Vijay Varadharajan

Professor

  • 3417 Citations
  • 28 h-Index
1983 …2019
If you made any changes in Pure these will be visible here soon.

Research Outputs 1983 2019

Filter
Chapter
2015

Biometric analysis for finger vein data: two-dimensional kernel principal component analysis

Damavandinejadmonfared, S. & Varadharajan, V., 2015, Emerging Trends in Image Processing, Computer Vision and Pattern Recognition. Deligiannidis, L. & Arabnia, H. R. (eds.). Waltham, MA: Morgan Kaufmann, p. 393-405 13 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Biometrics
Principal component analysis
Identification (control systems)
Experiments

Effective finger vein-based authentication: Kernel principal component analysis

Damavandinejadmonfared, S. & Varadharajan, V., 2015, Emerging Trends in Image Processing, Computer Vision and Pattern Recognition. Deligiannidis, L. & Arabnia, H. R. (eds.). Waltham, MA: Morgan Kaufmann, p. 447-455 9 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Principal component analysis
Authentication
Face recognition
Entropy
Polynomials
2014

A trust management framework for secure cloud data storage using cryptographic role-based access control

Zhou, L., Varadharajan, V. & Hitchens, M., 2014, E-Business and Telecommunications: International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013 Revised Selected Papers. Obaidat, M. S. & Filipe, J. (eds.). Heidelberg: Springer, Springer Nature, p. 226-251 26 p. (Communications in Computer and Information Science; vol. 456).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Access control
Data storage equipment
Security of data
Managers

Cryptographic role-based access control for secure cloud data storage systems

Zhou, L., Varadharajan, V. & Hitchens, M., 2014, Security, Privacy and Trust in Cloud Systems. Nepal, S. & Pathan, M. (eds.). Heidelberg: Springer, Springer Nature, p. 313-344 32 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Access control
Data storage equipment
Costs
2013

A secure elliptic curve based RFID ownership transfer scheme with controlled delegation

Cheng, S., Varadharajan, V., Mu, Y. & Susilo, W., 2013, Radio Frequency Identification System Security: RFIDsec'13 Asia Workshop Proceedings. Ma, C. & Weng, J. (eds.). Amsterdam: IOS Press, Vol. 11. p. 31-43 13 p. (Cryptology and Information Security Series; vol. 11).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Radio frequency identification (RFID)
Cryptography
Recovery

On RFID authentication protocols with wide-strong privacy

Li, N., Mu, Y., Susilo, W., Guo, F. & Varadharajan, V., Nov 2013, Radio Frequency Identification System Security: RFIDsec'13 Asia Workshop Proceedings. Ma, C. & Weng, J. (eds.). Amsterdam: IOS Press, p. 3-16 14 p. (Cryptology and Information Security Series; vol. 11).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Radio frequency identification (RFID)
Authentication
Identification (control systems)
2010

Security in mobile AD HOC networks

Balakrishnan, V., Varadharajan, V. & Tupakula, U., 1 Jan 2010, Selected topics in communication networks and distributed systems. Misra, S., Misra, S. C. & Woungang, I. (eds.). Singapore: World Scientific Publishing, p. 671-708 38 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Mobile ad hoc networks
Communication
Network management
Security systems

SMRTI: Secure mobile ad hoc network routing with trust intrigue

Balakrishnan, V., Varadharajan, V., Lucs, P. & Tupakula, U., 22 Feb 2010, Mobile Intelligence. Yang, L. T., Waluyo, A. B., Ma, J., Tan, L. & Srinivasan, B. (eds.). Hoboken, N.J: John Wiley & Sons, p. 412-436 25 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

2009

ALOPA: authorization logic for property attestation in trusted platforms

Nagarajan, A., Varadharajan, V. & Hitchens, M., 2009, Autonomic and Trusted Computing: 6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings. González Nieto, J., Reif, W., Wang, G. & Indulska, J. (eds.). Berlin: Springer, Springer Nature, p. 134-148 15 p. (Lecture Notes in Computer Science; vol. 5586).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Authorization
Access control
Logic
Specifications
Resources

Secure interoperation in multidomain environments employing UCON policies

Lu, J., Li, R., Varadharajan, V., Lu, Z. & Ma, X., 2009, Information Security: 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings. Samarati, P., Ardagna, C. A., Yung, M. & Martinelli, F. (eds.). Berlin: Springer, Springer Nature, p. 395-402 8 p. (Lecture Notes in Computer Science; vol. 5735).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Control Policy
Access control
Interoperability
Role-based Access Control
Authorization

Trust Management in Mobile Ad Hoc Networks

Balakrishnan, V., Varadharajan, V. & Tupakula, U., 2009, Guide to wireless ad hoc networks. Misra, S., Woungang, I. & Misra, S. C. (eds.). London: Springer, Springer Nature, p. 473-502 30 p. (Computer Communications and Networks Series).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

2008

Distributed denial of service attacks in networks

Tupakula, U. K. & Varadharajan, V., 2008, Handbook of research on information security and assurance. Gupta, J. N. D. & Sharma, S. K. (eds.). USA, London UK: IGI Global, p. 85-97 13 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Internet
Denial-of-service attack
2007

