Find Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011

Author

  • Vijay Varadharajan
2016

Policy based security architecture for software defined networks

Karmakar, K. K., Varadharajan, V., Tupakula, U. & Hitchens, M., 4 Apr 2016, 2016 Symposium on Applied Computing, SAC 2016. New York, USA: Association for Computing Machinery, Vol. 04-08-April-2016. p. 658-663 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

10 Citations (Scopus)

A Secure keyword ordered multiuser searchable encryption framework

Kaushik, K. & Varadharajan, V., 2016, Security in Computing and Communications: 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings. Mueller, P., Thampi, S. M., Alam Bhuiyan, M. Z., Ko, R., Doss, R. & Alcaraz Calero, J. M. (eds.). Singapore: Springer, Springer Nature, p. 99-111 13 p. (Communications in Computer and Information Science; vol. 625).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2015

Biometric analysis for finger vein data: two-dimensional kernel principal component analysis

Damavandinejadmonfared, S. & Varadharajan, V., 2015, Emerging Trends in Image Processing, Computer Vision and Pattern Recognition. Deligiannidis, L. & Arabnia, H. R. (eds.). Waltham, MA: Morgan Kaufmann, p. 393-405 13 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

2017

Mitigating attacks in Software Defined Network (SDN)

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 5 Jun 2017, SDS 2017: Fourth International Conference on Software Defined Systems. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 112-117 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

15 Citations (Scopus)
2012

A pre-computable signature scheme with efficient verification for RFID

Guo, F., Mu, Y., Susilo, W. & Varadharajan, V., 2012, Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Proceedings. Ryan, M. D., Smyth, B. & Wang, G. (eds.). Heidelberg: Springer, Springer Nature, Vol. 7232. p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7232 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2016

Securing Big Data Environments from Attacks

Tupakula, U. & Varadharajan, V., 30 Jun 2016, Proceedings - 2nd IEEE International Conference on Big Data Security on Cloud, IEEE BigDataSecurity 2016, 2nd IEEE International Conference on High Performance and Smart Computing, IEEE HPSC 2016 and IEEE International Conference on Intelligent Data and Security, IEEE IDS 2016. Qiu, M. (ed.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 109-112 4 p. 7502273

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2014

Secure monitoring for dementia patients

Tupakula, U. & Varadharajan, V., 2014, Proceedings of the 29th Annual ACM Symposium on Applied Computing, SAC 2014. New York: Association for Computing Machinery, p. 14-19 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)
2017

PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 2017, In : Journal of Intelligent and Fuzzy Systems. 32, 4, p. 2909-2921 13 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)
2014

CP-ABE with constant-size keys for lightweight devices

Guo, F., Mu, Y., Susilo, W., Wong, D. S. & Varadharajan, V., 2014, In : IEEE Transactions on Information Forensics and Security. 9, 5, p. 763-771 9 p., 6757025.

Research output: Contribution to journalArticle

70 Citations (Scopus)
2015

A simple and novel technique for counteracting exploit kits

Min, B. & Varadharajan, V., 2015, International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I. Tian, J., Jing, J. & Srivatsa, M. (eds.). Cham: Springer, Springer Nature, Vol. 152. p. 259-277 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 152).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)
2017

Cryptography and data security in cloud computing

Yan, Z., Deng, R. H. & Varadharajan, V., 1 May 2017, In : Information Sciences. 387, p. 53-55 3 p.

Research output: Contribution to journalEditorial

10 Citations (Scopus)
2011

Rethinking cyber security

Varadharajan, V., 2011, Proceedings of the 4th International Conference on Security of Information and Networks. Orgun, M. A., Elçi, A., Makarevich, O. B., Huss, S. A., Pieprzyk, J., Babenko, L. K., Chefranov, A. G. & Shankaran, R. (eds.). New York: Association for Computing Machinery, p. 3-3 1 p.

