BibTeX records: Vijay Varadharajan

download as .bib file

@article{DBLP:journals/tifs/VaradharajanKTH19,
  author    = {Vijay Varadharajan and
               Kallol Krishna Karmakar and
               Udaya Kiran Tupakula and
               Michael Hitchens},
  title     = {A Policy-Based Security Architecture for Software-Defined Networks},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {14},
  number    = {4},
  pages     = {897--912},
  year      = {2019},
  url       = {https://doi.org/10.1109/TIFS.2018.2868220},
  doi       = {10.1109/TIFS.2018.2868220},
  timestamp = {Thu, 08 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/VaradharajanKTH19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/VaradharajanTK18,
  author    = {Vijay Varadharajan and
               Udaya Kiran Tupakula and
               Kallol Krishna Karmakar},
  title     = {Secure Monitoring of Patients With Wandering Behavior in Hospital
               Environments},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {11523--11533},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2017.2773647},
  doi       = {10.1109/ACCESS.2017.2773647},
  timestamp = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/access/VaradharajanTK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/Yousefi-AzarHVC18,
  author    = {Mahmood Yousefi{-}Azar and
               Leonard G. C. Hamey and
               Vijay Varadharajan and
               Shiping Chen},
  title     = {Malytics: {A} Malware Detection Scheme},
  journal   = {{IEEE} Access},
  volume    = {6},
  pages     = {49418--49431},
  year      = {2018},
  url       = {https://doi.org/10.1109/ACCESS.2018.2864871},
  doi       = {10.1109/ACCESS.2018.2864871},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/access/Yousefi-AzarHVC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inis/PalHVR18,
  author    = {Shantanu Pal and
               Michael Hitchens and
               Vijay Varadharajan and
               Tahiry M. Rabehaja},
  title     = {Fine-Grained Access Control for Smart Healthcare Systems in the Internet
               of Things},
  journal   = {{EAI} Endorsed Trans. Indust. Netw. {\&} Intellig. Syst.},
  volume    = {4},
  number    = {13},
  pages     = {e5},
  year      = {2018},
  url       = {https://doi.org/10.4108/eai.20-3-2018.154370},
  doi       = {10.4108/eai.20-3-2018.154370},
  timestamp = {Wed, 18 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/inis/PalHVR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/VaradharajanT18,
  author    = {Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {Securing Services in Networked Cloud Infrastructures},
  journal   = {{IEEE} Trans. Cloud Computing},
  volume    = {6},
  number    = {4},
  pages     = {1149--1163},
  year      = {2018},
  url       = {https://doi.org/10.1109/TCC.2016.2570752},
  doi       = {10.1109/TCC.2016.2570752},
  timestamp = {Sun, 23 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tcc/VaradharajanT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/Yousefi-AzarHVC18,
  author    = {Mahmood Yousefi{-}Azar and
               Len Hamey and
               Vijay Varadharajan and
               Shiping Chen},
  title     = {Learning Latent Byte-Level Feature Representation for Malware Detection},
  booktitle = {Neural Information Processing - 25th International Conference, {ICONIP}
               2018, Siem Reap, Cambodia, December 13-16, 2018, Proceedings, Part
               {IV}},
  pages     = {568--578},
  year      = {2018},
  crossref  = {DBLP:conf/iconip/2018-4},
  url       = {https://doi.org/10.1007/978-3-030-04212-7\_50},
  doi       = {10.1007/978-3-030-04212-7\_50},
  timestamp = {Tue, 04 Dec 2018 09:21:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iconip/Yousefi-AzarHVC18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/PalHVR18,
  author    = {Shantanu Pal and
               Michael Hitchens and
               Vijay Varadharajan and
               Tahiry M. Rabehaja},
  title     = {Policy-Based Access Control for Constrained Healthcare Resources},
  booktitle = {19th {IEEE} International Symposium on "A World of Wireless, Mobile
               and Multimedia Networks", WoWMoM 2018, Chania, Greece, June 12-15,
               2018},
  pages     = {588--599},
  year      = {2018},
  crossref  = {DBLP:conf/wowmom/2018},
  url       = {https://doi.org/10.1109/WoWMoM.2018.8449813},
  doi       = {10.1109/WoWMoM.2018.8449813},
  timestamp = {Wed, 05 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wowmom/PalHVR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-03465,
  author    = {Mahmood Yousefi{-}Azar and
               Len Hamey and
               Vijay Varadharajan and
               Shiping Chen},
  title     = {Malytics: {A} Malware Detection Scheme},
  journal   = {CoRR},
  volume    = {abs/1803.03465},
  year      = {2018},
  url       = {http://arxiv.org/abs/1803.03465},
  archivePrefix = {arXiv},
  eprint    = {1803.03465},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1803-03465},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-02053,
  author    = {Vijay Varadharajan and
               Kallol Krishna Karmakar and
               Udaya Kiran Tupakula and
               Michael Hitchens},
  title     = {A Policy based Security Architecture for Software Defined Networks},
  journal   = {CoRR},
  volume    = {abs/1806.02053},
  year      = {2018},
  url       = {http://arxiv.org/abs/1806.02053},
  archivePrefix = {arXiv},
  eprint    = {1806.02053},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1806-02053},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/MishraPVT17,
  author    = {Preeti Mishra and
               Emmanuel S. Pilli and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {{VAED:} VMI-assisted evasion detection approach for infrastructure
               as a service cloud},
  journal   = {Concurrency and Computation: Practice and Experience},
  volume    = {29},
  number    = {12},
  year      = {2017},
  url       = {https://doi.org/10.1002/cpe.4133},
  doi       = {10.1002/cpe.4133},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/concurrency/MishraPVT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YanDV17,
  author    = {Zheng Yan and
               Robert H. Deng and
               Vijay Varadharajan},
  title     = {Cryptography and Data Security in Cloud Computing},
  journal   = {Inf. Sci.},
  volume    = {387},
  pages     = {53--55},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.ins.2016.12.034},
  doi       = {10.1016/j.ins.2016.12.034},
  timestamp = {Thu, 19 Oct 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isci/YanDV17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/MishraPVT17,
  author    = {Preeti Mishra and
               Emmanuel S. Pilli and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {PSI-NetVisor: Program semantic aware intrusion detection at network
               and hypervisor layer in cloud},
  journal   = {Journal of Intelligent and Fuzzy Systems},
  volume    = {32},
  number    = {4},
  pages     = {2909--2921},
  year      = {2017},
  url       = {https://doi.org/10.3233/JIFS-169234},
  doi       = {10.3233/JIFS-169234},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jifs/MishraPVT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MishraPVT17,
  author    = {Preeti Mishra and
               Emmanuel S. Pilli and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {Intrusion detection techniques in cloud environment: {A} survey},
  journal   = {J. Network and Computer Applications},
  volume    = {77},
  pages     = {18--47},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.jnca.2016.10.015},
  doi       = {10.1016/j.jnca.2016.10.015},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/MishraPVT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/VaradharajanT17,
  author    = {Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {On the Design and Implementation of an Integrated Security Architecture
               for Cloud with Improved Resilience},
  journal   = {{IEEE} Trans. Cloud Computing},
  volume    = {5},
  number    = {3},
  pages     = {375--389},
  year      = {2017},
  url       = {https://doi.org/10.1109/TCC.2016.2535320},
  doi       = {10.1109/TCC.2016.2535320},
  timestamp = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcc/VaradharajanT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GuoMSHWV17,
  author    = {Fuchun Guo and
               Yi Mu and
               Willy Susilo and
               Homer Hsing and
               Duncan S. Wong and
               Vijay Varadharajan},
  title     = {Optimized Identity-Based Encryption from Bilinear Pairing for Lightweight
               Devices},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {14},
  number    = {2},
  pages     = {211--220},
  year      = {2017},
  url       = {https://doi.org/10.1109/TDSC.2015.2445760},
  doi       = {10.1109/TDSC.2015.2445760},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/GuoMSHWV17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/GuoMSV17,
  author    = {Fuchun Guo and
               Yi Mu and
               Willy Susilo and
               Vijay Varadharajan},
  title     = {Privacy-Preserving Mutual Authentication in {RFID} with Designated
               Readers},
  journal   = {Wireless Personal Communications},
  volume    = {96},
  number    = {3},
  pages     = {4819--4845},
  year      = {2017},
  url       = {https://doi.org/10.1007/s11277-017-4430-x},
  doi       = {10.1007/s11277-017-4430-x},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/wpc/GuoMSV17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/JinVT17,
  author    = {Fan Jin and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {A trust model based energy detection for cognitive radio networks},
  booktitle = {Proceedings of the Australasian Computer Science Week Multiconference,
               {ACSW} 2017, Geelong, Australia, January 31 - February 3, 2017},
  pages     = {68:1--68:8},
  year      = {2017},
  crossref  = {DBLP:conf/acsw/2017},
  url       = {https://doi.org/10.1145/3014812.3014882},
  doi       = {10.1145/3014812.3014882},
  timestamp = {Tue, 06 Nov 2018 11:06:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsw/JinVT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/ChengVMS17,
  author    = {Shu Cheng and
               Vijay Varadharajan and
               Yi Mu and
               Willy Susilo},
  title     = {An efficient and provably secure {RFID} grouping proof protocol},
  booktitle = {Proceedings of the Australasian Computer Science Week Multiconference,
               {ACSW} 2017, Geelong, Australia, January 31 - February 3, 2017},
  pages     = {71:1--71:7},
  year      = {2017},
  crossref  = {DBLP:conf/acsw/2017},
  url       = {https://doi.org/10.1145/3014812.3014885},
  doi       = {10.1145/3014812.3014885},
  timestamp = {Tue, 06 Nov 2018 11:06:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsw/ChengVMS17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/Yousefi-AzarHVM17,
  author    = {Mahmood Yousefi{-}Azar and
               Len Hamey and
               Vijay Varadharajan and
               Mark D. McDonnell},
  title     = {Fast, Automatic and Scalable Learning to Detect Android Malware},
  booktitle = {Neural Information Processing - 24th International Conference, {ICONIP}
               2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part {V}},
  pages     = {848--857},
  year      = {2017},
  crossref  = {DBLP:conf/iconip/2017-5},
  url       = {https://doi.org/10.1007/978-3-319-70139-4\_86},
  doi       = {10.1007/978-3-319-70139-4\_86},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iconip/Yousefi-AzarHVM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/Yousefi-AzarVHT17,
  author    = {Mahmood Yousefi{-}Azar and
               Vijay Varadharajan and
               Len Hamey and
               Udaya Kiran Tupakula},
  title     = {Autoencoder-based feature learning for cyber security applications},
  booktitle = {2017 International Joint Conference on Neural Networks, {IJCNN} 2017,
               Anchorage, AK, USA, May 14-19, 2017},
  pages     = {3854--3861},
  year      = {2017},
  crossref  = {DBLP:conf/ijcnn/2017},
  url       = {https://doi.org/10.1109/IJCNN.2017.7966342},
  doi       = {10.1109/IJCNN.2017.7966342},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ijcnn/Yousefi-AzarVHT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/VaradharajanKT17,
  author    = {Vijay Varadharajan and
               Kallol Krishna Karmakar and
               Udaya Kiran Tupakula},
  title     = {Securing communication in multiple Autonomous System domains with
               Software Defined Networking},
  booktitle = {2017 {IFIP/IEEE} Symposium on Integrated Network and Service Management
               (IM), Lisbon, Portugal, May 8-12, 2017},
  pages     = {195--203},
  year      = {2017},
  crossref  = {DBLP:conf/im/2017},
  url       = {https://doi.org/10.23919/INM.2017.7987280},
  doi       = {10.23919/INM.2017.7987280},
  timestamp = {Fri, 28 Jul 2017 08:21:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/im/VaradharajanKT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/PalHV17,
  author    = {Shantanu Pal and
               Michael Hitchens and
               Vijay Varadharajan},
  title     = {Towards a Secure Access Control Architecture for the Internet of Things},
  booktitle = {42nd {IEEE} Conference on Local Computer Networks, {LCN} 2017, Singapore,
               October 9-12, 2017},
  pages     = {219--222},
  year      = {2017},
  crossref  = {DBLP:conf/lcn/2017},
  url       = {https://doi.org/10.1109/LCN.2017.76},
  doi       = {10.1109/LCN.2017.76},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/PalHV17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/PalHVR17,
  author    = {Shantanu Pal and
               Michael Hitchens and
               Vijay Varadharajan and
               Tahiry M. Rabehaja},
  title     = {On Design of {A} Fine-Grained Access Control Architecture for Securing
               IoT-Enabled Smart Healthcare Systems},
  booktitle = {Proceedings of the 14th {EAI} International Conference on Mobile and
               Ubiquitous Systems: Computing, Networking and Services, Melbourne,
               Australia, November 7-10, 2017.},
  pages     = {432--441},
  year      = {2017},
  crossref  = {DBLP:conf/mobiquitous/2017},
  url       = {https://doi.org/10.1145/3144457.3144485},
  doi       = {10.1145/3144457.3144485},
  timestamp = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobiquitous/PalHVR17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sds/KarmakarVT17,
  author    = {Kallol Krishna Karmakar and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {Mitigating attacks in Software Defined Network {(SDN)}},
  booktitle = {2017 Fourth International Conference on Software Defined Systems,
               {SDS} 2017, Valencia, Spain, May 8-11, 2017},
  pages     = {112--117},
  year      = {2017},
  crossref  = {DBLP:conf/sds/2017},
  url       = {https://doi.org/10.1109/SDS.2017.7939150},
  doi       = {10.1109/SDS.2017.7939150},
  timestamp = {Tue, 13 Jun 2017 19:18:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sds/KarmakarVT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JinVT17,
  author    = {Fan Jin and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {An Eclat Algorithm Based Energy Detection for Cognitive Radio Networks},
  booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
               2017},
  pages     = {1096--1102},
  year      = {2017},
  crossref  = {DBLP:conf/trustcom/2017},
  url       = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.358},
  doi       = {10.1109/Trustcom/BigDataSE/ICESS.2017.358},
  timestamp = {Fri, 15 Feb 2019 12:58:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/JinVT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/TupakulaVK17,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan and
               Kallol Krishna Karmakar},
  title     = {SDN-based Dynamic Policy Specification and Enforcement for Provisioning
               SECaaS in Cloud},
  booktitle = {Web Information Systems Engineering - {WISE} 2017 - 18th International
               Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part
               {II}},
  pages     = {550--561},
  year      = {2017},
  crossref  = {DBLP:conf/wise/2017-2},
  url       = {https://doi.org/10.1007/978-3-319-68786-5\_44},
  doi       = {10.1007/978-3-319-68786-5\_44},
  timestamp = {Wed, 14 Mar 2018 16:00:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wise/TupakulaVK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/prdc/2017,
  editor    = {Dong Seong Kim and
               Masato Kitakami and
               Vijay Varadharajan},
  title     = {22nd {IEEE} Pacific Rim International Symposium on Dependable Computing,
               {PRDC} 2017, Christchurch, New Zealand, January 22-25, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7919908},
  isbn      = {978-1-5090-5652-1},
  timestamp = {Fri, 12 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/prdc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhouVG16,
  author    = {Lan Zhou and
               Vijay Varadharajan and
               K. Gopinath},
  title     = {A Secure Role-Based Cloud Storage System For Encrypted Patient-Centric
               Health Records},
  journal   = {Comput. J.},
  volume    = {59},
  number    = {11},
  pages     = {1593--1611},
  year      = {2016},
  url       = {https://doi.org/10.1093/comjnl/bxw019},
  doi       = {10.1093/comjnl/bxw019},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/ZhouVG16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/MinV16,
  author    = {Byungho Min and
               Vijay Varadharajan},
  title     = {Rethinking Software Component Security: Software Component Level Integrity
               and Cross Verification},
  journal   = {Comput. J.},
  volume    = {59},
  number    = {11},
  pages     = {1735--1748},
  year      = {2016},
  url       = {https://doi.org/10.1093/comjnl/bxw047},
  doi       = {10.1093/comjnl/bxw047},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/MinV16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/MinV16,
  author    = {Byungho Min and
               Vijay Varadharajan},
  title     = {A novel malware for subversion of self-protection in anti-virus},
  journal   = {Softw., Pract. Exper.},
  volume    = {46},
  number    = {3},
  pages     = {361--379},
  year      = {2016},
  url       = {https://doi.org/10.1002/spe.2317},
  doi       = {10.1002/spe.2317},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/spe/MinV16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/YiPBV16,
  author    = {Xun Yi and
               Russell Paulet and
               Elisa Bertino and
               Vijay Varadharajan},
  title     = {Practical Approximate k Nearest Neighbor Queries with Location and
               Query Privacy},
  journal   = {{IEEE} Trans. Knowl. Data Eng.},
  volume    = {28},
  number    = {6},
  pages     = {1546--1559},
  year      = {2016},
  url       = {https://doi.org/10.1109/TKDE.2016.2520473},
  doi       = {10.1109/TKDE.2016.2520473},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tkde/YiPBV16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/KarmakarVT16,
  author    = {Kallol Krishna Karmakar and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {On the Design and Implementation of a Security Architecture for Software
               Defined Networks},
  booktitle = {18th {IEEE} International Conference on High Performance Computing
               and Communications; 14th {IEEE} International Conference on Smart
               City; 2nd {IEEE} International Conference on Data Science and Systems,
               HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016},
  pages     = {671--678},
  year      = {2016},
  crossref  = {DBLP:conf/hpcc/2016},
  url       = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0099},
  doi       = {10.1109/HPCC-SmartCity-DSS.2016.0099},
  timestamp = {Thu, 07 Feb 2019 16:03:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hpcc/KarmakarVT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/MishraPVT16,
  author    = {Preeti Mishra and
               Emmanuel S. Pilli and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {Securing Virtual Machines from Anomalies Using Program-Behavior Analysis
               in Cloud Environment},
  booktitle = {18th {IEEE} International Conference on High Performance Computing
               and Communications; 14th {IEEE} International Conference on Smart
               City; 2nd {IEEE} International Conference on Data Science and Systems,
               HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016},
  pages     = {991--998},
  year      = {2016},
  crossref  = {DBLP:conf/hpcc/2016},
  url       = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0141},
  doi       = {10.1109/HPCC-SmartCity-DSS.2016.0141},
  timestamp = {Thu, 07 Feb 2019 16:03:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hpcc/MishraPVT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icacci/MishraPVT16,
  author    = {Preeti Mishra and
               Emmanuel S. Pilli and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {NvCloudIDS: {A} security architecture to detect intrusions at network
               and virtualization layer in cloud environment},
  booktitle = {2016 International Conference on Advances in Computing, Communications
               and Informatics, {ICACCI} 2016, Jaipur, India, September 21-24, 2016},
  pages     = {56--62},
  year      = {2016},
  crossref  = {DBLP:conf/icacci/2016},
  url       = {https://doi.org/10.1109/ICACCI.2016.7732025},
  doi       = {10.1109/ICACCI.2016.7732025},
  timestamp = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icacci/MishraPVT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/KarmakarVT16,
  author    = {Kallol Krishna Karmakar and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {On the Design and Implementation of a Security Architecture for End
               to End Services in Software Defined Networks},
  booktitle = {41st {IEEE} Conference on Local Computer Networks, {LCN} 2016, Dubai,
               United Arab Emirates, November 7-10, 2016},
  pages     = {519--522},
  year      = {2016},
  crossref  = {DBLP:conf/lcn/2016},
  url       = {https://doi.org/10.1109/LCN.2016.82},
  doi       = {10.1109/LCN.2016.82},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/KarmakarVT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/KarmakarVTH16,
  author    = {Kallol Krishna Karmakar and
               Vijay Varadharajan and
               Udaya Kiran Tupakula and
               Michael Hitchens},
  title     = {Policy based security architecture for software defined networks},
  booktitle = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
               Pisa, Italy, April 4-8, 2016},
  pages     = {658--663},
  year      = {2016},
  crossref  = {DBLP:conf/sac/2016},
  url       = {https://doi.org/10.1145/2851613.2851728},
  doi       = {10.1145/2851613.2851728},
  timestamp = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/KarmakarVTH16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/MinV16,
  author    = {Byungho Min and
               Vijay Varadharajan},
  title     = {Cascading attacks against smart grid using control command disaggregation
               and services},
  booktitle = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
               Pisa, Italy, April 4-8, 2016},
  pages     = {2142--2147},
  year      = {2016},
  crossref  = {DBLP:conf/sac/2016},
  url       = {https://doi.org/10.1145/2851613.2853128},
  doi       = {10.1145/2851613.2853128},
  timestamp = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/MinV16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JayarathnaVT16,
  author    = {Dilshan Jayarathna and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {Integrated Security for Services Hosted in Virtual Environments},
  booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
               2016},
  pages     = {82--89},
  year      = {2016},
  crossref  = {DBLP:conf/trustcom/2016},
  url       = {https://doi.org/10.1109/TrustCom.2016.0049},
  doi       = {10.1109/TrustCom.2016.0049},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/JayarathnaVT16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/TupakulaV15,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Trust Enhanced Security for Tenant Transactions in the Cloud Environment},
  journal   = {Comput. J.},
  volume    = {58},
  number    = {10},
  pages     = {2388--2403},
  year      = {2015},
  url       = {https://doi.org/10.1093/comjnl/bxu048},
  doi       = {10.1093/comjnl/bxu048},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/TupakulaV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/VaradharajanT15,
  author    = {Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {Securing wireless mobile nodes from distributed denial-of-service
               attacks},
  journal   = {Concurrency and Computation: Practice and Experience},
  volume    = {27},
  number    = {15},
  pages     = {3794--3815},
  year      = {2015},
  url       = {https://doi.org/10.1002/cpe.3353},
  doi       = {10.1002/cpe.3353},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/concurrency/VaradharajanT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LiMSV15,
  author    = {Nan Li and
               Yi Mu and
               Willy Susilo and
               Vijay Varadharajan},
  title     = {Shared {RFID} ownership transfer protocols},
  journal   = {Computer Standards {\&} Interfaces},
  volume    = {42},
  pages     = {95--104},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.csi.2015.05.003},
  doi       = {10.1016/j.csi.2015.05.003},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/csi/LiMSV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ZhouVH15,
  author    = {Lan Zhou and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Generic constructions for role-based encryption},
  journal   = {Int. J. Inf. Sec.},
  volume    = {14},
  number    = {5},
  pages     = {417--430},
  year      = {2015},
  url       = {https://doi.org/10.1007/s10207-014-0267-4},
  doi       = {10.1007/s10207-014-0267-4},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/ZhouVH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiMSGV15,
  author    = {Nan Li and
               Yi Mu and
               Willy Susilo and
               Fuchun Guo and
               Vijay Varadharajan},
  title     = {Vulnerabilities of an ECC-based {RFID} authentication scheme},
  journal   = {Security and Communication Networks},
  volume    = {8},
  number    = {17},
  pages     = {3262--3270},
  year      = {2015},
  url       = {https://doi.org/10.1002/sec.1250},
  doi       = {10.1002/sec.1250},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/LiMSGV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/HaghighiXVQ15,
  author    = {Mohammad Sayad Haghighi and
               Yang Xiang and
               Vijay Varadharajan and
               Barry G. Quinn},
  title     = {A Stochastic Time-Domain Model for Burst Data Aggregation in {IEEE}
               802.15.4 Wireless Sensor Networks},
  journal   = {{IEEE} Trans. Computers},
  volume    = {64},
  number    = {3},
  pages     = {627--639},
  year      = {2015},
  url       = {https://doi.org/10.1109/TC.2013.2296773},
  doi       = {10.1109/TC.2013.2296773},
  timestamp = {Sun, 11 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tc/HaghighiXVQ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuRWV15,
  author    = {Jia Yu and
               Kui Ren and
               Cong Wang and
               Vijay Varadharajan},
  title     = {Enabling Cloud Storage Auditing With Key-Exposure Resistance},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {10},
  number    = {6},
  pages     = {1167--1179},
  year      = {2015},
  url       = {https://doi.org/10.1109/TIFS.2015.2400425},
  doi       = {10.1109/TIFS.2015.2400425},
  timestamp = {Wed, 06 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/YuRWV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouVH15,
  author    = {Lan Zhou and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Trust Enhanced Cryptographic Role-Based Access Control for Secure
               Cloud Data Storage},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {10},
  number    = {11},
  pages     = {2381--2395},
  year      = {2015},
  url       = {https://doi.org/10.1109/TIFS.2015.2455952},
  doi       = {10.1109/TIFS.2015.2455952},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/ZhouVH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsc/Damavandinejadmonfared15,
  author    = {Sepehr Damavandinejadmonfared and
               Vijay Varadharajan},
  title     = {A New Extension of Kernel Principal Component Analysis for Finger
               Vein Authentication},
  booktitle = {38th Australasian Computer Science Conference, {ACSC} 2015, Sydney,
               Australia, January 2015},
  pages     = {59--63},
  year      = {2015},
  crossref  = {DBLP:conf/acsc/2015},
  url       = {http://crpit.com/abstracts/CRPITV159Damavandinejadmonfared.html},
  timestamp = {Fri, 03 Jul 2015 13:05:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsc/Damavandinejadmonfared15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsc/WijesingheTV15,
  author    = {Udaya Wijesinghe and
               Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {An Enhanced Model for Network Flow Based Botnet Detection},
  booktitle = {38th Australasian Computer Science Conference, {ACSC} 2015, Sydney,
               Australia, January 2015},
  pages     = {101--110},
  year      = {2015},
  crossref  = {DBLP:conf/acsc/2015},
  url       = {http://crpit.com/abstracts/CRPITV159Wijesinghe.html},
  timestamp = {Fri, 03 Jul 2015 13:05:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsc/WijesingheTV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/JayarathnaTV15,
  author    = {Dilshan Jayarathna and
               Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Hypervisor-based Security Architecture to Protect Web Applications},
  booktitle = {13th Australasian Information Security Conference, {AISC} 2015, Sydney,
               Australia, January 2015},
  pages     = {15--24},
  year      = {2015},
  crossref  = {DBLP:conf/auisc/2015},
  url       = {http://crpit.com/abstracts/CRPITV161Jayarathna.html},
  timestamp = {Fri, 03 Jul 2015 13:14:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/auisc/JayarathnaTV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiMSV15,
  author    = {Nan Li and
               Yi Mu and
               Willy Susilo and
               Vijay Varadharajan},
  title     = {Anonymous Yoking-Group Proofs},
  booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
               2015},
  pages     = {615--620},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015asia},
  url       = {https://doi.org/10.1145/2714576.2714609},
  doi       = {10.1145/2714576.2714609},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/LiMSV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/MinV15,
  author    = {Byungho Min and
               Vijay Varadharajan},
  title     = {Secure Dynamic Software Loading and Execution Using Cross Component
               Verification},
  booktitle = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems
               and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015},
  pages     = {113--124},
  year      = {2015},
  crossref  = {DBLP:conf/dsn/2015},
  url       = {https://doi.org/10.1109/DSN.2015.17},
  doi       = {10.1109/DSN.2015.17},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/MinV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/MinV15,
  author    = {Byungho Min and
               Vijay Varadharajan},
  title     = {Design and Evaluation of Feature Distributed Malware Attacks against
               the Internet of Things (IoT)},
  booktitle = {20th International Conference on Engineering of Complex Computer Systems,
               {ICECCS} 2015, Gold Coast, Australia, December 9-12, 2015},
  pages     = {80--89},
  year      = {2015},
  crossref  = {DBLP:conf/iceccs/2015},
  url       = {https://doi.org/10.1109/ICECCS.2015.19},
  doi       = {10.1109/ICECCS.2015.19},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iceccs/MinV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict/WijesingheTV15,
  author    = {Udaya Wijesinghe and
               Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Botnet detection using software defined networking},
  booktitle = {22nd International Conference on Telecommunications, {ICT} 2015, Sydney,
               Australia, April 27-29, 2015},
  pages     = {219--224},
  year      = {2015},
  crossref  = {DBLP:conf/ict/2015},
  url       = {https://doi.org/10.1109/ICT.2015.7124686},
  doi       = {10.1109/ICT.2015.7124686},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ict/WijesingheTV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/FanVH15,
  author    = {Xinyu Fan and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Provenance Based Classification Access Policy System Based on Encrypted
               Search for Cloud Data Storage},
  booktitle = {Information Security - 18th International Conference, {ISC} 2015,
               Trondheim, Norway, September 9-11, 2015, Proceedings},
  pages     = {283--298},
  year      = {2015},
  crossref  = {DBLP:conf/isw/2015},
  url       = {https://doi.org/10.1007/978-3-319-23318-5\_16},
  doi       = {10.1007/978-3-319-23318-5\_16},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/FanVH15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itnac/JinVT15,
  author    = {Fan Jin and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {Improved detection of primary user emulation attacks in cognitive
               radio networks},
  booktitle = {International Telecommunication Networks and Applications Conference,
               {ITNAC} 2015, Sydney, Australia, November 18-20, 2015},
  pages     = {274--279},
  year      = {2015},
  crossref  = {DBLP:conf/itnac/2015},
  url       = {http://doi.ieeecomputersociety.org/10.1109/ATNAC.2015.7366825},
  doi       = {10.1109/ATNAC.2015.7366825},
  timestamp = {Wed, 07 Feb 2018 16:55:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/itnac/JinVT15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/MinV15,
  author    = {Byungho Min and
               Vijay Varadharajan},
  title     = {Design, implementation and evaluation of a novel anti-virus parasitic
               malware},
  booktitle = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing,
               Salamanca, Spain, April 13-17, 2015},
  pages     = {2127--2133},
  year      = {2015},
  crossref  = {DBLP:conf/sac/2015},
  url       = {https://doi.org/10.1145/2695664.2695683},
  doi       = {10.1145/2695664.2695683},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/MinV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GuoMSV14,
  author    = {Fuchun Guo and
               Yi Mu and
               Willy Susilo and
               Vijay Varadharajan},
  title     = {Server-Aided Signature Verification for Lightweight Devices},
  journal   = {Comput. J.},
  volume    = {57},
  number    = {4},
  pages     = {481--493},
  year      = {2014},
  url       = {https://doi.org/10.1093/comjnl/bxt003},
  doi       = {10.1093/comjnl/bxt003},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/GuoMSV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/RuanV14,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {Dynamic delegation framework for role based access control in distributed
               data management systems},
  journal   = {Distributed and Parallel Databases},
  volume    = {32},
  number    = {2},
  pages     = {245--269},
  year      = {2014},
  url       = {https://doi.org/10.1007/s10619-012-7120-4},
  doi       = {10.1007/s10619-012-7120-4},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dpd/RuanV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/NagarajanVT14,
  author    = {Aarthi Nagarajan and
               Vijay Varadharajan and
               Nathan Tarr},
  title     = {Trust enhanced distributed authorisation for web services},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {80},
  number    = {5},
  pages     = {916--934},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.jcss.2014.02.002},
  doi       = {10.1016/j.jcss.2014.02.002},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcss/NagarajanVT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/ZhouVH14,
  author    = {Lan Zhou and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Secure administration of cryptographic role-based access control for
               large-scale cloud storage systems},
  journal   = {J. Comput. Syst. Sci.},
  volume    = {80},
  number    = {8},
  pages     = {1518--1533},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.jcss.2014.04.019},
  doi       = {10.1016/j.jcss.2014.04.019},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jcss/ZhouVH14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/VaradharajanT14,
  author    = {Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {Counteracting security attacks in virtual machines in the cloud using
               property based attestation},
  journal   = {J. Network and Computer Applications},
  volume    = {40},
  pages     = {31--45},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.jnca.2013.08.002},
  doi       = {10.1016/j.jnca.2013.08.002},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/VaradharajanT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/MinVTH14,
  author    = {Byungho Min and
               Vijay Varadharajan and
               Udaya Kiran Tupakula and
               Michael Hitchens},
  title     = {Antivirus security: naked during updates},
  journal   = {Softw., Pract. Exper.},
  volume    = {44},
  number    = {10},
  pages     = {1201--1222},
  year      = {2014},
  url       = {https://doi.org/10.1002/spe.2197},
  doi       = {10.1002/spe.2197},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/spe/MinVTH14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SchulzVS14,
  author    = {Steffen Schulz and
               Vijay Varadharajan and
               Ahmad{-}Reza Sadeghi},
  title     = {The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {9},
  number    = {2},
  pages     = {221--232},
  year      = {2014},
  url       = {https://doi.org/10.1109/TIFS.2013.2289978},
  doi       = {10.1109/TIFS.2013.2289978},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/SchulzVS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/GuoMSWV14,
  author    = {Fuchun Guo and
               Yi Mu and
               Willy Susilo and
               Duncan S. Wong and
               Vijay Varadharajan},
  title     = {{CP-ABE} With Constant-Size Keys for Lightweight Devices},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {9},
  number    = {5},
  pages     = {763--771},
  year      = {2014},
  url       = {https://doi.org/10.1109/TIFS.2014.2309858},
  doi       = {10.1109/TIFS.2014.2309858},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/GuoMSWV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/VaradharajanT14,
  author    = {Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {Security as a Service Model for Cloud Environment},
  journal   = {{IEEE} Trans. Network and Service Management},
  volume    = {11},
  number    = {1},
  pages     = {60--75},
  year      = {2014},
  url       = {https://doi.org/10.1109/TNSM.2014.041614.120394},
  doi       = {10.1109/TNSM.2014.041614.120394},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tnsm/VaradharajanT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aswec/MinV14,
  author    = {Byungho Min and
               Vijay Varadharajan},
  title     = {A New Technique for Counteracting Web Browser Exploits},
  booktitle = {23rd Australian Software Engineering Conference, {ASWEC} 2014, Milsons
               Point, Sydney, NSW, Australia, April 7-10, 2014},
  pages     = {132--141},
  year      = {2014},
  crossref  = {DBLP:conf/aswec/2014},
  url       = {https://doi.org/10.1109/ASWEC.2014.28},
  doi       = {10.1109/ASWEC.2014.28},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aswec/MinV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/auisc/JayarathnaTV14,
  author    = {Dilshan Jayarathna and
               Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Hypervisor-based Security Architecture for Validating {DNS} Services
               (Poster)},
  booktitle = {Twelfth Australasian Information Security Conference, {AISC} 2014,
               Auckland, New Zealand, January 2014},
  pages     = {83--86},
  year      = {2014},
  crossref  = {DBLP:conf/auisc/2014},
  url       = {http://crpit.com/abstracts/CRPITV149Jayarathna.html},
  timestamp = {Fri, 03 Jul 2015 13:12:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/auisc/JayarathnaTV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdcloud/HouKTV14,
