Search filters

List of works by Vijay Varadharajan

A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks

scholarly article published December 2010

A Policy-Based Security Architecture for Software-Defined Networks

scientific article published on 31 August 2018

A Role-Based Encryption (RBE) Scheme for Securing Outsourced Cloud Data in a Multi-Organization Context

scientific article published in 2022

A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records

scientific article published in 2016

A trust management architecture for hierarchical wireless sensor networks

scholarly article published October 2010

Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage

scientific article published in 2013

Analysis of Policy-Based Security Management System in Software-Defined Networks

scientific article published on 13 February 2019

Counteracting security attacks in virtual machines in the cloud using property based attestation

scientific article published in 2014

Critical issues in trust management for Mobile Ad-Hoc Networks

scholarly article published August 2009

Cryptography and Data Security in Cloud Computing

scientific article published in 2017

Editorial: Special issue on blockchain and communication networks

scientific article published in 2020

Enabling Cloud Storage Auditing With Key-Exposure Resistance

Evolution and challenges in trust and security in information system infrastructures

scientific article published on 06 October 2009

Extending the schematic protection model—II. Revocation

scientific article published in 1996

Fuzzy Regression Based Trust Prediction in Service-Oriented Applications

article

Generic constructions for role-based encryption

scientific article published in 2014

High-speed network security. I. SMDS and frame relay

scientific article published in 1999

High-speed network security. I. SMDS and frame relay

scientific article published in 1997

Modified forms of cipher block chaining

scientific article published in 1991

Multilevel security in a distributed object-oriented system

scientific article published in 1991

On the Analysis of On-Line Database Reorganization

On the design, implementation and application of an authorisation architecture for web services

scientific article published in 2007

Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices

scientific article published in 2017

Output feedback stabilization of large-scale networked cyberphysical systems using cryptographic techniques

scientific article published in 2022

Rethinking Software Component Security: Software Component Level Integrity and Cross Verification

scientific article published in 2016

Security for cluster based ad hoc networks

scientific article published in 2004

Security protocol for Frame Relay

scientific article published in 1993

Techniques for Enhancing Security in Industrial Control Systems

scientific article published on 30 October 2023

Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage

scientific article published in 2015

Trust Enhanced Security for Tenant Transactions in the Cloud Environment

scientific article published in 2014

Trust-enhanced secure mobile agent-based system design

scientific article published in 2007

Verification of network security protocols

scientific article published in 1989

Vulnerabilities of an ECC-based RFID authentication scheme

scientific article published in 2015