Research output: Chapter in Book/Report/Conference proceedingOther chapter contribution

Enforcing role-based access control for secure data storage in the cloud

Zhou, L., Varadharajan, V. & Hitchens, M., Oct 2011, In : Computer Journal. 54, 10, p. 1675-1687 13 p.

Research output: Contribution to journalArticle

67 Citations (Scopus)

TVLAN: trusted and virtualised local area networks

Tupakula, U. & Varadharajan, V., 2011, TrustCom 2011: 2011 international joint conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11: 16-18 November 2011, Changsha, Hunan, P. R. China. Wang, G., Tate, S. R., Chen, J-J. & Sakurai, K. (eds.). Los Alamitos, Calif: Institute of Electrical and Electronics Engineers (IEEE), p. 606-612 7 p. 6120871

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2018

Policy-based access control for constrained healthcare resources

Pal, S., Hitchens, M., Varadharajan, V. & Rabehaja, T., 28 Aug 2018, 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2018. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-4 4 p. 8449813

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

3 Citations (Scopus)
2017

Out-VM monitoring for Malicious Network Packet Detection in cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 12 Jul 2017, ISEASP 2017: Proceedings of the 2017 ISEA Asia Security and Privacy Conference. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

5 Citations (Scopus)
2013

Integrating trust with cryptographic role-based access control for secure cloud data storage

Zhou, L., Varadharajan, V. & Hitchens, M., 2013, Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13, 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, 16-18 July 2013, Melbourne, Victoria, Australia. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 560-569 10 p. 6680887

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

11 Citations (Scopus)
2012

Message from the PriSecCSN2012 workshop chairs

Liu, C., Ranjan, R., Chen, J., Yu, P. S., Thuraisingham, B. & Varadharajan, V., 2012, CGC/SCA 2012: Proceedings of the Second International Conference on Cloud and Green Computing and second International Conference on Social Computing and Its Applications. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. xxvii 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2011

TVDSEC: Trusted Virtual Domain SECurity

Tupakula, U. & Varadharajan, V., 2011, Proceedings - 2011 4th IEEE International Conference on Utility and Cloud Computing, UCC 2011. Buyya, R., Pallickara, S. & Fox, G. (eds.). Los Alamitos, California: Institute of Electrical and Electronics Engineers (IEEE), p. 57-64 8 p. 6123481

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

5 Citations (Scopus)
2014

Effective kernel mapping for one-dimensional Principal Component Analysis in finger vein recognition

Damavandinejadmonfared, S. & Varadharajan, V., 2014, IPCV'14: the 2014 International Conference on Image Processing, Computer Vision, and Pattern Recognition. United States: World Academy of Science, 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2012
2014

Server-aided signature verification for lightweight devices

Guo, F., Mu, Y., Susilo, W. & Varadharajan, V., 2014, In : Computer Journal. 57, 4, p. 481-493 13 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Design and analysis of security attacks against critical smart grid infrastructures

Min, B. & Varadharajan, V., 13 Oct 2014, ICECCS 2014: Proceedings of the 19th International Conference on Engineering of Complex Computer Systems. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 59-68 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

11 Citations (Scopus)
2013

A trust-aware framework for evaluating security controls of service providers in cloud marketplaces

Habib, S. M., Varadharajan, V. & Mühlhäuser, M., 2013, TrustCom 2013: TrustCom 2013 : 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications : proceedings : 16-18 July 2013, Melbourne, Victoria, Australia. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 459-468 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

18 Citations (Scopus)
2018

Modeling identity for the Internet of Things: survey, classification and trends

Pal, S., Hitchens, M. & Varadharajan, V., 2018, 2018 12th International Conference on Sensing Technology, ICST 2018. Institute of Electrical and Electronics Engineers (IEEE), Vol. 2018-December. p. 45-51 7 p. 8603595

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2012

TREASURE: trust enhanced security for cloud environments

Varadharajan, V. & Tupakula, U., 2012, Proceedings: the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2012): 25-27 June 2012, Liverpool, UK. Min, G., Wu, Y., Liu, L. C., Jin, X., Jarvis, S. & Al-Dubai, A. Y. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 145-152 8 p. 6295969