  author    = {Xiaofei Hou and
               Ashwin Kumar T. K and
               Johnson P. Thomas and
               Vijay Varadharajan},
  title     = {Dynamic Workload Balancing for Hadoop MapReduce},
  booktitle = {2014 {IEEE} Fourth International Conference on Big Data and Cloud
               Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014},
  pages     = {56--62},
  year      = {2014},
  crossref  = {DBLP:conf/bdcloud/2014},
  url       = {https://doi.org/10.1109/BDCloud.2014.103},
  doi       = {10.1109/BDCloud.2014.103},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/bdcloud/HouKTV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MinV14,
  author    = {Byungho Min and
               Vijay Varadharajan},
  title     = {Feature-Distributed Malware Attack: Risk and Defence},
  booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
               in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
               Part {II}},
  pages     = {457--474},
  year      = {2014},
  crossref  = {DBLP:conf/esorics/2014-2},
  url       = {https://doi.org/10.1007/978-3-319-11212-1\_26},
  doi       = {10.1007/978-3-319-11212-1\_26},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/MinV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosys/KoeberlSSV14,
  author    = {Patrick Koeberl and
               Steffen Schulz and
               Ahmad{-}Reza Sadeghi and
               Vijay Varadharajan},
  title     = {TrustLite: a security architecture for tiny embedded devices},
  booktitle = {Ninth Eurosys Conference 2014, EuroSys 2014, Amsterdam, The Netherlands,
               April 13-16, 2014},
  pages     = {10:1--10:14},
  year      = {2014},
  crossref  = {DBLP:conf/eurosys/2014},
  url       = {https://doi.org/10.1145/2592798.2592824},
  doi       = {10.1145/2592798.2592824},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/eurosys/KoeberlSSV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/TupakulaV14,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Techniques for detecting attacks on critical infrastructure},
  booktitle = {International Conference on Computing, Networking and Communications,
               {ICNC} 2014, Honolulu, HI, USA, February 3-6, 2014},
  pages     = {48--52},
  year      = {2014},
  crossref  = {DBLP:conf/iccnc/2014},
  url       = {https://doi.org/10.1109/ICCNC.2014.6785303},
  doi       = {10.1109/ICCNC.2014.6785303},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iccnc/TupakulaV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/YiPBV14,
  author    = {Xun Yi and
               Russell Paulet and
               Elisa Bertino and
               Vijay Varadharajan},
  title     = {Practical k nearest neighbor queries with location privacy},
  booktitle = {{IEEE} 30th International Conference on Data Engineering, Chicago,
               {ICDE} 2014, IL, USA, March 31 - April 4, 2014},
  pages     = {640--651},
  year      = {2014},
  crossref  = {DBLP:conf/icde/2014},
  url       = {https://doi.org/10.1109/ICDE.2014.6816688},
  doi       = {10.1109/ICDE.2014.6816688},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icde/YiPBV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/MinV14,
  author    = {Byungho Min and
               Vijay Varadharajan},
  title     = {Design and Analysis of Security Attacks against Critical Smart Grid
               Infrastructures},
  booktitle = {2014 19th International Conference on Engineering of Complex Computer
               Systems, Tianjin, China, August 4-7, 2014},
  pages     = {59--68},
  year      = {2014},
  crossref  = {DBLP:conf/iceccs/2014},
  url       = {https://doi.org/10.1109/ICECCS.2014.16},
  doi       = {10.1109/ICECCS.2014.16},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iceccs/MinV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/LiMSGV14,
  author    = {Nan Li and
               Yi Mu and
               Willy Susilo and
               Fuchun Guo and
               Vijay Varadharajan},
  title     = {Privacy-Preserving Authorized {RFID} Authentication Protocols},
  booktitle = {Radio Frequency Identification: Security and Privacy Issues - 10th
               International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014,
               Revised Selected Papers},
  pages     = {108--122},
  year      = {2014},
  crossref  = {DBLP:conf/rfidsec/2014},
  url       = {https://doi.org/10.1007/978-3-319-13066-8\_7},
  doi       = {10.1007/978-3-319-13066-8\_7},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rfidsec/LiMSGV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/TupakulaV14,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Secure monitoring for dementia patients},
  booktitle = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
               Korea - March 24 - 28, 2014},
  pages     = {14--19},
  year      = {2014},
  crossref  = {DBLP:conf/sac/2014},
  url       = {https://doi.org/10.1145/2554850.2554950},
  doi       = {10.1145/2554850.2554950},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/TupakulaV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MinV14,
  author    = {Byungho Min and
               Vijay Varadharajan},
  title     = {A Simple and Novel Technique for Counteracting Exploit Kits},
  booktitle = {International Conference on Security and Privacy in Communication
               Networks - 10th International {ICST} Conference, SecureComm 2014,
               Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
               {I}},
  pages     = {259--277},
  year      = {2014},
  crossref  = {DBLP:conf/securecomm/2014-1},
  url       = {https://doi.org/10.1007/978-3-319-23829-6\_19},
  doi       = {10.1007/978-3-319-23829-6\_19},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/MinV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TupakulaV14,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Trust Enhanced Cloud Security for Healthcare Services},
  booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2014, Beijing, China, September
               24-26, 2014},
  pages     = {344--351},
  year      = {2014},
  crossref  = {DBLP:conf/trustcom/2014},
  url       = {https://doi.org/10.1109/TrustCom.2014.46},
  doi       = {10.1109/TrustCom.2014.46},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/TupakulaV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MinV14,
  author    = {Byungho Min and
               Vijay Varadharajan},
  title     = {Design and Analysis of a New Feature-Distributed Malware},
  booktitle = {13th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2014, Beijing, China, September
               24-26, 2014},
  pages     = {457--464},
  year      = {2014},
  crossref  = {DBLP:conf/trustcom/2014},
  url       = {https://doi.org/10.1109/TrustCom.2014.58},
  doi       = {10.1109/TrustCom.2014.58},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/MinV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhouVH13,
  author    = {Lan Zhou and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Achieving Secure Role-Based Access Control on Encrypted Data in Cloud
               Storage},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {8},
  number    = {12},
  pages     = {1947--1960},
  year      = {2013},
  url       = {https://doi.org/10.1109/TIFS.2013.2286456},
  doi       = {10.1109/TIFS.2013.2286456},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/ZhouVH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GuoMSV13,
  author    = {Fuchun Guo and
               Yi Mu and
               Willy Susilo and
               Vijay Varadharajan},
  title     = {Membership Encryption and Its Applications},
  booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
               2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  pages     = {219--234},
  year      = {2013},
  crossref  = {DBLP:conf/acisp/2013},
  url       = {https://doi.org/10.1007/978-3-642-39059-3\_15},
  doi       = {10.1007/978-3-642-39059-3\_15},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/GuoMSV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/awc/LeeVT13,
  author    = {Alan Lee and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {On Malware Characterization and Attack Classification},
  booktitle = {First Australasian Web Conference, {AWC} 2013, Adelaide, Australia,
               January 2013},
  pages     = {43--48},
  year      = {2013},
  crossref  = {DBLP:conf/awc/2013},
  url       = {http://crpit.com/abstracts/CRPITV144Lee.html},
  timestamp = {Sun, 05 Jul 2015 18:17:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/awc/LeeVT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/VaradharajanT13,
  author    = {Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {On the Security of Tenant Transactions in the Cloud},
  booktitle = {{IEEE} 5th International Conference on Cloud Computing Technology
               and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5,
               2013, Volume 1},
  pages     = {525--530},
  year      = {2013},
  crossref  = {DBLP:conf/cloudcom/2013-1},
  url       = {https://doi.org/10.1109/CloudCom.2013.76},
  doi       = {10.1109/CloudCom.2013.76},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cloudcom/VaradharajanT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/TupakulaV13,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Securing Mobile Devices from DoS Attacks},
  booktitle = {16th {IEEE} International Conference on Computational Science and
               Engineering, {CSE} 2013, December 3-5, 2013, Sydney, Australia},
  pages     = {34--41},
  year      = {2013},
  crossref  = {DBLP:conf/cse/2013},
  url       = {https://doi.org/10.1109/CSE.2013.16},
  doi       = {10.1109/CSE.2013.16},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cse/TupakulaV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euspn/TupakulaV13,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Security Techniques for Counteracting Attacks in Mobile Healthcare
               Services},
  booktitle = {The 4th International Conference on Emerging Ubiquitous Systems and
               Pervasive Networks {(EUSPN-2013)} and the 3rd International Conference
               on Current and Future Trends of Information and Communication Technologies
               in Healthcare (ICTH), Niagara Falls, Ontario, Canada, October 21-24,
               2013},
  pages     = {374--381},
  year      = {2013},
  crossref  = {DBLP:conf/euspn/2013},
  url       = {https://doi.org/10.1016/j.procs.2013.09.049},
  doi       = {10.1016/j.procs.2013.09.049},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/euspn/TupakulaV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/ZhouVH13,
  author    = {Lan Zhou and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic
               Role-Based Access Control},
  booktitle = {E-Business and Telecommunications - International Joint Conference,
               {ICETE} 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected
               Papers},
  pages     = {226--251},
  year      = {2013},
  crossref  = {DBLP:conf/icete/2013},
  url       = {https://doi.org/10.1007/978-3-662-44788-8\_14},
  doi       = {10.1007/978-3-662-44788-8\_14},
  timestamp = {Fri, 02 Nov 2018 09:49:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icete/ZhouVH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiMSV13,
  author    = {Nan Li and
               Yi Mu and
               Willy Susilo and
               Vijay Varadharajan},
  title     = {Secure {RFID} Ownership Transfer Protocols},
  booktitle = {Information Security Practice and Experience - 9th International Conference,
               {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings},
  pages     = {189--203},
  year      = {2013},
  crossref  = {DBLP:conf/ispec/2013},
  url       = {https://doi.org/10.1007/978-3-642-38033-4\_14},
  doi       = {10.1007/978-3-642-38033-4\_14},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/LiMSV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/MinV13,
  author    = {Byungho Min and
               Vijay Varadharajan},
  title     = {Design and Analysis of a Sophisticated Malware Attack Against Smart
               Grid},
  booktitle = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
               Texas, USA, November 13-15, 2013, Proceedings},
  pages     = {130--139},
  year      = {2013},
  crossref  = {DBLP:conf/isw/2013},
  url       = {https://doi.org/10.1007/978-3-319-27659-5\_9},
  doi       = {10.1007/978-3-319-27659-5\_9},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/MinV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/LiMSGV13,
  author    = {Nan Li and
               Yi Mu and
               Willy Susilo and
               Fuchun Guo and
               Vijay Varadharajan},
  title     = {On {RFID} Authentication Protocols with Wide-Strong Privacy},
  booktitle = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop
               Proceedings, Guangzhou, China, November 27, 2013},
  pages     = {3--16},
  year      = {2013},
  crossref  = {DBLP:conf/rfidsec/2013a},
  url       = {https://doi.org/10.3233/978-1-61499-328-5-3},
  doi       = {10.3233/978-1-61499-328-5-3},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rfidsec/LiMSGV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/ChengVMS13,
  author    = {Shu Cheng and
               Vijay Varadharajan and
               Yi Mu and
               Willy Susilo},
  title     = {A Secure Elliptic Curve based {RFID} Ownership Transfer Scheme with
               Controlled Delegation},
  booktitle = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop
               Proceedings, Guangzhou, China, November 27, 2013},
  pages     = {31--43},
  year      = {2013},
  crossref  = {DBLP:conf/rfidsec/2013a},
  url       = {https://doi.org/10.3233/978-1-61499-328-5-31},
  doi       = {10.3233/978-1-61499-328-5-31},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rfidsec/ChengVMS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/HabibVM13,
  author    = {Sheikh Mahbub Habib and
               Vijay Varadharajan and
               Max M{\"{u}}hlh{\"{a}}user},
  title     = {A framework for evaluating trust of service providers in cloud marketplaces},
  booktitle = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
               {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  pages     = {1963--1965},
  year      = {2013},
  crossref  = {DBLP:conf/sac/2013},
  url       = {https://doi.org/10.1145/2480362.2480727},
  doi       = {10.1145/2480362.2480727},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/HabibVM13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZhouVH13,
  author    = {Lan Zhou and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Trust-based Secure Cloud Data Storage with Cryptographic Role-based
               Access Control},
  booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  pages     = {62--73},
  year      = {2013},
  crossref  = {DBLP:conf/secrypt/2013},
  url       = {http://ieeexplore.ieee.org/document/7223156/},
  timestamp = {Sun, 30 Apr 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/ZhouVH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/VaradharajanT13,
  author    = {Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {Integrated Security Architecture for Virtual Machines},
  booktitle = {Security and Privacy in Communication Networks - 9th International
               {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
               25-28, 2013, Revised Selected Papers},
  pages     = {140--153},
  year      = {2013},
  crossref  = {DBLP:conf/securecomm/2013},
  url       = {https://doi.org/10.1007/978-3-319-04283-1\_9},
  doi       = {10.1007/978-3-319-04283-1\_9},
  timestamp = {Mon, 05 Jun 2017 12:43:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/VaradharajanT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/HabibVM13,
  author    = {Sheikh Mahbub Habib and
               Vijay Varadharajan and
               Max M{\"{u}}hlh{\"{a}}user},
  title     = {A Trust-Aware Framework for Evaluating Security Controls of Service
               Providers in Cloud Marketplaces},
  booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
               Symposium on Parallel and Distributed Processing with Applications,
               {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
               and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages     = {459--468},
  year      = {2013},
  crossref  = {DBLP:conf/trustcom/2013},
  url       = {https://doi.org/10.1109/TrustCom.2013.58},
  doi       = {10.1109/TrustCom.2013.58},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/HabibVM13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KrishnaVT13,
  author    = {Aarthi Krishna and
               Vijay Varadharajan and
               Nathan Tarr},
  title     = {On the Design of a Trust Enhanced Distributed Authorisation Architecture
               for Service Oriented Architectures},
  booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
               Symposium on Parallel and Distributed Processing with Applications,
               {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
               and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages     = {517--524},
  year      = {2013},
  crossref  = {DBLP:conf/trustcom/2013},
  url       = {https://doi.org/10.1109/TrustCom.2013.246},
  doi       = {10.1109/TrustCom.2013.246},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/KrishnaVT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TupakulaV13,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Trust Enhanced Security Architecture for Detecting Insider Threats},
  booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
               Symposium on Parallel and Distributed Processing with Applications,
               {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
               and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages     = {552--559},
  year      = {2013},
  crossref  = {DBLP:conf/trustcom/2013},
  url       = {https://doi.org/10.1109/TrustCom.2013.8},
  doi       = {10.1109/TrustCom.2013.8},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/TupakulaV13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouVH13,
  author    = {Lan Zhou and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Integrating Trust with Cryptographic Role-Based Access Control for
               Secure Cloud Data Storage},
  booktitle = {12th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
               Symposium on Parallel and Distributed Processing with Applications,
               {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
               and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  pages     = {560--569},
  year      = {2013},
  crossref  = {DBLP:conf/trustcom/2013},
  url       = {https://doi.org/10.1109/TrustCom.2013.69},
  doi       = {10.1109/TrustCom.2013.69},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/ZhouVH13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2013,
  editor    = {Tanveer A. Zia and
               Albert Y. Zomaya and
               Vijay Varadharajan and
               Zhuoqing Morley Mao},
  title     = {Security and Privacy in Communication Networks - 9th International
               {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
               25-28, 2013, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {127},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-04283-1},
  doi       = {10.1007/978-3-319-04283-1},
  isbn      = {978-3-319-04282-4},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/TupakulaV12,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Dynamic State-Based Security Architecture for Detecting Security Attacks
               in Virtual Machines},
  journal   = {Comput. J.},
  volume    = {55},
  number    = {4},
  pages     = {397--409},
  year      = {2012},
  url       = {https://doi.org/10.1093/comjnl/bxr084},
  doi       = {10.1093/comjnl/bxr084},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/TupakulaV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcc/ZhouVH12,
  author    = {Lan Zhou and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {A flexible cryptographic approach for secure data storage in the cloud
               using role-based access control},
  journal   = {{IJCC}},
  volume    = {1},
  number    = {2/3},
  pages     = {201--220},
  year      = {2012},
  url       = {https://doi.org/10.1504/IJCC.2012.046720},
  doi       = {10.1504/IJCC.2012.046720},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijcc/ZhouVH12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apweb/Varadharajan12,
  author    = {Vijay Varadharajan},
  title     = {Security and Trust in the Web},
  booktitle = {Web Technologies and Applications - 14th Asia-Pacific Web Conference,
               APWeb 2012, Kunming, China, April 11-13, 2012. Proceedings},
  pages     = {20--21},
  year      = {2012},
  crossref  = {DBLP:conf/apweb/2012},
  url       = {https://doi.org/10.1007/978-3-642-29253-8\_2},
  doi       = {10.1007/978-3-642-29253-8\_2},
  timestamp = {Thu, 01 Jun 2017 18:58:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/apweb/Varadharajan12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SadeghiSV12,
  author    = {Ahmad{-}Reza Sadeghi and
               Steffen Schulz and
               Vijay Varadharajan},
  title     = {The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs},
  booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
               in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  pages     = {253--270},
  year      = {2012},
  crossref  = {DBLP:conf/esorics/2012},
  url       = {https://doi.org/10.1007/978-3-642-33167-1\_15},
  doi       = {10.1007/978-3-642-33167-1\_15},
  timestamp = {Fri, 02 Jun 2017 20:48:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/SadeghiSV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hipc/TupakulaVD12,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan and
               Dipankar Dutta},
  title     = {Intrusion detection techniques for virtual domains},
  booktitle = {19th International Conference on High Performance Computing, HiPC
               2012, Pune, India, December 18-22, 2012},
  pages     = {1--9},
  year      = {2012},
  crossref  = {DBLP:conf/hipc/2012},
  url       = {https://doi.org/10.1109/HiPC.2012.6507491},
  doi       = {10.1109/HiPC.2012.6507491},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hipc/TupakulaVD12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GuoMSV12,
  author    = {Fuchun Guo and
               Yi Mu and
               Willy Susilo and
               Vijay Varadharajan},
  title     = {A Pre-computable Signature Scheme with Efficient Verification for
               {RFID}},
  booktitle = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  pages     = {1--16},
  year      = {2012},
  crossref  = {DBLP:conf/ispec/2012},
  url       = {https://doi.org/10.1007/978-3-642-29101-2\_1},
  doi       = {10.1007/978-3-642-29101-2\_1},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/GuoMSV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/TupakulaV12,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Distributed service control technique for detecting security attacks},
  booktitle = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012,
               Maui, HI, USA, April 16-20, 2012},
  pages     = {574--577},
  year      = {2012},
  crossref  = {DBLP:conf/noms/2012},
  url       = {https://doi.org/10.1109/NOMS.2012.6211959},
  doi       = {10.1109/NOMS.2012.6211959},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/noms/TupakulaV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/VaradharajanT12,
  author    = {Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {{TREASURE:} Trust Enhanced Security for Cloud Environments},
  booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2012, Liverpool, United
               Kingdom, June 25-27, 2012},
  pages     = {145--152},
  year      = {2012},
  crossref  = {DBLP:conf/trustcom/2012},
  url       = {https://doi.org/10.1109/TrustCom.2012.283},
  doi       = {10.1109/TrustCom.2012.283},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/VaradharajanT12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhaoHQVW12,
  author    = {Huawei Zhao and
               Jiankun Hu and
               Jing Qin and
               Vijay Varadharajan and
               Haishan Wan},
  title     = {Hashed Random Key Pre-distribution Scheme for Large Heterogeneous
               Sensor Networks},
  booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2012, Liverpool, United
               Kingdom, June 25-27, 2012},
  pages     = {706--713},
  year      = {2012},
  crossref  = {DBLP:conf/trustcom/2012},
  url       = {https://doi.org/10.1109/TrustCom.2012.171},
  doi       = {10.1109/TrustCom.2012.171},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/ZhaoHQVW12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouVH12,
  author    = {Lan Zhou and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Trusted Administration of Large-Scale Cryptographic Role-Based Access
               Control Systems},
  booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2012, Liverpool, United
               Kingdom, June 25-27, 2012},
  pages     = {714--721},
  year      = {2012},
  crossref  = {DBLP:conf/trustcom/2012},
  url       = {https://doi.org/10.1109/TrustCom.2012.285},
  doi       = {10.1109/TrustCom.2012.285},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/ZhouVH12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/SchulzSZMXV12,
  author    = {Steffen Schulz and
               Ahmad{-}Reza Sadeghi and
               Maria Zhdanova and
               Hossen A. Mustafa and
               Wenyuan Xu and
               Vijay Varadharajan},
  title     = {Tetherway: a framework for tethering camouflage},
  booktitle = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
               in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
               16-18, 2012},
  pages     = {149--160},
  year      = {2012},
  crossref  = {DBLP:conf/wisec/2012},
  url       = {https://doi.org/10.1145/2185448.2185468},
  doi       = {10.1145/2185448.2185468},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/SchulzSZMXV12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhouVH11,
  author    = {Lan Zhou and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Enforcing Role-Based Access Control for Secure Data Storage in the
               Cloud},
  journal   = {Comput. J.},
  volume    = {54},
  number    = {10},
  pages     = {1675--1687},
  year      = {2011},
  url       = {https://doi.org/10.1093/comjnl/bxr080},
  doi       = {10.1093/comjnl/bxr080},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cj/ZhouVH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/NagarajanV11,
  author    = {Aarthi Nagarajan and
               Vijay Varadharajan},
  title     = {Dynamic trust enhanced security model for trusted platform based services},
  journal   = {Future Generation Comp. Syst.},
  volume    = {27},
  number    = {5},
  pages     = {564--573},
  year      = {2011},
  url       = {https://doi.org/10.1016/j.future.2010.10.008},
  doi       = {10.1016/j.future.2010.10.008},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fgcs/NagarajanV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HaghighiMVQ11,
  author    = {Mohammad Sayad Haghighi and
               Kamal Mohamedpour and
               Vijay Varadharajan and
               Barry G. Quinn},
  title     = {Stochastic Modeling of Hello Flooding in Slotted {CSMA/CA} Wireless
               Sensor Networks},
  journal   = {{IEEE} Trans. Information Forensics and Security},
  volume    = {6},
  number    = {4},
  pages     = {1185--1199},
  year      = {2011},
  url       = {https://doi.org/10.1109/TIFS.2011.2163306},
  doi       = {10.1109/TIFS.2011.2163306},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tifs/HaghighiMVQ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apsec/UlucenkVBT11,
  author    = {Caglar Ulucenk and
               Vijay Varadharajan and
               Venkatesan Balakrishnan and
               Udaya Kiran Tupakula},
  title     = {Techniques for Analysing {PDF} Malware},
  booktitle = {18th Asia Pacific Software Engineering Conference, {APSEC} 2011, Ho
               Chi Minh, Vietnam, December 5-8, 2011},
  pages     = {41--48},
  year      = {2011},
  crossref  = {DBLP:conf/apsec/2011},
  url       = {https://doi.org/10.1109/APSEC.2011.41},
  doi       = {10.1109/APSEC.2011.41},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/apsec/UlucenkVBT11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/TupakulaVA11,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan and
               Naveen Akku},
  title     = {Intrusion Detection Techniques for Infrastructure as a Service Cloud},
  booktitle = {{IEEE} Ninth International Conference on Dependable, Autonomic and
               Secure Computing, {DASC} 2011, 12-14 December 2011, Sydney, Australia},
  pages     = {744--751},
  year      = {2011},
  crossref  = {DBLP:conf/dasc/2011},
  url       = {https://doi.org/10.1109/DASC.2011.128},
  doi       = {10.1109/DASC.2011.128},
  timestamp = {Mon, 22 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dasc/TupakulaVA11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasfaa/RuanV11,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {Reasoning about Dynamic Delegation in Role Based Access Control Systems},
  booktitle = {Database Systems for Advanced Applications - 16th International Conference,
               {DASFAA} 2011, Hong Kong, China, April 22-25, 2011, Proceedings, Part
               {I}},
  pages     = {239--253},
  year      = {2011},
  crossref  = {DBLP:conf/dasfaa/2011-1},
  url       = {https://doi.org/10.1007/978-3-642-20149-3\_19},
  doi       = {10.1007/978-3-642-20149-3\_19},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dasfaa/RuanV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/TupakulaVV11,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan and
               Sunil Kumar Vuppala},
  title     = {Security Techniques for Beyond 3G Wireless Mobile Networks},
  booktitle = {{IEEE/IFIP} 9th International Conference on Embedded and Ubiquitous
               Computing, {EUC} 2011, Melbourne, Australia, October 24-26, 2011},
  pages     = {136--143},
  year      = {2011},
  crossref  = {DBLP:conf/euc/2011},
  url       = {https://doi.org/10.1109/EUC.2011.64},
  doi       = {10.1109/EUC.2011.64},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/euc/TupakulaVV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/TupakulaVB11,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan and
               Abhishek Bichhawat},
  title     = {Security Architecture for Virtual Machines},
  booktitle = {Algorithms and Architectures for Parallel Processing - 11th International
               Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings,
               Part {I}},
  pages     = {218--229},
  year      = {2011},
  crossref  = {DBLP:conf/ica3pp/2011-1},
  url       = {https://doi.org/10.1007/978-3-642-24650-0\_19},
  doi       = {10.1007/978-3-642-24650-0\_19},
  timestamp = {Sun, 11 Mar 2018 01:37:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ica3pp/TupakulaVB11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/TupakulaV11,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {On the design of Virtual machine Intrusion detection system},
  booktitle = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated
               Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011},
  pages     = {682--685},
  year      = {2011},
  crossref  = {DBLP:conf/im/2011},
  url       = {https://doi.org/10.1109/INM.2011.5990655},
  doi       = {10.1109/INM.2011.5990655},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/im/TupakulaV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/TupakulaV11,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Security techniques for zero day attacks},
  booktitle = {Proceedings of the 7th International Wireless Communications and Mobile
               Computing Conference, {IWCMC} 2011, Istanbul, Turkey, 4-8 July, 2011},
  pages     = {442--447},
  year      = {2011},
  crossref  = {DBLP:conf/iwcmc/2011},
  url       = {https://doi.org/10.1109/IWCMC.2011.5982574},
  doi       = {10.1109/IWCMC.2011.5982574},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwcmc/TupakulaV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/HaghighiMV11,
  author    = {Mohammad Sayad Haghighi and
               Kamal Mohamedpour and
               Vijay Varadharajan},
  title     = {Analysis of packet loss for batch traffic arrivals in {IEEE} 802.15.4-based
               networks},
  booktitle = {{IEEE} 36th Conference on Local Computer Networks, {LCN} 2011, Bonn,
               Germany, October 4-7, 2011},
  pages     = {117--122},
  year      = {2011},
  crossref  = {DBLP:conf/lcn/2011},
  url       = {https://doi.org/10.1109/LCN.2011.6115166},
  doi       = {10.1109/LCN.2011.6115166},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/HaghighiMV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Varadharajan11,
  author    = {Vijay Varadharajan},
  title     = {Rethinking cyber security},
  booktitle = {Proceedings of the 4th International Conference on Security of Information
               and Networks, {SIN} 2011, Sydney, NSW, Australia, November 14-19,
               2011},
  pages     = {3--4},
  year      = {2011},
  crossref  = {DBLP:conf/sin/2011},
  url       = {https://doi.org/10.1145/2070425.2070428},
  doi       = {10.1145/2070425.2070428},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sin/Varadharajan11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/TupakulaVV11,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan and
               Sunil Kumar Vuppala},
  title     = {Counteracting DDoS attacks in {WLAN}},
  booktitle = {Proceedings of the 4th International Conference on Security of Information
               and Networks, {SIN} 2011, Sydney, NSW, Australia, November 14-19,
               2011},
  pages     = {119--126},
  year      = {2011},
  crossref  = {DBLP:conf/sin/2011},
  url       = {https://doi.org/10.1145/2070425.2070445},
  doi       = {10.1145/2070425.2070445},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sin/TupakulaVV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/RiesHMV11,
  author    = {Sebastian Ries and
               Sheikh Mahbub Habib and
               Max M{\"{u}}hlh{\"{a}}user and
               Vijay Varadharajan},
  title     = {CertainLogic: {A} Logic for Modeling Trust and Uncertainty - (Short
               Paper)},
  booktitle = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
               2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  pages     = {254--261},
  year      = {2011},
  crossref  = {DBLP:conf/trust/2011},
  url       = {https://doi.org/10.1007/978-3-642-21599-5\_19},
  doi       = {10.1007/978-3-642-21599-5\_19},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/RiesHMV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KrishnaV11,
  author    = {Aarthi Krishna and
               Vijay Varadharajan},
  title     = {A Hybrid Trust Model for Authorisation Using Trusted Platforms},
  booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
               November, 2011},
  pages     = {288--295},
  year      = {2011},
  crossref  = {DBLP:conf/trustcom/2011},
  url       = {https://doi.org/10.1109/TrustCom.2011.39},
  doi       = {10.1109/TrustCom.2011.39},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/KrishnaV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TupakulaV11,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {{TVLAN:} Trusted and Virtualised Local Area Networks},
  booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
               November, 2011},
  pages     = {606--612},
  year      = {2011},
  crossref  = {DBLP:conf/trustcom/2011},
  url       = {https://doi.org/10.1109/TrustCom.2011.78},
  doi       = {10.1109/TrustCom.2011.78},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/TupakulaV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ucc/TupakulaV11,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {{TVDSEC:} Trusted Virtual Domain Security},
  booktitle = {{IEEE} 4th International Conference on Utility and Cloud Computing,
               {UCC} 2011, Melbourne, Australia, December 5-8, 2011},
  pages     = {57--64},
  year      = {2011},
  crossref  = {DBLP:conf/ucc/2011},
  url       = {https://doi.org/10.1109/UCC.2011.18},
  doi       = {10.1109/UCC.2011.18},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ucc/TupakulaV11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/RuanV10,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {A graph theoretic approach to authorization delegation and conflict
               resolution in decentralised systems},
  journal   = {Distributed and Parallel Databases},
  volume    = {27},
  number    = {1},
  pages     = {1--29},
  year      = {2010},
  url       = {https://doi.org/10.1007/s10619-009-7044-9},
  doi       = {10.1007/s10619-009-7044-9},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dpd/RuanV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Varadharajan10,
  author    = {Vijay Varadharajan},
  title     = {Internet Filtering Issues and Challenges},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {8},
  number    = {4},
  pages     = {62--65},
  year      = {2010},
  url       = {https://doi.org/10.1109/MSP.2010.131},
  doi       = {10.1109/MSP.2010.131},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/Varadharajan10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/LinV10,
  author    = {Ching Lin and
               Vijay Varadharajan},
  title     = {MobileTrust: a trust enhanced security architecture for mobile agent
               systems},
  journal   = {Int. J. Inf. Sec.},
  volume    = {9},
  number    = {3},
  pages     = {153--178},
  year      = {2010},
  url       = {https://doi.org/10.1007/s10207-009-0098-x},
  doi       = {10.1007/s10207-009-0098-x},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/LinV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhangV10,
  author    = {Junqi Zhang and
               Vijay Varadharajan},
  title     = {Wireless sensor network key management survey and taxonomy},
  journal   = {J. Network and Computer Applications},
  volume    = {33},
  number    = {2},
  pages     = {63--75},
  year      = {2010},
  url       = {https://doi.org/10.1016/j.jnca.2009.10.001},
  doi       = {10.1016/j.jnca.2009.10.001},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnca/ZhangV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/NagarajanV10,
  author    = {Aarthi Nagarajan and
               Vijay Varadharajan},
  title     = {Modelling Dynamic Trust with Property Based Attestation in Trusted
               Platforms},
  booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
               {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  pages     = {257--272},
  year      = {2010},
  crossref  = {DBLP:conf/dbsec/2010},
  url       = {https://doi.org/10.1007/978-3-642-13739-6\_17},
  doi       = {10.1007/978-3-642-13739-6\_17},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/NagarajanV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ZhangSOVS10,
  author    = {Junqi Zhang and
               Rajan Shankaran and
               Mehmet A. Orgun and
               Vijay Varadharajan and
               Abdul Sattar},
  title     = {A Dynamic Trust Establishment and Management Framework for Wireless
               Sensor Networks},
  booktitle = {{IEEE/IFIP} 8th International Conference on Embedded and Ubiquitous
               Computing, {EUC} 2010, Hong Kong, China, 11-13 December 2010},
  pages     = {484--491},
  year      = {2010},
  crossref  = {DBLP:conf/euc/2010},
  url       = {https://doi.org/10.1109/EUC.2010.80},
  doi       = {10.1109/EUC.2010.80},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/euc/ZhangSOVS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/TupakulaV10,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Detecting Security Attacks in Trusted Virtual Domains},
  booktitle = {{IEEE/IFIP} 8th International Conference on Embedded and Ubiquitous
               Computing, {EUC} 2010, Hong Kong, China, 11-13 December 2010},
  pages     = {529--535},
  year      = {2010},
  crossref  = {DBLP:conf/euc/2010},
  url       = {https://doi.org/10.1109/EUC.2010.87},
  doi       = {10.1109/EUC.2010.87},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/euc/TupakulaV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/NagarajanVH10,
  author    = {Aarthi Nagarajan and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Analysis of Property Based Attestation in Trusted Platforms},
  booktitle = {{IEEE/IFIP} 8th International Conference on Embedded and Ubiquitous
               Computing, {EUC} 2010, Hong Kong, China, 11-13 December 2010},
  pages     = {833--840},
  year      = {2010},
  crossref  = {DBLP:conf/euc/2010},
