Vijay Varadharajan
Person information
- affiliation: Macquarie University, Sydney, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [j87]Vijay Varadharajan, Udaya Kiran Tupakula, Kallol Krishna Karmakar:
Secure Monitoring of Patients With Wandering Behavior in Hospital Environments. IEEE Access 6: 11523-11533 (2018) - [j86]Shantanu Pal, Michael Hitchens, Vijay Varadharajan, Tahiry M. Rabehaja:
Fine-Grained Access Control for Smart Healthcare Systems in the Internet of Things. EAI Endorsed Trans. Indust. Netw. & Intellig. Syst. 4(13): e5 (2018) - [i1]Mahmood Yousefi-Azar, Len Hamey, Vijay Varadharajan, Shiping Chen:
Malytics: A Malware Detection Scheme. CoRR abs/1803.03465 (2018) - 2017
- [j85]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud. Concurrency and Computation: Practice and Experience 29(12) (2017) - [j84]Zheng Yan, Robert H. Deng, Vijay Varadharajan:
Cryptography and Data Security in Cloud Computing. Inf. Sci. 387: 53-55 (2017) - [j83]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud. Journal of Intelligent and Fuzzy Systems 32(4): 2909-2921 (2017) - [j82]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
Intrusion detection techniques in cloud environment: A survey. J. Network and Computer Applications 77: 18-47 (2017) - [j81]Vijay Varadharajan, Udaya Kiran Tupakula:
On the Design and Implementation of an Integrated Security Architecture for Cloud with Improved Resilience. IEEE Trans. Cloud Computing 5(3): 375-389 (2017) - [j80]Fuchun Guo, Yi Mu, Willy Susilo, Homer Hsing, Duncan S. Wong, Vijay Varadharajan:
Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight Devices. IEEE Trans. Dependable Sec. Comput. 14(2): 211-220 (2017) - [j79]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
Privacy-Preserving Mutual Authentication in RFID with Designated Readers. Wireless Personal Communications 96(3): 4819-4845 (2017) - [c258]Fan Jin, Vijay Varadharajan, Udaya Kiran Tupakula:
A trust model based energy detection for cognitive radio networks. ACSW 2017: 68:1-68:8 - [c257]Shu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo:
An efficient and provably secure RFID grouping proof protocol. ACSW 2017: 71:1-71:7 - [c256]Mahmood Yousefi-Azar, Len Hamey, Vijay Varadharajan, Mark D. McDonnell:
Fast, Automatic and Scalable Learning to Detect Android Malware. ICONIP (5) 2017: 848-857 - [c255]Mahmood Yousefi-Azar, Vijay Varadharajan, Len Hamey, Udaya Kiran Tupakula:
Autoencoder-based feature learning for cyber security applications. IJCNN 2017: 3854-3861 - [c254]Vijay Varadharajan, Kallol Krishna Karmakar, Udaya Kiran Tupakula:
Securing communication in multiple Autonomous System domains with Software Defined Networking. IM 2017: 195-203 - [c253]Shantanu Pal, Michael Hitchens, Vijay Varadharajan:
Towards a Secure Access Control Architecture for the Internet of Things. LCN 2017: 219-222 - [c252]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula:
Mitigating attacks in Software Defined Network (SDN). SDS 2017: 112-117 - [c251]Fan Jin, Vijay Varadharajan, Udaya Kiran Tupakula:
An Eclat Algorithm Based Energy Detection for Cognitive Radio Networks. TrustCom/BigDataSE/ICESS 2017: 1096-1102 - [c250]Udaya Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
SDN-based Dynamic Policy Specification and Enforcement for Provisioning SECaaS in Cloud. WISE (2) 2017: 550-561 - [e9]Dong Seong Kim, Masato Kitakami, Vijay Varadharajan:
22nd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2017, Christchurch, New Zealand, January 22-25, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-5652-1 [contents] - 2016
- [j78]Lan Zhou, Vijay Varadharajan, K. Gopinath:
A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric Health Records. Comput. J. 59(11): 1593-1611 (2016) - [j77]Byungho Min, Vijay Varadharajan:
Rethinking Software Component Security: Software Component Level Integrity and Cross Verification. Comput. J. 59(11): 1735-1748 (2016) - [j76]Byungho Min, Vijay Varadharajan:
A novel malware for subversion of self-protection in anti-virus. Softw., Pract. Exper. 46(3): 361-379 (2016) - [j75]Xun Yi, Russell Paulet, Elisa Bertino, Vijay Varadharajan:
Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy. IEEE Trans. Knowl. Data Eng. 28(6): 1546-1559 (2016) - [c249]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula:
On the Design and Implementation of a Security Architecture for Software Defined Networks. HPCC/SmartCity/DSS 2016: 671-678 - [c248]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
Securing Virtual Machines from Anomalies Using Program-Behavior Analysis in Cloud Environment. HPCC/SmartCity/DSS 2016: 991-998 - [c247]Preeti Mishra, Emmanuel S. Pilli, Vijay Varadharajan, Udaya Kiran Tupakula:
NvCloudIDS: A security architecture to detect intrusions at network and virtualization layer in cloud environment. ICACCI 2016: 56-62 - [c246]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula:
On the Design and Implementation of a Security Architecture for End to End Services in Software Defined Networks. LCN 2016: 519-522 - [c245]Kallol Krishna Karmakar, Vijay Varadharajan, Udaya Kiran Tupakula, Michael Hitchens:
Policy based security architecture for software defined networks. SAC 2016: 658-663 - [c244]Byungho Min, Vijay Varadharajan:
Cascading attacks against smart grid using control command disaggregation and services. SAC 2016: 2142-2147 - [c243]Dilshan Jayarathna, Vijay Varadharajan, Udaya Kiran Tupakula:
Integrated Security for Services Hosted in Virtual Environments. Trustcom/BigDataSE/ISPA 2016: 82-89 - 2015
- [j74]Udaya Kiran Tupakula, Vijay Varadharajan:
Trust Enhanced Security for Tenant Transactions in the Cloud Environment. Comput. J. 58(10): 2388-2403 (2015) - [j73]Vijay Varadharajan, Udaya Kiran Tupakula:
Securing wireless mobile nodes from distributed denial-of-service attacks. Concurrency and Computation: Practice and Experience 27(15): 3794-3815 (2015) - [j72]Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan:
Shared RFID ownership transfer protocols. Computer Standards & Interfaces 42: 95-104 (2015) - [j71]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Generic constructions for role-based encryption. Int. J. Inf. Sec. 14(5): 417-430 (2015) - [j70]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
Vulnerabilities of an ECC-based RFID authentication scheme. Security and Communication Networks 8(17): 3262-3270 (2015) - [j69]Mohammad Sayad Haghighi, Yang Xiang, Vijay Varadharajan, Barry G. Quinn:
A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks. IEEE Trans. Computers 64(3): 627-639 (2015) - [j68]Jia Yu, Kui Ren, Cong Wang, Vijay Varadharajan:
Enabling Cloud Storage Auditing With Key-Exposure Resistance. IEEE Trans. Information Forensics and Security 10(6): 1167-1179 (2015) - [j67]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage. IEEE Trans. Information Forensics and Security 10(11): 2381-2395 (2015) - [c242]Sepehr Damavandinejadmonfared, Vijay Varadharajan:
A New Extension of Kernel Principal Component Analysis for Finger Vein Authentication. ACSC 2015: 59-63 - [c241]Udaya Wijesinghe, Udaya Kiran Tupakula, Vijay Varadharajan:
An Enhanced Model for Network Flow Based Botnet Detection. ACSC 2015: 101-110 - [c240]Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan:
Hypervisor-based Security Architecture to Protect Web Applications. AISC 2015: 15-24 - [c239]Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan:
Anonymous Yoking-Group Proofs. AsiaCCS 2015: 615-620 - [c238]Byungho Min, Vijay Varadharajan:
Secure Dynamic Software Loading and Execution Using Cross Component Verification. DSN 2015: 113-124 - [c237]Byungho Min, Vijay Varadharajan:
Design and Evaluation of Feature Distributed Malware Attacks against the Internet of Things (IoT). ICECCS 2015: 80-89 - [c236]Udaya Wijesinghe, Udaya Kiran Tupakula, Vijay Varadharajan:
Botnet detection using software defined networking. ICT 2015: 219-224 - [c235]Xinyu Fan, Vijay Varadharajan, Michael Hitchens:
Provenance Based Classification Access Policy System Based on Encrypted Search for Cloud Data Storage. ISC 2015: 283-298 - [c234]Fan Jin, Vijay Varadharajan, Udaya Kiran Tupakula:
Improved detection of primary user emulation attacks in cognitive radio networks. ITNAC 2015: 274-279 - [c233]Byungho Min, Vijay Varadharajan:
Design, implementation and evaluation of a novel anti-virus parasitic malware. SAC 2015: 2127-2133 - 2014
- [j66]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
Server-Aided Signature Verification for Lightweight Devices. Comput. J. 57(4): 481-493 (2014) - [j65]Chun Ruan, Vijay Varadharajan:
Dynamic delegation framework for role based access control in distributed data management systems. Distributed and Parallel Databases 32(2): 245-269 (2014) - [j64]Aarthi Nagarajan, Vijay Varadharajan, Nathan Tarr:
Trust enhanced distributed authorisation for web services. J. Comput. Syst. Sci. 80(5): 916-934 (2014) - [j63]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Secure administration of cryptographic role-based access control for large-scale cloud storage systems. J. Comput. Syst. Sci. 80(8): 1518-1533 (2014) - [j62]Vijay Varadharajan, Udaya Kiran Tupakula:
Counteracting security attacks in virtual machines in the cloud using property based attestation. J. Network and Computer Applications 40: 31-45 (2014) - [j61]Byungho Min, Vijay Varadharajan, Udaya Kiran Tupakula, Michael Hitchens:
Antivirus security: naked during updates. Softw., Pract. Exper. 44(10): 1201-1222 (2014) - [j60]Steffen Schulz, Vijay Varadharajan, Ahmad-Reza Sadeghi:
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. IEEE Trans. Information Forensics and Security 9(2): 221-232 (2014) - [j59]Fuchun Guo, Yi Mu, Willy Susilo, Duncan S. Wong, Vijay Varadharajan:
CP-ABE With Constant-Size Keys for Lightweight Devices. IEEE Trans. Information Forensics and Security 9(5): 763-771 (2014) - [j58]Vijay Varadharajan, Udaya Kiran Tupakula:
Security as a Service Model for Cloud Environment. IEEE Trans. Network and Service Management 11(1): 60-75 (2014) - [c232]Byungho Min, Vijay Varadharajan:
A New Technique for Counteracting Web Browser Exploits. Australian Software Engineering Conference 2014: 132-141 - [c231]Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan:
Hypervisor-based Security Architecture for Validating DNS Services (Poster). AISC 2014: 83-86 - [c230]Xiaofei Hou, Ashwin Kumar T. K, Johnson P. Thomas, Vijay Varadharajan:
Dynamic Workload Balancing for Hadoop MapReduce. BDCloud 2014: 56-62 - [c229]Byungho Min, Vijay Varadharajan:
Feature-Distributed Malware Attack: Risk and Defence. ESORICS (2) 2014: 457-474 - [c228]Patrick Koeberl, Steffen Schulz, Ahmad-Reza Sadeghi, Vijay Varadharajan:
TrustLite: a security architecture for tiny embedded devices. EuroSys 2014: 10:1-10:14 - [c227]Udaya Kiran Tupakula, Vijay Varadharajan:
Techniques for detecting attacks on critical infrastructure. ICNC 2014: 48-52 - [c226]Xun Yi, Russell Paulet, Elisa Bertino, Vijay Varadharajan:
Practical k nearest neighbor queries with location privacy. ICDE 2014: 640-651 - [c225]Byungho Min, Vijay Varadharajan:
Design and Analysis of Security Attacks against Critical Smart Grid Infrastructures. ICECCS 2014: 59-68 - [c224]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
Privacy-Preserving Authorized RFID Authentication Protocols. RFIDSec 2014: 108-122 - [c223]
- [c222]Byungho Min, Vijay Varadharajan:
A Simple and Novel Technique for Counteracting Exploit Kits. SecureComm (1) 2014: 259-277 - [c221]Udaya Kiran Tupakula, Vijay Varadharajan:
Trust Enhanced Cloud Security for Healthcare Services. TrustCom 2014: 344-351 - [c220]Byungho Min, Vijay Varadharajan:
Design and Analysis of a New Feature-Distributed Malware. TrustCom 2014: 457-464 - 2013