A unified taxonomy framework of trust

Zhao, W., Varadharajan, V. & Bryan, G., 2007, Trust in e-services: technologies, practices and challenges. Song, R., Korba, L. & Yee, G. (eds.). Hershey, PA; London: IGI Global, p. 29-50 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Taxonomies
Authentication
Labels
2003

Digital Cash

Mu, Y., Varadharajan, V. & Nguyen, K. Q., 2003, Payment Technologies for E-Commerce. Weidong Kou (ed.). Heidelberg, Germany: Springer, Springer Nature, p. 171-194 24 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Role-based access control and the access control matrix

Saunders, G., Hitchens, M. & Varadharajan, V., 2003, Information and communications security: 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings. Qing, S., Gollmann, D. & Zhou, J. (eds.). Heidelberg, Germany: Springer, Springer Nature, p. 145-157 13 p. (Lecture notes in computer science; vol. 2836).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Role-based Access Control
Access Control
Access control
Matrix Models
Model
2002

Distributed Authorization: principles and practice

Varadharajan, V., 2002, Coding Theory and Cryptology. Niederreiter, H. (ed.). Singapore: Singapore University Press, p. 385-432 48 p.

Research output: Chapter in Book/Report/Conference proceedingChapterResearch

2001

RBAC for XML document stores

Hitchens, M. & Varadharajan, V., 2001, Information and Communications Security: Third International Conference, ICICS 2001 Xian, China, November 13-16, 2001 Proceedings. Qing, S., Okamoto, T. & Zhou, J. (eds.). Berlin: Springer, Springer Nature, Vol. 2229. p. 131-143 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2229).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Role-based Access Control
XML
Access Control
Access control
Control Policy
1999

A secure communication scheme for multiagent systems

Wang, H., Varadharajan, V. & Zhang, Y., 1999, Multiagent Platforms: First Pacific Rim International Workshop on Multi-Agents, PRIMA’98 Singapore, November 23, 1998 Selected Papers. Ishida, T. (ed.). Berlin: Springer, Springer Nature, Vol. 1599. p. 174-185 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1599).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Secure Communication
Multi agent systems
Multi-agent Systems
Communication
Cryptography

Delegated decryption

Mu, Y., Varadharajan, V. & Nguyen, K. Q., 1999, Cryptography and Coding: 7th IMA International Conference Cirencester, UK, December 20–22, 1999 Proceedings. Walker, M. (ed.). Berlin: Springer, Springer Nature, p. 258-269 12 p. (Lecture Notes in Computer Science; vol. 1746).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Public key

Divertible zero-knowledge proof of polynomial relations and blind group signature

Nguyen, K. Q., Mu, Y. & Varadharajan, V., 1999, Information Security and Privacy: 4th Australasian Conference, ACISP’99 Wollongong, NSW, Australia, April 7–9, 1999 Proceedings. Pieprzyk, J., Safavi-Naini, R. & Seberry, J. (eds.). Berlin: Springer, Springer Nature, Vol. 1587. p. 117-128 12 p. (Lecture Notes in Computer Science; vol. 1587).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Blind Signature
Group Signature
Zero-knowledge Proof
Polynomials
Polynomial

Issues in the design of a language for role based access control

Hitchens, M. & Varadharajan, V., 1999, Information and Communication Security: Second International Conference, ICICS’99, Sydney, Australia, November 9-11, 1999. Proceedings. Varadharajan, V. & Mu, Y. (eds.). Berlin: Springer, Springer Nature, p. 22-38 17 p. (Lecture Notes in Computer Science; vol. 1726).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Role-based Access Control
Access control
Access Control
Control Policy
Control systems

Undeniable confirmer signature

Nguyen, K., Mu, Y. & Varadharajan, V., 1999, Information Security: Second International Workshop, ISW’99 Kuala Lumpur, Malaysia, November 6-7, 1999 Proceedings. Mambo, M. & Zheng, Y. (eds.). Berlin: Springer, Springer Nature, p. 235-246 12 p. (Lecture Notes in Computer Science; vol. 1729).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Undeniable Signature
Signature
Signature Scheme
Flexibility
Verify

Zero-knowledge proofs of possession of digital signatures and its applications

Nguyen, K. Q., Bao, F., Mu, Y. & Varadharajan, V., 1999, Information and Communication Security: Second International Conference, ICICS’99, Sydney, Australia, November 9-11, 1999. Proceedings. Varadharajan, V. & Mu, Y. (eds.). Berlin: Springer, Springer Nature, Vol. 1726. p. 103-118 16 p. (Lecture Notes in Computer Science; vol. 1726).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Zero-knowledge Proof
Electronic document identification systems
Digital Signature
Discrete Logarithm
Signature Scheme
1998

A new digital cash scheme based on blind Nyberg-Rueppel digital signature

Nguyen, K. Q., Mu, Y. & Varadharajan, V., 1998, Information Security: First International Workshop, ISW'97 Tatsunokuchi, Ishikawa, Japan September 17–19, 1997 Proceedings. Okamoto, E., Davida, G. & Mambo, M. (eds.). Berlin: Springer, Springer Nature, p. 313-320 8 p. (Lecture Notes in Computer Science; vol. 1396).

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

Electronic document identification systems
Digital Signature
Anonymity
Electronic money