  url       = {https://doi.org/10.1109/EUC.2010.136},
  doi       = {10.1109/EUC.2010.136},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/euc/NagarajanVH10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ZhangSOVS10,
  author    = {Junqi Zhang and
               Rajan Shankaran and
               Mehmet A. Orgun and
               Vijay Varadharajan and
               Abdul Sattar},
  title     = {A trust management architecture for hierarchical wireless sensor networks},
  booktitle = {The 35th Annual {IEEE} Conference on Local Computer Networks, {LCN}
               2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings},
  pages     = {264--267},
  year      = {2010},
  crossref  = {DBLP:conf/lcn/2010},
  url       = {https://doi.org/10.1109/LCN.2010.5735718},
  doi       = {10.1109/LCN.2010.5735718},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/ZhangSOVS10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/ZhangSOSV10,
  author    = {Junqi Zhang and
               Rajan Shankaran and
               Mehmet A. Orgun and
               Abdul Sattar and
               Vijay Varadharajan},
  title     = {A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks},
  booktitle = {Mobile and Ubiquitous Systems: Computing, Networking, and Services
               - 7th International {ICST} Conference, MobiQuitous 2010, Sydney, Australia,
               December 6-9, 2010, Revised Selected Papers},
  pages     = {186--197},
  year      = {2010},
  crossref  = {DBLP:conf/mobiquitous/2010},
  url       = {https://doi.org/10.1007/978-3-642-29154-8\_16},
  doi       = {10.1007/978-3-642-29154-8\_16},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobiquitous/ZhangSOSV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/WangSV10,
  author    = {Hua Wang and
               Lili Sun and
               Vijay Varadharajan},
  title     = {Purpose-Based Access Control Policies and Conflicting Analysis},
  booktitle = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
               International Information Security Conference, {SEC} 2010, Held as
               Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  pages     = {217--228},
  year      = {2010},
  crossref  = {DBLP:conf/sec/2010},
  url       = {https://doi.org/10.1007/978-3-642-15257-3\_20},
  doi       = {10.1007/978-3-642-15257-3\_20},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/WangSV10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sutc/HaghighiMVM10,
  author    = {Mohammad Sayad Haghighi and
               Kamal Mohamedpour and
               Vijay Varadharajan and
               Alireza Mohammadi{-}Nodooshan},
  title     = {Overhearing Gain Analysis in Low-Traffic {CDMA} Wireless Sensor Networks},
  booktitle = {{IEEE} International Conference on Sensor Networks, Ubiquitous, and
               Trustworthy Computing, {SUTC} 2010 and {IEEE} International Workshop
               on Ubiquitous and Mobile Computing, {UMC} 2010, 7-9 June 2010, Newport
               Beach, California, {USA}},
  pages     = {89--94},
  year      = {2010},
  crossref  = {DBLP:conf/sutc/2010},
  url       = {https://doi.org/10.1109/SUTC.2010.18},
  doi       = {10.1109/SUTC.2010.18},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sutc/HaghighiMVM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2010,
  editor    = {Kai Rannenberg and
               Vijay Varadharajan and
               Christian Weber},
  title     = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
               International Information Security Conference, {SEC} 2010, Held as
               Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {330},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15257-3},
  doi       = {10.1007/978-3-642-15257-3},
  isbn      = {978-3-642-15256-6},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sin/2010,
  editor    = {Oleg B. Makarevich and
               Atilla El{\c{c}}i and
               Mehmet A. Orgun and
               Sorin A. Huss and
               Ludmila K. Babenko and
               Alexander G. Chefranov and
               Vijay Varadharajan},
  title     = {Proceedings of the 3rd International Conference on Security of Information
               and Networks, {SIN} 2010, Rostov-on-Don, Russian Federation, September
               7-11, 2010},
  publisher = {{ACM}},
  year      = {2010},
  isbn      = {978-1-4503-0234-0},
  timestamp = {Wed, 26 Jan 2011 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sin/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Varadharajan09,
  author    = {Vijay Varadharajan},
  title     = {A Note on Trust-Enhanced Security},
  journal   = {{IEEE} Security {\&} Privacy},
  volume    = {7},
  number    = {3},
  pages     = {57--59},
  year      = {2009},
  url       = {https://doi.org/10.1109/MSP.2009.59},
  doi       = {10.1109/MSP.2009.59},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ieeesp/Varadharajan09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soca/WangLWV09,
  author    = {Yan Wang and
               Kwei{-}Jay Lin and
               Duncan S. Wong and
               Vijay Varadharajan},
  title     = {Trust management towards service-oriented applications},
  journal   = {Service Oriented Computing and Applications},
  volume    = {3},
  number    = {2},
  pages     = {129--146},
  year      = {2009},
  url       = {https://doi.org/10.1007/s11761-008-0035-2},
  doi       = {10.1007/s11761-008-0035-2},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/soca/WangLWV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/NagarajanVH09,
  author    = {Aarthi Nagarajan and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {{ALOPA:} Authorization Logic for Property Attestation in Trusted Platforms},
  booktitle = {Autonomic and Trusted Computing, 6th International Conference, {ATC}
               2009, Brisbane, Australia, July 7-9, 2009, Proceedings},
  pages     = {134--148},
  year      = {2009},
  crossref  = {DBLP:conf/atc/2009},
  url       = {https://doi.org/10.1007/978-3-642-02704-8\_11},
  doi       = {10.1007/978-3-642-02704-8\_11},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/atc/NagarajanVH09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/LiWV09,
  author    = {Lei Li and
               Yan Wang and
               Vijay Varadharajan},
  title     = {Fuzzy Regression Based Trust Prediction in Service-Oriented Applications},
  booktitle = {Autonomic and Trusted Computing, 6th International Conference, {ATC}
               2009, Brisbane, Australia, July 7-9, 2009, Proceedings},
  pages     = {221--235},
  year      = {2009},
  crossref  = {DBLP:conf/atc/2009},
  url       = {https://doi.org/10.1007/978-3-642-02704-8\_17},
  doi       = {10.1007/978-3-642-02704-8\_17},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/atc/LiWV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/GanHDV09,
  author    = {Zaobin Gan and
               Juxia He and
               Qian Ding and
               Vijay Varadharajan},
  title     = {Trust Relationship Modelling in E-commerce-Based Social Network},
  booktitle = {2009 International Conference on Computational Intelligence and Security,
               {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
               Papers},
  pages     = {206--210},
  year      = {2009},
  crossref  = {DBLP:conf/cis/2009-1},
  url       = {https://doi.org/10.1109/CIS.2009.184},
  doi       = {10.1109/CIS.2009.184},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cis/GanHDV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/ShankaranVOH09,
  author    = {Rajan Shankaran and
               Vijay Varadharajan and
               Mehmet A. Orgun and
               Michael Hitchens},
  title     = {Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks},
  booktitle = {Proceedings of the 33rd Annual {IEEE} International Computer Software
               and Applications Conference, {COMPSAC} 2009, Seattle, Washington,
               USA, July 20-24, 2009. Volume 2},
  pages     = {188--193},
  year      = {2009},
  crossref  = {DBLP:conf/compsac/2009-2},
  url       = {https://doi.org/10.1109/COMPSAC.2009.132},
  doi       = {10.1109/COMPSAC.2009.132},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/compsac/ShankaranVOH09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/RuanV09,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {Reasoning on Weighted Delegatable Authorizations},
  booktitle = {Database and Expert Systems Applications, 20th International Conference,
               {DEXA} 2009, Linz, Austria, August 31 - September 4, 2009. Proceedings},
  pages     = {279--286},
  year      = {2009},
  crossref  = {DBLP:conf/dexa/2009},
  url       = {https://doi.org/10.1007/978-3-642-03573-9\_23},
  doi       = {10.1007/978-3-642-03573-9\_23},
  timestamp = {Wed, 24 Jan 2018 12:46:36 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dexa/RuanV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/RuanV09,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {Trust Enhanced Authorization for Mobile Agents},
  booktitle = {E-Commerce and Web Technologies, 10th International Conference, EC-Web
               2009, Linz, Austria, September 1-4, 2009. Proceedings},
  pages     = {84--95},
  year      = {2009},
  crossref  = {DBLP:conf/ecweb/2009},
  url       = {https://doi.org/10.1007/978-3-642-03964-5\_9},
  doi       = {10.1007/978-3-642-03964-5\_9},
  timestamp = {Tue, 23 May 2017 01:06:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecweb/RuanV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/TupakulaVV09,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan and
               Sunil Kumar Vuppala},
  title     = {{SBAC:} Service Based Access Control},
  booktitle = {14th {IEEE} International Conference on Engineering of Complex Computer
               Systems, {ICECCS} 2009, Potsdam, Germany, 2-4 June 2009},
  pages     = {202--209},
  year      = {2009},
  crossref  = {DBLP:conf/iceccs/2009},
  url       = {https://doi.org/10.1109/ICECCS.2009.43},
  doi       = {10.1109/ICECCS.2009.43},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iceccs/TupakulaVV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/ShankaranVOH09,
  author    = {Rajan Shankaran and
               Vijay Varadharajan and
               Mehmet A. Orgun and
               Michael Hitchens},
  title     = {Critical Issues in Trust Management for Mobile Ad-Hoc Networks},
  booktitle = {Proceedings of the {IEEE} International Conference on Information
               Reuse and Integration, {IRI} 2009, 10-12 August 2009, Las Vegas, Nevada,
               {USA}},
  pages     = {97--100},
  year      = {2009},
  crossref  = {DBLP:conf/iri/2009},
  url       = {https://doi.org/10.1109/IRI.2009.5211602},
  doi       = {10.1109/IRI.2009.5211602},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iri/ShankaranVOH09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LuLVLM09,
  author    = {Jianfeng Lu and
               Ruixuan Li and
               Vijay Varadharajan and
               Zhengding Lu and
               Xiaopu Ma},
  title     = {Secure Interoperation in Multidomain Environments Employing {UCON}
               Policies},
  booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
               Italy, September 7-9, 2009. Proceedings},
  pages     = {395--402},
  year      = {2009},
  crossref  = {DBLP:conf/isw/2009},
  url       = {https://doi.org/10.1007/978-3-642-04474-8\_31},
  doi       = {10.1007/978-3-642-04474-8\_31},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/LuLVLM09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/NagarajanVHG09,
  author    = {Aarthi Nagarajan and
               Vijay Varadharajan and
               Michael Hitchens and
               Eimear Gallery},
  title     = {Property Based Attestation and Trusted Computing: Analysis and Challenges},
  booktitle = {Third International Conference on Network and System Security, {NSS}
               2009, Gold Coast, Queensland, Australia, October 19-21, 2009},
  pages     = {278--285},
  year      = {2009},
  crossref  = {DBLP:conf/nss/2009},
  url       = {https://doi.org/10.1109/NSS.2009.83},
  doi       = {10.1109/NSS.2009.83},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nss/NagarajanVHG09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/TupakulaVP09,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan and
               Srini Rao Pandalaneni},
  title     = {DoSTRACK: a system for defending against DoS attacks},
  booktitle = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC),
               Honolulu, Hawaii, USA, March 9-12, 2009},
  pages     = {47--53},
  year      = {2009},
  crossref  = {DBLP:conf/sac/2009},
  url       = {https://doi.org/10.1145/1529282.1529291},
  doi       = {10.1145/1529282.1529291},
  timestamp = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/TupakulaVP09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/Varadharajan09,
  author    = {Vijay Varadharajan},
  title     = {Evolution and challenges in trust and security in information system
               infrastructures},
  booktitle = {Proceedings of the 2nd International Conference on Security of Information
               and Networks, {SIN} 2009, Gazimagusa, North Cyprus, October 6-10,
               2009},
  pages     = {1--2},
  year      = {2009},
  crossref  = {DBLP:conf/sin/2009},
  url       = {https://doi.org/10.1145/1626195.1626197},
  doi       = {10.1145/1626195.1626197},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sin/Varadharajan09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/GalleryNV09,
  author    = {Eimear Gallery and
               Aarthi Nagarajan and
               Vijay Varadharajan},
  title     = {A Property-Dependent Agent Transfer Protocol},
  booktitle = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
               UK, April 6-8, 2009, Proceedings},
  pages     = {240--263},
  year      = {2009},
  crossref  = {DBLP:conf/trust/2009},
  url       = {https://doi.org/10.1007/978-3-642-00587-9\_15},
  doi       = {10.1007/978-3-642-00587-9\_15},
  timestamp = {Mon, 05 Jun 2017 12:40:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/GalleryNV09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2009asia,
  editor    = {Wanqing Li and
               Willy Susilo and
               Udaya Kiran Tupakula and
               Reihaneh Safavi{-}Naini and
               Vijay Varadharajan},
  title     = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2009, Sydney, Australia, March
               10-12, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-394-5},
  timestamp = {Tue, 21 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2009asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/TupakulaV08,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {A hybrid model against {TCP.} {SYN} and reflection DDoS attacks},
  journal   = {Comput. Syst. Sci. Eng.},
  volume    = {23},
  number    = {3},
  year      = {2008},
  timestamp = {Thu, 23 Aug 2012 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/csse/TupakulaV08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isem/WangWLV08,
  author    = {Yan Wang and
               Duncan S. Wong and
               Kwei{-}Jay Lin and
               Vijay Varadharajan},
  title     = {Evaluating transaction trust and risk levels in peer-to-peer e-commerce
               environments},
  journal   = {Inf. Syst. E-Business Management},
  volume    = {6},
  number    = {1},
  pages     = {25--48},
  year      = {2008},
  url       = {https://doi.org/10.1007/s10257-007-0056-y},
  doi       = {10.1007/s10257-007-0056-y},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/isem/WangWLV08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/NagarajanVHA08,
  author    = {Aarthi Nagarajan and
               Vijay Varadharajan and
               Michael Hitchens and
               Saurabh Arora},
  title     = {On the Applicability of Trusted Computing in Distributed Authorization
               Using Web Services},
  booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
               Working Conference on Data and Applications Security, London, UK,
               July 13-16, 2008, Proceedings},
  pages     = {222--237},
  year      = {2008},
  crossref  = {DBLP:conf/dbsec/2008},
  url       = {https://doi.org/10.1007/978-3-540-70567-3\_18},
  doi       = {10.1007/978-3-540-70567-3\_18},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/NagarajanVHA08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhangV08,
  author    = {Junqi Zhang and
               Vijay Varadharajan},
  title     = {A New Security Scheme for Wireless Sensor Networks},
  booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM}
               2008, New Orleans, LA, USA, 30 November - 4 December 2008},
  pages     = {128--132},
  year      = {2008},
  crossref  = {DBLP:conf/globecom/2008},
  url       = {https://doi.org/10.1109/GLOCOM.2008.ECP.32},
  doi       = {10.1109/GLOCOM.2008.ECP.32},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/ZhangV08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciw/ZhaoV08,
  author    = {Weiliang Zhao and
               Vijay Varadharajan},
  title     = {A Novel Approach of Web Search Based on Community Wisdom},
  booktitle = {Third International Conference on Internet and Web Applications and
               Services, {ICIW} 2008, 8-13 June 2008, Athens, Greece},
  pages     = {431--436},
  year      = {2008},
  crossref  = {DBLP:conf/iciw/2008},
  url       = {https://doi.org/10.1109/ICIW.2008.66},
  doi       = {10.1109/ICIW.2008.66},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iciw/ZhaoV08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/ZhaoV08,
  author    = {Weiliang Zhao and
               Vijay Varadharajan},
  title     = {Trust Management for Web Services},
  booktitle = {2008 {IEEE} International Conference on Web Services {(ICWS} 2008),
               September 23-26, 2008, Beijing, China},
  pages     = {818--821},
  year      = {2008},
  crossref  = {DBLP:conf/icws/2008},
  url       = {https://doi.org/10.1109/ICWS.2008.53},
  doi       = {10.1109/ICWS.2008.53},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icws/ZhaoV08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/BalakrishnanVT08,
  author    = {Venkatesan Balakrishnan and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {Subjective logic based trust model for mobile ad hoc networks},
  booktitle = {4th International {ICST} Conference on Security and Privacy in Communication
               Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages     = {30},
  year      = {2008},
  crossref  = {DBLP:conf/securecomm/2008},
  url       = {https://doi.org/10.1145/1460877.1460916},
  doi       = {10.1145/1460877.1460916},
  timestamp = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/BalakrishnanVT08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijaose/FosterV07,
  author    = {David Foster and
               Vijay Varadharajan},
  title     = {Trust-enhanced secure mobile agent-based system design},
  journal   = {{IJAOSE}},
  volume    = {1},
  number    = {2},
  pages     = {205--224},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJAOSE.2007.014407},
  doi       = {10.1504/IJAOSE.2007.014407},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijaose/FosterV07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/IndrakantiVA07,
  author    = {Sarath Indrakanti and
               Vijay Varadharajan and
               Ritesh Agarwal},
  title     = {On the design, implementation and application of an authorisation
               architecture for web services},
  journal   = {{IJICS}},
  volume    = {1},
  number    = {1/2},
  pages     = {64--108},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJICS.2007.012245},
  doi       = {10.1504/IJICS.2007.012245},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijics/IndrakantiVA07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwmc/TupakulaVGVR07,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan and
               Ashok Kumar Gajam and
               Sunil Kumar Vuppala and
               Pandalaneni Naga Srinivasa Rao},
  title     = {DDoS: design, implementation and analysis of automated model},
  journal   = {{IJWMC}},
  volume    = {2},
  number    = {1},
  pages     = {72--85},
  year      = {2007},
  url       = {https://doi.org/10.1504/IJWMC.2007.013797},
  doi       = {10.1504/IJWMC.2007.013797},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijwmc/TupakulaVGVR07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LinV07,
  author    = {Ching Lin and
               Vijay Varadharajan},
  title     = {A Hybrid Trust Model for Enhancing Security in Distributed Systems},
  booktitle = {Proceedings of the The Second International Conference on Availability,
               Reliability and Security, {ARES} 2007, The International Dependability
               Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
               Austria},
  pages     = {35--42},
  year      = {2007},
  crossref  = {DBLP:conf/IEEEares/2007},
  url       = {https://doi.org/10.1109/ARES.2007.6},
  doi       = {10.1109/ARES.2007.6},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/LinV07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/BalakrishnanVLT07,
  author    = {Venkatesan Balakrishnan and
               Vijay Varadharajan and
               Phillip Lucs and
               Udaya Kiran Tupakula},
  title     = {Trust Enhanced Secure Mobile Ad-Hoc Network Routing},
  booktitle = {21st International Conference on Advanced Information Networking and
               Applications {(AINA} 2007), Workshops Proceedings, Volume 2, May 21-23,
               2007, Niagara Falls, Canada},
  pages     = {27--33},
  year      = {2007},
  crossref  = {DBLP:conf/aina/2007w2},
  url       = {https://doi.org/10.1109/AINAW.2007.359},
  doi       = {10.1109/AINAW.2007.359},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aina/BalakrishnanVLT07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NagarajanVH07,
  author    = {Aarthi Nagarajan and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Trust management for trusted computing platforms in web services},
  booktitle = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing,
               {STC} 2007, Alexandria, VA, USA, November 2, 2007},
  pages     = {58--62},
  year      = {2007},
  crossref  = {DBLP:conf/ccs/2007stc},
  url       = {https://doi.org/10.1145/1314354.1314369},
  doi       = {10.1145/1314354.1314369},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/NagarajanVH07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcst/GanTWV07,
  author    = {Zaobin Gan and
               Jiufei Tang and
               Ping Wu and
               Vijay Varadharajan},
  title     = {A Novel Security Risk Evaluation for Information Systems},
  booktitle = {Japan-China Joint Workshop on Frontier of Computer Science and Technology,
               {FCST} 2007, Wuhan, China, 1-3 November, 2007},
  pages     = {67--73},
  year      = {2007},
  crossref  = {DBLP:conf/fcst/2007},
  url       = {https://doi.org/10.1109/FCST.2007.9},
  doi       = {10.1109/FCST.2007.9},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fcst/GanTWV07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icebe/WangWLV07,
  author    = {Yan Wang and
               Duncan S. Wong and
               Kwei{-}Jay Lin and
               Vijay Varadharajan},
  title     = {The Design of {A} Rule-based and Event-driven Trust Management Framework},
  booktitle = {Proceedings of {ICEBE} 2007, {IEEE} International Conference on e-Business
               Engineering and the Workshops {SOAIC} 2007, {SOSE} 2007, {SOKM} 2007,
               24-26 October, 2007, Hong Kong, China},
  pages     = {97--104},
  year      = {2007},
  crossref  = {DBLP:conf/icebe/2007},
  url       = {https://doi.org/10.1109/ICEBE.2007.28},
  doi       = {10.1109/ICEBE.2007.28},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icebe/WangWLV07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciw/ZhangWV07,
  author    = {Junqi Zhang and
               Yan Wang and
               Vijay Varadharajan},
  title     = {A New Security Scheme for Integration of Mobile Agents and Web Services},
  booktitle = {International Conference on Internet and Web Applications and Services
               {(ICIW} 2007), May 13-19, 2007, Le Morne, Mauritius},
  pages     = {43},
  year      = {2007},
  crossref  = {DBLP:conf/iciw/2007},
  url       = {https://doi.org/10.1109/ICIW.2007.5},
  doi       = {10.1109/ICIW.2007.5},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iciw/ZhangWV07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icns/BalakrishnanVTL07,
  author    = {Venkatesan Balakrishnan and
               Vijay Varadharajan and
               Udaya Kiran Tupakula and
               Phillip Lucs},
  title     = {Trust and Recommendations in Mobile Ad hoc Networks},
  booktitle = {Third International Conference on Networking and Services {(ICNS}
               2007), June 19-25, 2007, Athens, Greece},
  pages     = {64},
  year      = {2007},
  crossref  = {DBLP:conf/icns/2007},
  url       = {https://doi.org/10.1109/ICNS.2007.123},
  doi       = {10.1109/ICNS.2007.123},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icns/BalakrishnanVTL07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/BalakrishnanVTL07,
  author    = {Venkatesan Balakrishnan and
               Vijay Varadharajan and
               Udaya Kiran Tupakula and
               Phillip Lucs},
  title     = {{TEAM:} Trust Enhanced Security Architecture for Mobile Ad-hoc Networks},
  booktitle = {Proceedings of the 15th {IEEE} International Conference on Networks,
               {ICON} 2007, 19-21 November 2007, Adelaide, Australia},
  pages     = {182--187},
  year      = {2007},
  crossref  = {DBLP:conf/icon/2007},
  url       = {https://doi.org/10.1109/ICON.2007.4444083},
  doi       = {10.1109/ICON.2007.4444083},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icon/BalakrishnanVTL07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/NagarajanVH07,
  author    = {Aarthi Nagarajan and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Trust Management and Negotiation for Attestation in Trusted Platforms
               Using Web Services},
  booktitle = {Eighth International Conference on Parallel and Distributed Computing,
               Applications and Technologies {(PDCAT} 2007), 3-6 December 2007, Adelaide,
               Australia},
  pages     = {453--460},
  year      = {2007},
  crossref  = {DBLP:conf/pdcat/2007},
  url       = {https://doi.org/10.1109/PDCAT.2007.78},
  doi       = {10.1109/PDCAT.2007.78},
  timestamp = {Mon, 25 Jun 2018 09:57:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pdcat/NagarajanVH07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soca/ZhangWV07,
  author    = {Junqi Zhang and
               Yan Wang and
               Vijay Varadharajan},
  title     = {Mobile Agent and Web Service Integration Security Architecture},
  booktitle = {{IEEE} International Conference on Service-Oriented Computing and
               Applications, {SOCA} 2007, 19-20 June 2007, Newport Beach, California,
               {USA}},
  pages     = {172--179},
  year      = {2007},
  crossref  = {DBLP:conf/soca/2007},
  url       = {https://doi.org/10.1109/SOCA.2007.29},
  doi       = {10.1109/SOCA.2007.29},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/soca/ZhangWV07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/WangV07,
  author    = {Yan Wang and
               Vijay Varadharajan},
  title     = {Role-based Recommendation and Trust Evaluation},
  booktitle = {9th {IEEE} International Conference on E-Commerce Technology {(CEC}
               2007) / 4th {IEEE} International Conference on Enterprise Computing,
               E-Commerce and E-Services {(EEE} 2007), 23-26 July 2007, National
               Center of Sciences, Tokyo, Japan},
  pages     = {278--288},
  year      = {2007},
  crossref  = {DBLP:conf/wecwis/2007},
  url       = {https://doi.org/10.1109/CEC-EEE.2007.83},
  doi       = {10.1109/CEC-EEE.2007.83},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wecwis/WangV07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/ZhaoVB06,
  author    = {Weiliang Zhao and
               Vijay Varadharajan and
               George Bryan},
  title     = {General Methodology for Analysis and Modeling of Trust Relationships
               in Distributed Computing},
  journal   = {{JCP}},
  volume    = {1},
  number    = {2},
  pages     = {42--53},
  year      = {2006},
  url       = {https://doi.org/10.4304/jcp.1.2.42-53},
  doi       = {10.4304/jcp.1.2.42-53},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jcp/ZhaoVB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LinV06,
  author    = {Ching Lin and
               Vijay Varadharajan},
  title     = {Trust Based Risk Management for Distributed System Security - {A}
               New Approach},
  booktitle = {Proceedings of the The First International Conference on Availability,
               Reliability and Security, {ARES} 2006, The International Dependability
               Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
               University of Technology, Austria},
  pages     = {6--13},
  year      = {2006},
  crossref  = {DBLP:conf/IEEEares/2006},
  url       = {https://doi.org/10.1109/ARES.2006.139},
  doi       = {10.1109/ARES.2006.139},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/LinV06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/TupakulaV06,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Analysis of traceback techniques},
  booktitle = {The proceedings of the Fourth Australasian Symposium on Grid Computing
               and e-Research (AusGrid 2006) and the Fourth Australasian Information
               Security Workshop (Network Security) {(AISW} 2006), Hobart, Tasmania,
               Australia, January 2006},
  pages     = {115--124},
  year      = {2006},
  crossref  = {DBLP:conf/acsw/2006},
  url       = {https://dl.acm.org/citation.cfm?id=1151843},
  timestamp = {Mon, 26 Nov 2018 12:14:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsw/TupakulaV06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aict/ZhangVM06,
  author    = {Junqi Zhang and
               Vijay Varadharajan and
               Yi Mu},
  title     = {A Scalable Multi-service Group Key Management Scheme},
  booktitle = {Advanced International Conference on Telecommunications and International
               Conference on Internet and Web Applications and Services {(AICT/ICIW}
               2006), 19-25 February 2006, Guadeloupe, French Caribbean},
  pages     = {172},
  year      = {2006},
  crossref  = {DBLP:conf/aict/2006},
  url       = {https://doi.org/10.1109/AICT-ICIW.2006.31},
  doi       = {10.1109/AICT-ICIW.2006.31},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aict/ZhangVM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/LinV06,
  author    = {Ching Lin and
               Vijay Varadharajan},
  title     = {Trust Enhanced Security - {A} New Philosophy for Secure Collaboration
               of Mobile Agents},
  booktitle = {2nd International {ICST} Conference on Collaborative Computing: Networking,
               Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
               November 17-20, 2006},
  year      = {2006},
  crossref  = {DBLP:conf/colcom/2006},
  url       = {https://doi.org/10.1109/COLCOM.2006.361905},
  doi       = {10.1109/COLCOM.2006.361905},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/LinV06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/RuanV06,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {Implementing Authorization Delegations Using Graph},
  booktitle = {Database and Expert Systems Applications, 17th International Conference,
               {DEXA} 2006, Krak{\'{o}}w, Poland, September 4-8, 2006, Proceedings},
  pages     = {904--913},
  year      = {2006},
  crossref  = {DBLP:conf/dexa/2006},
  url       = {https://doi.org/10.1007/11827405\_88},
  doi       = {10.1007/11827405\_88},
  timestamp = {Wed, 24 Jan 2018 12:46:36 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dexa/RuanV06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ismis/RuanV06,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {Integration of Graph Based Authorization Policies},
  booktitle = {Foundations of Intelligent Systems, 16th International Symposium,
               {ISMIS} 2006, Bari, Italy, September 27-29, 2006, Proceedings},
  pages     = {359--368},
  year      = {2006},
  crossref  = {DBLP:conf/ismis/2006},
  url       = {https://doi.org/10.1007/11875604\_42},
  doi       = {10.1007/11875604\_42},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ismis/RuanV06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/noms/BalakrishnanVT06,
  author    = {Venkatesan Balakrishnan and
               Vijay Varadharajan and
               Udaya Kiran Tupakula},
  title     = {Fellowship: Defense against Flooding and Packet Drop Attacks in {MANET}},
  booktitle = {Management of Integrated End-to-End Communications and Services, 10th
               {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2006,
               Vancouver, Canada, April 3-7, 2006. Proceedings},
  year      = {2006},
  crossref  = {DBLP:conf/noms/2006},
  url       = {https://doi.org/10.1109/NOMS.2006.1687659},
  doi       = {10.1109/NOMS.2006.1687659},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/noms/BalakrishnanVT06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GanV06,
  author    = {Zaobin Gan and
               Vijay Varadharajan},
  title     = {Design and Implementation of a Practical Secure Distributed Healthcare
               Application},
  booktitle = {{SECRYPT} 2006, Proceedings of the International Conference on Security
               and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006,
               {SECRYPT} is part of {ICETE} - The International Joint Conference
               on e-Business and Telecommunications},
  pages     = {431--436},
  year      = {2006},
  crossref  = {DBLP:conf/secrypt/2006},
  timestamp = {Thu, 28 Sep 2006 10:10:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/GanV06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GanWV06,
  author    = {Zaobin Gan and
               Dengwei Wei and
               Vijay Varadharajan},
  title     = {Improving Software Security Through an Integrated Approach},
  booktitle = {{SECRYPT} 2006, Proceedings of the International Conference on Security
               and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006,
               {SECRYPT} is part of {ICETE} - The International Joint Conference
               on e-Business and Telecommunications},
  pages     = {437--442},
  year      = {2006},
  crossref  = {DBLP:conf/secrypt/2006},
  timestamp = {Thu, 28 Sep 2006 10:10:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/GanWV06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZhaoVB06,
  author    = {Weiliang Zhao and
               Vijay Varadharajan and
               George Bryan},
  title     = {A Unified Framework for Trust Management},
  booktitle = {Second International Conference on Security and Privacy in Communication
               Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
               2, 2006 - September 1, 2006},
  pages     = {1--8},
  year      = {2006},
  crossref  = {DBLP:conf/securecomm/2006},
  url       = {https://doi.org/10.1109/SECCOMW.2006.359574},
  doi       = {10.1109/SECCOMW.2006.359574},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/ZhaoVB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/woc/ZhangVM06,
  author    = {Junqi Zhang and
               Vijay Varadharajan and
               Yi Mu},
  title     = {ID-based Secure {PIM-SM} Schemes},
  booktitle = {Sixth {IASTED} International Multi-Conference on Wireless and Optical
               Communications: Conference on Communication Systems and Applications,
               Conference on Optical Communication Systems and Networks, Conference
               on Wireless Networks and Emerging Technologies, Conference on Wireless
               {SENSOR} Networks, Banff, Alberta, Canada, July 3-5, 2006},
  pages     = {190--195},
  year      = {2006},
  crossref  = {DBLP:conf/woc/2006},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/woc/ZhangVM06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/ZhangVM05,
  author    = {Junqi Zhang and
               Vijay Varadharajan and
               Yi Mu},
  title     = {Secure distribution and access of {XML} documents},
  journal   = {{IJHPCN}},
  volume    = {3},
  number    = {5/6},
  pages     = {356--365},
  year      = {2005},
  url       = {https://doi.org/10.1504/IJHPCN.2005.009423},
  doi       = {10.1504/IJHPCN.2005.009423},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijhpcn/ZhangVM05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/BaiZV05,
  author    = {Yun Bai and
               Yan Zhang and
               Vijay Varadharajan},
  title     = {On the sequence of authorization policy transformations},
  journal   = {Int. J. Inf. Sec.},
  volume    = {4},
  number    = {1-2},
  pages     = {120--131},
  year      = {2005},
  url       = {https://doi.org/10.1007/s10207-004-0069-1},
  doi       = {10.1007/s10207-004-0069-1},
  timestamp = {Wed, 07 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/BaiZV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwsr/IndrakantiVH05,
  author    = {Sarath Indrakanti and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Authorization Service for Web Services and its Application in a Health
               Care Domain},
  journal   = {Int. J. Web Service Res.},
  volume    = {2},
  number    = {4},
  pages     = {94--119},
  year      = {2005},
  url       = {https://doi.org/10.4018/jwsr.2005100105},
  doi       = {10.4018/jwsr.2005100105},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jwsr/IndrakantiVH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mis/WangV05,
  author    = {Yan Wang and
               Vijay Varadharajan},
  title     = {Secure route structures for parallel mobile agents based systems using
               fast binary dispatch},
  journal   = {Mobile Information Systems},
  volume    = {1},
  number    = {3},
  pages     = {185--205},
  year      = {2005},
  url       = {https://doi.org/10.1155/2005/738056},
  doi       = {10.1155/2005/738056},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/mis/WangV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/WangV05,
  author    = {Yan Wang and
               Vijay Varadharajan},
  title     = {Trust2: Developing Trust in Peer-to-Peer Environments},
  booktitle = {2005 {IEEE} International Conference on Services Computing {(SCC}
               2005), 11-15 July 2005, Orlando, FL, {USA}},
  pages     = {24--34},
  year      = {2005},
  crossref  = {DBLP:conf/IEEEscc/2005},
  url       = {https://doi.org/10.1109/SCC.2005.104},
  doi       = {10.1109/SCC.2005.104},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEscc/WangV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/BalakrishnanV05,
  author    = {Venkatesan Balakrishnan and
               Vijay Varadharajan},
  title     = {Designing Secure Wireless Mobile Ad Hoc Networks},
  booktitle = {19th International Conference on Advanced Information Networking and
               Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan},
  pages     = {5--8},
  year      = {2005},
  crossref  = {DBLP:conf/aina/2005},
  url       = {https://doi.org/10.1109/AINA.2005.159},
  doi       = {10.1109/AINA.2005.159},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aina/BalakrishnanV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/IndrakantiV05,
  author    = {Sarath Indrakanti and
               Vijay Varadharajan},
  title     = {An Authorization Architecture for Web Services},
  booktitle = {Data and Applications Security XIX, 19th Annual {IFIP} {WG} 11.3 Working
               Conference on Data and Applications Security, Storrs, CT, USA, August
               7-10, 2005, Proceedings},
  pages     = {222--236},
  year      = {2005},
  crossref  = {DBLP:conf/dbsec/2005},
  url       = {https://doi.org/10.1007/11535706\_17},
  doi       = {10.1007/11535706\_17},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/IndrakantiV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eee/WangV05,
  author    = {Yan Wang and
               Vijay Varadharajan},
  title     = {Two-Phase Peer Evaluation in {P2P} E-Commerce Environments},
  booktitle = {2005 {IEEE} International Conference on e-Technology, e-Commerce,
               and e-Services {(EEE} 2005), 29 March - 1 April 2005, Hong Kong, China},
  pages     = {654--657},
  year      = {2005},
  crossref  = {DBLP:conf/eee/2005},
  url       = {https://doi.org/10.1109/EEE.2005.140},
  doi       = {10.1109/EEE.2005.140},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eee/WangV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/TranHVW05,
  author    = {Huu Tran and
               Michael Hitchens and
               Vijay Varadharajan and
               Paul Andrew Watters},