- [j57]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Achieving Secure Role-Based Access Control on Encrypted Data in Cloud Storage. IEEE Trans. Information Forensics and Security 8(12): 1947-1960 (2013) - [c219]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
Membership Encryption and Its Applications. ACISP 2013: 219-234 - [c218]Alan Lee, Vijay Varadharajan, Udaya Kiran Tupakula:
On Malware Characterization and Attack Classification. AWC 2013: 43-48 - [c217]Vijay Varadharajan, Udaya Kiran Tupakula:
On the Security of Tenant Transactions in the Cloud. CloudCom (1) 2013: 525-530 - [c216]
- [c215]Udaya Kiran Tupakula, Vijay Varadharajan:
Security Techniques for Counteracting Attacks in Mobile Healthcare Services. EUSPN/ICTH 2013: 374-381 - [c214]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control. ICETE (Selected Papers) 2013: 226-251 - [c213]Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan:
Secure RFID Ownership Transfer Protocols. ISPEC 2013: 189-203 - [c212]Byungho Min, Vijay Varadharajan:
Design and Analysis of a Sophisticated Malware Attack Against Smart Grid. ISC 2013: 130-139 - [c211]Nan Li, Yi Mu, Willy Susilo, Fuchun Guo, Vijay Varadharajan:
On RFID Authentication Protocols with Wide-Strong Privacy. RFIDSec Asia 2013: 3-16 - [c210]Shu Cheng, Vijay Varadharajan, Yi Mu, Willy Susilo:
A Secure Elliptic Curve based RFID Ownership Transfer Scheme with Controlled Delegation. RFIDSec Asia 2013: 31-43 - [c209]Sheikh Mahbub Habib, Vijay Varadharajan, Max Mühlhäuser:
A framework for evaluating trust of service providers in cloud marketplaces. SAC 2013: 1963-1965 - [c208]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control. SECRYPT 2013: 62-73 - [c207]Vijay Varadharajan, Udaya Kiran Tupakula:
Integrated Security Architecture for Virtual Machines. SecureComm 2013: 140-153 - [c206]Sheikh Mahbub Habib, Vijay Varadharajan, Max Mühlhäuser:
A Trust-Aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces. TrustCom/ISPA/IUCC 2013: 459-468 - [c205]Aarthi Krishna, Vijay Varadharajan, Nathan Tarr:
On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures. TrustCom/ISPA/IUCC 2013: 517-524 - [c204]Udaya Kiran Tupakula, Vijay Varadharajan:
Trust Enhanced Security Architecture for Detecting Insider Threats. TrustCom/ISPA/IUCC 2013: 552-559 - [c203]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Integrating Trust with Cryptographic Role-Based Access Control for Secure Cloud Data Storage. TrustCom/ISPA/IUCC 2013: 560-569 - [e8]Tanveer A. Zia, Albert Y. Zomaya, Vijay Varadharajan, Zhuoqing Morley Mao:
Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Sydney, NSW, Australia, September 25-28, 2013, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 127, Springer 2013, ISBN 978-3-319-04282-4 [contents] - 2012
- [j56]Udaya Kiran Tupakula, Vijay Varadharajan:
Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines. Comput. J. 55(4): 397-409 (2012) - [j55]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
A flexible cryptographic approach for secure data storage in the cloud using role-based access control. IJCC 1(2/3): 201-220 (2012) - [c202]
- [c201]Ahmad-Reza Sadeghi, Steffen Schulz, Vijay Varadharajan:
The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs. ESORICS 2012: 253-270 - [c200]Udaya Kiran Tupakula, Vijay Varadharajan, Dipankar Dutta:
Intrusion detection techniques for virtual domains. HiPC 2012: 1-9 - [c199]Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan:
A Pre-computable Signature Scheme with Efficient Verification for RFID. ISPEC 2012: 1-16 - [c198]Udaya Kiran Tupakula, Vijay Varadharajan:
Distributed service control technique for detecting security attacks. NOMS 2012: 574-577 - [c197]Vijay Varadharajan, Udaya Kiran Tupakula:
TREASURE: Trust Enhanced Security for Cloud Environments. TrustCom 2012: 145-152 - [c196]Huawei Zhao, Jiankun Hu, Jing Qin, Vijay Varadharajan, Haishan Wan:
Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks. TrustCom 2012: 706-713 - [c195]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Trusted Administration of Large-Scale Cryptographic Role-Based Access Control Systems. TrustCom 2012: 714-721 - [c194]Steffen Schulz, Ahmad-Reza Sadeghi, Maria Zhdanova, Hossen A. Mustafa, Wenyuan Xu, Vijay Varadharajan:
Tetherway: a framework for tethering camouflage. WISEC 2012: 149-160 - 2011
- [j54]Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Enforcing Role-Based Access Control for Secure Data Storage in the Cloud. Comput. J. 54(10): 1675-1687 (2011) - [j53]Aarthi Nagarajan, Vijay Varadharajan:
Dynamic trust enhanced security model for trusted platform based services. Future Generation Comp. Syst. 27(5): 564-573 (2011) - [j52]Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan, Barry G. Quinn:
Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks. IEEE Trans. Information Forensics and Security 6(4): 1185-1199 (2011) - [c193]Caglar Ulucenk, Vijay Varadharajan, Venkatesan Balakrishnan, Udaya Kiran Tupakula:
Techniques for Analysing PDF Malware. APSEC 2011: 41-48 - [c192]Udaya Kiran Tupakula, Vijay Varadharajan, Naveen Akku:
Intrusion Detection Techniques for Infrastructure as a Service Cloud. DASC 2011: 744-751 - [c191]Chun Ruan, Vijay Varadharajan:
Reasoning about Dynamic Delegation in Role Based Access Control Systems. DASFAA (1) 2011: 239-253 - [c190]Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala:
Security Techniques for Beyond 3G Wireless Mobile Networks. EUC 2011: 136-143 - [c189]Udaya Kiran Tupakula, Vijay Varadharajan, Abhishek Bichhawat:
Security Architecture for Virtual Machines. ICA3PP (1) 2011: 218-229 - [c188]Udaya Kiran Tupakula, Vijay Varadharajan:
On the design of Virtual machine Intrusion detection system. Integrated Network Management 2011: 682-685 - [c187]Udaya Kiran Tupakula, Vijay Varadharajan:
Security techniques for zero day attacks. IWCMC 2011: 442-447 - [c186]Mohammad Sayad Haghighi, Kamal Mohamedpour, Vijay Varadharajan:
Analysis of packet loss for batch traffic arrivals in IEEE 802.15.4-based networks. LCN 2011: 117-122 - [c185]
- [c184]Udaya Kiran Tupakula, Vijay Varadharajan, Sunil Kumar Vuppala:
Counteracting DDoS attacks in WLAN. SIN 2011: 119-126 - [c183]Sebastian Ries, Sheikh Mahbub Habib, Max Mühlhäuser, Vijay Varadharajan:
CertainLogic: A Logic for Modeling Trust and Uncertainty - (Short Paper). TRUST 2011: 254-261 - [c182]Aarthi Krishna, Vijay Varadharajan:
A Hybrid Trust Model for Authorisation Using Trusted Platforms. TrustCom 2011: 288-295 - [c181]Udaya Kiran Tupakula, Vijay Varadharajan:
TVLAN: Trusted and Virtualised Local Area Networks. TrustCom 2011: 606-612 - [c180]
- 2010
- [j51]Chun Ruan, Vijay Varadharajan:
A graph theoretic approach to authorization delegation and conflict resolution in decentralised systems. Distributed and Parallel Databases 27(1): 1-29 (2010) - [j50]Vijay Varadharajan:
Internet Filtering Issues and Challenges. IEEE Security & Privacy 8(4): 62-65 (2010) - [j49]Ching Lin, Vijay Varadharajan:
MobileTrust: a trust enhanced security architecture for mobile agent systems. Int. J. Inf. Sec. 9(3): 153-178 (2010) - [j48]Junqi Zhang, Vijay Varadharajan:
Wireless sensor network key management survey and taxonomy. J. Network and Computer Applications 33(2): 63-75 (2010) - [c179]Aarthi Nagarajan, Vijay Varadharajan:
Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms. DBSec 2010: 257-272 - [c178]Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Vijay Varadharajan, Abdul Sattar:
A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks. EUC 2010: 484-491 - [c177]Udaya Kiran Tupakula, Vijay Varadharajan:
Detecting Security Attacks in Trusted Virtual Domains. EUC 2010: 529-535 - [c176]Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens:
Analysis of Property Based Attestation in Trusted Platforms. EUC 2010: 833-840 - [c175]Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Vijay Varadharajan, Abdul Sattar:
A trust management architecture for hierarchical wireless sensor networks. LCN 2010: 264-267 - [c174]