Search Results - "Varadharajan, V."
-
1
Design And Implementation of Smart Billing System
Published in 2023 International Conference on Sustainable Emerging Innovations in Engineering and Technology (ICSEIET) (14-09-2023)“…People must shop for a variety of things, from groceries and vegetables to clothing. Traditionally, people would visit distinct stores to purchase various…”
Get full text
Conference Proceeding -
2
Achieving secure and flexible M-services through tickets
Published in IEEE transactions on systems, man and cybernetics. Part A, Systems and humans (01-11-2003)“…Web services via wireless technologies, mobile services (M-services), HTTP, and XML have become important for conducting business. W3C XML Protocol Working…”
Get full text
Journal Article -
3
Hand decontamination by medical staff in general medical wards
Published in The Journal of hospital infection (01-04-2005)Get full text
Journal Article -
4
Robust non-interactive oblivious transfer
Published in IEEE communications letters (01-04-2003)“…We present a novel scheme of noninteractive m out of n oblivious transfer, which demonstrates significant improvement over the existing schemes in terms of…”
Get full text
Journal Article -
5
Enforcing Role-Based Access Control for Secure Data Storage in the Cloud
Published in Computer journal (01-10-2011)“…In recent times, there has been increasing interest in storing data securely in the cloud environment. To provide owners of data stored in the cloud with…”
Get full text
Journal Article -
6
On the design of secure ATM networks
Published in Computer communications (25-09-1999)“…Asynchronous Transfer Mode (ATM) is seen to be a technology that allows flexibility, efficiency and manageable bandwidth on demand to be achieved in high-speed…”
Get full text
Journal Article -
7
An access control model and its use in representing mental health application access policy
Published in IEEE transactions on knowledge and data engineering (01-02-1996)“…The paper considers an access control model and proposes extensions to it to deal with authentication and revocation. The model is then applied to represent…”
Get full text
Journal Article -
8
The nonvesicular sterol transporter Aster-C plays a minor role in whole body cholesterol balance
Published in Frontiers in physiology (2024)“…The Aster-C protein (encoded by the gene) is an endoplasmic reticulum (ER) resident protein that has been reported to transport cholesterol from the plasma…”
Get full text
Journal Article -
9
ASSESSMENT OF GESTATIONAL DIABETES MELLITUS RELATED STRESS USING A SPECIFIC SCALE ADMINISTERED AS AN ONLINE MOBILE APPLICATION
Published in International journal of pharmacy and pharmaceutical sciences (23-04-2019)“…Objective: Aim of the study was to assess the Gestational Diabetes Mellitus (GDM) related stress among pregnant women using an online mobile application based…”
Get full text
Journal Article -
10
Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines
Published in Computer journal (01-04-2012)“…Current Internet environment is vulnerable to a range of different types of attacks, and furthermore, new types of attacks are being discovered on a daily…”
Get full text
Journal Article -
11
Server-Aided Signature Verification for Lightweight Devices
Published in Computer journal (01-04-2014)“…Server-aided verification (SAV) has potential applicability in lightweight devices for improving signature verification, where the verifier possesses a…”
Get full text
Journal Article -
12
Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks
Published in IEEE transactions on information forensics and security (01-12-2011)“…Broadcasting a request or challenge is a classic method of collecting local information in distributed wireless networks. Neighbor discovery is known to be a…”
Get full text
Journal Article -
13
Security for cluster based ad hoc networks
Published in Computer communications (01-03-2004)“…A mobile ad hoc network is a short-lived cooperative collection of mobile nodes that communicate with each other without the services of a fixed…”
Get full text
Journal Article -
14
Distributed service control technique for detecting security attacks
Published in 2012 IEEE Network Operations and Management Symposium (01-04-2012)“…We propose Distributed Service Control (DSC) technique for securing critical services. One of the main aims of DSC is to deal with the attacks by minimising…”
Get full text
Conference Proceeding -
15
Intrusion detection techniques for virtual domains
Published in 2012 19th International Conference on High Performance Computing (01-12-2012)“…A virtual domain enables grouping of related virtual machines running on separate physical machine into a single network domain with a unified security policy…”
Get full text
Conference Proceeding -
16
A Trust based Access Control Framework for P2P File-Sharing Systems
Published in Proceedings of the 38th Annual Hawaii International Conference on System Sciences (2005)“…Peer-to-peer (P2P) file sharing systems have become popular as a new paradigm for information exchange. However, the decentralized and anonymous…”
Get full text
Conference Proceeding -
17
Petri net based modelling of information flow security requirements
Published in [1990] Proceedings. The Computer Security Foundations Workshop III (1990)“…An extended Petri net formalism which can be used to model information flow security requirements is described. The proposed framework can be used to specify a…”
Get full text
Conference Proceeding -
18
Secure distributed location management scheme for mobile hosts
Published in Proceedings LCN 2001. 26th Annual IEEE Conference on Local Computer Networks (2001)“…With the increasing growth in mobile computing devices and wireless networks, users are able to access information from anywhere and at anytime. In such…”
Get full text
Conference Proceeding -
19
Techniques for Analysing PDF Malware
Published in 2011 18th Asia-Pacific Software Engineering Conference (01-12-2011)“…Today, PDF is one of the widely used applications for sharing documents. Some of the important factors for the popular use of the PDF application are due to…”
Get full text
Conference Proceeding -
20
An analysis of the proxy problem in distributed systems
Published in Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy (1991)“…The authors look at the problem of delegation of rights or proxy in distributed object systems. Two signature-based schemes for achieving delegation which…”
Get full text
Conference Proceeding