  title     = {A Trust based Access Control Framework for {P2P} File-Sharing Systems},
  booktitle = {38th Hawaii International Conference on System Sciences {(HICSS-38}
               2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island,
               HI, {USA}},
  year      = {2005},
  crossref  = {DBLP:conf/hicss/2005},
  url       = {https://doi.org/10.1109/HICSS.2005.58},
  doi       = {10.1109/HICSS.2005.58},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hicss/TranHVW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iat/WangV05,
  author    = {Yan Wang and
               Vijay Varadharajan},
  title     = {A Mobile Autonomous Agent-based Secure Payment Protocol Supporting
               Multiple Payments},
  booktitle = {Proceedings of the 2005 {IEEE/WIC/ACM} International Conference on
               Intelligent Agent Technology, Compiegne, France, September 19-22,
               2005},
  pages     = {88--94},
  year      = {2005},
  crossref  = {DBLP:conf/iat/2005},
  url       = {https://doi.org/10.1109/IAT.2005.13},
  doi       = {10.1109/IAT.2005.13},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iat/WangV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/ZhaoVB05,
  author    = {Weiliang Zhao and
               Vijay Varadharajan and
               George Bryan},
  title     = {Type and Scope of Trust Relationships in Collaborative Interactions
               in Distributed Environments},
  booktitle = {{ICEIS} 2005, Proceedings of the Seventh International Conference
               on Enterprise Information Systems, Miami, USA, May 25-28, 2005},
  pages     = {331--336},
  year      = {2005},
  crossref  = {DBLP:conf/iceis/2005},
  timestamp = {Thu, 02 Feb 2017 12:53:54 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iceis/ZhaoVB05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Varadharajan05,
  author    = {Vijay Varadharajan},
  title     = {Authorization and Trust Enhanced Security for Distributed Applications},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  pages     = {1--20},
  year      = {2005},
  crossref  = {DBLP:conf/iciss/2005},
  url       = {https://doi.org/10.1007/11593980\_1},
  doi       = {10.1007/11593980\_1},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/Varadharajan05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ZhaoVB05,
  author    = {Weiliang Zhao and
               Vijay Varadharajan and
               George Bryan},
  title     = {Analysis and Modelling of Trust in Distributed Information Systems},
  booktitle = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  pages     = {106--119},
  year      = {2005},
  crossref  = {DBLP:conf/iciss/2005},
  url       = {https://doi.org/10.1007/11593980\_8},
  doi       = {10.1007/11593980\_8},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/ZhaoVB05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icita/GanWZV05,
  author    = {Zaobin Gan and
               Dengwen Wei and
               Jin{-}Long Zhang and
               Vijay Varadharajan},
  title     = {Business-Process-Oriented Software Requirements Automatic Generator},
  booktitle = {Third International Conference on Information Technology and Applications
               {(ICITA} 2005), 4-7 July 2005, Sydney, Australia},
  pages     = {95--98},
  year      = {2005},
  crossref  = {DBLP:conf/icita/2005},
  url       = {https://doi.org/10.1109/ICITA.2005.90},
  doi       = {10.1109/ICITA.2005.90},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icita/GanWZV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icita/GanWV05,
  author    = {Zaobin Gan and
               Dengwen Wei and
               Vijay Varadharajan},
  title     = {Evaluating the Performance and Scalability of Web Application Systems},
  booktitle = {Third International Conference on Information Technology and Applications
               {(ICITA} 2005), 4-7 July 2005, Sydney, Australia},
  pages     = {111--114},
  year      = {2005},
  crossref  = {DBLP:conf/icita/2005},
  url       = {https://doi.org/10.1109/ICITA.2005.131},
  doi       = {10.1109/ICITA.2005.131},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icita/GanWV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icita/FosterV05,
  author    = {David Foster and
               Vijay Varadharajan},
  title     = {Security and Trust Enhanced Mobile Agent Based System Design},
  booktitle = {Third International Conference on Information Technology and Applications
               {(ICITA} 2005), 4-7 July 2005, Sydney, Australia},
  pages     = {155--160},
  year      = {2005},
  crossref  = {DBLP:conf/icita/2005},
  url       = {https://doi.org/10.1109/ICITA.2005.248},
  doi       = {10.1109/ICITA.2005.248},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icita/FosterV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmb/GanLV05,
  author    = {Zaobin Gan and
               Ching Lin and
               Vijay Varadharajan},
  title     = {A Middleware-Based Script Language},
  booktitle = {2005 International Conference on Mobile Business {(ICMB} 2005), 11-13
               July 2005, Sydney, Australia},
  pages     = {690--693},
  year      = {2005},
  crossref  = {DBLP:conf/icmb/2005},
  url       = {https://doi.org/10.1109/ICMB.2005.8},
  doi       = {10.1109/ICMB.2005.8},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icmb/GanLV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icps/TranWHV05,
  author    = {Huu Tran and
               Paul A. Watters and
               Michael Hitchens and
               Vijay Varadharajan},
  title     = {Trust and authorization in the grid: a recommendation model},
  booktitle = {Proceedings of the International Conference on Pervasive Services
               2005, {ICPS} '05, Santorini, Greece, July 11-14, 2005},
  pages     = {433--436},
  year      = {2005},
  crossref  = {DBLP:conf/icps/2005},
  url       = {https://doi.org/10.1109/PERSER.2005.1506561},
  doi       = {10.1109/PERSER.2005.1506561},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icps/TranWHV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ismis/RuanV05,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {Data Protection in Distributed Database Systems},
  booktitle = {Foundations of Intelligent Systems, 15th International Symposium,
               {ISMIS} 2005, Saratoga Springs, NY, USA, May 25-28, 2005, Proceedings},
  pages     = {191--199},
  year      = {2005},
  crossref  = {DBLP:conf/ismis/2005},
  url       = {https://doi.org/10.1007/11425274\_20},
  doi       = {10.1007/11425274\_20},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ismis/RuanV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isws/IndrakantiVH05,
  author    = {Sarath Indrakanti and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Analysis of Existing Authorization Models and Requirements for Design
               of Authorization Framework for the Service Oriented Architecture},
  booktitle = {Proceedings of The 2005 International Symposium on Web Services and
               Applications, {ISWS} 2005, Las Vegas, Nevada, USA, June 27-30, 2005},
  pages     = {35--44},
  year      = {2005},
  crossref  = {DBLP:conf/isws/2005},
  timestamp = {Thu, 16 Feb 2006 15:58:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isws/IndrakantiVH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/ZhaoV05,
  author    = {Weiliang Zhao and
               Vijay Varadharajan},
  title     = {Efficient TTP-Free Mental Poker Protocols},
  booktitle = {International Symposium on Information Technology: Coding and Computing
               {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  pages     = {745--750},
  year      = {2005},
  crossref  = {DBLP:conf/itcc/2005-1},
  url       = {https://doi.org/10.1109/ITCC.2005.141},
  doi       = {10.1109/ITCC.2005.141},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/itcc/ZhaoV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/BalakrishnanV05,
  author    = {Venkatesan Balakrishnan and
               Vijay Varadharajan},
  title     = {Short Paper: Fellowship in Mobile Ad hoc Networks},
  booktitle = {First International Conference on Security and Privacy for Emerging
               Areas in Communications Networks, SecureComm 2005, Athens, Greece,
               5-9 September, 2005},
  pages     = {225--227},
  year      = {2005},
  crossref  = {DBLP:conf/securecomm/2005},
  url       = {https://doi.org/10.1109/SECURECOMM.2005.40},
  doi       = {10.1109/SECURECOMM.2005.40},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/BalakrishnanV05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/LinVW05,
  author    = {Ching Lin and
               Vijay Varadharajan and
               Yan Wang},
  title     = {Maximizing Utility of Mobile Agent Based E-Commerce Applications with
               Trust Enhanced Security},
  booktitle = {Trust, Privacy and Security in Digital Business: Second International
               Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005,
               Proceedings},
  pages     = {151--160},
  year      = {2005},
  crossref  = {DBLP:conf/trustbus/2005},
  url       = {https://doi.org/10.1007/11537878\_16},
  doi       = {10.1007/11537878\_16},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustbus/LinVW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/LinVWP05,
  author    = {Ching Lin and
               Vijay Varadharajan and
               Yan Wang and
               Vineet Pruthi},
  title     = {Trust Enhanced Security for Mobile Agents},
  booktitle = {7th {IEEE} International Conference on E-Commerce Technology {(CEC}
               2005), 19-22 July 2005, M{\"{u}}nchen, Germany},
  pages     = {231--238},
  year      = {2005},
  crossref  = {DBLP:conf/wecwis/2005},
  url       = {https://doi.org/10.1109/ICECT.2005.97},
  doi       = {10.1109/ICECT.2005.97},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wecwis/LinVWP05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsmai/IndrakantiVH05,
  author    = {Sarath Indrakanti and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Architectural Framework for Web Services Authorization},
  booktitle = {Web Services and Model-Driven Enterprise Information Services, Proceedings
               of the Joint Workshop on Web Services and Model-Driven Enterprise
               Information Services, {WSMDEIS} 2005, In conjunction with {ICEIS}
               2005, Miami, USA, May 2005},
  pages     = {75--84},
  year      = {2005},
  crossref  = {DBLP:conf/wsmai/2005},
  timestamp = {Mon, 27 Jun 2005 13:41:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wsmai/IndrakantiVH05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/VaradharajanSH04,
  author    = {Vijay Varadharajan and
               Rajan Shankaran and
               Michael Hitchens},
  title     = {Security for cluster based ad hoc networks},
  journal   = {Computer Communications},
  volume    = {27},
  number    = {5},
  pages     = {488--501},
  year      = {2004},
  url       = {https://doi.org/10.1016/j.comcom.2003.10.005},
  doi       = {10.1016/j.comcom.2003.10.005},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/VaradharajanSH04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ZhaoVB04,
  author    = {Weiliang Zhao and
               Vijay Varadharajan and
               George Bryan},
  title     = {Fair Trading Protocol with Offline Anonymous Credit Card Payment},
  journal   = {Information Systems Security},
  volume    = {13},
  number    = {3},
  pages     = {41--47},
  year      = {2004},
  url       = {https://doi.org/10.1201/1086/44530.13.3.20040701/83068.6},
  doi       = {10.1201/1086/44530.13.3.20040701/83068.6},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isjgp/ZhaoVB04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/TupakulaV04,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Tracing DoS Floods: An Automated Approach},
  journal   = {J. Network Syst. Manage.},
  volume    = {12},
  number    = {1},
  pages     = {111--135},
  year      = {2004},
  url       = {https://doi.org/10.1023/B:JONS.0000015701.83726.ca},
  doi       = {10.1023/B:JONS.0000015701.83726.ca},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnsm/TupakulaV04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsi/ChaddoudVCS04,
  author    = {Ghassan Chaddoud and
               Vijay Varadharajan and
               Isabelle Chrisment and
               Andr{\'{e}} Schaff},
  title     = {Gestion efficace de la s{\'{e}}curit{\'{e}} des communications
               de groupe pour le service {SSM}},
  journal   = {Technique et Science Informatiques},
  volume    = {23},
  number    = {9},
  pages     = {1107--1135},
  year      = {2004},
  url       = {https://doi.org/10.3166/tsi.23.1107-1135},
  doi       = {10.3166/tsi.23.1107-1135},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tsi/ChaddoudVCS04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/LinVWP04,
  author    = {Ching Lin and
               Vijay Varadharajan and
               Yan Wang and
               Vineet Pruthi},
  title     = {Enhancing Grid Security with Trust Management},
  booktitle = {2004 {IEEE} International Conference on Services Computing {(SCC}
               2004), 15-18 September 2004, Shanghai, China},
  pages     = {303--310},
  year      = {2004},
  crossref  = {DBLP:conf/IEEEscc/2004},
  url       = {https://doi.org/10.1109/SCC.2004.1358019},
  doi       = {10.1109/SCC.2004.1358019},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEscc/LinVWP04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ISCApdcs/HitchensSV04,
  author    = {Michael Hitchens and
               Rajan Shankaran and
               Vijay Varadharajan},
  title     = {Securing the Ad-Hoc On-demand Distance Vector Protocol},
  booktitle = {Proceedings of the {ISCA} 17th International Conference on Parallel
               and Distributed Computing Systems, September 15-17, 2004, The Canterbury
               Hotel, San Francisco, California, {USA}},
  pages     = {353--360},
  year      = {2004},
  crossref  = {DBLP:conf/ISCApdcs/2004},
  timestamp = {Fri, 08 Sep 2006 09:21:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ISCApdcs/HitchensSV04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RuanV04,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {A Weighted Graph Approach to Authorization Delegation and Conflict
               Resolution},
  booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
               2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  pages     = {402--413},
  year      = {2004},
  crossref  = {DBLP:conf/acisp/2004},
  url       = {https://doi.org/10.1007/978-3-540-27800-9\_35},
  doi       = {10.1007/978-3-540-27800-9\_35},
  timestamp = {Wed, 14 Nov 2018 10:59:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/RuanV04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/ZhangVM04,
  author    = {Junqi Zhang and
               Vijay Varadharajan and
               Yi Mu},
  title     = {Securing {XML} Document Sources and Their Distribution},
  booktitle = {18th International Conference on Advanced Information Networking and
               Applications {(AINA} 2004), 29-31 March 2004, Fukuoka, Japan},
  pages     = {562--567},
  year      = {2004},
  crossref  = {DBLP:conf/aina/2004},
  url       = {https://doi.org/10.1109/AINA.2004.1283969},
  doi       = {10.1109/AINA.2004.1283969},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aina/ZhangVM04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/WangV04,
  author    = {Yan Wang and
               Vijay Varadharajan},
  title     = {Interaction Trust Evaluation in Decentralized Environments},
  booktitle = {E-Commerce and Web Technologies, 5th International Conference, EC-Web
               2004, Zaragoza, Spain, August 31-September 3, 2004, Proceedings},
  pages     = {144--153},
  year      = {2004},
  crossref  = {DBLP:conf/ecweb/2004},
  url       = {https://doi.org/10.1007/978-3-540-30077-9\_15},
  doi       = {10.1007/978-3-540-30077-9\_15},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ecweb/WangV04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/TupakulaVG04,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan and
               Ashok Kumar Gajam},
  title     = {Counteracting {TCP} {SYN} DDoS attacks using automated model},
  booktitle = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM}
               '04, Dallas, Texas, USA, 29 November - 3 December 2004},
  pages     = {2240--2244},
  year      = {2004},
  crossref  = {DBLP:conf/globecom/2004},
  url       = {https://doi.org/10.1109/GLOCOM.2004.1378407},
  doi       = {10.1109/GLOCOM.2004.1378407},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/TupakulaVG04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ChaddoudV04,
  author    = {Ghassan Chaddoud and
               Vijay Varadharajan},
  title     = {Efficient secure group management for {SSM}},
  booktitle = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2004, Paris, France, 20-24 June 2004},
  pages     = {1436--1440},
  year      = {2004},
  crossref  = {DBLP:conf/icc/2004},
  url       = {https://doi.org/10.1109/ICC.2004.1312749},
  doi       = {10.1109/ICC.2004.1312749},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icc/ChaddoudV04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/IndrakantiVH04,
  author    = {Sarath Indrakanti and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Authorization Service for Web Services and its Implementation},
  booktitle = {Proceedings of the {IEEE} International Conference on Web Services
               (ICWS'04), June 6-9, 2004, San Diego, California, {USA}},
  pages     = {774--777},
  year      = {2004},
  crossref  = {DBLP:conf/icws/2004},
  url       = {https://doi.org/10.1109/ICWS.2004.1314814},
  doi       = {10.1109/ICWS.2004.1314814},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icws/IndrakantiVH04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdc/ZhangVM04,
  author    = {Junqi Zhang and
               Vijay Varadharajan and
               Yi Mu},
  title     = {A Secure {PIM-SM} Multicast Routing Protocol},
  booktitle = {Distributed Computing - {IWDC} 2004, 6th International Workshop, Kolkata,
               India, December 27-30, 2004, Proceedings},
  pages     = {276--288},
  year      = {2004},
  crossref  = {DBLP:conf/iwdc/2004},
  url       = {https://doi.org/10.1007/978-3-540-30536-1\_32},
  doi       = {10.1007/978-3-540-30536-1\_32},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwdc/ZhangVM04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/ZhaoVB04,
  author    = {Weiliang Zhao and
               Vijay Varadharajan and
               George Bryan},
  title     = {Fair Trading Protocol With Off-line Anonymous Credit Card Payment},
  booktitle = {Security In Information Systems, Proceedings of the 2nd International
               Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction
               with {ICEIS} 2004, Porto, Portugal, April 2004},
  pages     = {186--195},
  year      = {2004},
  crossref  = {DBLP:conf/sis/2004},
  timestamp = {Mon, 23 Aug 2004 13:05:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sis/ZhaoVB04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/ZhaoVB04,
  author    = {Weiliang Zhao and
               Vijay Varadharajan and
               George Bryan},
  title     = {Modelling Trust Relationships in Distributed Environments},
  booktitle = {Trust and Privacy in Digital Business, First International Conference,
               TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings},
  pages     = {40--49},
  year      = {2004},
  crossref  = {DBLP:conf/trustbus/2004},
  url       = {https://doi.org/10.1007/978-3-540-30079-3\_5},
  doi       = {10.1007/978-3-540-30079-3\_5},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustbus/ZhaoVB04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/LinVWM04,
  author    = {Ching Lin and
               Vijay Varadharajan and
               Yan Wang and
               Yi Mu},
  title     = {On the Design of a New Trust Model for Mobile Agent Security},
  booktitle = {Trust and Privacy in Digital Business, First International Conference,
               TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings},
  pages     = {60--69},
  year      = {2004},
  crossref  = {DBLP:conf/trustbus/2004},
  url       = {https://doi.org/10.1007/978-3-540-30079-3\_7},
  doi       = {10.1007/978-3-540-30079-3\_7},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustbus/LinVWM04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/Varadharajan04,
  author    = {Vijay Varadharajan},
  title     = {Trustworthy Computing (Extended Abstract)},
  booktitle = {Web Information Systems - {WISE} 2004, 5th International Conference
               on Web Information Systems Engineering, Brisbane, Australia, November
               22-24, 2004, Proceedings},
  pages     = {13--16},
  year      = {2004},
  crossref  = {DBLP:conf/wise/2004},
  url       = {https://doi.org/10.1007/978-3-540-30480-7\_2},
  doi       = {10.1007/978-3-540-30480-7\_2},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wise/Varadharajan04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/WangV04,
  author    = {Yan Wang and
               Vijay Varadharajan},
  title     = {A Time-Based Peer Trust Evaluation in {P2P} E-commerce Environments},
  booktitle = {Web Information Systems - {WISE} 2004, 5th International Conference
               on Web Information Systems Engineering, Brisbane, Australia, November
               22-24, 2004, Proceedings},
  pages     = {730--735},
  year      = {2004},
  crossref  = {DBLP:conf/wise/2004},
  url       = {https://doi.org/10.1007/978-3-540-30480-7\_76},
  doi       = {10.1007/978-3-540-30480-7\_76},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wise/WangV04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2004,
  editor    = {Huaxiong Wang and
               Josef Pieprzyk and
               Vijay Varadharajan},
  title     = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
               2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3108},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98755},
  doi       = {10.1007/b98755},
  isbn      = {3-540-22379-7},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/BaiV03,
  author    = {Yun Bai and
               Vijay Varadharajan},
  title     = {On transformation of authorization policies},
  journal   = {Data Knowl. Eng.},
  volume    = {45},
  number    = {3},
  pages     = {333--357},
  year      = {2003},
  url       = {https://doi.org/10.1016/S0169-023X(02)00194-5},
  doi       = {10.1016/S0169-023X(02)00194-5},
  timestamp = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dke/BaiV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/MuZVL03,
  author    = {Yi Mu and
               Junqi Zhang and
               Vijay Varadharajan and
               Yan{-}Xia Lin},
  title     = {Robust non-interactive oblivious transfer},
  journal   = {{IEEE} Communications Letters},
  volume    = {7},
  number    = {4},
  pages     = {153--155},
  year      = {2003},
  url       = {https://doi.org/10.1109/LCOMM.2003.811213},
  doi       = {10.1109/LCOMM.2003.811213},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/icl/MuZVL03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/RuanV03,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {A formal graph based framework for supporting authorization delegations
               and conflict resolutions},
  journal   = {Int. J. Inf. Sec.},
  volume    = {1},
  number    = {4},
  pages     = {211--222},
  year      = {2003},
  url       = {https://doi.org/10.1007/s10207-003-0018-4},
  doi       = {10.1007/s10207-003-0018-4},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/RuanV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/WangZCV03,
  author    = {Hua Wang and
               Yanchun Zhang and
               Jinli Cao and
               Vijay Varadharajan},
  title     = {Achieving secure and flexible M-services through tickets},
  journal   = {{IEEE} Trans. Systems, Man, and Cybernetics, Part {A}},
  volume    = {33},
  number    = {6},
  pages     = {697--708},
  year      = {2003},
  url       = {https://doi.org/10.1109/TSMCA.2003.819917},
  doi       = {10.1109/TSMCA.2003.819917},
  timestamp = {Fri, 27 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tsmc/WangZCV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/VaradharajanF03,
  author    = {Vijay Varadharajan and
               David Foster},
  title     = {A Security Architecture for Mobile Agent Based Applications},
  journal   = {World Wide Web},
  volume    = {6},
  number    = {1},
  pages     = {93--122},
  year      = {2003},
  url       = {https://doi.org/10.1023/A:1022360516731},
  doi       = {10.1023/A:1022360516731},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/www/VaradharajanF03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LinV03,
  author    = {Ching Lin and
               Vijay Varadharajan},
  title     = {Modelling and Evaluating Trust Relationships in Mobile Agents Based
               Systems},
  booktitle = {Applied Cryptography and Network Security, First International Conference,
               {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  pages     = {176--190},
  year      = {2003},
  crossref  = {DBLP:conf/acns/2003},
  url       = {https://doi.org/10.1007/978-3-540-45203-4\_14},
  doi       = {10.1007/978-3-540-45203-4\_14},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/LinV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/RuanV03,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {An Authorization Model for E-consent Requirement in a Health Care
               Application},
  booktitle = {Applied Cryptography and Network Security, First International Conference,
               {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  pages     = {191--205},
  year      = {2003},
  crossref  = {DBLP:conf/acns/2003},
  url       = {https://doi.org/10.1007/978-3-540-45203-4\_15},
  doi       = {10.1007/978-3-540-45203-4\_15},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/RuanV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsc/TupakulaV03,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {A Practical Method to Counteract Denial of Service Attacks},
  booktitle = {Computer Science 2003, Twenty-Sixth Australasian Computer Science
               Conference (ACSC2003), Adelaide, South Australia, February 2003},
  pages     = {275--284},
  year      = {2003},
  crossref  = {DBLP:conf/acsc/2003},
  url       = {http://crpit.com/confpapers/CRPITV16Tupakula.pdf},
  timestamp = {Wed, 18 Aug 2004 12:50:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsc/TupakulaV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/ZhaoVM03,
  author    = {Weiliang Zhao and
               Vijay Varadharajan and
               Yi Mu},
  title     = {A Secure Mental Poker Protocol Over The Internet},
  booktitle = {{ACSW} Frontiers 2003, 2003 {ACSW} Workshops - the Australasian Information
               Security Workshop {(AISW)} and the Workshop on Wearable, Invisible,
               Context-Aware, Ambient, Pervasive and Ubiquitous Computing (WICAPUC),
               Adelaide, South Australia, February 2003},
  pages     = {105--109},
  year      = {2003},
  crossref  = {DBLP:conf/acsw/2003},
  url       = {http://crpit.com/confpapers/CRPITV21AZhao.pdf},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsw/ZhaoVM03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/RuanVZ03,
  author    = {Chun Ruan and
               Vijay Varadharajan and
               Yan Zhang},
  title     = {Delegatable Authorization Program and Its Application},
  booktitle = {Proceedings of the International Conference on Security and Management,
               {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1},
  pages     = {267--273},
  year      = {2003},
  crossref  = {DBLP:conf/csreaSAM/2003-1},
  timestamp = {Wed, 07 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/csreaSAM/RuanVZ03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/IndrakantiVHT03,
  author    = {Sarath Indrakanti and
               Vijay Varadharajan and
               Michael Hitchens and
               Rajat Kumar Todi},
  title     = {Secure Authorisation for Web Services},
  booktitle = {Data and Applications Security {XVII:} Status and Prospects, {IFIP}
               {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and
               Application Security, August4-6, 2003, Estes Park, Colorado, {USA}},
  pages     = {163--175},
  year      = {2003},
  crossref  = {DBLP:conf/dbsec/2003},
  url       = {https://doi.org/10.1007/1-4020-8070-0\_12},
  doi       = {10.1007/1-4020-8070-0\_12},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/IndrakantiVHT03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/RuanV03,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {Decentralized Temporal Authorization Administration},
  booktitle = {Database and Expert Systems Applications, 14th International Conference,
               {DEXA} 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings},
  pages     = {917--926},
  year      = {2003},
  crossref  = {DBLP:conf/dexa/2003},
  url       = {https://doi.org/10.1007/978-3-540-45227-0\_89},
  doi       = {10.1007/978-3-540-45227-0\_89},
  timestamp = {Mon, 29 May 2017 16:53:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dexa/RuanV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/IslamTV03,
  author    = {Munirul Islam and
               Johnson P. Thomas and
               Vijay Varadharajan},
  title     = {Reducing the scope of denial of service attacks in QoS routing},
  booktitle = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM}
               '03, San Francisco, CA, USA, 1-5 December 2003},
  pages     = {1368--1373},
  year      = {2003},
  crossref  = {DBLP:conf/globecom/2003},
  url       = {https://doi.org/10.1109/GLOCOM.2003.1258462},
  doi       = {10.1109/GLOCOM.2003.1258462},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/IslamTV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iadis/IndrakantiVT03,
  author    = {Sarath Indrakanti and
               Vijay Varadharajan and
               Rajat Kumar Todi},
  title     = {Authorisation Service in .Net My Services},
  booktitle = {Proceedings of the {IADIS} International Conference WWW/Internet 2003,
               {ICWI} 2003, Algarve, Portugal, November 5-8, 2003},
  pages     = {1115--1118},
  year      = {2003},
  crossref  = {DBLP:conf/iadis/2003icwi},
  timestamp = {Thu, 18 Mar 2004 15:27:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iadis/IndrakantiVT03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SaundersHV03,
  author    = {Gregory Saunders and
               Michael Hitchens and
               Vijay Varadharajan},
  title     = {Role-Based Access Control and the Access Control Matrix},
  booktitle = {Information and Communications Security, 5th International Conference,
               {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  pages     = {145--157},
  year      = {2003},
  crossref  = {DBLP:conf/icics/2003},
  url       = {https://doi.org/10.1007/978-3-540-39927-8\_14},
  doi       = {10.1007/978-3-540-39927-8\_14},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/SaundersHV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/ZhangVM03,
  author    = {Junqi Zhang and
               Vijay Varadharajan and
               Yi Mu},
  title     = {A novel dynamic key management scheme for secure multicasting},
  booktitle = {11th {IEEE} International Conference on Networks, {ICON} 2003, September
               28 - October 1, 2003 Sydney, NSW, Australia.},
  pages     = {391--395},
  year      = {2003},
  crossref  = {DBLP:conf/icon/2003},
  url       = {https://doi.org/10.1109/ICON.2003.1266222},
  doi       = {10.1109/ICON.2003.1266222},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icon/ZhangVM03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/TupakulaV03,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {Counteracting DDoS attacks in multiple {ISP} domains using routing
               arbiter architecture},
  booktitle = {11th {IEEE} International Conference on Networks, {ICON} 2003, September
               28 - October 1, 2003 Sydney, NSW, Australia.},
  pages     = {455--460},
  year      = {2003},
  crossref  = {DBLP:conf/icon/2003},
  url       = {https://doi.org/10.1109/ICON.2003.1266233},
  doi       = {10.1109/ICON.2003.1266233},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icon/TupakulaV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iis/RuanVZ03,
  author    = {Chun Ruan and
               Vijay Varadharajan and
               Yan Zhang},
  title     = {Evaluation of Authorization with Delegation and Negation},
  booktitle = {Intelligent Information Processing and Web Mining, Proceedings of
               the International {IIS:} IIPWM'03 Conference held in Zakopane, Poland,
               June 2-5, 2003},
  pages     = {547--551},
  year      = {2003},
  crossref  = {DBLP:conf/iis/2003},
  timestamp = {Wed, 07 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iis/RuanVZ03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/im/TupakulaV03,
  author    = {Udaya Kiran Tupakula and
               Vijay Varadharajan},
  title     = {A Controller Agent Model to Counteract DoS Attacks in Multiple Domains},
  booktitle = {Integrated Network Management VII, Managing It All, {IFIP/IEEE} Eighth
               International Symposium on Integrated Network Management {(IM} 2003),
               March 24-28, 2003, Colorado Springs, {USA}},
  pages     = {113--116},
  year      = {2003},
  crossref  = {DBLP:conf/im/2003},
  timestamp = {Mon, 24 Mar 2003 13:34:13 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/im/TupakulaV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ismis/RuanV03,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {Supporting E-consent on Health Data by Logic},
  booktitle = {Foundations of Intelligent Systems, 14th International Symposium,
               {ISMIS} 2003, Maebashi City, Japan, October 28-31, 2003, Proceedings},
  pages     = {392--396},
  year      = {2003},
  crossref  = {DBLP:conf/ismis/2003},
  url       = {https://doi.org/10.1007/978-3-540-39592-8\_54},
  doi       = {10.1007/978-3-540-39592-8\_54},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ismis/RuanV03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/RuanVZ03,
  author    = {Chun Ruan and
               Vijay Varadharajan and
               Yan Zhang},
  title     = {A Logic Model for Temporal Authorization Delegation with Negation},
  booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
               UK, October 1-3, 2003, Proceedings},
  pages     = {310--324},
  year      = {2003},
  crossref  = {DBLP:conf/isw/2003},
  url       = {https://doi.org/10.1007/10958513\_24},
  doi       = {10.1007/10958513\_24},
  timestamp = {Wed, 07 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/RuanVZ03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ShankaranVH03,
  author    = {Rajan Shankaran and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {A secure multicast support framework for Mobile {IP}},
  booktitle = {2003 {IEEE} Wireless Communications and Networking, {WCNC} 2003, New
               Orleans, LA, USA, 16-20 March, 2003},
  pages     = {2114--2119},
  year      = {2003},
  crossref  = {DBLP:conf/wcnc/2003},
  url       = {https://doi.org/10.1109/WCNC.2003.1200713},
  doi       = {10.1109/WCNC.2003.1200713},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/ShankaranVH03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/BaiV02,
  author    = {Yun Bai and
               Vijay Varadharajan},
  title     = {Object Oriented Database with Authorization Policies},
  journal   = {Fundam. Inform.},
  volume    = {53},
  number    = {3-4},
  pages     = {229--250},
  year      = {2002},
  url       = {http://content.iospress.com/articles/fundamenta-informaticae/fi53-3-4-02},
  timestamp = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fuin/BaiV02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/MuV02,
  author    = {Yi Mu and
               Vijay Varadharajan},
  title     = {Group Cryptography: Signature and Encryption},
  journal   = {Informatica (Slovenia)},
  volume    = {26},
  number    = {3},
  year      = {2002},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/informaticaSI/MuV02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/ChenVRZ02,
  author    = {Guangrong Chen and
               Vijay Varadharajan and
               Pradeep Ray and
               P. Zuluaga},
  title     = {Management for eBusiness in the New Millennium: {A} Report on {APNOMS}
               2001},
  journal   = {J. Network Syst. Manage.},
  volume    = {10},
  number    = {2},
  pages     = {255--259},
  year      = {2002},
  url       = {https://doi.org/10.1023/A:1015962901420},
  doi       = {10.1023/A:1015962901420},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jnsm/ChenVRZ02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RuanV02,
  author    = {Chun Ruan and
               Vijay Varadharajan},
  title     = {Resolving Conflicts in Authorization Delegations},
  booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP}
               2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  pages     = {271--285},
  year      = {2002},
  crossref  = {DBLP:conf/acisp/2002},
  url       = {https://doi.org/10.1007/3-540-45450-0\_22},
  doi       = {10.1007/3-540-45450-0\_22},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/RuanV02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HitchensVS02,
  author    = {Michael Hitchens and
               Vijay Varadharajan and
               Gregory Saunders},
  title     = {Policy Administration Domains},
  booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP}
               2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  pages     = {286--302},
  year      = {2002},
  crossref  = {DBLP:conf/acisp/2002},
  url       = {https://doi.org/10.1007/3-540-45450-0\_23},
  doi       = {10.1007/3-540-45450-0\_23},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/HitchensVS02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MuZV02,
  author    = {Yi Mu and
               Junqi Zhang and
               Vijay Varadharajan},
  title     = {m out of n Oblivious Transfer},
  booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP}
               2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  pages     = {395--405},
  year      = {2002},
  crossref  = {DBLP:conf/acisp/2002},
  url       = {https://doi.org/10.1007/3-540-45450-0\_30},
  doi       = {10.1007/3-540-45450-0\_30},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/MuZV02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangVM02,
  author    = {Junqi Zhang and
               Vijay Varadharajan and
               Yi Mu},
  title     = {A Secure Object Sharing Scheme for Java Card},
  booktitle = {Information and Communications Security, 4th International Conference,
               {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  pages     = {243--251},
  year      = {2002},
  crossref  = {DBLP:conf/icics/2002},
  url       = {https://doi.org/10.1007/3-540-36159-6\_21},
  doi       = {10.1007/3-540-36159-6\_21},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/ZhangVM02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ismis/RuanVZ02,
  author    = {Chun Ruan and
               Vijay Varadharajan and
               Yan Zhang},
  title     = {Logic-Based Reasoning on Delegatable Authorizations},
  booktitle = {Foundations of Intelligent Systems, 13th International Symposium,
               {ISMIS} 2002, Lyon, France, June 27-29, 2002, Proceedings},
  pages     = {185--193},
  year      = {2002},
  crossref  = {DBLP:conf/ismis/2002},
  url       = {https://doi.org/10.1007/3-540-48050-1\_22},
  doi       = {10.1007/3-540-48050-1\_22},
  timestamp = {Wed, 07 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ismis/RuanVZ02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcs/HitchensVS02,
  author    = {Michael Hitchens and
               Vijay Varadharajan and
               Gregory Saunders},
  title     = {Security Policy Management in Distributed Systems},
  booktitle = {International Conference on Parallel and Distributed Computing Systems,
               {PDCS} 2002, November 4-6, 2002, Cambridge, {USA}},
  pages     = {290--294},
  year      = {2002},
  crossref  = {DBLP:conf/pdcs/2002},
  timestamp = {Tue, 26 Sep 2006 13:37:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pdcs/HitchensVS02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcs/ShankaranVH02,
  author    = {Rajan Shankaran and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Secure Multicast Support for Mobile {IP} with Hierarchical Registration
               Approach},
  booktitle = {International Conference on Parallel and Distributed Computing Systems,
               {PDCS} 2002, November 4-6, 2002, Cambridge, {USA}},
  pages     = {851--856},
  year      = {2002},
  crossref  = {DBLP:conf/pdcs/2002},
