Search Results - "Varadharajan, V."

Refine Results
  1. 1

    Design And Implementation of Smart Billing System by P, Kalaiselvi, M, Michael Jones, S, Murugesh, V, Varadharajan, K, Veerakumar, N, Prakash

    “…People must shop for a variety of things, from groceries and vegetables to clothing. Traditionally, people would visit distinct stores to purchase various…”
    Get full text
    Conference Proceeding
  2. 2

    Achieving secure and flexible M-services through tickets by Hua Wang, Yanchun Zhang, Jinli Cao, Varadharajan, V.

    “…Web services via wireless technologies, mobile services (M-services), HTTP, and XML have become important for conducting business. W3C XML Protocol Working…”
    Get full text
    Journal Article
  3. 3
  4. 4

    Robust non-interactive oblivious transfer by Yi Mu, Junqi Zhang, Varadharajan, V., Yan-Xia Lin

    Published in IEEE communications letters (01-04-2003)
    “…We present a novel scheme of noninteractive m out of n oblivious transfer, which demonstrates significant improvement over the existing schemes in terms of…”
    Get full text
    Journal Article
  5. 5

    Enforcing Role-Based Access Control for Secure Data Storage in the Cloud by Zhou, Lan, Varadharajan, Vijay, Hitchens, Michael

    Published in Computer journal (01-10-2011)
    “…In recent times, there has been increasing interest in storing data securely in the cloud environment. To provide owners of data stored in the cloud with…”
    Get full text
    Journal Article
  6. 6

    On the design of secure ATM networks by Varadharajan, V, Shankaran, R, Hitchens, M

    Published in Computer communications (25-09-1999)
    “…Asynchronous Transfer Mode (ATM) is seen to be a technology that allows flexibility, efficiency and manageable bandwidth on demand to be achieved in high-speed…”
    Get full text
    Journal Article
  7. 7

    An access control model and its use in representing mental health application access policy by Varadharajan, V., Calvelli, C.

    “…The paper considers an access control model and proposes extensions to it to deal with authentication and revocation. The model is then applied to represent…”
    Get full text
    Journal Article
  8. 8
  9. 9

    ASSESSMENT OF GESTATIONAL DIABETES MELLITUS RELATED STRESS USING A SPECIFIC SCALE ADMINISTERED AS AN ONLINE MOBILE APPLICATION by SRINIVASAN, A., KRISHNARAJAN, D., SARANYA, P., JITHIN, T. G., THOMAS, SNEHA, VARADHARAJAN, V.

    “…Objective: Aim of the study was to assess the Gestational Diabetes Mellitus (GDM) related stress among pregnant women using an online mobile application based…”
    Get full text
    Journal Article
  10. 10

    Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines by Tupakula, Udaya Kiran, Varadharajan, Vijay

    Published in Computer journal (01-04-2012)
    “…Current Internet environment is vulnerable to a range of different types of attacks, and furthermore, new types of attacks are being discovered on a daily…”
    Get full text
    Journal Article
  11. 11

    Server-Aided Signature Verification for Lightweight Devices by Guo, Fuchun, Mu, Yi, Susilo, Willy, Varadharajan, Vijay

    Published in Computer journal (01-04-2014)
    “…Server-aided verification (SAV) has potential applicability in lightweight devices for improving signature verification, where the verifier possesses a…”
    Get full text
    Journal Article
  12. 12

    Stochastic Modeling of Hello Flooding in Slotted CSMA/CA Wireless Sensor Networks by Sayad Haghighi, Mohammad, Mohamedpour, K., Varadharajan, V., Quinn, B. G.

    “…Broadcasting a request or challenge is a classic method of collecting local information in distributed wireless networks. Neighbor discovery is known to be a…”
    Get full text
    Journal Article
  13. 13

    Security for cluster based ad hoc networks by Varadharajan, Vijay, Shankaran, Rajan, Hitchens, Michael

    Published in Computer communications (01-03-2004)
    “…A mobile ad hoc network is a short-lived cooperative collection of mobile nodes that communicate with each other without the services of a fixed…”
    Get full text
    Journal Article
  14. 14

    Distributed service control technique for detecting security attacks by Tupakula, U., Varadharajan, V.

    “…We propose Distributed Service Control (DSC) technique for securing critical services. One of the main aims of DSC is to deal with the attacks by minimising…”
    Get full text
    Conference Proceeding
  15. 15

    Intrusion detection techniques for virtual domains by Tupakula, U., Varadharajan, V., Dutta, D.

    “…A virtual domain enables grouping of related virtual machines running on separate physical machine into a single network domain with a unified security policy…”
    Get full text
    Conference Proceeding
  16. 16

    A Trust based Access Control Framework for P2P File-Sharing Systems by Huu Tran, Hitchens, M., Varadharajan, V., Watters, P.

    “…Peer-to-peer (P2P) file sharing systems have become popular as a new paradigm for information exchange. However, the decentralized and anonymous…”
    Get full text
    Conference Proceeding
  17. 17

    Petri net based modelling of information flow security requirements by Varadharajan, V.

    “…An extended Petri net formalism which can be used to model information flow security requirements is described. The proposed framework can be used to specify a…”
    Get full text
    Conference Proceeding
  18. 18

    Secure distributed location management scheme for mobile hosts by Shankaran, R., Varadharajan, V., Hitchens, M.

    “…With the increasing growth in mobile computing devices and wireless networks, users are able to access information from anywhere and at anytime. In such…”
    Get full text
    Conference Proceeding
  19. 19

    Techniques for Analysing PDF Malware by Ulucenk, C., Varadharajan, V., Balakrishnan, V., Tupakula, U.

    “…Today, PDF is one of the widely used applications for sharing documents. Some of the important factors for the popular use of the PDF application are due to…”
    Get full text
    Conference Proceeding
  20. 20

    An analysis of the proxy problem in distributed systems by Varadharajan, V., Allen, P., Black, S.

    “…The authors look at the problem of delegation of rights or proxy in distributed object systems. Two signature-based schemes for achieving delegation which…”
    Get full text
    Conference Proceeding