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

6 Citations (Scopus)
2016

Securing virtual machines from anomalies using program-behavior analysis in cloud environment

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 2016, HPCC/SmartCity/DSS 2016: Proceedings of the Eighteenth IEEE International Conference on High Performance Computing and Communications, the Fourteenth IEEE International Conference on Smart City, the Second IEEE International Conference on Data Science and Systems. Chen, J. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 991-998 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

10 Citations (Scopus)
2015

Botnet detection using software defined networking

Wijesinghe, U., Tupakula, U. & Varadharajan, V., 2015, 2015 22nd International Conference on Telecommunications, ICT 2015. New York, NY: Institute of Electrical and Electronics Engineers (IEEE), p. 219-224 6 p. 7124686

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

6 Citations (Scopus)
2011

Analysis of packet loss for batch traffic arrivals in IEEE 802.15.4-based networks

Haghighi, M. S., Mohamed-Pour, K. & Varadharajan, V., 2011, Proceedings of the 36th Annual IEEE Conference on Local Computer Networks, LCN 2011. Pfeifer, T., Jayasumana, A. & Aschenbruck, N. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 117-122 6 p. 6115166

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2014

Dynamic workload balancing for hadoop MapReduce

Hou, X., Kumar, A. T. K., Thomas, J. P. & Varadharajan, V., 2014, Proceedings - 4th IEEE International Conference on Big Data and Cloud Computing, BDCloud 2014 with the 7th IEEE International Conference on Social Computing and Networking, SocialCom 2014 and the 4th International Conference on Sustainable Computing and Communications, SustainCom 2014. Chen, J. & Yang, L. T. (eds.). Picataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 56-62 7 p. 7034766

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

9 Citations (Scopus)
2015

Securing wireless mobile nodes from distributed denial-of-service attacks

Varadharajan, V. & Tupakula, U., 1 Oct 2015, In : Concurrency Computation. 27, 15, p. 3794-3815 22 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2012

Trusted administration of large-scale cryptographic role-based access control systems

Zhou, L., Varadharajan, V. & Hitchens, M., 2012, Proceedings: the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2012): 25-27 June 2012, Liverpool, UK. Min, G., Wu, Y., Liu, L. C., Jin, X., Jarvis, S. & Al-Dubai, A. Y. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 714-721 8 p. 6296040

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)
2016

On the design and implementation of a security architecture for Software Defined Networks

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 2016, HPCC/SmartCity/DSS 2016: Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications, 14th IEEE International Conference on Smart City and 2nd IEEE International Conference on Data Science and Systems. Chen, J. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 671-678 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)
2013

Trust-based secure cloud data storage with cryptographic role-based access control

Zhou, L., Varadharajan, V. & Hitchens, M., 2013, ICETE 2013 - 10th International Joint Conference on E-Business and Telecommunications; SECRYPT 2013 - 10th International Conference on Security and Cryptography, Proceedings. Portugal: SciTePress, p. 62-73 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Security and privacy in communication networks: Revised selected papers

Zia, T. (ed.), Zomaya, A. (ed.), Varadharajan, V. (ed.) & Mao, M. (ed.), 2013, Heidelberg: Springer, Springer Nature. 419 p. (Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; vol. 127)

Research output: Book/ReportEdited Book/Anthology

Securing mobile devices from DoS attacks

Tupakula, U. & Varadharajan, V., 2013, Proceedings - 16th IEEE International Conference on Computational Science and Engineering, CSE 2013. Chen, J., Cuzzocrea, A. & Yang, L. T. (eds.). Piscataway, NJ: Institute of Electrical Engineers, p. 34-41 8 p. 6755194

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)
2015

Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage

Zhou, L., Varadharajan, V. & Hitchens, M., 1 Nov 2015, In : IEEE Transactions on Information Forensics and Security. 10, 11, p. 2381-2395 15 p., 7155561.

Research output: Contribution to journalArticle

46 Citations (Scopus)
1 Downloads (Pure)
2017

Towards a secure access control Architecture for the Internet of Things

Pal, S., Hitchens, M. & Varadharajan, V., 14 Nov 2017, 2017 IEEE 42nd Conference on Local Computer Networks (LCN 2017): proceedings. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 219-222 4 p. 8109357

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)
2016

Trust enhanced secure role-based access control on encrypted data in cloud (abstract of keynote talk)

Varadharajan, V., 2016, Trust management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Proceedings. Habib, S. M., Mauw, S., Vassileva, J. & Mühlhäuser, M. (eds.). Switzerland: Springer, Springer Nature, Vol. 473. p. ix-ix 1 p. (IFIP Advances in Information and Communication Technology; vol. 473).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2017

Securing communication in multiple Autonomous System domains with Software Defined Networking

Varadharajan, V., Karmakar, K. K. & Tupakula, U., 20 Jul 2017, Proceedings of the IM 2017 - 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 195-203 9 p. 7987280

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

3 Citations (Scopus)
2014

The silence of the LANs: efficient leakage resilience for IPsec VPNs

Schulz, S., Varadharajan, V. & Sadeghi, A-R., Feb 2014, In : IEEE Transactions on Information Forensics and Security. 9, 2, p. 221-232 12 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)
2019

Towards the design of a trust management framework for the Internet of Things

Pal, S., Hitchens, M. & Varadharajan, V., 2019, 2019 13th International Conference on Sensing Technology, ICST 2019. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-7 7 p. (Proceedings of the International Conference on Sensing Technology, ICST; vol. 2019-December).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2015

Provenance based classification access policy system based on encrypted search for cloud data storage

Fan, X., Varadharajan, V. & Hitchens, M., 2015, Information Security: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings. Lopez, J. & Mitchell, C. J. (eds.). Cham: Springer, Springer Nature, p. 283-298 16 p. (Lecture Notes in Computer Science; vol. 9290).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Effective finger vein-based authentication: kernel principal component analysis

Damavandinejadmonfared, S. & Varadharajan, V., 2015, Emerging trends in image processing, computer vision and pattern recognition. Deligiannidis, L. & Arabnia, H. R. (eds.). Waltham, MA: Morgan Kaufmann, p. 447-455 9 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Design and analysis of a sophisticated malware attack against smart grid

Min, B. & Varadharajan, V., 2015, Information Security: 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings. Desmedt, Y. (ed.). Cham, Switzerland: Springer, Springer Nature, p. 130-139 10 p. (Lecture Notes in Computer Science; vol. 7807).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

A stochastic time-domain model for burst data aggregation in IEEE 802.15.4 wireless sensor networks

Haghighi, M. S., Xiang, Y., Varadharajan, V. & Quinn, B. G., 1 Mar 2015, In : IEEE Transactions on Computers. 64, 3, p. 627-639 13 p., 6698362.

Research output: Contribution to journalArticle

7 Citations (Scopus)
2012

The silence of the LANs: Efficient leakage resilience for IPsec VPNs

Sadeghi, A. R., Schulz, S. & Varadharajan, V., 2012, Computer Security, ESORICS 2012 - 17th European Symposium on Research in Computer Security, Proceedings. Foresti, S., Young, M. & Martinelli, F. (eds.). Heidelberg, Germany: Springer, Springer Nature, Vol. 7459 LNCS. p. 253-270 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7459 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

6 Citations (Scopus)
2014

Practical k nearest neighbor queries with location privacy

Yi, X., Paulet, R., Bertino, E. & Varadharajan, V., 2014, 2014 IEEE 30th International Conference on Data Engineering, ICDE 2014. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 640-651 12 p. (International Conference on Data Engineering Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

55 Citations (Scopus)
2016

A secure role-based cloud storage system for encrypted patient-centric health records

Zhou, L., Varadharajan, V. & Gopinath, K., 3 Nov 2016, In : Computer Journal. 59, 11, p. 1593-1611 19 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)