  timestamp = {Tue, 26 Sep 2006 13:37:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pdcs/ShankaranVH02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/SaundersHV01,
  author    = {Gregory Saunders and
               Michael Hitchens and
               Vijay Varadharajan},
  title     = {Role-Based Access Control and the Access Control Matrix},
  journal   = {Operating Systems Review},
  volume    = {35},
  number    = {4},
  pages     = {6--20},
  year      = {2001},
  url       = {https://doi.org/10.1145/506084.506085},
  doi       = {10.1145/506084.506085},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/SaundersHV01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WietrzykTV01,
  author    = {Vlad Ingar Wietrzyk and
               Makoto Takizawa and
               Vijay Varadharajan},
  title     = {A Strategy for {MLS} Workflow},
  booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
               2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  pages     = {159--175},
  year      = {2001},
  crossref  = {DBLP:conf/acisp/2001},
  url       = {https://doi.org/10.1007/3-540-47719-5\_14},
  doi       = {10.1007/3-540-47719-5\_14},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/WietrzykTV01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsc/ZhangV01,
  author    = {Yan Zhang and
               Vijay Varadharajan},
  title     = {A Logic for Modeling the Dynamics of Beliefs in Cryptographic Protocols},
  booktitle = {24th Australasian Computer Science Conference {(ACSC} 2001), 29 January
               - 1 February 2001, Gold Coast, Queensland, Australia},
  pages     = {215--222},
  year      = {2001},
  crossref  = {DBLP:conf/acsc/2001},
  url       = {https://doi.org/10.1109/ACSC.2001.906645},
  doi       = {10.1109/ACSC.2001.906645},
  timestamp = {Wed, 07 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsc/ZhangV01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/MolliSGRSV01,
  author    = {Pascal Molli and
               Hala Skaf{-}Molli and
               Claude Godart and
               Pradeep Ray and
               Rajan Shankaran and
               Vijay Varadharajan},
  title     = {Integrating Network Services for Virtual Teams},
  booktitle = {{ICEIS} 2001, Proceedings of the 3rd International Conference on Enterprise
               Information Systems, Setubal, Portugal, July 7-10, 2001},
  pages     = {1034--1039},
  year      = {2001},
  crossref  = {DBLP:conf/iceis/2001},
  timestamp = {Thu, 02 Feb 2017 12:58:08 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iceis/MolliSGRSV01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HitchensV01,
  author    = {Michael Hitchens and
               Vijay Varadharajan},
  title     = {{RBAC} for {XML} Document Stores},
  booktitle = {Information and Communications Security, Third International Conference,
               {ICICS} 2001, Xian, China, November 13-16, 2001},
  pages     = {131--143},
  year      = {2001},
  crossref  = {DBLP:conf/icics/2001},
  url       = {https://doi.org/10.1007/3-540-45600-7\_15},
  doi       = {10.1007/3-540-45600-7\_15},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/HitchensV01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WuV01,
  author    = {Chuan{-}Kun Wu and
               Vijay Varadharajan},
  title     = {Fair Exchange of Digital Signatures with Offline Trusted Third Party},
  booktitle = {Information and Communications Security, Third International Conference,
               {ICICS} 2001, Xian, China, November 13-16, 2001},
  pages     = {466--470},
  year      = {2001},
  crossref  = {DBLP:conf/icics/2001},
  url       = {https://doi.org/10.1007/3-540-45600-7\_52},
  doi       = {10.1007/3-540-45600-7\_52},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/WuV01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/WietrzykTOV01,
  author    = {Vlad Ingar Wietrzyk and
               Makoto Takizawa and
               Mehmet A. Orgun and
               Vijay Varadharajan},
  title     = {A Secure Transaction Environment for Workflows in Distributed Systems},
  booktitle = {Eigth International Conference on Parallel and Distributed Systems,
               {ICPADS} 2001, KyongJu City, Korea, June 26-29, 2001},
  pages     = {198--208},
  year      = {2001},
  crossref  = {DBLP:conf/icpads/2001},
  url       = {https://doi.org/10.1109/ICPADS.2001.934820},
  doi       = {10.1109/ICPADS.2001.934820},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icpads/WietrzykTOV01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icpads/ShankaranVH01,
  author    = {Rajan Shankaran and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {A Distributed Location Management Scheme for Mobile Hosts},
  booktitle = {Eigth International Conference on Parallel and Distributed Systems,
               {ICPADS} 2001, KyongJu City, Korea, June 26-29, 2001},
  pages     = {297--304},
  year      = {2001},
  crossref  = {DBLP:conf/icpads/2001},
  url       = {https://doi.org/10.1109/ICPADS.2001.934833},
  doi       = {10.1109/ICPADS.2001.934833},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icpads/ShankaranVH01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MuV01,
  author    = {Yi Mu and
               Vijay Varadharajan},
  title     = {Robust and Secure Broadcasting},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
               on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  pages     = {223--231},
  year      = {2001},
  crossref  = {DBLP:conf/indocrypt/2001},
  url       = {https://doi.org/10.1007/3-540-45311-3\_21},
  doi       = {10.1007/3-540-45311-3\_21},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/MuV01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isec/MuNV01,
  author    = {Yi Mu and
               Khanh Quoc Nguyen and
               Vijay Varadharajan},
  title     = {A Fair Electronic Cash Scheme},
  booktitle = {Topics in Electronic Commerce, Second International Symposium, {ISEC}
               2001 Hong Kong, China, April 26-28, 2001, Proceedings},
  pages     = {20--32},
  year      = {2001},
  crossref  = {DBLP:conf/isec/2001},
  url       = {https://doi.org/10.1007/3-540-45415-2\_2},
  doi       = {10.1007/3-540-45415-2\_2},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isec/MuNV01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ShankaranVH01,
  author    = {Rajan Shankaran and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Secure Distributed Location Management Scheme for Mobile Hosts},
  booktitle = {26th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2001),
               14-16 November 2001, Tampa, Florida, USA, Proceedings},
  pages     = {296--305},
  year      = {2001},
  crossref  = {DBLP:conf/lcn/2001},
  url       = {https://doi.org/10.1109/LCN.2001.990799},
  doi       = {10.1109/LCN.2001.990799},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/ShankaranVH01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Varadharajan01,
  author    = {Vijay Varadharajan},
  title     = {Secure Networked Computing},
  booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures
               for Network Security, International Workshop {MMM-ACNS} 2001, St.
               Petersburg, Russia, May 21-23, 2001, Proceedings},
  pages     = {27},
  year      = {2001},
  crossref  = {DBLP:conf/mmmacns/2001},
  url       = {https://doi.org/10.1007/3-540-45116-1\_5},
  doi       = {10.1007/3-540-45116-1\_5},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mmmacns/Varadharajan01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/HitchensV01,
  author    = {Michael Hitchens and
               Vijay Varadharajan},
  title     = {Tower: {A} Language for Role Based Access Control},
  booktitle = {Policies for Distributed Systems and Networks, International Workshop,
               {POLICY} 2001 Bristol, UK, January 29-31, 2001, Proceedings},
  pages     = {88--106},
  year      = {2001},
  crossref  = {DBLP:conf/policy/2001},
  url       = {https://doi.org/10.1007/3-540-44569-2\_6},
  doi       = {10.1007/3-540-44569-2\_6},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/policy/HitchensV01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/WangVZ01,
  author    = {Hongxue Wang and
               Vijay Varadharajan and
               Yan Zhang},
  title     = {A New Approach to Reasoning About Accountability in Cryptographic
               Protocols for E-Commerce},
  booktitle = {E-Commerce Security and Privacy},
  pages     = {113--131},
  year      = {2001},
  crossref  = {DBLP:series/ais/2},
  url       = {https://doi.org/10.1007/978-1-4615-1467-1\_7},
  doi       = {10.1007/978-1-4615-1467-1\_7},
  timestamp = {Wed, 07 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/series/ais/WangVZ01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2001,
  editor    = {Vijay Varadharajan and
               Yi Mu},
  title     = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
               2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2119},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-47719-5},
  doi       = {10.1007/3-540-47719-5},
  isbn      = {3-540-42300-1},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iee/HitchensV00,
  author    = {Michael Hitchens and
               Vijay Varadharajan},
  title     = {Design and specification of role based access control policies},
  journal   = {{IEE} Proceedings - Software},
  volume    = {147},
  number    = {4},
  pages     = {117--129},
  year      = {2000},
  url       = {https://doi.org/10.1049/ip-sen:20000792},
  doi       = {10.1049/ip-sen:20000792},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iee/HitchensV00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/VaradharajanW00,
  author    = {Vijay Varadharajan and
               Chuan{-}Kun Wu},
  title     = {Public key cryptosystems based on boolean permutations and their applications},
  journal   = {Int. J. Comput. Math.},
  volume    = {74},
  number    = {2},
  pages     = {167--184},
  year      = {2000},
  url       = {https://doi.org/10.1080/00207160008804932},
  doi       = {10.1080/00207160008804932},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijcm/VaradharajanW00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MuV00,
  author    = {Yi Mu and
               Vijay Varadharajan},
  title     = {Fail-Stop Confirmer Signatures},
  booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
               2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  pages     = {368--377},
  year      = {2000},
  crossref  = {DBLP:conf/acisp/2000},
  url       = {https://doi.org/10.1007/10718964\_30},
  doi       = {10.1007/10718964\_30},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/MuV00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhaoVM00,
  author    = {Weiliang Zhao and
               Vijay Varadharajan and
               Yi Mu},
  title     = {Fair On-line Gambling},
  booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
               11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages     = {394--400},
  year      = {2000},
  crossref  = {DBLP:conf/acsac/2000},
  url       = {https://doi.org/10.1109/ACSAC.2000.898894},
  doi       = {10.1109/ACSAC.2000.898894},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/ZhaoVM00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adbis/WietrzykOV00,
  author    = {Vlad Ingar Wietrzyk and
               Mehmet A. Orgun and
               Vijay Varadharajan},
  title     = {On the Analysis of On-Line Database Reorganization},
  booktitle = {Current Issues in Databases and Information Systems, East-European
               Conference on Advances in Databases and Information Systems Held Jointly
               with International Conference on Database Systems for Advanced Applications,
               {ADBIS-DASFAA} 2000, Prague, Czech Republic, September 5-8, 2000,
               Proceedings},
  pages     = {293--306},
  year      = {2000},
  crossref  = {DBLP:conf/adbis/2000},
  url       = {https://doi.org/10.1007/3-540-44472-6\_23},
  doi       = {10.1007/3-540-44472-6\_23},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/adbis/WietrzykOV00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adc/MuV00,
  author    = {Yi Mu and
               Vijay Varadharajan},
  title     = {Towards a Protection Model for Supporting Multiple Access Control
               Policies},
  booktitle = {Australasian Database Conference, {ADC} 2000, Canberra, Australia,
               January 31 - February 3, 2000},
  pages     = {107--114},
  year      = {2000},
  crossref  = {DBLP:conf/adc/2000},
  url       = {https://doi.org/10.1109/ADC.2000.819820},
  doi       = {10.1109/ADC.2000.819820},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/adc/MuV00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Varadharajan00,
  author    = {Vijay Varadharajan},
  title     = {Security enhanced mobile agents},
  booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
               Communications Security, Athens, Greece, November 1-4, 2000.},
  pages     = {200--209},
  year      = {2000},
  crossref  = {DBLP:conf/ccs/2000},
  url       = {https://doi.org/10.1145/352600.352632},
  doi       = {10.1145/352600.352632},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Varadharajan00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/WangVZ00,
  author    = {Hongxue Wang and
               Vijay Varadharajan and
               Yan Zhang},
  title     = {Towards a Generic Logic for Analysing Network Protocols},
  booktitle = {Proceedings of the 2000 {ICDCS} Workshops, April 10, 2000, Taipei,
               Taiwan, {ROC}},
  pages     = {A19--A26},
  year      = {2000},
  crossref  = {DBLP:conf/icdcsw/2000},
  timestamp = {Wed, 07 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcsw/WangVZ00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MuV00,
  author    = {Yi Mu and
               Vijay Varadharajan},
  title     = {An Internet Anonymous Auction Scheme},
  booktitle = {Information Security and Cryptology - {ICISC} 2000, Third International
               Conference, Seoul, Korea, December 8-9, 2000, Proceedings},
  pages     = {171--182},
  year      = {2000},
  crossref  = {DBLP:conf/icisc/2000},
  url       = {https://doi.org/10.1007/3-540-45247-8\_14},
  doi       = {10.1007/3-540-45247-8\_14},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/MuV00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MuV00,
  author    = {Yi Mu and
               Vijay Varadharajan},
  title     = {Distributed Signcryption},
  booktitle = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
               in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  pages     = {155--164},
  year      = {2000},
  crossref  = {DBLP:conf/indocrypt/2000},
  url       = {https://doi.org/10.1007/3-540-44495-5\_14},
  doi       = {10.1007/3-540-44495-5\_14},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/MuV00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/HitchensV00,
  author    = {Michael Hitchens and
               Vijay Varadharajan},
  title     = {Elements of a Language for Role-Based Access Control},
  booktitle = {Information Security for Global Information Infrastructures, {IFIP}
               {TC11} Fifteenth Annual Working Conference on Information Security,
               August 22-24, 2000, Beijing, China},
  pages     = {371--380},
  year      = {2000},
  crossref  = {DBLP:conf/sec/2000},
  timestamp = {Fri, 26 Jul 2002 13:04:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/HitchensV00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/VaradharajanSH99,
  author    = {Vijay Varadharajan and
               Rajan Shankaran and
               Michael Hitchens},
  title     = {On the design of secure {ATM} networks},
  journal   = {Computer Communications},
  volume    = {22},
  number    = {15-16},
  pages     = {1512--1525},
  year      = {1999},
  url       = {https://doi.org/10.1016/S0140-3664(99)00124-3},
  doi       = {10.1016/S0140-3664(99)00124-3},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/VaradharajanSH99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/VaradharajanNM99,
  author    = {Vijay Varadharajan and
               Khanh Quoc Nguyen and
               Yi Mu},
  title     = {On the Design of Efficient RSA-based Off-line Electronic Cash Schemes},
  journal   = {Theor. Comput. Sci.},
  volume    = {226},
  number    = {1-2},
  pages     = {173--184},
  year      = {1999},
  url       = {https://doi.org/10.1016/S0304-3975(99)00071-7},
  doi       = {10.1016/S0304-3975(99)00071-7},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tcs/VaradharajanNM99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NguyenMV99,
  author    = {Khanh Quoc Nguyen and
               Yi Mu and
               Vijay Varadharajan},
  title     = {Divertible Zero-Knowledge Proof of Polynominal Relations and Blind
               Group Signature},
  booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
               Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  pages     = {117--128},
  year      = {1999},
  crossref  = {DBLP:conf/acisp/1999},
  url       = {https://doi.org/10.1007/3-540-48970-3\_10},
  doi       = {10.1007/3-540-48970-3\_10},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/NguyenMV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaiV99,
  author    = {Yun Bai and
               Vijay Varadharajan},
  title     = {Authorization in Object Oriented Databases},
  booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
               Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  pages     = {270--280},
  year      = {1999},
  crossref  = {DBLP:conf/acisp/1999},
  url       = {https://doi.org/10.1007/3-540-48970-3\_22},
  doi       = {10.1007/3-540-48970-3\_22},
  timestamp = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/BaiV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SaundersHV99,
  author    = {Gregory Saunders and
               Michael Hitchens and
               Vijay Varadharajan},
  title     = {An Analysis of Access Control Models},
  booktitle = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
               Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  pages     = {281--293},
  year      = {1999},
  crossref  = {DBLP:conf/acisp/1999},
  url       = {https://doi.org/10.1007/3-540-48970-3\_23},
  doi       = {10.1007/3-540-48970-3\_23},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/SaundersHV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LeNV99,
  author    = {Tri Van Le and
               Khanh Quoc Nguyen and
               Vijay Varadharajan},
  title     = {How to Prove That a Committed Number Is Prime},
  booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Singapore, November 14-18, 1999, Proceedings},
  pages     = {208--218},
  year      = {1999},
  crossref  = {DBLP:conf/asiacrypt/1999},
  url       = {https://doi.org/10.1007/978-3-540-48000-6\_17},
  doi       = {10.1007/978-3-540-48000-6\_17},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/LeNV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BaiV99,
  author    = {Yun Bai and
               Vijay Varadharajan},
  title     = {A Logical Formalization for Specifying Authorizations in Object-Oriented
               Databases},
  booktitle = {Research Advances in Database and Information Systems Security, {IFIP}
               {WG} 11.3 Thirteenth International Conference on Database Security,
               July 26-28, 1999, Seattle, Washington, {USA}},
  pages     = {317--330},
  year      = {1999},
  crossref  = {DBLP:conf/dbsec/1999},
  timestamp = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/BaiV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/NguyenVM99,
  author    = {Khanh Quoc Nguyen and
               Vijay Varadharajan and
               Yi Mu},
  title     = {Batching Proofs of Knowledge and Its Applications},
  booktitle = {10th International Workshop on Database {\&} Expert Systems Applications,
               Florence, Italy, September 1-3, 1999, Proceedings.},
  pages     = {844--849},
  year      = {1999},
  crossref  = {DBLP:conf/dexaw/1999},
  url       = {https://doi.org/10.1109/DEXA.1999.795292},
  doi       = {10.1109/DEXA.1999.795292},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dexaw/NguyenVM99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/BaoDNV99,
  author    = {Feng Bao and
               Robert H. Deng and
               Khanh Quoc Nguyen and
               Vijay Varadharajan},
  title     = {Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party},
  booktitle = {10th International Workshop on Database {\&} Expert Systems Applications,
               Florence, Italy, September 1-3, 1999, Proceedings.},
  pages     = {858--863},
  year      = {1999},
  crossref  = {DBLP:conf/dexaw/1999},
  url       = {https://doi.org/10.1109/DEXA.1999.795294},
  doi       = {10.1109/DEXA.1999.795294},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dexaw/BaoDNV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HitchensV99,
  author    = {Michael Hitchens and
               Vijay Varadharajan},
  title     = {Issues in the Design of a Language for Role Based Access Control},
  booktitle = {Information and Communication Security, Second International Conference,
               ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  pages     = {22--38},
  year      = {1999},
  crossref  = {DBLP:conf/icics/1999},
  url       = {https://doi.org/10.1007/978-3-540-47942-0\_4},
  doi       = {10.1007/978-3-540-47942-0\_4},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/HitchensV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/NguyenBMV99,
  author    = {Khanh Quoc Nguyen and
               Feng Bao and
               Yi Mu and
               Vijay Varadharajan},
  title     = {Zero-Knowledge Proofs of Possession of Digital Signatures and Its
               Applications},
  booktitle = {Information and Communication Security, Second International Conference,
               ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  pages     = {103--118},
  year      = {1999},
  crossref  = {DBLP:conf/icics/1999},
  url       = {https://doi.org/10.1007/978-3-540-47942-0\_9},
  doi       = {10.1007/978-3-540-47942-0\_9},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/NguyenBMV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/MurayamaV99,
  author    = {Yuko Murayama and
               Vijay Varadharajan},
  title     = {Message from the {IWSEC} Workshop Co-Chairs},
  booktitle = {Proceedings of the 1999 International Conference on Parallel Processing
               Workshops, {ICPPW} 1999, Wakamatsu, Japan, September 21-24, 1999},
  pages     = {132--133},
  year      = {1999},
  crossref  = {DBLP:conf/icppw/1999},
  url       = {https://doi.org/10.1109/ICPP.1999.10010},
  doi       = {10.1109/ICPP.1999.10010},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icppw/MurayamaV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/WuV99,
  author    = {Chuan{-}Kun Wu and
               Vijay Varadharajan},
  title     = {Modified Chinese Remainder Theorem and Its Application to Proxy Signatures},
  booktitle = {Proceedings of the 1999 International Conference on Parallel Processing
               Workshops, {ICPPW} 1999, Wakamatsu, Japan, September 21-24, 1999},
  pages     = {146--153},
  year      = {1999},
  crossref  = {DBLP:conf/icppw/1999},
  url       = {https://doi.org/10.1109/ICPPW.1999.800054},
  doi       = {10.1109/ICPPW.1999.800054},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icppw/WuV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/MuVN99,
  author    = {Yi Mu and
               Vijay Varadharajan and
               Khanh Quoc Nguyen},
  title     = {Delegated Decryption},
  booktitle = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester,
               UK, December 20-22, 1999, Proceedings},
  pages     = {258--269},
  year      = {1999},
  crossref  = {DBLP:conf/ima/1999},
  url       = {https://doi.org/10.1007/3-540-46665-7\_30},
  doi       = {10.1007/3-540-46665-7\_30},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ima/MuVN99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/NguyenMV99,
  author    = {Khanh Quoc Nguyen and
               Yi Mu and
               Vijay Varadharajan},
  title     = {Undeniable Confirmer Signature},
  booktitle = {Information Security, Second International Workshop, ISW'99, Kuala
               Lumpur, Malaysia, November 1999, Proceedings},
  pages     = {235--246},
  year      = {1999},
  crossref  = {DBLP:conf/isw/1999},
  url       = {https://doi.org/10.1007/3-540-47790-X\_20},
  doi       = {10.1007/3-540-47790-X\_20},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/NguyenMV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/ShankaranVH99,
  author    = {Rajan Shankaran and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Secure Multicast Extensions for Mobile Networks},
  booktitle = {Proceedings 26th Conference on Local Computer Networks, Lowell, Massachusetts,
               USA, 17-20 October, 1999},
  pages     = {106--116},
  year      = {1999},
  crossref  = {DBLP:conf/lcn/1999},
  url       = {https://doi.org/10.1109/LCN.1999.802004},
  doi       = {10.1109/LCN.1999.802004},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/ShankaranVH99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safecomp/BaiV99,
  author    = {Yun Bai and
               Vijay Varadharajan},
  title     = {On Formal Languages for Sequences of Authorization Transformations},
  booktitle = {Computer Safety, Reliability and Security, 18th International Conference,
               SAFECOMP'99, Toulouse, France, September, 1999, Proceedings},
  pages     = {375--384},
  year      = {1999},
  crossref  = {DBLP:conf/safecomp/1999},
  url       = {https://doi.org/10.1007/3-540-48249-0\_32},
  doi       = {10.1007/3-540-48249-0\_32},
  timestamp = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/safecomp/BaiV99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tools/WangVS99,
  author    = {Hongxue Wang and
               Vijay Varadharajan and
               John K. Slaney},
  title     = {Towards Perfect Objects},
  booktitle = {{TOOLS} Pacific 1999: 32nd International Conference on Technology
               of Object-Oriented Languages and Systems, 22-25 November 1999, Melbourne,
               Australia},
  pages     = {115--126},
  year      = {1999},
  crossref  = {DBLP:conf/tools/32-1999},
  url       = {https://doi.org/10.1109/TOOLS.1999.809419},
  doi       = {10.1109/TOOLS.1999.809419},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tools/WangVS99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/1999,
  editor    = {Vijay Varadharajan and
               Yi Mu},
  title     = {Information and Communication Security, Second International Conference,
               ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1726},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/b72329},
  doi       = {10.1007/b72329},
  isbn      = {3-540-66682-6},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaiV98,
  author    = {Yun Bai and
               Vijay Varadharajan},
  title     = {A High Level Language for Conventional Access Control Models},
  booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
               Brisbane, Queensland, Australia, July 1998, Proceedings},
  pages     = {273--283},
  year      = {1998},
  crossref  = {DBLP:conf/acisp/1998},
  url       = {https://doi.org/10.1007/BFb0053740},
  doi       = {10.1007/BFb0053740},
  timestamp = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/BaiV98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VaradharajanCP98,
  author    = {Vijay Varadharajan and
               C. Crall and
               Joe Pato},
  title     = {Authorization in Enterprise-Wide Distributed System: {A} Practical
               Design and Application},
  booktitle = {14th Annual Computer Security Applications Conference {(ACSAC} 1998),
               7-11 December 1998, Scottsdale, AZ, {USA}},
  pages     = {178--189},
  year      = {1998},
  crossref  = {DBLP:conf/acsac/1998},
  url       = {https://doi.org/10.1109/CSAC.1998.738614},
  doi       = {10.1109/CSAC.1998.738614},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/VaradharajanCP98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShankaranV98,
  author    = {Rajan Shankaran and
               Vijay Varadharajan},
  title     = {Secure Signaling and Access Control for {ATM} Networks},
  booktitle = {14th Annual Computer Security Applications Conference {(ACSAC} 1998),
               7-11 December 1998, Scottsdale, AZ, {USA}},
  pages     = {212--222},
  year      = {1998},
  crossref  = {DBLP:conf/acsac/1998},
  url       = {https://doi.org/10.1109/CSAC.1998.738622},
  doi       = {10.1109/CSAC.1998.738622},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/ShankaranV98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/MuV98,
  author    = {Yi Mu and
               Vijay Varadharajan},
  title     = {Anonymous Secure E-Voting Over a Network},
  booktitle = {14th Annual Computer Security Applications Conference {(ACSAC} 1998),
               7-11 December 1998, Scottsdale, AZ, {USA}},
  pages     = {293--299},
  year      = {1998},
  crossref  = {DBLP:conf/acsac/1998},
  url       = {https://doi.org/10.1109/CSAC.1998.738649},
  doi       = {10.1109/CSAC.1998.738649},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/MuV98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/MuV98,
  author    = {Yi Mu and
               Vijay Varadharajan},
  title     = {A New Scheme of Credit based Payment for Electronic Commerce},
  booktitle = {Proceedings 23rd Conference on Local Computer Networks, Boston, Massachusetts,
               USA, October 11-14, 1998},
  pages     = {278--284},
  year      = {1998},
  crossref  = {DBLP:conf/lcn/1998},
  url       = {https://doi.org/10.1109/LCN.1998.727668},
  doi       = {10.1109/LCN.1998.727668},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/MuV98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pricai/WangVZ98,
  author    = {Hongxue Wang and
               Vijay Varadharajan and
               Yan Zhang},
  title     = {A Secure Communication Scheme for Multiagent Systems},
  booktitle = {Multiagent Platforms, First Pacific Rim International Workshop on
               Multi-Agents, {PRIMA} '98, Singapore, November 23, 1998, Selected
               Papers},
  pages     = {174--185},
  year      = {1998},
  crossref  = {DBLP:conf/prima/1998},
  url       = {https://doi.org/10.1007/3-540-48826-X\_13},
  doi       = {10.1007/3-540-48826-X\_13},
  timestamp = {Thu, 20 Sep 2018 16:01:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pricai/WangVZ98},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/VaradharajanK97,
  author    = {Vijay Varadharajan and
               Panos Katsavos},
  title     = {High-speed network security. I. {SMDS} and frame relay},
  journal   = {Computer Communications},
  volume    = {20},
  number    = {10},
  pages     = {832--847},
  year      = {1997},
  url       = {https://doi.org/10.1016/S0140-3664(97)00060-1},
  doi       = {10.1016/S0140-3664(97)00060-1},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/VaradharajanK97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/Varadharajan97,
  author    = {Vijay Varadharajan},
  title     = {Extending the Schematic Protection Model {II:} Revocation},
  journal   = {Operating Systems Review},
  volume    = {31},
  number    = {1},
  pages     = {64--77},
  year      = {1997},
  url       = {https://doi.org/10.1145/254784.254795},
  doi       = {10.1145/254784.254795},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/Varadharajan97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaiV97,
  author    = {Yun Bai and
               Vijay Varadharajan},
  title     = {Analysis and Implementation of a Formal Authorisation Policy Design
               Approach},
  booktitle = {Information Security and Privacy, Second Australasian Conference,
               ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  pages     = {14--25},
  year      = {1997},
  crossref  = {DBLP:conf/acisp/1997},
  url       = {https://doi.org/10.1007/BFb0027939},
  doi       = {10.1007/BFb0027939},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/BaiV97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/VaradharajanSH97,
  author    = {Vijay Varadharajan and
               Rajan Shankaran and
               Michael Hitchens},
  title     = {Security Issues in Asynchronous Transfer Mode},
  booktitle = {Information Security and Privacy, Second Australasian Conference,
               ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  pages     = {76--89},
  year      = {1997},
  crossref  = {DBLP:conf/acisp/1997},
  url       = {https://doi.org/10.1007/BFb0027945},
  doi       = {10.1007/BFb0027945},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/VaradharajanSH97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MuVL97,
  author    = {Yi Mu and
               Vijay Varadharajan and
               Yan{-}Xia Lin},
  title     = {New Micropayment Schemes Based on PayWords},
  booktitle = {Information Security and Privacy, Second Australasian Conference,
               ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  pages     = {283--293},
  year      = {1997},
  crossref  = {DBLP:conf/acisp/1997},
  url       = {https://doi.org/10.1007/BFb0027935},
  doi       = {10.1007/BFb0027935},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/MuVL97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NguyenMV97,
  author    = {Khanh Quoc Nguyen and
               Yi Mu and
               Vijay Varadharajan},
  title     = {Micro-Digital Money for Electronic Commerce},
  booktitle = {13th Annual Computer Security Applications Conference {(ACSAC} 1997),
               8-12 December 1997, San Diego, CA, {USA}},
  pages     = {2--8},
  year      = {1997},
  crossref  = {DBLP:conf/acsac/1997},
  url       = {https://doi.org/10.1109/CSAC.1997.646167},
  doi       = {10.1109/CSAC.1997.646167},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/NguyenMV97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NguyenMV97a,
  author    = {Khanh Quoc Nguyen and
               Yi Mu and
               Vijay Varadharajan},
  title     = {Secure and Efficient Digital Coins},
  booktitle = {13th Annual Computer Security Applications Conference {(ACSAC} 1997),
               8-12 December 1997, San Diego, CA, {USA}},
  pages     = {9--15},
  year      = {1997},
  crossref  = {DBLP:conf/acsac/1997},
  url       = {https://doi.org/10.1109/CSAC.1997.646168},
  doi       = {10.1109/CSAC.1997.646168},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/NguyenMV97a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BaiV97,
  author    = {Yun Bai and
               Vijay Varadharajan},
  title     = {A Logic For State Transformations in Authorization Policies},
  booktitle = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12,
               1997, Rockport, Massachusetts, {USA}},
  pages     = {173--182},
  year      = {1997},
  crossref  = {DBLP:conf/csfw/1997},
  url       = {https://doi.org/10.1109/CSFW.1997.596810},
  doi       = {10.1109/CSFW.1997.596810},
  timestamp = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/BaiV97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/BaiV97,
  author    = {Yun Bai and
               Vijay Varadharajan},
  title     = {A language for specifying sequences of authorization transformations
               and its applications},
  booktitle = {Information and Communication Security, First International Conference,
               ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  pages     = {39--49},
  year      = {1997},
  crossref  = {DBLP:conf/icics/1997},
  url       = {https://doi.org/10.1007/BFb0028460},
  doi       = {10.1007/BFb0028460},
  timestamp = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/BaiV97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/NguyenVM97,
  author    = {Khanh Quoc Nguyen and
               Vijay Varadharajan and
               Yi Mu},
  title     = {A New Efficient Off-line Anonymous Cash Scheme},
  booktitle = {Algorithms and Computation, 8th International Symposium, {ISAAC} '97,
               Singapore, December 17-19, 1997, Proceedings},
  pages     = {193--201},
  year      = {1997},
  crossref  = {DBLP:conf/isaac/1997},
  url       = {https://doi.org/10.1007/3-540-63890-3\_22},
  doi       = {10.1007/3-540-63890-3\_22},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isaac/NguyenVM97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/NguyenMV97,
  author    = {Khanh Quoc Nguyen and
               Yi Mu and
               Vijay Varadharajan},
  title     = {A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature},
  booktitle = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
               Japan, September 17-19, 1997, Proceedings},
  pages     = {313--320},
  year      = {1997},
  crossref  = {DBLP:conf/isw/1997},
  url       = {https://doi.org/10.1007/BFb0030431},
  doi       = {10.1007/BFb0030431},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/NguyenMV97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/VaradharajanSH97,
  author    = {Vijay Varadharajan and
               Rajan Shankaran and
               Michael Hitchens},
  title     = {Security services and public key infrastructure for {ATM} networks},
  booktitle = {22nd {IEEE} Conference on Local Computer Networks {(LCN} '97), 2-5
               November 1997, Minneapolis, Minnesota, USA, Proceedings},
  pages     = {253--262},
  year      = {1997},
  crossref  = {DBLP:conf/lcn/1997},
  url       = {https://doi.org/10.1109/LCN.1997.630995},
  doi       = {10.1109/LCN.1997.630995},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/VaradharajanSH97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pacis/BaiV97,
  author    = {Yun Bai and
               Vijay Varadharajan},
  title     = {A Formal Security Design Approach for Transformation of Authorizations
               in Information Systems},
  booktitle = {The Third Pacific Asia Conference on Information Systems, {PACIS}
               1997, Brisbane, Australia, April, 1-5, 1997},
  pages     = {81},
  year      = {1997},
  crossref  = {DBLP:conf/pacis/1997},
  url       = {http://aisel.aisnet.org/pacis1997/81},
  timestamp = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pacis/BaiV97},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/1997,
  editor    = {Vijay Varadharajan and
               Josef Pieprzyk and
               Yi Mu},
  title     = {Information Security and Privacy, Second Australasian Conference,
               ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1270},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/BFb0027916},
  doi       = {10.1007/BFb0027916},
  isbn      = {3-540-63232-8},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/VaradharajanC96,
  author    = {Vijay Varadharajan and
               Claudio Calvelli},
  title     = {Key management for a secure {LAN-SMDS} network},
  journal   = {Computer Communications},
  volume    = {19},
  number    = {9-10},
  pages     = {813--823},
  year      = {1996},
  url       = {https://doi.org/10.1016/S0140-3664(96)01111-5},
  doi       = {10.1016/S0140-3664(96)01111-5},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/VaradharajanC96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VaradharajanC96,
  author    = {Vijay Varadharajan and
               Claudio Calvelli},
  title     = {Extending the schematic protection model - {II.} Revocation},
  journal   = {Computers {\&} Security},
  volume    = {15},
  number    = {6},
  pages     = {525--536},
  year      = {1996},
  url       = {https://doi.org/10.1016/S0167-4048(96)00010-7},
  doi       = {10.1016/S0167-4048(96)00010-7},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/VaradharajanC96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/VaradharajanA96,
  author    = {Vijay Varadharajan and
               Phillip Allen},
  title     = {Joint Actions Based Authorization Schemes},
  journal   = {Operating Systems Review},
  volume    = {30},
  number    = {3},
  pages     = {32--45},
  year      = {1996},
  url       = {https://doi.org/10.1145/230908.230915},
  doi       = {10.1145/230908.230915},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/VaradharajanA96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/VaradharajanC96,
  author    = {Vijay Varadharajan and
               Claudio Calvelli},
  title     = {An Access Control Model and Its Use in Representing Mental Health
               Application Access Policy},
  journal   = {{IEEE} Trans. Knowl. Data Eng.},
  volume    = {8},
  number    = {1},
  pages     = {81--95},
  year      = {1996},
  url       = {https://doi.org/10.1109/69.485638},
  doi       = {10.1109/69.485638},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tkde/VaradharajanC96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MuV96,
  author    = {Yi Mu and
               Vijay Varadharajan},
  title     = {On the design of security protocols for mobile communications},
  booktitle = {Information Security and Privacy, First Australasian Conference, ACISP'96,
               Wollongong, NSW, Australia, June 24-26, 1996, Proceedings},
  pages     = {134--145},
  year      = {1996},
  crossref  = {DBLP:conf/acisp/1996},
  url       = {https://doi.org/10.1007/BFb0023294},
  doi       = {10.1007/BFb0023294},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/MuV96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/VaradharajanA96,
  author    = {Vijay Varadharajan and
               Phillip Allen},
  title     = {Support for joint action based security policies},
  booktitle = {Information Security and Privacy, First Australasian Conference, ACISP'96,
               Wollongong, NSW, Australia, June 24-26, 1996, Proceedings},
  pages     = {207--218},
  year      = {1996},
  crossref  = {DBLP:conf/acisp/1996},
  url       = {https://doi.org/10.1007/BFb0023300},
  doi       = {10.1007/BFb0023300},
  timestamp = {Mon, 22 May 2017 16:14:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/VaradharajanA96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VaradharajanM96,
  author    = {Vijay Varadharajan and
               Yi Mu},
  title     = {On The Design Of Secure Electronic Payment Schemes For Internet},
  booktitle = {12th Annual Computer Security Applications Conference {(ACSAC} 1996),
               9-13 December 1996, San Diego, CA, {USA}},
  pages     = {78--87},
  year      = {1996},
  crossref  = {DBLP:conf/acsac/1996},
  url       = {https://doi.org/10.1109/CSAC.1996.569674},
  doi       = {10.1109/CSAC.1996.569674},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/VaradharajanM96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HitchensV96,
  author    = {Michael Hitchens and
               Vijay Varadharajan},
  title     = {esign Choices For Symmetric Key Based Inter-Domain Authentication
               Protocols In Distributed Systems},
  booktitle = {12th Annual Computer Security Applications Conference {(ACSAC} 1996),
               9-13 December 1996, San Diego, CA, {USA}},
  pages     = {105--116},
  year      = {1996},
  crossref  = {DBLP:conf/acsac/1996},
  url       = {https://doi.org/10.1109/CSAC.1996.569679},
  doi       = {10.1109/CSAC.1996.569679},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/HitchensV96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip/VaradharajanM96,
  author    = {Vijay Varadharajan and
               Yi Mu},
  title     = {Design of Secure End-toEnd Protocols for Mobile Systems},
  booktitle = {{IFIP} World Conference on Mobile Communications},
  pages     = {258--266},
  year      = {1996},
  timestamp = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ifip/VaradharajanM96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/Varadharajan96,
  author    = {Vijay Varadharajan},
  title     = {Security in High-Speed Networks},
  booktitle = {Proceedings 21st Conference on Local Computer Networks, Minneapolis,
               Minnesota, USA, October 13-16, 1996},
  pages     = {2--11},
  year      = {1996},
  crossref  = {DBLP:conf/lcn/1996},
  url       = {https://doi.org/10.1109/LCN.1996.558125},
  doi       = {10.1109/LCN.1996.558125},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/Varadharajan96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/VaradharajanH96,
  author    = {Vijay Varadharajan and
               Thomas Hardjono},
  title     = {Security model for distributed object framework and its applicability
               to {CORBA}},
  booktitle = {Information Systems Security, Facing the information society of the
               21st Century},
  pages     = {452--463},
  year      = {1996},
  crossref  = {DBLP:conf/sec/1996},
  timestamp = {Thu, 03 Jan 2002 12:08:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sec/VaradharajanH96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/Varadharajan96,
  author    = {Vijay Varadharajan},
  title     = {Design of enterprise-wide secure networked system},
  booktitle = {5th Workshop on Enabling Technologies, Infrastructure for Collaborative
               Enterprises (WET-ICE'96), June 19-21, 1996, Stanford, CA, USA, Proceedings},
  pages     = {100--105},
  year      = {1996},
  crossref  = {DBLP:conf/wetice/1996},
  url       = {https://doi.org/10.1109/ENABL.1996.555093},
  doi       = {10.1109/ENABL.1996.555093},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wetice/Varadharajan96},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/KatsavosV94,
  author    = {Panos Katsavos and
               Vijay Varadharajan},
  title     = {A Secure Frame Relay Service},
  journal   = {Computer Networks and {ISDN} Systems},
  volume    = {26},
  number    = {12},
  pages     = {1539--1558},
  year      = {1994},
  url       = {https://doi.org/10.1016/0169-7552(94)90028-0},
  doi       = {10.1016/0169-7552(94)90028-0},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cn/KatsavosV94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VaradharajanC94,
  author    = {Vijay Varadharajan and
               Claudio Calvelli},
  title     = {Extending the schematic protection model. I. Conditional tickets and
               authentication},
  booktitle = {1994 {IEEE} Computer Society Symposium on Research in Security and
               Privacy, Oakland, CA, USA, May 16-18, 1994},
  pages     = {213--229},
  year      = {1994},
  crossref  = {DBLP:conf/sp/1994},
  url       = {https://doi.org/10.1109/RISP.1994.296579},
  doi       = {10.1109/RISP.1994.296579},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/VaradharajanC94},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccr/KatsavosV93,
  author    = {Panagiotis Katsavos and
               Vijay Varadharajan},
  title     = {Security protocol for Frame Relay},
  journal   = {Computer Communication Review},
  volume    = {23},
  number    = {5},
  pages     = {17--35},
  year      = {1993},
  url       = {https://doi.org/10.1145/165611.165614},
  doi       = {10.1145/165611.165614},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ccr/KatsavosV93},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/CalvelliV93,
  author    = {Claudio Calvelli and
               Vijay Varadharajan},
  title     = {Authentication and Revocation in {SPM} (Extended Abstract)},
  journal   = {Operating Systems Review},
  volume    = {27},
  number    = {4},
  pages     = {42--57},
  year      = {1993},
  url       = {https://doi.org/10.1145/163640.163644},
  doi       = {10.1145/163640.163644},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/CalvelliV93},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CalvelliV93,
  author    = {Claudio Calvelli and
               Vijay Varadharajan},
  title     = {Representation of mental health application access policy in a monotonic
               model},
  booktitle = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
               6-10 Decemver, 1993, Orlando, Florida, {USA}},
  pages     = {195--209},
  year      = {1993},
  crossref  = {DBLP:conf/acsac/1993},
  url       = {https://doi.org/10.1109/CSAC.1993.315439},
  doi       = {10.1109/CSAC.1993.315439},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/CalvelliV93},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CalvelliV92,
  author    = {Claudio Calvelli and
               Vijay Varadharajan},
  title     = {An Analysis of some Delegation Protocols for Distributed Systems},
  booktitle = {5th {IEEE} Computer Security Foundations Workshop - CSFW'92, Franconia,
               New Hampshire, USA, June 16-18, 1992, Proceedings},
  pages     = {92--110},
  year      = {1992},
  crossref  = {DBLP:conf/csfw/1992},
  url       = {https://doi.org/10.1109/CSFW.1992.236784},
  doi       = {10.1109/CSFW.1992.236784},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/CalvelliV92},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MitchellV91,
  author    = {Chris J. Mitchell and
               Vijay Varadharajan},
  title     = {Modified forms of cipher block chaining},
  journal   = {Computers {\&} Security},
  volume    = {10},
  number    = {1},
  pages     = {37--40},
  year      = {1991},
  url       = {https://doi.org/10.1016/0167-4048(91)90054-H},
  doi       = {10.1016/0167-4048(91)90054-H},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/MitchellV91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VaradharajanB91,
  author    = {Vijay Varadharajan and
               Stewart Black},
  title     = {Multilevel security in a distributed object-oriented system},
  journal   = {Computers {\&} Security},
  volume    = {10},
  number    = {1},
  pages     = {51--68},
  year      = {1991},
  url       = {https://doi.org/10.1016/0167-4048(91)90056-J},
  doi       = {10.1016/0167-4048(91)90056-J},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/VaradharajanB91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/Varadharajan91,
  author    = {Vijay Varadharajan},
  title     = {A petri net model for system design and refinement},
  journal   = {Journal of Systems and Software},
  volume    = {15},
  number    = {3},
  pages     = {239--250},
  year      = {1991},
  url       = {https://doi.org/10.1016/0164-1212(91)90040-D},
  doi       = {10.1016/0164-1212(91)90040-D},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jss/Varadharajan91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Varadharajan91,
  author    = {Vijay Varadharajan},
  title     = {Hook-Up Property of Information Flow Secure Nets},
  booktitle = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia,
               New Hampshire, USA, June 18-20, 1991, Proceedings},
  pages     = {154--175},
  year      = {1991},
  crossref  = {DBLP:conf/csfw/1991},
  url       = {https://doi.org/10.1109/CSFW.1991.151582},
  doi       = {10.1109/CSFW.1991.151582},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/Varadharajan91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/VaradharajanAB91,
  author    = {Vijay Varadharajan and
               Phillip Allen and
               Stewart Black},
  title     = {An Analysis of the Proxy Problem in Distributed Systems},
  booktitle = {{IEEE} Symposium on Security and Privacy},
  pages     = {255--277},
  year      = {1991},
  url       = {https://doi.org/10.1109/RISP.1991.130793},
  doi       = {10.1109/RISP.1991.130793},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/VaradharajanAB91},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/VaradharajanB90,
  author    = {Vijay Varadharajan and
               Stewart Black},
  title     = {A multilevel security model for a distributed object-oriented system},
  booktitle = {Sixth Annual Computer Security Applications Conference, {ACSAC} 1990,
               3-7 December, 1990, Tucson, Arizona, {USA}},
  pages     = {68--78},
  year      = {1990},
  crossref  = {DBLP:conf/acsac/1990},
  url       = {https://doi.org/10.1109/CSAC.1990.143753},
  doi       = {10.1109/CSAC.1990.143753},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/VaradharajanB90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Varadharajan90,
  author    = {Vijay Varadharajan},
  title     = {Network Security Policy Models},
  booktitle = {Advances in Cryptology - {AUSCRYPT} '90, International Conference
               on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings},
  pages     = {74--95},
  year      = {1990},
  crossref  = {DBLP:conf/asiacrypt/1990},
  url       = {https://doi.org/10.1007/BFb0030353},
  doi       = {10.1007/BFb0030353},
  timestamp = {Fri, 19 May 2017 13:10:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/Varadharajan90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Varadharajan90,
  author    = {Vijay Varadharajan},
  title     = {Petri Net Based Modelling of Information Flow Security Requirements},
  booktitle = {Third {IEEE} Computer Security Foundations Workshop - CSFW'90, Franconia,
               New Hampshire, USA, June 12-14, 1990, Proceedings},
  pages     = {51--61},
  year      = {1990},
  crossref  = {DBLP:conf/csfw/1990},
  url       = {https://doi.org/10.1109/CSFW.1990.128185},
  doi       = {10.1109/CSFW.1990.128185},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/Varadharajan90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/Varadharajan90,
  author    = {Vijay Varadharajan},
  title     = {A Multilevel Security Policy for Networks},
  booktitle = {Proceedings {IEEE} {INFOCOM} '90, The Conference on Computer Communications,
               Ninth Annual Joint Conference of the {IEEE} Computer and Communications
               Societies, The Multiple Facets of Integration, San Francisco, CA,
               USA, June 3-7, 1990},
  pages     = {710--718},
  year      = {1990},
  crossref  = {DBLP:conf/infocom/1990},
  url       = {https://doi.org/10.1109/INFCOM.1990.91313},
  doi       = {10.1109/INFCOM.1990.91313},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/Varadharajan90},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Varadharajan89,
  author    = {Vijay Varadharajan},
  title     = {Verification of network security protocols},
  journal   = {Computers {\&} Security},
  volume    = {8},
  number    = {8},
  pages     = {693--708},
  year      = {1989},
  url       = {https://doi.org/10.1016/0167-4048(89)90008-4},
  doi       = {10.1016/0167-4048(89)90008-4},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/Varadharajan89},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/VaradharajanB87,
  author    = {Vijay Varadharajan and
               Keith D. Baker},
  title     = {Net-Based System Design Representation and Analysis},
  journal   = {Comput. Syst. Sci. Eng.},
  volume    = {2},
  number    = {4},
  pages     = {167--178},
  year      = {1987},
  timestamp = {Thu, 02 May 2013 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/csse/VaradharajanB87},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iee/VaradharajanB87,
  author    = {Vijay Varadharajan and
               Keith D. Baker},
  title     = {Directed graph based representation for software system design},
  journal   = {Software Engineering Journal},
  volume    = {2},
  number    = {1},
  pages     = {21--28},
  year      = {1987},
  url       = {https://doi.org/10.1049/sej.1987.0004},
  doi       = {10.1049/sej.1987.0004},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iee/VaradharajanB87},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/VaradharajanS85,
  author    = {Vijay Varadharajan and
               Peter W. Sanders},
  title     = {Practical secure electronic mail system with public key distribution},
  journal   = {Computer Communications},
  volume    = {8},
  number    = {3},
  pages     = {121--127},
  year      = {1985},
  url       = {https://doi.org/10.1016/0140-3664(85)90152-5},
  doi       = {10.1016/0140-3664(85)90152-5},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/VaradharajanS85},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/VaradharajanO85,
  author    = {Vijay Varadharajan and
               Robert W. K. Odoni},
  title     = {Extension of {RSA} Cryptosystems to Matrix Rings},
  journal   = {Cryptologia},
  volume    = {9},
  number    = {2},
  pages     = {140--153},
  year      = {1985},
  url       = {https://doi.org/10.1080/0161-118591859852},
  doi       = {10.1080/0161-118591859852},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cryptologia/VaradharajanO85},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Varadharajan85,
  author    = {Vijay Varadharajan},
  title     = {Trapdoor Rings and Their Use in Cryptography},
  booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
               USA, August 18-22, 1985, Proceedings},
  pages     = {369--395},
  year      = {1985},
  crossref  = {DBLP:conf/crypto/1985},
  url       = {https://doi.org/10.1007/3-540-39799-X\_27},
  doi       = {10.1007/3-540-39799-X\_27},
  timestamp = {Fri, 19 May 2017 12:26:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/Varadharajan85},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/SandersV83,
  author    = {Peter W. Sanders and
               Vijay Varadharajan},
  title     = {Secure communications between microcomputer systems},
  journal   = {Computer Communications},
  volume    = {6},
  number    = {5},
  pages     = {245--252},
  year      = {1983},
  url       = {https://doi.org/10.1016/0140-3664(83)90086-5},
  doi       = {10.1016/0140-3664(83)90086-5},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/comcom/SandersV83},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iconip/2018-4,
  editor    = {Long Cheng and
               Andrew Chi{-}Sing Leung and
               Seiichi Ozawa},
  title     = {Neural Information Processing - 25th International Conference, {ICONIP}
               2018, Siem Reap, Cambodia, December 13-16, 2018, Proceedings, Part
               {IV}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11304},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-04212-7},
  doi       = {10.1007/978-3-030-04212-7},
  isbn      = {978-3-030-04211-0},
  timestamp = {Tue, 04 Dec 2018 09:21:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iconip/2018-4},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wowmom/2018,
  title     = {19th {IEEE} International Symposium on "A World of Wireless, Mobile
               and Multimedia Networks", WoWMoM 2018, Chania, Greece, June 12-15,
               2018},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8412803},
  isbn      = {978-1-5386-4725-7},
  timestamp = {Tue, 04 Sep 2018 13:24:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wowmom/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsw/2017,
  title     = {Proceedings of the Australasian Computer Science Week Multiconference,
               {ACSW} 2017, Geelong, Australia, January 31 - February 3, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3014812},
  doi       = {10.1145/3014812},
  isbn      = {978-1-4503-4768-6},
  timestamp = {Tue, 06 Nov 2018 11:06:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsw/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iconip/2017-5,
  editor    = {Derong Liu and
               Shengli Xie and
               Yuanqing Li and
               Dongbin Zhao and
               El{-}Sayed M. El{-}Alfy},
  title     = {Neural Information Processing - 24th International Conference, {ICONIP}
               2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part {V}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10638},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70139-4},
  doi       = {10.1007/978-3-319-70139-4},
  isbn      = {978-3-319-70138-7},
  timestamp = {Fri, 10 Aug 2018 11:00:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iconip/2017-5},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ijcnn/2017,
  title     = {2017 International Joint Conference on Neural Networks, {IJCNN} 2017,
               Anchorage, AK, USA, May 14-19, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7958416},
  isbn      = {978-1-5090-6182-2},
  timestamp = {Mon, 10 Jul 2017 09:14:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ijcnn/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/im/2017,
  title     = {2017 {IFIP/IEEE} Symposium on Integrated Network and Service Management
               (IM), Lisbon, Portugal, May 8-12, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7976714},
  isbn      = {978-3-901882-89-0},
  timestamp = {Fri, 28 Jul 2017 08:21:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/im/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2017,
  title     = {42nd {IEEE} Conference on Local Computer Networks, {LCN} 2017, Singapore,
               October 9-12, 2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8108703},
  isbn      = {978-1-5090-6523-3},
  timestamp = {Wed, 22 Nov 2017 17:23:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobiquitous/2017,
  editor    = {Tao Gu and
               Ramamohanarao Kotagiri and
               Huai Liu},
  title     = {Proceedings of the 14th {EAI} International Conference on Mobile and
               Ubiquitous Systems: Computing, Networking and Services, Melbourne,
               Australia, November 7-10, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3144457},
  timestamp = {Thu, 09 Aug 2018 09:24:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobiquitous/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sds/2017,
  title     = {2017 Fourth International Conference on Software Defined Systems,
               {SDS} 2017, Valencia, Spain, May 8-11, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7936434},
  isbn      = {978-1-5386-2855-3},
  timestamp = {Tue, 13 Jun 2017 19:18:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sds/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2017,
  title     = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
               2017},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8027145},
  isbn      = {978-1-5090-4906-6},
  timestamp = {Fri, 15 Feb 2019 12:58:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wise/2017-2,
  editor    = {Athman Bouguettaya and
               Yunjun Gao and
               Andrey Klimenko and
               Lu Chen and
               Xiangliang Zhang and
               Fedor Dzerzhinskiy and
               Weijia Jia and
               Stanislav V. Klimenko and
               Qing Li},
  title     = {Web Information Systems Engineering - {WISE} 2017 - 18th International
               Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part
               {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10570},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-68786-5},
  doi       = {10.1007/978-3-319-68786-5},
  isbn      = {978-3-319-68785-8},
  timestamp = {Wed, 14 Mar 2018 16:00:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wise/2017-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hpcc/2016,
  editor    = {Jinjun Chen and
               Laurence T. Yang},
  title     = {18th {IEEE} International Conference on High Performance Computing
               and Communications; 14th {IEEE} International Conference on Smart
               City; 2nd {IEEE} International Conference on Data Science and Systems,
               HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7819725},
  isbn      = {978-1-5090-4297-5},
  timestamp = {Thu, 07 Feb 2019 16:03:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hpcc/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icacci/2016,
  title     = {2016 International Conference on Advances in Computing, Communications
               and Informatics, {ICACCI} 2016, Jaipur, India, September 21-24, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7592392},
  isbn      = {978-1-5090-2029-4},
  timestamp = {Mon, 28 Nov 2016 11:00:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icacci/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2016,
  title     = {41st {IEEE} Conference on Local Computer Networks, {LCN} 2016, Dubai,
               United Arab Emirates, November 7-10, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7795840},
  isbn      = {978-1-5090-2054-6},
  timestamp = {Tue, 03 Jan 2017 17:32:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sac/2016,
  editor    = {Sascha Ossowski},
  title     = {Proceedings of the 31st Annual {ACM} Symposium on Applied Computing,
               Pisa, Italy, April 4-8, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2851613},
  doi       = {10.1145/2851613},
  isbn      = {978-1-4503-3739-7},
  timestamp = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2016,
  title     = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
               2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7845250},
  isbn      = {978-1-5090-3205-1},
  timestamp = {Wed, 15 Feb 2017 10:43:47 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsc/2015,
  editor    = {David Parry},
  title     = {38th Australasian Computer Science Conference, {ACSC} 2015, Sydney,
               Australia, January 2015},
  series    = {{CRPIT}},
  volume    = {159},
  publisher = {Australian Computer Society},
  year      = {2015},
  url       = {http://crpit.com/Vol159.html},
  isbn      = {978-1-921770-41-8},
  timestamp = {Fri, 03 Jul 2015 13:05:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsc/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/auisc/2015,
  editor    = {Ian Welch and
               Xun Yi},
  title     = {13th Australasian Information Security Conference, {AISC} 2015, Sydney,
               Australia, January 2015},
  series    = {{CRPIT}},
  volume    = {161},
  publisher = {Australian Computer Society},
  year      = {2015},
  url       = {http://crpit.com/Vol161.html},
  isbn      = {978-1-921770-43-2},
  timestamp = {Fri, 03 Jul 2015 13:14:59 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/auisc/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015asia,
  editor    = {Feng Bao and
               Steven Miller and
               Jianying Zhou and
               Gail{-}Joon Ahn},
  title     = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
               2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2714576},
  isbn      = {978-1-4503-3245-3},
  timestamp = {Tue, 21 Nov 2017 18:32:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dsn/2015,
  title     = {45th Annual {IEEE/IFIP} International Conference on Dependable Systems
               and Networks, {DSN} 2015, Rio de Janeiro, Brazil, June 22-25, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7265894},
  isbn      = {978-1-4799-8629-3},
  timestamp = {Thu, 31 Mar 2016 11:13:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dsn/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iceccs/2015,
  title     = {20th International Conference on Engineering of Complex Computer Systems,
               {ICECCS} 2015, Gold Coast, Australia, December 9-12, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7381588},
  isbn      = {978-1-4673-8581-7},
  timestamp = {Tue, 03 May 2016 13:47:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iceccs/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ict/2015,
  title     = {22nd International Conference on Telecommunications, {ICT} 2015, Sydney,
               Australia, April 27-29, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7109533},
  isbn      = {978-1-4799-8078-9},
  timestamp = {Mon, 22 Jun 2015 14:34:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ict/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2015,
  editor    = {Javier L{\'{o}}pez and
               Chris J. Mitchell},
  title     = {Information Security - 18th International Conference, {ISC} 2015,
               Trondheim, Norway, September 9-11, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9290},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-23318-5},
  doi       = {10.1007/978-3-319-23318-5},
  isbn      = {978-3-319-23317-8},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/itnac/2015,
  title     = {International Telecommunication Networks and Applications Conference,
               {ITNAC} 2015, Sydney, Australia, November 18-20, 2015},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7363403},
  isbn      = {978-1-4673-9348-5},
  timestamp = {Wed, 07 Feb 2018 16:55:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/itnac/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sac/2015,
  editor    = {Roger L. Wainwright and
               Juan Manuel Corchado and
               Alessio Bechini and
               Jiman Hong},
  title     = {Proceedings of the 30th Annual {ACM} Symposium on Applied Computing,
               Salamanca, Spain, April 13-17, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2695664},
  isbn      = {978-1-4503-3196-8},
  timestamp = {Tue, 21 Jul 2015 14:16:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sac/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aswec/2014,
  title     = {23rd Australian Software Engineering Conference, {ASWEC} 2014, Milsons
               Point, Sydney, NSW, Australia, April 7-10, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6823821},
  isbn      = {978-1-4799-3149-1},
  timestamp = {Thu, 16 Oct 2014 11:29:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aswec/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/auisc/2014,
  editor    = {Udaya Parampalli and
               Ian Welch},
  title     = {Twelfth Australasian Information Security Conference, {AISC} 2014,
               Auckland, New Zealand, January 2014},
  series    = {{CRPIT}},
  volume    = {149},
  publisher = {Australian Computer Society},
  year      = {2014},
  url       = {http://crpit.com/Vol149.html},
  isbn      = {978-1-921770-32-6},
  timestamp = {Fri, 03 Jul 2015 13:12:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/auisc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/bdcloud/2014,
  title     = {2014 {IEEE} Fourth International Conference on Big Data and Cloud
               Computing, BDCloud 2014, Sydney, Australia, December 3-5, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7031559},
  isbn      = {978-1-4799-6719-3},
  timestamp = {Fri, 23 Dec 2016 10:24:41 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/bdcloud/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2014-2,
  editor    = {Miroslaw Kutylowski and
               Jaideep Vaidya},
  title     = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
               in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8713},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-11212-1},
  doi       = {10.1007/978-3-319-11212-1},
  isbn      = {978-3-319-11211-4},
  timestamp = {Tue, 23 May 2017 01:07:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2014-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosys/2014,
  editor    = {Dick C. A. Bulterman and
               Herbert Bos and
               Antony I. T. Rowstron and
               Peter Druschel},
  title     = {Ninth Eurosys Conference 2014, EuroSys 2014, Amsterdam, The Netherlands,
               April 13-16, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2592798},
  isbn      = {978-1-4503-2704-6},
  timestamp = {Fri, 13 Jun 2014 16:30:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosys/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iccnc/2014,
  title     = {International Conference on Computing, Networking and Communications,
               {ICNC} 2014, Honolulu, HI, USA, February 3-6, 2014},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6778476},
  timestamp = {Thu, 16 Apr 2015 18:45:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iccnc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icde/2014,
  editor    = {Isabel F. Cruz and
               Elena Ferrari and
               Yufei Tao and
               Elisa Bertino and
               Goce Trajcevski},
  title     = {{IEEE} 30th International Conference on Data Engineering, Chicago,
               {ICDE} 2014, IL, USA, March 31 - April 4, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6811095},
  isbn      = {978-1-4799-3480-5},
  timestamp = {Mon, 25 Apr 2016 13:11:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icde/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iceccs/2014,
  title     = {2014 19th International Conference on Engineering of Complex Computer
               Systems, Tianjin, China, August 4-7, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6921524},
  isbn      = {978-1-4799-5482-7},
  timestamp = {Thu, 23 Apr 2015 17:57:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iceccs/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rfidsec/2014,
  editor    = {Nitesh Saxena and
               Ahmad{-}Reza Sadeghi},
  title     = {Radio Frequency Identification: Security and Privacy Issues - 10th
               International Workshop, RFIDSec 2014, Oxford, UK, July 21-23, 2014,
               Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8651},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13066-8},
  doi       = {10.1007/978-3-319-13066-8},
  isbn      = {978-3-319-13065-1},
  timestamp = {Wed, 24 May 2017 08:28:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/rfidsec/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sac/2014,
  editor    = {Yookun Cho and
               Sung Y. Shin and
               Sang{-}Wook Kim and
               Chih{-}Cheng Hung and
               Jiman Hong},
  title     = {Symposium on Applied Computing, {SAC} 2014, Gyeongju, Republic of
               Korea - March 24 - 28, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2554850},
  isbn      = {978-1-4503-2469-4},
  timestamp = {Sun, 20 Jul 2014 11:32:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sac/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2014-1,
  editor    = {Jing Tian and
               Jiwu Jing and
               Mudhakar Srivatsa},
  title     = {International Conference on Security and Privacy in Communication
               Networks - 10th International {ICST} Conference, SecureComm 2014,
               Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
               {I}},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {152},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-23829-6},
  doi       = {10.1007/978-3-319-23829-6},
  isbn      = {978-3-319-23828-9},
  timestamp = {Tue, 23 May 2017 01:12:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2014-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2014,
  title     = {13th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2014, Beijing, China, September
               24-26, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7008824},
  isbn      = {978-1-4799-6513-7},
  timestamp = {Thu, 13 Aug 2015 18:46:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2013,
  editor    = {Colin Boyd and
               Leonie Simpson},
  title     = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
               2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7959},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39059-3},
  doi       = {10.1007/978-3-642-39059-3},
  isbn      = {978-3-642-39058-6},
  timestamp = {Thu, 25 May 2017 00:42:39 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/awc/2013,
  editor    = {Helen Ashman and
               Quan Z. Sheng and
               Andrew Trotman},
  title     = {First Australasian Web Conference, {AWC} 2013, Adelaide, Australia,
               January 2013},
  series    = {{CRPIT}},
  volume    = {144},
  publisher = {Australian Computer Society},
  year      = {2013},
  url       = {http://crpit.com/Vol144.html},
  isbn      = {978-1-921770-29-6},
  timestamp = {Sun, 05 Jul 2015 18:17:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/awc/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cloudcom/2013-1,
  title     = {{IEEE} 5th International Conference on Cloud Computing Technology
               and Science, CloudCom 2013, Bristol, United Kingdom, December 2-5,
               2013, Volume 1},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=6735455},
  isbn      = {978-0-7695-5095-4},
  timestamp = {Tue, 02 Jun 2015 18:34:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cloudcom/2013-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cse/2013,
  title     = {16th {IEEE} International Conference on Computational Science and
               Engineering, {CSE} 2013, December 3-5, 2013, Sydney, Australia},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6724092},
  isbn      = {978-0-7695-5096-1},
  timestamp = {Thu, 07 May 2015 18:17:27 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cse/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/euspn/2013,
  editor    = {Elhadi M. Shakshuki},
  title     = {The 4th International Conference on Emerging Ubiquitous Systems and
               Pervasive Networks {(EUSPN-2013)} and the 3rd International Conference
               on Current and Future Trends of Information and Communication Technologies
               in Healthcare (ICTH), Niagara Falls, Ontario, Canada, October 21-24,
               2013},
  series    = {Procedia Computer Science},
  volume    = {21},
  publisher = {Elsevier},
  year      = {2013},
  url       = {http://www.sciencedirect.com/science/journal/18770509/21},
  timestamp = {Tue, 19 May 2015 17:01:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/euspn/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icete/2013,
  editor    = {Mohammad S. Obaidat and
               Joaquim Filipe},
  title     = {E-Business and Telecommunications - International Joint Conference,
               {ICETE} 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected
               Papers},
  series    = {Communications in Computer and Information Science},
  volume    = {456},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44788-8},
  doi       = {10.1007/978-3-662-44788-8},
  isbn      = {978-3-662-44787-1},
  timestamp = {Fri, 02 Nov 2018 09:49:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icete/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2013,
  editor    = {Robert H. Deng and
               Tao Feng},
  title     = {Information Security Practice and Experience - 9th International Conference,
               {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7863},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38033-4},
  doi       = {10.1007/978-3-642-38033-4},
  isbn      = {978-3-642-38032-7},
  timestamp = {Sun, 21 May 2017 00:18:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2013,
  editor    = {Yvo Desmedt},
  title     = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
               Texas, USA, November 13-15, 2013, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7807},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-27659-5},
  doi       = {10.1007/978-3-319-27659-5},
  isbn      = {978-3-319-27658-8},
  timestamp = {Sun, 21 May 2017 00:20:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rfidsec/2013a,
  editor    = {Changshe Ma and
               Jian Weng},
  title     = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop
               Proceedings, Guangzhou, China, November 27, 2013},
  series    = {Cryptology and Information Security Series},
  volume    = {11},
  publisher = {{IOS} Press},
  year      = {2013},
  isbn      = {978-1-61499-327-8},
  timestamp = {Mon, 16 Mar 2015 08:13:15 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/rfidsec/2013a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sac/2013,
  editor    = {Sung Y. Shin and
               Jos{\'{e}} Carlos Maldonado},
  title     = {Proceedings of the 28th Annual {ACM} Symposium on Applied Computing,
               {SAC} '13, Coimbra, Portugal, March 18-22, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2480362},
  isbn      = {978-1-4503-1656-9},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sac/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2013,
  editor    = {Pierangela Samarati},
  title     = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  publisher = {SciTePress},
  year      = {2013},
  isbn      = {978-989-8565-73-0},
  timestamp = {Tue, 05 Nov 2013 12:35:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2013,
  editor    = {Tanveer A. Zia and
               Albert Y. Zomaya and
               Vijay Varadharajan and
               Zhuoqing Morley Mao},
  title     = {Security and Privacy in Communication Networks - 9th International
               {ICST} Conference, SecureComm 2013, Sydney, NSW, Australia, September
               25-28, 2013, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {127},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-04283-1},
  doi       = {10.1007/978-3-319-04283-1},
  isbn      = {978-3-319-04282-4},
  timestamp = {Mon, 05 Jun 2017 12:43:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2013,
  title     = {12th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2013 / 11th {IEEE} International
               Symposium on Parallel and Distributed Processing with Applications,
               {ISPA-13} / 12th {IEEE} International Conference on Ubiquitous Computing
               and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6679587},
  isbn      = {978-0-7695-5022-0},
  timestamp = {Thu, 13 Aug 2015 18:46:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/apweb/2012,
  editor    = {Quan Z. Sheng and
               Guoren Wang and
               Christian S. Jensen and
               Guandong Xu},
  title     = {Web Technologies and Applications - 14th Asia-Pacific Web Conference,
               APWeb 2012, Kunming, China, April 11-13, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7235},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29253-8},
  doi       = {10.1007/978-3-642-29253-8},
  isbn      = {978-3-642-29252-1},
  timestamp = {Thu, 01 Jun 2017 18:58:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/apweb/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2012,
  editor    = {Sara Foresti and
               Moti Yung and
               Fabio Martinelli},
  title     = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
               in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7459},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-33167-1},
  doi       = {10.1007/978-3-642-33167-1},
  isbn      = {978-3-642-33166-4},
  timestamp = {Fri, 02 Jun 2017 20:48:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hipc/2012,
  title     = {19th International Conference on High Performance Computing, HiPC
               2012, Pune, India, December 18-22, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6504607},
  isbn      = {978-1-4673-2372-7},
  timestamp = {Thu, 18 Sep 2014 16:58:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hipc/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2012,
  editor    = {Mark Dermot Ryan and
               Ben Smyth and
               Guilin Wang},
  title     = {Information Security Practice and Experience - 8th International Conference,
               {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7232},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29101-2},
  doi       = {10.1007/978-3-642-29101-2},
  isbn      = {978-3-642-29100-5},
  timestamp = {Sun, 21 May 2017 00:18:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ispec/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/noms/2012,
  editor    = {Filip De Turck and
               Luciano Paschoal Gaspary and
               Deep Medhi},
  title     = {2012 {IEEE} Network Operations and Management Symposium, {NOMS} 2012,
               Maui, HI, USA, April 16-20, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6203618},
  isbn      = {978-1-4673-0267-8},
  timestamp = {Fri, 08 Jul 2016 10:46:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/noms/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2012,
  editor    = {Geyong Min and
               Yulei Wu and
               Lei (Chris) Liu and
               Xiaolong Jin and
               Stephen A. Jarvis and
               Ahmed Yassin Al{-}Dubai},
  title     = {11th {IEEE} International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2012, Liverpool, United
               Kingdom, June 25-27, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6294581},
  isbn      = {978-1-4673-2172-3},
  timestamp = {Thu, 13 Aug 2015 18:46:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisec/2012,
  editor    = {Marwan Krunz and
               Loukas Lazos and
               Roberto Di Pietro and
               Wade Trappe},
  title     = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
               in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
               16-18, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2185448},
  isbn      = {978-1-4503-1265-3},
  timestamp = {Thu, 19 Apr 2012 15:49:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wisec/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/apsec/2011,
  editor    = {Tran Dan Thu and
               Karl R. P. H. Leung},
  title     = {18th Asia Pacific Software Engineering Conference, {APSEC} 2011, Ho
               Chi Minh, Vietnam, December 5-8, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6129717},
  isbn      = {978-1-4577-2199-1},
  timestamp = {Tue, 25 Nov 2014 17:05:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/apsec/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dasc/2011,
  title     = {{IEEE} Ninth International Conference on Dependable, Autonomic and
               Secure Computing, {DASC} 2011, 12-14 December 2011, Sydney, Australia},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6118336},
  isbn      = {978-0-7695-4612-4},
  timestamp = {Tue, 18 Aug 2015 20:06:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dasc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dasfaa/2011-1,
  editor    = {Jeffrey Xu Yu and
               Myoung{-}Ho Kim and
               Rainer Unland},
  title     = {Database Systems for Advanced Applications - 16th International Conference,
               {DASFAA} 2011, Hong Kong, China, April 22-25, 2011, Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {6587},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20149-3},
  doi       = {10.1007/978-3-642-20149-3},
  isbn      = {978-3-642-20148-6},
  timestamp = {Fri, 26 May 2017 00:50:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dasfaa/2011-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/euc/2011,
  title     = {{IEEE/IFIP} 9th International Conference on Embedded and Ubiquitous
               Computing, {EUC} 2011, Melbourne, Australia, October 24-26, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6104283},
  isbn      = {978-1-4577-1822-9},
  timestamp = {Thu, 11 Jun 2015 16:44:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/euc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ica3pp/2011-1,
  editor    = {Yang Xiang and
               Alfredo Cuzzocrea and
               Michael Hobbs and
               Wanlei Zhou},
  title     = {Algorithms and Architectures for Parallel Processing - 11th International
               Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {7016},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-24650-0},
  doi       = {10.1007/978-3-642-24650-0},
  isbn      = {978-3-642-24649-4},
  timestamp = {Sun, 11 Mar 2018 01:37:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ica3pp/2011-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/im/2011,
  editor    = {Nazim Agoulmine and
               Claudio Bartolini and
               Tom Pfeifer and
               Declan O'Sullivan},
  title     = {Proceedings of the 12th {IFIP/IEEE} International Symposium on Integrated
               Network Management, {IM} 2011, Dublin, Ireland, 23-27 May 2011},
  publisher = {{IEEE}},
  year      = {2011},
  isbn      = {978-1-4244-9221-3},
  timestamp = {Mon, 22 Aug 2011 07:13:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/im/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwcmc/2011,
  title     = {Proceedings of the 7th International Wireless Communications and Mobile
               Computing Conference, {IWCMC} 2011, Istanbul, Turkey, 4-8 July, 2011},
  publisher = {{IEEE}},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5963770},
  isbn      = {978-1-4244-9539-9},
  timestamp = {Thu, 15 Sep 2011 17:43:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwcmc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2011,
  editor    = {Chun Tung Chou and
               Tom Pfeifer and
               Anura P. Jayasumana},
  title     = {{IEEE} 36th Conference on Local Computer Networks, {LCN} 2011, Bonn,
               Germany, October 4-7, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6105664},
  isbn      = {978-1-61284-926-3},
  timestamp = {Wed, 10 Dec 2014 18:26:39 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sin/2011,
  editor    = {Mehmet A. Orgun and
               Atilla El{\c{c}}i and
               Oleg B. Makarevich and
               Sorin A. Huss and
               Josef Pieprzyk and
               Lyudmila K. Babenko and
               Alexander G. Chefranov and
               Rajan Shankaran},
  title     = {Proceedings of the 4th International Conference on Security of Information
               and Networks, {SIN} 2011, Sydney, NSW, Australia, November 14-19,
               2011},
  publisher = {{ACM}},
  year      = {2011},
  isbn      = {978-1-4503-1020-8},
  timestamp = {Sat, 26 Nov 2011 15:38:52 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sin/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2011,
  editor    = {Jonathan M. McCune and
               Boris Balacheff and
               Adrian Perrig and
               Ahmad{-}Reza Sadeghi and
               M. Angela Sasse and
               Yolanta Beres},
  title     = {Trust and Trustworthy Computing - 4th International Conference, {TRUST}
               2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6740},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21599-5},
  doi       = {10.1007/978-3-642-21599-5},
  isbn      = {978-3-642-21598-8},
  timestamp = {Tue, 23 May 2017 01:08:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2011,
  title     = {{IEEE} 10th International Conference on Trust, Security and Privacy
               in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
               November, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6120120},
  isbn      = {978-1-4577-2135-9},
  timestamp = {Wed, 15 Jun 2016 12:22:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ucc/2011,
  title     = {{IEEE} 4th International Conference on Utility and Cloud Computing,
               {UCC} 2011, Melbourne, Australia, December 5-8, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6123165},
  isbn      = {978-1-4577-2116-8},
  timestamp = {Wed, 11 May 2016 12:42:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ucc/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2010,
  editor    = {Sara Foresti and
               Sushil Jajodia},
  title     = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
               {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6166},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13739-6},
  doi       = {10.1007/978-3-642-13739-6},
  isbn      = {978-3-642-13738-9},
  timestamp = {Tue, 18 Jul 2017 16:51:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/euc/2010,
  title     = {{IEEE/IFIP} 8th International Conference on Embedded and Ubiquitous
               Computing, {EUC} 2010, Hong Kong, China, 11-13 December 2010},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5703185},
  isbn      = {978-0-7695-4322-2},
  timestamp = {Thu, 11 Jun 2015 16:44:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/euc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2010,
  title     = {The 35th Annual {IEEE} Conference on Local Computer Networks, {LCN}
               2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5729427},
  isbn      = {978-1-4244-8387-7},
  timestamp = {Wed, 10 Dec 2014 18:26:34 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobiquitous/2010,
  editor    = {Patrick S{\'{e}}nac and
               Max Ott and
               Aruna Seneviratne},
  title     = {Mobile and Ubiquitous Systems: Computing, Networking, and Services
               - 7th International {ICST} Conference, MobiQuitous 2010, Sydney, Australia,
               December 6-9, 2010, Revised Selected Papers},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {73},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29154-8},
  doi       = {10.1007/978-3-642-29154-8},
  isbn      = {978-3-642-29153-1},
  timestamp = {Sun, 21 May 2017 00:20:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobiquitous/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2010,
  editor    = {Kai Rannenberg and
               Vijay Varadharajan and
               Christian Weber},
  title     = {Security and Privacy - Silver Linings in the Cloud - 25th {IFIP} {TC-11}
               International Information Security Conference, {SEC} 2010, Held as
               Part of {WCC} 2010, Brisbane, Australia, September 20-23, 2010. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {330},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15257-3},
  doi       = {10.1007/978-3-642-15257-3},
  isbn      = {978-3-642-15256-6},
  timestamp = {Fri, 19 May 2017 01:25:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sutc/2010,
  title     = {{IEEE} International Conference on Sensor Networks, Ubiquitous, and
               Trustworthy Computing, {SUTC} 2010 and {IEEE} International Workshop
               on Ubiquitous and Mobile Computing, {UMC} 2010, 7-9 June 2010, Newport
               Beach, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5504581},
  isbn      = {978-0-7695-4049-8},
  timestamp = {Mon, 10 Nov 2014 18:11:35 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sutc/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/atc/2009,
  editor    = {Wolfgang Reif and
               Guojun Wang and
               Jadwiga Indulska},
  title     = {Autonomic and Trusted Computing, 6th International Conference, {ATC}
               2009, Brisbane, Australia, July 7-9, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5586},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-02704-8},
  doi       = {10.1007/978-3-642-02704-8},
  isbn      = {978-3-642-02703-1},
  timestamp = {Thu, 25 May 2017 00:43:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/atc/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cis/2009-1,
  title     = {2009 International Conference on Computational Intelligence and Security,
               {CIS} 2009, Beijing, China, 11-14 December 2009, Volume 1 - Conference
               Papers},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5375794},
  isbn      = {978-0-7695-3931-7},
  timestamp = {Tue, 16 Feb 2016 13:59:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cis/2009-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/compsac/2009-2,
  editor    = {Sheikh Iqbal Ahamed and
               Elisa Bertino and
               Carl K. Chang and
               Vladimir Getov and
               Lin Liu and
               Hua Ming and
               Rajesh Subramanyan},
  title     = {Proceedings of the 33rd Annual {IEEE} International Computer Software
               and Applications Conference, {COMPSAC} 2009, Seattle, Washington,
               USA, July 20-24, 2009. Volume 2},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=5254045},
  timestamp = {Mon, 15 Jun 2015 19:00:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/compsac/2009-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dexa/2009,
  editor    = {Sourav S. Bhowmick and
               Josef K{\"{u}}ng and
               Roland R. Wagner},
  title     = {Database and Expert Systems Applications, 20th International Conference,
               {DEXA} 2009, Linz, Austria, August 31 - September 4, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5690},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03573-9},
  doi       = {10.1007/978-3-642-03573-9},
  isbn      = {978-3-642-03572-2},
  timestamp = {Wed, 24 Jan 2018 12:46:36 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dexa/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecweb/2009,
  editor    = {Tommaso Di Noia and
               Francesco Buccafurri},
  title     = {E-Commerce and Web Technologies, 10th International Conference, EC-Web
               2009, Linz, Austria, September 1-4, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5692},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03964-5},
  doi       = {10.1007/978-3-642-03964-5},
  isbn      = {978-3-642-03963-8},
  timestamp = {Tue, 23 May 2017 01:06:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecweb/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iceccs/2009,
  title     = {14th {IEEE} International Conference on Engineering of Complex Computer
               Systems, {ICECCS} 2009, Potsdam, Germany, 2-4 June 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5090495},
  isbn      = {978-0-7695-3702-3},
  timestamp = {Thu, 23 Apr 2015 17:57:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iceccs/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iri/2009,
  title     = {Proceedings of the {IEEE} International Conference on Information
               Reuse and Integration, {IRI} 2009, 10-12 August 2009, Las Vegas, Nevada,
               {USA}},
  publisher = {{IEEE} Systems, Man, and Cybernetics Society},
  year      = {2009},
  timestamp = {Mon, 19 Apr 2010 08:59:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iri/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2009,
  editor    = {Pierangela Samarati and
               Moti Yung and
               Fabio Martinelli and
               Claudio Agostino Ardagna},
  title     = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
               Italy, September 7-9, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5735},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04474-8},
  doi       = {10.1007/978-3-642-04474-8},
  isbn      = {978-3-642-04473-1},
  timestamp = {Sun, 21 May 2017 00:20:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2009,
  editor    = {Yang Xiang and
               Javier L{\'{o}}pez and
               Haining Wang and
               Wanlei Zhou},
  title     = {Third International Conference on Network and System Security, {NSS}
               2009, Gold Coast, Queensland, Australia, October 19-21, 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5328291},
  isbn      = {978-0-7695-3838-9},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nss/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sac/2009,
  editor    = {Sung Y. Shin and
               Sascha Ossowski},
  title     = {Proceedings of the 2009 {ACM} Symposium on Applied Computing (SAC),
               Honolulu, Hawaii, USA, March 9-12, 2009},
  publisher = {{ACM}},
  year      = {2009},
  url       = {https://doi.org/10.1145/1529282},
  doi       = {10.1145/1529282},
  isbn      = {978-1-60558-166-8},
  timestamp = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sin/2009,
  editor    = {Atilla El{\c{c}}i and
               Oleg B. Makarevich and
               Mehmet A. Orgun and
               Alexander G. Chefranov and
               Josef Pieprzyk and
               Yuri Anatolievich Bryukhomitsky and
               Siddika Berna {\"{O}}rs},
  title     = {Proceedings of the 2nd International Conference on Security of Information
               and Networks, {SIN} 2009, Gazimagusa, North Cyprus, October 6-10,
               2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-412-6},
  timestamp = {Fri, 22 Nov 2013 12:57:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sin/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trust/2009,
  editor    = {Liqun Chen and
               Chris J. Mitchell and
               Andrew P. Martin},
  title     = {Trusted Computing, Second International Conference, Trust 2009, Oxford,
               UK, April 6-8, 2009, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5471},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00587-9},
  doi       = {10.1007/978-3-642-00587-9},
  isbn      = {978-3-642-00586-2},
  timestamp = {Mon, 05 Jun 2017 12:40:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trust/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2008,
  editor    = {Vijay Atluri},
  title     = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
               Working Conference on Data and Applications Security, London, UK,
               July 13-16, 2008, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5094},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-70567-3},
  doi       = {10.1007/978-3-540-70567-3},
  isbn      = {978-3-540-70566-6},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/globecom/2008,
  title     = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM}
               2008, New Orleans, LA, USA, 30 November - 4 December 2008},
  publisher = {{IEEE}},
  year      = {2008},
  timestamp = {Wed, 18 Mar 2009 14:56:54 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciw/2008,
  editor    = {Abdelhamid Mellouk and
               Jun Bi and
               Guadalupe Ortiz and
               Dickson K. W. Chiu and
               Manuela Popescu},
  title     = {Third International Conference on Internet and Web Applications and
               Services, {ICIW} 2008, 8-13 June 2008, Athens, Greece},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4545573},
  isbn      = {978-0-7695-3163-2},
  timestamp = {Mon, 06 Oct 2014 17:41:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciw/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icws/2008,
  title     = {2008 {IEEE} International Conference on Web Services {(ICWS} 2008),
               September 23-26, 2008, Beijing, China},
  publisher = {{IEEE} Computer Society},
  year      = {2008},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4670129},
  isbn      = {978-0-7695-3310-0},
  timestamp = {Wed, 19 Aug 2015 17:47:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icws/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2008,
  editor    = {Albert Levi and
               Peng Liu and
               Refik Molva},
  title     = {4th International {ICST} Conference on Security and Privacy in Communication
               Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/1460877},
  doi       = {10.1145/1460877},
  isbn      = {978-1-60558-241-2},
  timestamp = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2007,
  title     = {Proceedings of the The Second International Conference on Availability,
               Reliability and Security, {ARES} 2007, The International Dependability
               Conference - Bridging Theory and Practice, April 10-13 2007, Vienna,
               Austria},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4159773},
  isbn      = {0-7695-2775-2},
  timestamp = {Mon, 13 Apr 2015 17:11:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aina/2007w2,
  title     = {21st International Conference on Advanced Information Networking and
               Applications {(AINA} 2007), Workshops Proceedings, Volume 2, May 21-23,
               2007, Niagara Falls, Canada},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=4224052},
  timestamp = {Mon, 15 Sep 2014 17:23:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aina/2007w2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007stc,
  editor    = {Peng Ning and
               Vijay Atluri and
               Shouhuai Xu and
               Moti Yung},
  title     = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing,
               {STC} 2007, Alexandria, VA, USA, November 2, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-888-6},
  timestamp = {Tue, 11 Nov 2008 13:23:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2007stc},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fcst/2007,
  title     = {Japan-China Joint Workshop on Frontier of Computer Science and Technology,
               {FCST} 2007, Wuhan, China, 1-3 November, 2007},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4402584},
  isbn      = {978-0-7695-3036-9},
  timestamp = {Tue, 21 Jun 2016 15:02:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fcst/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icebe/2007,
  editor    = {S. C. Cheung and
               Yinsheng Li and
               Kuo{-}Ming Chao and
               Muhammad Younas and
               Jen{-}Yao Chung},
  title     = {Proceedings of {ICEBE} 2007, {IEEE} International Conference on e-Business
               Engineering and the Workshops {SOAIC} 2007, {SOSE} 2007, {SOKM} 2007,
               24-26 October, 2007, Hong Kong, China},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4402048},
  isbn      = {0-7695-3003-6},
  timestamp = {Thu, 09 Nov 2017 12:37:30 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icebe/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciw/2007,
  title     = {International Conference on Internet and Web Applications and Services
               {(ICIW} 2007), May 13-19, 2007, Le Morne, Mauritius},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4222895},
  isbn      = {0-7695-2844-9},
  timestamp = {Mon, 06 Oct 2014 17:41:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciw/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icns/2007,
  title     = {Third International Conference on Networking and Services {(ICNS}
               2007), June 19-25, 2007, Athens, Greece},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4438242},
  isbn      = {978-0-7695-2858-8},
  timestamp = {Thu, 09 Jul 2015 16:49:47 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icns/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icon/2007,
  title     = {Proceedings of the 15th {IEEE} International Conference on Networks,
               {ICON} 2007, 19-21 November 2007, Adelaide, Australia},
  publisher = {{IEEE}},
  year      = {2007},
  isbn      = {1-4244-1230-7},
  timestamp = {Wed, 10 Feb 2010 14:03:30 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icon/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pdcat/2007,
  editor    = {David S. Munro and
               Hong Shen and
               Quan Z. Sheng and
               Henry Detmold and
               Katrina E. Falkner and
               Cruz Izu and
               Paul D. Coddington and
               Bradley Alexander and
               Si{-}Qing Zheng},
  title     = {Eighth International Conference on Parallel and Distributed Computing,
               Applications and Technologies {(PDCAT} 2007), 3-6 December 2007, Adelaide,
               Australia},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4420121},
  isbn      = {0-7695-3049-4},
  timestamp = {Mon, 25 Jun 2018 09:57:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pdcat/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/soca/2007,
  title     = {{IEEE} International Conference on Service-Oriented Computing and
               Applications, {SOCA} 2007, 19-20 June 2007, Newport Beach, California,
               {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4273393},
  isbn      = {978-0-7695-2861-8},
  timestamp = {Fri, 10 Jul 2015 14:02:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/soca/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wecwis/2007,
  title     = {9th {IEEE} International Conference on E-Commerce Technology {(CEC}
               2007) / 4th {IEEE} International Conference on Enterprise Computing,
               E-Commerce and E-Services {(EEE} 2007), 23-26 July 2007, National
               Center of Sciences, Tokyo, Japan},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4285175},
  isbn      = {0-7695-2913-5},
  timestamp = {Thu, 04 Dec 2014 17:19:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wecwis/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEares/2006,
  title     = {Proceedings of the The First International Conference on Availability,
               Reliability and Security, {ARES} 2006, The International Dependability
               Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
               University of Technology, Austria},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10823},
  isbn      = {0-7695-2567-9},
  timestamp = {Mon, 13 Apr 2015 17:11:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEares/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsw/2006,
  editor    = {Rajkumar Buyya and
               Tianchi Ma and
               Reihaneh Safavi{-}Naini and
               Chris Steketee and
               Willy Susilo},
  title     = {The proceedings of the Fourth Australasian Symposium on Grid Computing
               and e-Research (AusGrid 2006) and the Fourth Australasian Information
               Security Workshop (Network Security) {(AISW} 2006), Hobart, Tasmania,
               Australia, January 2006},
  series    = {{CRPIT}},
  volume    = {54},
  publisher = {Australian Computer Society},
  year      = {2006},
  url       = {https://dl.acm.org/citation.cfm?id=1151828},
  isbn      = {1-920-68236-8},
  timestamp = {Mon, 26 Nov 2018 12:14:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsw/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aict/2006,
  title     = {Advanced International Conference on Telecommunications and International
               Conference on Internet and Web Applications and Services {(AICT/ICIW}
               2006), 19-25 February 2006, Guadeloupe, French Caribbean},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10670},
  isbn      = {0-7695-2522-9},
  timestamp = {Tue, 12 May 2015 11:15:27 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aict/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/colcom/2006,
  editor    = {Enrico Blanzieri and
               Tao Zhang},
  title     = {2nd International {ICST} Conference on Collaborative Computing: Networking,
               Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
               November 17-20, 2006},
  publisher = {{IEEE} Computer Society / {ICST}},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4207500},
  isbn      = {1-4244-0429-0},
  timestamp = {Thu, 19 Mar 2015 16:19:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/colcom/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dexa/2006,
  editor    = {St{\'{e}}phane Bressan and
               Josef K{\"{u}}ng and
               Roland R. Wagner},
  title     = {Database and Expert Systems Applications, 17th International Conference,
               {DEXA} 2006, Krak{\'{o}}w, Poland, September 4-8, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4080},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11827405},
  doi       = {10.1007/11827405},
  isbn      = {3-540-37871-5},
  timestamp = {Wed, 24 Jan 2018 12:46:36 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dexa/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ismis/2006,
  editor    = {Floriana Esposito and
               Zbigniew W. Ras and
               Donato Malerba and
               Giovanni Semeraro},
  title     = {Foundations of Intelligent Systems, 16th International Symposium,
               {ISMIS} 2006, Bari, Italy, September 27-29, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4203},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11875604},
  doi       = {10.1007/11875604},
  isbn      = {3-540-45764-X},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ismis/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/noms/2006,
  editor    = {Joseph L. Hellerstein and
               Burkhard Stiller},
  title     = {Management of Integrated End-to-End Communications and Services, 10th
               {IEEE/IFIP} Network Operations and Management Symposium, {NOMS} 2006,
               Vancouver, Canada, April 3-7, 2006. Proceedings},
  publisher = {{IEEE}},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=11101},
  isbn      = {1-4244-0143-7},
  timestamp = {Fri, 08 Jul 2016 10:47:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/noms/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2006,
  editor    = {Manu Malek and
               Eduardo Fern{\'{a}}ndez{-}Medina and
               Javier Hernando},
  title     = {{SECRYPT} 2006, Proceedings of the International Conference on Security
               and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006,
               {SECRYPT} is part of {ICETE} - The International Joint Conference
               on e-Business and Telecommunications},
  publisher = {{INSTICC} Press},
  year      = {2006},
  isbn      = {972-8865-63-5},
  timestamp = {Thu, 28 Sep 2006 10:10:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/secrypt/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2006,
  title     = {Second International Conference on Security and Privacy in Communication
               Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
               2, 2006 - September 1, 2006},
  publisher = {{IEEE}},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4198788},
  isbn      = {1-4244-0423-1},
  timestamp = {Thu, 21 Jun 2018 08:02:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/woc/2006,
  editor    = {Abraham O. Fapojuwo and
               Bozena Kaminska},
  title     = {Sixth {IASTED} International Multi-Conference on Wireless and Optical
               Communications: Conference on Communication Systems and Applications,
               Conference on Optical Communication Systems and Networks, Conference
               on Wireless Networks and Emerging Technologies, Conference on Wireless
               {SENSOR} Networks, Banff, Alberta, Canada, July 3-5, 2006},
  publisher = {{IASTED/ACTA} Press},
  year      = {2006},
  isbn      = {0-88986-565-5},
  timestamp = {Thu, 24 Aug 2006 12:05:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/woc/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEscc/2005,
  title     = {2005 {IEEE} International Conference on Services Computing {(SCC}
               2005), 11-15 July 2005, Orlando, FL, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10249},
  isbn      = {0-7695-2408-7},
  timestamp = {Tue, 01 Dec 2015 16:59:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEscc/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aina/2005,
  title     = {19th International Conference on Advanced Information Networking and
               Applications {(AINA} 2005), 28-30 March 2005, Taipei, Taiwan},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9746},
  isbn      = {0-7695-2249-1},
  timestamp = {Mon, 15 Sep 2014 17:23:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aina/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2005,
  editor    = {Sushil Jajodia and
               Duminda Wijesekera},
  title     = {Data and Applications Security XIX, 19th Annual {IFIP} {WG} 11.3 Working
               Conference on Data and Applications Security, Storrs, CT, USA, August
               7-10, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3654},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11535706},
  doi       = {10.1007/11535706},
  isbn      = {3-540-28138-X},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eee/2005,
  title     = {2005 {IEEE} International Conference on e-Technology, e-Commerce,
               and e-Services {(EEE} 2005), 29 March - 1 April 2005, Hong Kong, China},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9634},
  isbn      = {0-7695-2274-2},
  timestamp = {Fri, 12 Jun 2015 15:27:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eee/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hicss/2005,
  title     = {38th Hawaii International Conference on System Sciences {(HICSS-38}
               2005), {CD-ROM} / Abstracts Proceedings, 3-6 January 2005, Big Island,
               HI, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9518},
  isbn      = {0-7695-2268-8},
  timestamp = {Wed, 23 Jul 2014 20:34:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hicss/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iat/2005,
  editor    = {Andrzej Skowron and
               Jean{-}Paul A. Barth{\`{e}}s and
               Lakhmi C. Jain and
               Ron Sun and
               Pierre Morizet{-}Mahoudeaux and
               Jiming Liu and
               Ning Zhong},
  title     = {Proceedings of the 2005 {IEEE/WIC/ACM} International Conference on
               Intelligent Agent Technology, Compiegne, France, September 19-22,
               2005},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10469},
  isbn      = {0-7695-2416-8},
  timestamp = {Thu, 20 Jul 2017 16:44:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iat/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iceis/2005,
  editor    = {Chin{-}Sheng Chen and
               Joaquim Filipe and
               Isabel Seruca and
               Jos{\'{e}} Cordeiro},
  title     = {{ICEIS} 2005, Proceedings of the Seventh International Conference
               on Enterprise Information Systems, Miami, USA, May 25-28, 2005},
  year      = {2005},
  isbn      = {972-8865-19-8},
  timestamp = {Thu, 02 Feb 2017 12:53:54 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iceis/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2005,
  editor    = {Sushil Jajodia and
               Chandan Mazumdar},
  title     = {Information Systems Security, First International Conference, {ICISS}
               2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3803},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11593980},
  doi       = {10.1007/11593980},
  isbn      = {3-540-30706-0},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icita/2005,
  title     = {Third International Conference on Information Technology and Applications
               {(ICITA} 2005), 4-7 July 2005, Sydney, Australia},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9966},
  isbn      = {0-7695-2316-1},
  timestamp = {Tue, 12 May 2015 17:11:41 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icita/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icmb/2005,
  title     = {2005 International Conference on Mobile Business {(ICMB} 2005), 11-13
               July 2005, Sydney, Australia},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9999},
  isbn      = {0-7695-2367-6},
  timestamp = {Wed, 30 Jul 2014 16:59:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icmb/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icps/2005,
  title     = {Proceedings of the International Conference on Pervasive Services
               2005, {ICPS} '05, Santorini, Greece, July 11-14, 2005},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10064},
  isbn      = {0-7803-9032-6},
  timestamp = {Mon, 17 Nov 2014 16:58:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icps/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ismis/2005,
  editor    = {Mohand{-}Said Hacid and
               Neil V. Murray and
               Zbigniew W. Ras and
               Shusaku Tsumoto},
  title     = {Foundations of Intelligent Systems, 15th International Symposium,
               {ISMIS} 2005, Saratoga Springs, NY, USA, May 25-28, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3488},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b136302},
  doi       = {10.1007/b136302},
  isbn      = {3-540-25878-7},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ismis/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isws/2005,
  editor    = {Hamid R. Arabnia},
  title     = {Proceedings of The 2005 International Symposium on Web Services and
               Applications, {ISWS} 2005, Las Vegas, Nevada, USA, June 27-30, 2005},
  publisher = {{CSREA} Press},
  year      = {2005},
  isbn      = {1-932415-72-6},
  timestamp = {Thu, 16 Feb 2006 15:58:57 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isws/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/itcc/2005-1,
  title     = {International Symposium on Information Technology: Coding and Computing
               {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/tocresult.jsp?isnumber=30835},
  isbn      = {0-7695-2315-3},
  timestamp = {Thu, 09 Jul 2015 16:49:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/itcc/2005-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2005,
  title     = {First International Conference on Security and Privacy for Emerging
               Areas in Communications Networks, SecureComm 2005, Athens, Greece,
               5-9 September, 2005},
  publisher = {{IEEE}},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10695},
  isbn      = {0-7695-2369-2},
  timestamp = {Fri, 13 Mar 2015 14:05:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2005,
  editor    = {Sokratis K. Katsikas and
               Javier L{\'{o}}pez and
               G{\"{u}}nther Pernul},
  title     = {Trust, Privacy and Security in Digital Business: Second International
               Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3592},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11537878},
  doi       = {10.1007/11537878},
  isbn      = {3-540-28224-6},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustbus/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wecwis/2005,
  title     = {7th {IEEE} International Conference on E-Commerce Technology {(CEC}
               2005), 19-22 July 2005, M{\"{u}}nchen, Germany},
  publisher = {{IEEE} Computer Society},
  year      = {2005},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10218},
  isbn      = {0-7695-2277-7},
  timestamp = {Thu, 04 Dec 2014 17:19:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wecwis/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wsmai/2005,
  editor    = {Savitri Bevinakoppa and
               Lu{\'{\i}}s Ferreira Pires and
               Slimane Hammoudi},
  title     = {Web Services and Model-Driven Enterprise Information Services, Proceedings
               of the Joint Workshop on Web Services and Model-Driven Enterprise
               Information Services, {WSMDEIS} 2005, In conjunction with {ICEIS}
               2005, Miami, USA, May 2005},
  publisher = {{INSTICC} Press},
  year      = {2005},
  isbn      = {972-8865-27-9},
  timestamp = {Mon, 27 Jun 2005 13:41:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wsmai/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEscc/2004,
  title     = {2004 {IEEE} International Conference on Services Computing {(SCC}
               2004), 15-18 September 2004, Shanghai, China},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9386},
  isbn      = {0-7695-2225-4},
  timestamp = {Tue, 01 Dec 2015 16:59:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEscc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ISCApdcs/2004,
  editor    = {David A. Bader and
               Ashfaq A. Khokhar},
  title     = {Proceedings of the {ISCA} 17th International Conference on Parallel
               and Distributed Computing Systems, September 15-17, 2004, The Canterbury
               Hotel, San Francisco, California, {USA}},
  publisher = {{ISCA}},
  year      = {2004},
  isbn      = {1-880843-52-8},
  timestamp = {Fri, 08 Sep 2006 09:21:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ISCApdcs/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2004,
  editor    = {Huaxiong Wang and
               Josef Pieprzyk and
               Vijay Varadharajan},
  title     = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
               2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3108},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b98755},
  doi       = {10.1007/b98755},
  isbn      = {3-540-22379-7},
  timestamp = {Wed, 14 Nov 2018 10:59:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aina/2004,
  title     = {18th International Conference on Advanced Information Networking and
               Applications {(AINA} 2004), 29-31 March 2004, Fukuoka, Japan},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9028},
  isbn      = {0-7695-2051-0},
  timestamp = {Mon, 15 Sep 2014 17:23:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aina/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecweb/2004,
  editor    = {Kurt Bauknecht and
               Martin Bichler and
               Birgit Pr{\"{o}}ll},
  title     = {E-Commerce and Web Technologies, 5th International Conference, EC-Web
               2004, Zaragoza, Spain, August 31-September 3, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3182},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b100074},
  doi       = {10.1007/b100074},
  isbn      = {3-540-22917-5},
  timestamp = {Tue, 30 May 2017 12:57:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ecweb/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/globecom/2004,
  title     = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM}
               '04, Dallas, Texas, USA, 29 November - 3 December 2004},
  publisher = {{IEEE}},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9481},
  isbn      = {0-7803-8794-5},
  timestamp = {Tue, 11 Dec 2012 15:31:02 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icc/2004,
  title     = {Proceedings of {IEEE} International Conference on Communications,
               {ICC} 2004, Paris, France, 20-24 June 2004},
  publisher = {{IEEE}},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9179},
  isbn      = {0-7803-8533-0},
  timestamp = {Thu, 07 Mar 2013 17:23:08 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icws/2004,
  title     = {Proceedings of the {IEEE} International Conference on Web Services
               (ICWS'04), June 6-9, 2004, San Diego, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9185},
  isbn      = {0-7695-2167-3},
  timestamp = {Thu, 23 Jun 2016 15:53:27 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icws/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwdc/2004,
  editor    = {Nabanita Das and
               Arunabha Sen and
               Sajal K. Das and
               Bhabani P. Sinha},
  title     = {Distributed Computing - {IWDC} 2004, 6th International Workshop, Kolkata,
               India, December 27-30, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3326},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b104419},
  doi       = {10.1007/b104419},
  isbn      = {3-540-24076-4},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwdc/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sis/2004,
  editor    = {Eduardo Fern{\'{a}}ndez{-}Medina and
               Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
               L. Javier Garc{\'{\i}}a{-}Villalba},
  title     = {Security In Information Systems, Proceedings of the 2nd International
               Workshop on Security In Information Systems, {WOSIS} 2004, In conjunction
               with {ICEIS} 2004, Porto, Portugal, April 2004},
  publisher = {{INSTICC} Press},
  year      = {2004},
  isbn      = {972-8865-07-4},
  timestamp = {Mon, 23 Aug 2004 13:05:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sis/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustbus/2004,
  editor    = {Sokratis K. Katsikas and
               Javier L{\'{o}}pez and
               G{\"{u}}nther Pernul},
  title     = {Trust and Privacy in Digital Business, First International Conference,
               TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3184},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b99832},
  doi       = {10.1007/b99832},
  isbn      = {3-540-22919-1},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustbus/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wise/2004,
  editor    = {Xiaofang Zhou and
               Stanley Y. W. Su and
               Mike P. Papazoglou and
               Maria E. Orlowska and
               Keith G. Jeffery},
  title     = {Web Information Systems - {WISE} 2004, 5th International Conference
               on Web Information Systems Engineering, Brisbane, Australia, November
               22-24, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3306},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b103344},
  doi       = {10.1007/b103344},
  isbn      = {3-540-23894-8},
  timestamp = {Tue, 30 May 2017 16:36:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wise/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2003,
  editor    = {Jianying Zhou and
               Moti Yung and
               Yongfei Han},
  title     = {Applied Cryptography and Network Security, First International Conference,
               {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2846},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b13996},
  doi       = {10.1007/b13996},
  isbn      = {3-540-20208-0},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsc/2003,
  editor    = {Michael J. Oudshoorn},
  title     = {Computer Science 2003, Twenty-Sixth Australasian Computer Science
               Conference (ACSC2003), Adelaide, South Australia, February 2003},
  series    = {{CRPIT}},
  volume    = {16},
  publisher = {Australian Computer Society},
  year      = {2003},
  isbn      = {0-909-92594-1},
  timestamp = {Wed, 18 Aug 2004 12:50:28 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsc/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsw/2003,
  editor    = {Chris W. Johnson and
               Paul Montague and
               Chris Steketee},
  title     = {{ACSW} Frontiers 2003, 2003 {ACSW} Workshops - the Australasian Information
               Security Workshop {(AISW)} and the Workshop on Wearable, Invisible,
               Context-Aware, Ambient, Pervasive and Ubiquitous Computing (WICAPUC),
               Adelaide, South Australia, February 2003},
  series    = {{CRPIT}},
  volume    = {21},
  publisher = {Australian Computer Society},
  year      = {2003},
  isbn      = {1-920682-00-7},
  timestamp = {Thu, 05 Oct 2017 11:44:23 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsw/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csreaSAM/2003-1,
  editor    = {Hamid R. Arabnia and
               Youngsong Mun},
  title     = {Proceedings of the International Conference on Security and Management,
               {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1},
  publisher = {{CSREA} Press},
  year      = {2003},
  isbn      = {1-932415-16-5},
  timestamp = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/csreaSAM/2003-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2003,
  editor    = {Sabrina De Capitani di Vimercati and
               Indrakshi Ray and
               Indrajit Ray},
  title     = {Data and Applications Security {XVII:} Status and Prospects, {IFIP}
               {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and
               Application Security, August4-6, 2003, Estes Park, Colorado, {USA}},
  series    = {{IFIP}},
  volume    = {142},
  publisher = {Kluwer/Springer},
  year      = {2004},
  isbn      = {1-4020-8069-7},
  timestamp = {Wed, 29 Mar 2017 16:45:25 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dexa/2003,
  editor    = {Vladim{\'{\i}}r Mar{\'{\i}}k and
               Werner Retschitzegger and
               Olga Step{\'{a}}nkov{\'{a}}},
  title     = {Database and Expert Systems Applications, 14th International Conference,
               {DEXA} 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2736},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b11824},
  doi       = {10.1007/b11824},
  isbn      = {3-540-40806-1},
  timestamp = {Mon, 29 May 2017 16:53:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dexa/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/globecom/2003,
  title     = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM}
               '03, San Francisco, CA, USA, 1-5 December 2003},
  publisher = {{IEEE}},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8900},
  isbn      = {0-7803-7974-8},
  timestamp = {Tue, 11 Dec 2012 13:14:02 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iadis/2003icwi,
  title     = {Proceedings of the {IADIS} International Conference WWW/Internet 2003,
               {ICWI} 2003, Algarve, Portugal, November 5-8, 2003},
  publisher = {{IADIS}},
  year      = {2003},
  isbn      = {972-98947-1-X},
  timestamp = {Thu, 18 Mar 2004 15:27:46 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iadis/2003icwi},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2003,
  editor    = {Sihan Qing and
               Dieter Gollmann and
               Jianying Zhou},
  title     = {Information and Communications Security, 5th International Conference,
               {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2836},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b13930},
  doi       = {10.1007/b13930},
  isbn      = {3-540-20150-5},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icon/2003,
  title     = {11th {IEEE} International Conference on Networks, {ICON} 2003, September
               28 - October 1, 2003 Sydney, NSW, Australia},
  publisher = {{IEEE}},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8945},
  isbn      = {0-7803-7788-5},
  timestamp = {Mon, 30 Jan 2017 14:36:40 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icon/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iis/2003,
  editor    = {Mieczyslaw A. Klopotek and
               Slawomir T. Wierzchon and
               Krzysztof Trojanowski},
  title     = {Intelligent Information Processing and Web Mining, Proceedings of
               the International {IIS:} IIPWM'03 Conference held in Zakopane, Poland,
               June 2-5, 2003},
  series    = {Advances in Soft Computing},
  publisher = {Springer},
  year      = {2003},
  isbn      = {3-540-00843-8},
  timestamp = {Tue, 13 Jul 2004 12:32:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iis/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/im/2003,
  editor    = {Germ{\'{a}}n S. Goldszmidt and
               J{\"{u}}rgen Sch{\"{o}}nw{\"{a}}lder},
  title     = {Integrated Network Management VII, Managing It All, {IFIP/IEEE} Eighth
               International Symposium on Integrated Network Management {(IM} 2003),
               March 24-28, 2003, Colorado Springs, {USA}},
  series    = {{IFIP} Conference Proceedings},
  volume    = {246},
  publisher = {Kluwer},
  year      = {2003},
  isbn      = {1-4020-7418-2},
  timestamp = {Mon, 24 Mar 2003 13:34:13 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/im/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ismis/2003,
  editor    = {Ning Zhong and
               Zbigniew W. Ras and
               Shusaku Tsumoto and
               Einoshin Suzuki},
  title     = {Foundations of Intelligent Systems, 14th International Symposium,
               {ISMIS} 2003, Maebashi City, Japan, October 28-31, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2871},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b14019},
  doi       = {10.1007/b14019},
  isbn      = {3-540-20256-0},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ismis/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2003,
  editor    = {Colin Boyd and
               Wenbo Mao},
  title     = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
               UK, October 1-3, 2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2851},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/b13828},
  doi       = {10.1007/b13828},
  isbn      = {3-540-20176-9},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wcnc/2003,
  title     = {2003 {IEEE} Wireless Communications and Networking, {WCNC} 2003, New
               Orleans, LA, USA, 16-20 March, 2003},
  publisher = {{IEEE}},
  year      = {2003},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8546},
  isbn      = {0-7803-7700-1},
  timestamp = {Mon, 05 Nov 2012 21:07:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wcnc/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2002,
  editor    = {Lynn Margaret Batten and
               Jennifer Seberry},
  title     = {Information Security and Privacy, 7th Australian Conference, {ACISP}
               2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2384},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45450-0},
  doi       = {10.1007/3-540-45450-0},
  isbn      = {3-540-43861-0},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2002,
  editor    = {Robert H. Deng and
               Sihan Qing and
               Feng Bao and
               Jianying Zhou},
  title     = {Information and Communications Security, 4th International Conference,
               {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2513},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36159-6},
  doi       = {10.1007/3-540-36159-6},
  isbn      = {3-540-00164-6},
  timestamp = {Mon, 06 Nov 2017 02:05:53 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ismis/2002,
  editor    = {Mohand{-}Said Hacid and
               Zbigniew W. Ras and
               Djamel A. Zighed and
               Yves Kodratoff},
  title     = {Foundations of Intelligent Systems, 13th International Symposium,
               {ISMIS} 2002, Lyon, France, June 27-29, 2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2366},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-48050-1},
  doi       = {10.1007/3-540-48050-1},
  isbn      = {3-540-43785-1},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ismis/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pdcs/2002,
  editor    = {Selim G. Akl and
               Teofilo F. Gonzalez},
  title     = {International Conference on Parallel and Distributed Computing Systems,
               {PDCS} 2002, November 4-6, 2002, Cambridge, {USA}},
  publisher = {{IASTED/ACTA} Press},
  year      = {2002},
  isbn      = {0-88986-366-0},
  timestamp = {Tue, 26 Sep 2006 13:37:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pdcs/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2001,
  editor    = {Vijay Varadharajan and
               Yi Mu},
  title     = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
               2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2119},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-47719-5},
  doi       = {10.1007/3-540-47719-5},
  isbn      = {3-540-42300-1},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsc/2001,
  title     = {24th Australasian Computer Science Conference {(ACSC} 2001), 29 January
               - 1 February 2001, Gold Coast, Queensland, Australia},
  publisher = {{IEEE} Computer Society},
  year      = {2001},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7265},
  isbn      = {0-7695-0963-0},
  timestamp = {Wed, 08 Oct 2014 17:36:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsc/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iceis/2001,
  title     = {{ICEIS} 2001, Proceedings of the 3rd International Conference on Enterprise
               Information Systems, Setubal, Portugal, July 7-10, 2001},
  year      = {2001},
  timestamp = {Thu, 02 Feb 2017 12:58:08 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iceis/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2001,
  editor    = {Sihan Qing and
               Tatsuaki Okamoto and
               Jianying Zhou},
  title     = {Information and Communications Security, Third International Conference,
               {ICICS} 2001, Xian, China, November 13-16, 2001},
  series    = {Lecture Notes in Computer Science},
  volume    = {2229},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45600-7},
  doi       = {10.1007/3-540-45600-7},
  isbn      = {3-540-42880-1},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icics/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icpads/2001,
  title     = {Eigth International Conference on Parallel and Distributed Systems,
               {ICPADS} 2001, KyongJu City, Korea, June 26-29, 2001},
  publisher = {{IEEE} Computer Society},
  year      = {2001},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7439},
  isbn      = {0-7695-1153-8},
  timestamp = {Mon, 04 May 2015 17:00:42 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icpads/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2001,
  editor    = {C. Pandu Rangan and
               Cunsheng Ding},
  title     = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
               on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2247},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45311-3},
  doi       = {10.1007/3-540-45311-3},
  isbn      = {3-540-43010-5},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isec/2001,
  editor    = {Weidong Kou and
               Yelena Yesha and
               Chung{-}Jen Tan},
  title     = {Topics in Electronic Commerce, Second International Symposium, {ISEC}
               2001 Hong Kong, China, April 26-28, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2040},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45415-2},
  doi       = {10.1007/3-540-45415-2},
  isbn      = {3-540-41963-2},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isec/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/2001,
  title     = {26th Annual {IEEE} Conference on Local Computer Networks {(LCN} 2001),
               14-16 November 2001, Tampa, Florida, USA, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {2001},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7773},
  isbn      = {0-7695-1321-2},
  timestamp = {Wed, 10 Dec 2014 18:26:33 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mmmacns/2001,
  editor    = {Vladimir I. Gorodetski and
               Victor A. Skormin and
               Leonard J. Popyack},
  title     = {Information Assurance in Computer Networks: Methods, Models, and Architectures
               for Network Security, International Workshop {MMM-ACNS} 2001, St.
               Petersburg, Russia, May 21-23, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2052},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45116-1},
  doi       = {10.1007/3-540-45116-1},
  isbn      = {3-540-42103-3},
  timestamp = {Fri, 26 May 2017 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mmmacns/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/policy/2001,
  editor    = {Morris Sloman and
               Jorge Lobo and
               Emil Lupu},
  title     = {Policies for Distributed Systems and Networks, International Workshop,
               {POLICY} 2001 Bristol, UK, January 29-31, 2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1995},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44569-2},
  doi       = {10.1007/3-540-44569-2},
  isbn      = {3-540-41610-2},
  timestamp = {Wed, 20 Sep 2017 10:44:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/policy/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/2,
  editor    = {Anup K. Ghosh},
  title     = {E-Commerce Security and Privacy},
  series    = {Advances in Information Security},
  volume    = {2},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/978-1-4615-1467-1},
  doi       = {10.1007/978-1-4615-1467-1},
  isbn      = {0-7923-7399-5},
  timestamp = {Tue, 16 May 2017 14:24:25 +0200},
  biburl    = {https://dblp.org/rec/bib/series/ais/2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2000,
  editor    = {Ed Dawson and
               Andrew J. Clark and
               Colin Boyd},
  title     = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
               2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1841},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/10718964},
  doi       = {10.1007/10718964},
  isbn      = {3-540-67742-9},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2000,
  title     = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
               11-15 December 2000, New Orleans, Louisiana, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2000},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7224},
  isbn      = {0-7695-0859-6},
  timestamp = {Mon, 04 Aug 2014 17:08:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/adbis/2000,
  editor    = {Julius Stuller and
               Jaroslav Pokorn{\'{y}} and
               Bernhard Thalheim and
               Yoshifumi Masunaga},
  title     = {Current Issues in Databases and Information Systems, East-European
               Conference on Advances in Databases and Information Systems Held Jointly
               with International Conference on Database Systems for Advanced Applications,
               {ADBIS-DASFAA} 2000, Prague, Czech Republic, September 5-8, 2000,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1884},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44472-6},
  doi       = {10.1007/3-540-44472-6},
  isbn      = {3-540-67977-4},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/adbis/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/adc/2000,
  title     = {Australasian Database Conference, {ADC} 2000, Canberra, Australia,
               January 31 - February 3, 2000},
  publisher = {{IEEE} Computer Society},
  year      = {2000},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6646},
  isbn      = {0-7695-0528-7},
  timestamp = {Mon, 29 Sep 2014 17:13:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/adc/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2000,
  editor    = {Dimitris Gritzalis and
               Sushil Jajodia and
               Pierangela Samarati},
  title     = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
               Communications Security, Athens, Greece, November 1-4, 2000},
  publisher = {{ACM}},
  year      = {2000},
  url       = {http://dl.acm.org/citation.cfm?id=352600},
  isbn      = {1-58113-203-4},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcsw/2000,
  editor    = {Ten{-}Hwang Lai},
  title     = {Proceedings of the 2000 {ICDCS} Workshops, April 10, 2000, Taipei,
               Taiwan, {ROC}},
  year      = {2000},
  timestamp = {Mon, 22 Mar 2004 09:40:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcsw/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2000,
  editor    = {Dongho Won},
  title     = {Information Security and Cryptology - {ICISC} 2000, Third International
               Conference, Seoul, Korea, December 8-9, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2015},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-45247-8},
  doi       = {10.1007/3-540-45247-8},
  isbn      = {3-540-41782-6},
  timestamp = {Fri, 26 May 2017 14:09:15 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icisc/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2000,
  editor    = {Bimal K. Roy and
               Eiji Okamoto},
  title     = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
               in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1977},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44495-5},
  doi       = {10.1007/3-540-44495-5},
  isbn      = {3-540-41452-5},
  timestamp = {Wed, 24 May 2017 15:40:45 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/indocrypt/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2000,
  editor    = {Sihan Qing and
               Jan H. P. Eloff},
  title     = {Information Security for Global Information Infrastructures, {IFIP}
               {TC11} Fifteenth Annual Working Conference on Information Security,
               August 22-24, 2000, Beijing, China},
  series    = {{IFIP} Conference Proceedings},
  volume    = {175},
  publisher = {Kluwer},
  year      = {2000},
  isbn      = {0-7923-7914-4},
  timestamp = {Fri, 26 Jul 2002 13:04:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/1999,
  editor    = {Josef Pieprzyk and
               Reihaneh Safavi{-}Naini and
               Jennifer Seberry},
  title     = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
               Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1587},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48970-3},
  doi       = {10.1007/3-540-48970-3},
  isbn      = {3-540-65756-8},
  timestamp = {Tue, 23 May 2017 14:54:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1999,
  editor    = {Kwok{-}Yan Lam and
               Eiji Okamoto and
               Chaoping Xing},
  title     = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Singapore, November 14-18, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1716},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/b72231},
  doi       = {10.1007/b72231},
  isbn      = {3-540-66666-4},
  timestamp = {Fri, 19 May 2017 01:26:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/1999,
  editor    = {Vijayalakshmi Atluri and
               John Hale},
  title     = {Research Advances in Database and Information Systems Security, {IFIP}
               {WG} 11.3 Thirteenth International Conference on Database Security,
               July 26-28, 1999, Seattle, Washington, {USA}},
  series    = {{IFIP} Conference Proceedings},
  volume    = {171},
  publisher = {Kluwer},
  year      = {2000},
  isbn      = {0-7923-7848-2},
  timestamp = {Thu, 03 Jan 2002 11:56:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dexaw/1999,
  title     = {10th International Workshop on Database {\&} Expert Systems Applications,
               Florence, Italy, September 1-3, 1999, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6448},
  isbn      = {0-7695-0281-4},
  timestamp = {Mon, 24 Nov 2014 16:44:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dexaw/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/1999,
  editor    = {Vijay Varadharajan and
               Yi Mu},
  title     = {Information and Communication Security, Second International Conference,
               ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1726},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/b72329},
  doi       = {10.1007/b72329},
  isbn      = {3-540-66682-6},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icppw/1999,
  title     = {Proceedings of the 1999 International Conference on Parallel Processing
               Workshops, {ICPPW} 1999, Wakamatsu, Japan, September 21-24, 1999},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6501},
  isbn      = {0-7695-0353-5},
  timestamp = {Fri, 25 Jul 2014 14:09:14 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icppw/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ima/1999,
  editor    = {Michael Walker},
  title     = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester,
               UK, December 20-22, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1746},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-46665-7},
  doi       = {10.1007/3-540-46665-7},
  isbn      = {3-540-66887-X},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ima/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/1999,
  editor    = {Masahiro Mambo and
               Yuliang Zheng},
  title     = {Information Security, Second International Workshop, ISW'99, Kuala
               Lumpur, Malaysia, November 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1729},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-47790-X},
  doi       = {10.1007/3-540-47790-X},
  isbn      = {3-540-66695-8},
  timestamp = {Wed, 24 May 2017 15:40:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/1999,
  title     = {Proceedings 26th Conference on Local Computer Networks, Lowell, Massachusetts,
               USA, 17-20 October, 1999},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6517},
  isbn      = {0-7695-0309-8},
  timestamp = {Wed, 10 Dec 2014 18:26:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/safecomp/1999,
  editor    = {Massimo Felici and
               Karama Kanoun and
               Alberto Pasquini},
  title     = {Computer Safety, Reliability and Security, 18th International Conference,
               SAFECOMP'99, Toulouse, France, September, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1698},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48249-0},
  doi       = {10.1007/3-540-48249-0},
  isbn      = {3-540-66488-2},
  timestamp = {Wed, 24 May 2017 15:40:43 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/safecomp/1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tools/32-1999,
  title     = {{TOOLS} Pacific 1999: 32nd International Conference on Technology
               of Object-Oriented Languages and Systems, 22-25 November 1999, Melbourne,
               Australia},
  publisher = {{IEEE} Computer Society},
  year      = {1999},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6574},
  isbn      = {0-7695-0462-0},
  timestamp = {Fri, 27 May 2016 11:24:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/tools/32-1999},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/1998,
  editor    = {Colin Boyd and
               Ed Dawson},
  title     = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
               Brisbane, Queensland, Australia, July 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1438},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0053715},
  doi       = {10.1007/BFb0053715},
  isbn      = {3-540-64732-5},
  timestamp = {Tue, 23 May 2017 11:53:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/1998,
  title     = {14th Annual Computer Security Applications Conference {(ACSAC} 1998),
               7-11 December 1998, Scottsdale, AZ, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {1998},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5961},
  isbn      = {0-8186-8789-4},
  timestamp = {Mon, 04 Aug 2014 17:08:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/1998,
  title     = {Proceedings 23rd Conference on Local Computer Networks, Boston, Massachusetts,
               USA, October 11-14, 1998},
  publisher = {{IEEE} Computer Society},
  year      = {1998},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5874},
  isbn      = {0-8186-8810-6},
  timestamp = {Wed, 10 Dec 2014 18:26:34 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/prima/1998,
  editor    = {Toru Ishida},
  title     = {Multiagent Platforms, First Pacific Rim International Workshop on
               Multi-Agents, {PRIMA} '98, Singapore, November 23, 1998, Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {1599},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48826-X},
  doi       = {10.1007/3-540-48826-X},
  isbn      = {3-540-65967-6},
  timestamp = {Thu, 20 Sep 2018 16:01:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/prima/1998},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/1997,
  editor    = {Vijay Varadharajan and
               Josef Pieprzyk and
               Yi Mu},
  title     = {Information Security and Privacy, Second Australasian Conference,
               ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1270},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/BFb0027916},
  doi       = {10.1007/BFb0027916},
  isbn      = {3-540-63232-8},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/1997,
  title     = {13th Annual Computer Security Applications Conference {(ACSAC} 1997),
               8-12 December 1997, San Diego, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {1997},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5212},
  isbn      = {0-8186-8274-4},
  timestamp = {Mon, 04 Aug 2014 17:08:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/1997,
  title     = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12,
               1997, Rockport, Massachusetts, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {1997},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4668},
  isbn      = {0-8186-7990-5},
  timestamp = {Fri, 13 May 2016 11:53:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/1997,
  editor    = {Yongfei Han and
               Tatsuaki Okamoto and
               Sihan Qing},
  title     = {Information and Communication Security, First International Conference,
               ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1334},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/BFb0028456},
  doi       = {10.1007/BFb0028456},
  isbn      = {3-540-63696-X},
  timestamp = {Tue, 23 May 2017 11:53:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icics/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isaac/1997,
  editor    = {Hon Wai Leong and
               Hiroshi Imai and
               Sanjay Jain},
  title     = {Algorithms and Computation, 8th International Symposium, {ISAAC} '97,
               Singapore, December 17-19, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1350},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/3-540-63890-3},
  doi       = {10.1007/3-540-63890-3},
  isbn      = {3-540-63890-3},
  timestamp = {Wed, 16 May 2018 06:34:29 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isaac/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/1997,
  editor    = {Eiji Okamoto and
               George I. Davida and
               Masahiro Mambo},
  title     = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
               Japan, September 17-19, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1396},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/BFb0030404},
  doi       = {10.1007/BFb0030404},
  isbn      = {3-540-64382-6},
  timestamp = {Tue, 23 May 2017 11:53:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isw/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/1997,
  title     = {22nd {IEEE} Conference on Local Computer Networks {(LCN} '97), 2-5
               November 1997, Minneapolis, Minnesota, USA, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1997},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4987},
  isbn      = {0-8186-8141-1},
  timestamp = {Wed, 10 Dec 2014 18:26:33 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pacis/1997,
  title     = {The Third Pacific Asia Conference on Information Systems, {PACIS}
               1997, Brisbane, Australia, April, 1-5, 1997},
  publisher = {AISeL},
  year      = {1997},
  url       = {http://aisel.aisnet.org/pacis1997/},
  timestamp = {Sat, 03 Mar 2012 13:54:18 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pacis/1997},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/1996,
  editor    = {Josef Pieprzyk and
               Jennifer Seberry},
  title     = {Information Security and Privacy, First Australasian Conference, ACISP'96,
               Wollongong, NSW, Australia, June 24-26, 1996, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1172},
  publisher = {Springer},
  year      = {1996},
  url       = {https://doi.org/10.1007/BFb0023281},
  doi       = {10.1007/BFb0023281},
  isbn      = {3-540-61991-7},
  timestamp = {Mon, 22 May 2017 16:14:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/1996,
  title     = {12th Annual Computer Security Applications Conference {(ACSAC} 1996),
               9-13 December 1996, San Diego, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {1996},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4296},
  timestamp = {Fri, 17 Apr 2015 21:40:09 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/lcn/1996,
  title     = {Proceedings 21st Conference on Local Computer Networks, Minneapolis,
               Minnesota, USA, October 13-16, 1996},
  publisher = {{IEEE} Computer Society},
  year      = {1996},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4101},
  isbn      = {0-8186-7617-5},
  timestamp = {Wed, 10 Dec 2014 18:26:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/lcn/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/1996,
  editor    = {Sokratis K. Katsikas and
               Dimitris Gritzalis},
  title     = {Information Systems Security, Facing the information society of the
               21st Century},
  series    = {{IFIP} Conference Proceedings},
  volume    = {54},
  publisher = {Chapman {\&} Hall},
  year      = {1996},
  isbn      = {0-412-78120-4},
  timestamp = {Thu, 03 Jan 2002 12:08:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sec/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wetice/1996,
  title     = {5th Workshop on Enabling Technologies, Infrastructure for Collaborative
               Enterprises (WET-ICE'96), June 19-21, 1996, Stanford, CA, USA, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1996},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4082},
  isbn      = {0-8186-7445-8},
  timestamp = {Thu, 06 Aug 2015 09:24:02 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wetice/1996},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/1994,
  title     = {1994 {IEEE} Computer Society Symposium on Research in Security and
               Privacy, Oakland, CA, USA, May 16-18, 1994},
  publisher = {{IEEE} Computer Society},
  year      = {1994},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=968},
  isbn      = {0-8186-5675-1},
  timestamp = {Mon, 12 Jan 2015 17:20:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sp/1994},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/1993,
  title     = {Ninth Annual Computer Security Applications Conference, {ACSAC} 1993,
               6-10 Decemver, 1993, Orlando, Florida, {USA}},
  publisher = {{IEEE}},
  year      = {1993},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=926},
  timestamp = {Fri, 24 Apr 2015 17:03:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/1993},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/1992,
  title     = {5th {IEEE} Computer Security Foundations Workshop - CSFW'92, Franconia,
               New Hampshire, USA, June 16-18, 1992, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1992},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=417},
  isbn      = {0-8186-2850-2},
  timestamp = {Thu, 19 Sep 2013 16:43:13 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/1992},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/1991,
  title     = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia,
               New Hampshire, USA, June 18-20, 1991, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1991},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=358},
  isbn      = {0-8186-2215-6},
  timestamp = {Thu, 19 Sep 2013 16:43:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/1991},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/1990,
  title     = {Sixth Annual Computer Security Applications Conference, {ACSAC} 1990,
               3-7 December, 1990, Tucson, Arizona, {USA}},
  publisher = {{IEEE}},
  year      = {1990},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=319},
  timestamp = {Wed, 03 Feb 2016 18:46:20 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/1990},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1990,
  editor    = {Jennifer Seberry and
               Josef Pieprzyk},
  title     = {Advances in Cryptology - {AUSCRYPT} '90, International Conference
               on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {453},
  publisher = {Springer},
  year      = {1990},
  url       = {https://doi.org/10.1007/BFb0030344},
  doi       = {10.1007/BFb0030344},
  isbn      = {3-540-53000-2},
  timestamp = {Fri, 19 May 2017 13:10:49 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/1990},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/1990,
  title     = {Third {IEEE} Computer Security Foundations Workshop - CSFW'90, Franconia,
               New Hampshire, USA, June 12-14, 1990, Proceedings},
  publisher = {{IEEE} Computer Society},
  year      = {1990},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=304},
  isbn      = {0-8186-2071-4},
  timestamp = {Thu, 19 Sep 2013 16:43:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/1990},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infocom/1990,
  title     = {Proceedings {IEEE} {INFOCOM} '90, The Conference on Computer Communications,
               Ninth Annual Joint Conference of the {IEEE} Computer and Communications
               Societies, The Multiple Facets of Integration, San Francisco, CA,
               USA, June 3-7, 1990},
  publisher = {{IEEE}},
  year      = {1990},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=291},
  isbn      = {0-8186-2049-8},
  timestamp = {Mon, 26 Jan 2015 16:54:50 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/1990},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/crypto/1985,
  editor    = {Hugh C. Williams},
  title     = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
               USA, August 18-22, 1985, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {218},
  publisher = {Springer},
  year      = {1986},
  url       = {https://doi.org/10.1007/3-540-39799-X},
  doi       = {10.1007/3-540-39799-X},
  isbn      = {3-540-16463-4},
  timestamp = {Fri, 19 May 2017 12:26:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/1985},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier