (1)
- Trust Management in the Pervasive Computing Era (2011) (1)
- Improving Software Security Through an Integrated Approach (2006) (1)
- On the Security of Tenant Transactions in the Cloud (2013) (1)
- Towards QoS and Security in Software-Driven Heterogeneous Autonomous Networks (2018) (1)
- On the design of secure ATM networks (1999) (1)
- Digital cash (2003) (1)
- Software Enabled Security Architecture and Mechanisms for Securing 5G Network Services (2020) (1)
- Trustworthy Computing (Extended Abstract) (2004) (1)
- Security protocol for Frame Relay (1993) (1)
- Security in mobile AD HOC networks (2010) (1)
- Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services (2007) (1)
- Policy Administration Domains (2002) (1)
- Searching over encrypted keywords in a database (2013) (1)
- Techniques for Securing 5G Network Services from attacks (2021) (1)
- Trapdoor Rings and Their Use in Cryptography (1985) (1)
- Trust Enhanced Security Architecture for Detecting Insider Threats (2013) (1)
- Modified Chinese remainder theorem and its application to proxy signatures (1999) (1)
- Delegatable Authorization Program and Its Application (2003) (1)
- Key management for a secure LAN-SMDS network (1996) (1)
- Design of a network security policy model (1990) (1)
- On the sequence of authorization policy transformations (2005) (1)
- Trust enhanced secure role-based access control on encrypted data in cloud (abstract of keynote talk) (2016) (1)
- Towards a protection model for supporting multiple access control policies (2000) (1)
- Securing Big Data Environments from Attacks (2016) (1)
- A Pre-computable Signature Scheme with Efficient Verification for RFID (2012) (1)
- Analysis of packet loss for batch traffic arrivals in IEEE 802.15.4-based networks (2011) (1)
- Secure Multicast Support for Mobile IP with Hierarchical Registration Approach (2002) (1)
- A unifying Petri net model of non-interference and non-deducibility information flow security (1991) (1)
- Lightweight Authentication Mechanism and OAuth Protocol for IoT Devices (2018) (1)
- A New Efficient Off-line Anonymous Cash Scheme (1997) (1)
- Hypervisor-based Security Architecture to Protect Web Applications (2015) (1)
- An approach for secure multicasting in mobile IP networks (2013) (1)
- Integrated Security Architecture for Virtual Machines (2013) (1)
- On the Analysis of On-Line Database Reorganization (2000) (1)
- ALOPA: Authorization Logic for Property Attestation in Trusted Platforms (2009) (1)
- Toward a Trust Aware Network Slice-Based Service Provision in Virtualized Infrastructures (2022) (1)
- Effective finger vein-based authentication (2015) (1)
- Object Oriented Database with Authorization Policies (2002) (1)
- ID-based Secure PIM-SM Schemes (2006) (1)
- Mitigating attacks in software defined networks (2019) (1)
- Trust-enhanced secure mobile agent-based system design (2007) (1)
- Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009 (2009) (1)
- Boolean permutation-based key escrow (1999) (1)
- Integrated Security for Services Hosted in Virtual Environments (2016) (1)
- Reasoning about Dynamic Delegation in Role Based Access Control Systems (2011) (1)
- Security techniques for zero day attacks (2011) (1)
- Design and Analysis of a Sophisticated Malware Attack Against Smart Grid (2013) (1)
- Distributed denial of service attacks in networks (2009) (1)
- Evaluation of Authorization with Delegation and Negation (2003) (1)
- Authorization in Object Oriented Databases (1999) (1)
- Trust Enhanced Authorization for Mobile Agents (2009) (1)
- Practical secure electronic mail system with public key distribution (1985) (1)
- Towards a Generic Logic for Analysing Network Protocols (2000) (1)
- Fail-Stop Confirmer Signatures (2000) (1)
- A mathematical model for system design and refinement (1990) (1)
- Secure monitoring of the patients with wandering behaviour (2016) (1)
- Proceedings of the 6th Australasian Conference on Information Security and Privacy (2001) (0)
- Towards perfect objects (1999) (0)
- A Secure Keyword Ordered Multiuser Searchable Encryption Framework (2016) (0)
- Network DoS Attacks: A New Packet Marking Scheme and Architectural Design (2003) (0)
- Securing the Ad-hoc On-demand distance vector potential (2004) (0)
- Specification of Parameters Relevant for Trust Evaluation in an Adhoc Grid Environment (2016) (0)
- Extending the schematic protection model - II. Revocation (1996) (0)
- Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004, Proceedings (Lecture Notes in Computer Science) (2004) (0)
- Welcome Message from the Program Chairs (2017) (0)
- Software Enabled Security Architecture for Counteracting Attacks in Control Systems (2020) (0)
- Overhearing Gain Analysis in Low-Traffic CDMA Wireless Sensor Networks (2010) (0)
- Security for local area and wide area networked computer communications (1996) (0)
- A secure multicast architecture and protocol for MOSPF (2005) (0)
- Security and Privacy in Communication Networks: 9th International ICST Conference, SecureComm 2013 (2013) (0)
- Distributed service control technique for detecting security attacks (2012) (0)
- Information and Communication Security: Second International Conference, ICICS'99 Sydney, Australia, November 9-11, 1999 Proceedings (1999) (0)
- IN EMERGING HIGH SPEED NETWORKS (1996) (0)
- Editorial Computers and Security Special Issue IFIP/SEC 2010 Security & Privacy - Silver Linings in the Cloud (2012) (0)
- Message from the IWSEC Workshop Co-Chairs (1999) (0)
- Forthcoming Contributions (2004) (0)
- A New Extension to Kernel Entropy Component Analysis for Image-based Authentication Systems (2015) (0)
- Proceedings of the Second Australasian Conference on Information Security and Privacy (1997) (0)
- A Security and Trust Framework for Agent-based P 2 P E-commerce (2004) (0)
- Analysis and Implementation of a Formal Authorisation Policy Design Approach (1997) (0)
- Message from the Blockchain-2018 General Chairs (2018) (0)
- Dynamic delegation framework for role based access control in distributed data management systems (2013) (0)
- Message from the PriSecCSN2012 workshop chairs (2012) (0)
- Security Challenges when Space Merges with Cyberspace (2022) (0)
- Security and Privacy in Communication Networks (2013) (0)
- Secure Key and Location Management Schemes for Cluster based Ad-hoc Networks (2005) (0)
- 2 A Security Model Overview 2 . 1 Security Threats (2015) (0)
- Security and Privacy - Silver Linings in the Cloud: 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010, ... in Information and Communication Technology) (2010) (0)
- Trust Enhanced Cloud Security for Healthcare Services (2014) (0)
- A High Level Language for Conventional Access Control Models (1998) (0)
- Attack Detection on the Software Defined Networking Switches (2020) (0)
- An ID-based Access Control Scheme for MOSPF (2005) (0)
- Information Security and Privacy (2004) (0)
- Use of trapdoor structures in cryptography (1986) (0)
- Information security and privacy : 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings (2004) (0)
- Securing critical information network infrastrucures from attacks (2004) (0)
- Information Security and Privacy: Second Australasian Conference, ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings (1997) (0)
- Net-Based System Design Representation and Analysis (1987) (0)
- Control of Large-Scale Networked Cyberphysical Systems Using Cryptographic Techniques (2020) (0)
- Secure Networked Computing (2001) (0)
- SDPM: A Secure Smart Device Provisioning and Monitoring Service Architecture for Smart Network Infrastructure (2022) (0)
- Cyber Security Risks in IoT Systems and Techniques for their Mitigation (2021) (0)
- A New improved scheme for face recognition analysis : two dimensional kernel entropy component (2013) (0)
- Biometric analysis for finger vein data: two-dimensional kernel principal component analysis (2015) (0)
- Security and Privacy - Silver Linings in the Cloud: 25th IFIP TC 11 International Information Security Conference, SEC 2010, Held as Part of WCC 2010 (2014) (0)
- Framework for defending against denial of service attacks in wireless networks (2006) (0)
- Message from the UbiSafe-09 Chairs (2009) (0)
- A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control (2013) (0)
- New public-key distribution systems (comment) (1989) (0)
- Targeted Context based Attacks on Trust Management Systems in IoT (2023) (0)
- Targeted Context based Attacks on Trust Models in IoT Systems (2021) (0)
- Control of Large-ScaleNetworkedCyberphysical Systems UsingCryptographicTechniques (2020) (0)
- Techniques for Securing Control Systems from Attacks (2021) (0)
- DASC 2011: message from the chairs (2011) (0)
- Some Thoughts on Trust Model for Mobile Agent Security (2003) (0)
- Building Intelligent Cities (2021) (0)
- Scalable Robust Location Based Geocast Protocol in MANETs (2013) (0)
- Information Security and Privacy : Proceedings of the 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. (2004) (0)
- Securing the Ad-Hoc On-demand Distance Vector Protocol (2004) (0)
- Towards a Trust Aware Network Slice based End to End Services for Virtualised Infrastructures (2020) (0)
- Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage (2015) (0)
- Implementation of Techniques for Enhancing Security of Southbound Infrastructure in SDN (2022) (0)
- Next Generation of Intelligent Cities (2021) (0)
- Secure signaling and access control for ATM networks (1998) (0)
- A Formal Security Design Approach for Transformation of Authorizations in Information Systems (1997) (0)
- Modelling security aspects of a Message Handling System in LOTOS (1989) (0)
- Fair Trading Protocol with Offline Anonymous Credit Card Payment (2004) (0)
- Secure authentication and access control in ATM networks (1998) (0)
- Reducing the scope of denial of service attacks in QoS routing (2003) (0)
- Security Policy Management in Distributed Systems (2002) (0)
- Formal Modelling and Verification of Software Defined Network (2020) (0)
- A novel secure observer-based controller and attack detection scheme for Networked Control Systems (2021) (0)
- Information security and privacy : 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001 : proceedings (2001) (0)
- SMRTI: Secure Mobile Ad Hoc Network Routing with Trust Intrigue (2010) (0)
- Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers (2013) (0)
- On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures (2013) (0)
- Design choices for symmetric key based inter-domain authentication protocols in distributed systems (1996) (0)
- A Secure PIM-SM Multicast Routing Protocol (2004) (0)
- Proceedings of the Second International Conference on Information and Communication Security (1999) (0)
- Fair online gambling scheme and TTP-free mental poker protocols (2006) (0)
- A New Approach to Reasoning About Accountability in Cryptographic Protocols for E-Commerce (2001) (0)
- Data Protection in Distributed Database Systems (2005) (0)
- A New Approach To Reasoning About Accountability In E-Commerce Protocols (2007) (0)
- Privacy-Preserving Mutual Authentication in RFID with Designated Readers (2017) (0)
- Communication system for portable device (1996) (0)
- Designing Deep Convolutional Neural Networks using a Genetic Algorithm for Image-based Malware Classification (2022) (0)
- Output Feedback Stabilization of Large-Scale Networked Cyberphysical Systems Using Cryptographic Techniques (2022) (0)
- Generic constructions for role-based encryption (2014) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Vijay Kingswood Varadharajan?
Vijay Kingswood Varadharajan is affiliated with the following schools: