default search action
Vladimir A. Oleshchuk
Person information
- affiliation: University of Agder, Kristiansand, Norway
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j22]Syed Sajid Ullah, Vladimir A. Oleshchuk, Harsha S. Gardiyawasam Pussewalage:
A survey on blockchain envisioned attribute based access control for internet of things: Overview, comparative analysis, and open research challenges. Comput. Networks 235: 109994 (2023) - [j21]Harsha Sandaruwan Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
A Delegatable Attribute Based Encryption Scheme for a Collaborative E-Health Cloud. IEEE Trans. Serv. Comput. 16(2): 787-801 (2023) - [c62]Vladimir A. Oleshchuk:
Enforcement of Web3 Security by Use Blockchain and LLMs. IDAACS 2023: 391-394 - [c61]Syed Sajid Ullah, Vladimir A. Oleshchuk, Harsha S. Gardiyawasam Pussewalage:
A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things. SECRYPT 2023: 528-539 - 2020
- [c60]Kuruge Darshana Abeyrathna, Harsha S. Gardiyawasam Pussewalage, Sasanka N. Ranasinghe, Vladimir A. Oleshchuk, Ole-Christoffer Granmo:
Intrusion Detection with Interpretable Rules Generated Using the Tsetlin Machine. SSCI 2020: 1121-1130
2010 – 2019
- 2019
- [j20]Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment. ACM Trans. Internet Techn. 19(3): 41:1-41:22 (2019) - [c59]Danchen Zhang, Vladimir I. Zadorozhny, Vladimir A. Oleshchuk:
SLFTD: A Subjective Logic Based Framework for Truth Discovery. ADBIS (Short Papers and Workshops) 2019: 102-110 - [c58]Vladimir A. Oleshchuk:
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage. IDAACS 2019: 820-823 - 2018
- [c57]Mohamed Abomhara, Geir M. Køien, Vladimir A. Oleshchuk, Mohamed Hamid:
Towards Risk-aware Access Control Framework for Healthcare Information Sharing. ICISSP 2018: 312-321 - [c56]Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
Blockchain Based Delegatable Access Control Scheme for a Collaborative E-Health Environment. iThings/GreenCom/CPSCom/SmartData 2018: 1204-1211 - 2017
- [j19]Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
Attribute based access control scheme with controlled access delegation for collaborative E-health environments. J. Inf. Secur. Appl. 37: 50-64 (2017) - [c55]Harsha Sandaruwan Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
An Efficient Multi-Show Unlinkable Attribute Based Credential Scheme for a Collaborative E-Health Environment. CIC 2017: 421-428 - [c54]Vladimir A. Oleshchuk:
A trust-based security enforcement in disruption-tolerant networks. IDAACS 2017: 514-517 - [c53]Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records. SACMAT 2017: 255-262 - 2016
- [j18]Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions. Int. J. Inf. Manag. 36(6): 1161-1173 (2016) - [j17]Huihui Yang, Vladimir A. Oleshchuk, Andreas Prinz:
Verifying Group Authentication Protocols by Scyther. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(2): 3-19 (2016) - [j16]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
Enforcing mobile security with location-aware role-based access control. Secur. Commun. Networks 9(5): 429-439 (2016) - [j15]S. Venkatesan, Vladimir A. Oleshchuk, Chenniappan Chellappan, Sourabh Prakash:
Analysis of key management protocols for social networks. Soc. Netw. Anal. Min. 6(1): 3:1-3:16 (2016) - [c52]Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
A Patient-Centric Attribute Based Access Control Scheme for Secure Sharing of Personal Health Records Using Cloud Computing. CIC 2016: 46-53 - [c51]Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
An attribute based access control scheme for secure sharing of electronic health records. HealthCom 2016: 1-6 - [c50]Harsha S. Gardiyawasam Pussewalage, Pasika Sashmal Ranaweera, Vladimir A. Oleshchuk, Indika A. M. Balapuwaduge:
Secure Multi-party Based Cloud Computing Framework for Statistical Data Analysis of Encrypted Data. ICIN 2016 - [c49]Vladimir A. Oleshchuk:
A Novel Framework for Security Enforcement in Networks for Disaster and Crisis Management. ISCRAM 2016 - [c48]Huihui Yang, Andreas Prinz, Vladimir A. Oleshchuk:
Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther. PDP 2016: 553-557 - 2015
- [j14]Huihui Yang, Vladimir A. Oleshchuk:
Attribute-based Authentication Schemes: a Survey. Int. J. Comput. 14(2): 86-96 (2015) - [j13]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
A novel policy-driven reversible anonymisation scheme for XML-based services. Inf. Syst. 48: 164-178 (2015) - [j12]Konstantinos Pelechrinis, Vladimir Zadorozhny, Velin Kounev, Vladimir A. Oleshchuk, Mohd Anwar, Yiling Lin:
Automatic evaluation of information provider reliability and expertise. World Wide Web 18(1): 33-72 (2015) - [c47]Huihui Yang, Vladimir A. Oleshchuk:
A Dynamic Attribute-Based Authentication Scheme. C2SI 2015: 106-118 - [c46]Huihui Yang, Vladimir A. Oleshchuk:
Traceable hierarchical attribute-based authentication for the cloud. CNS 2015: 685-689 - [c45]Vladimir A. Oleshchuk:
Constraints validation in privacy-preserving attribute-based access control. IDAACS 2015: 429-431 - [c44]Huihui Yang, Vladimir A. Oleshchuk:
An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees. NordSec 2015: 123-135 - 2014
- [j11]Yi Ren, Vladimir Zadorozhny, Vladimir A. Oleshchuk, Frank Y. Li:
A Novel Approach to Trust Management in Unattended Wireless Sensor Networks. IEEE Trans. Mob. Comput. 13(7): 1409-1423 (2014) - [c43]Huihui Yang, Vladimir A. Oleshchuk:
An improvement of the batch-authentication and key agreement framework for P2P-based online social networks. PRISMS 2014: 1-4 - 2013
- [j10]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li:
Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs. Comput. Commun. 36(9): 1067-1077 (2013) - [c42]Geir M. Køien, Vladimir A. Oleshchuk:
Addressing the Terms-of-Service Threat - Client-side Security and Policy Control for Free File Storage Services. CLOSER 2013: 562-569 - [c41]Huihui Yang, Lei Jiao, Vladimir A. Oleshchuk:
A General Framework for Group Authentication and Key Exchange Protocols. FPS 2013: 31-45 - [c40]Vladimir A. Oleshchuk:
A novel scheme for privacy preserving in RBAC. IDAACS 2013: 620-623 - [c39]Nils Ulltveit-Moe, Terje Gjøsæter, Sigurd M. Assev, Geir M. Køien, Vladimir A. Oleshchuk:
Privacy handling for critical information infrastructures. INDIN 2013: 688-694 - [i1]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
Measuring Privacy Leakage for IDS Rules. CoRR abs/1308.5421 (2013) - 2012
- [j9]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
Decision-cache based XACML authorisation and anonymisation for XML documents. Comput. Stand. Interfaces 34(6): 527-534 (2012) - [c38]Vladimir A. Oleshchuk:
Trust-enhanced data integrity model. IDAACS-SWS 2012: 109-112 - [c37]Vladimir A. Oleshchuk:
Trust-enhanced intelligent security model. IEEE Conf. of Intelligent Systems 2012: 476-480 - [c36]Yi Ren, Vladimir Zadorozhny, Vladimir A. Oleshchuk, Frank Y. Li:
An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks. MDM 2012: 147-156 - [c35]Vladimir A. Oleshchuk:
Trust-Aware RBAC. MMM-ACNS 2012: 97-107 - [c34]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li, Selo Sulistyo:
FoSBaS: A bi-directional secrecy and collusion resilience key management scheme for BANs. WCNC 2012: 2841-2846 - 2011
- [j8]Vitaly Klyuev, Vladimir A. Oleshchuk:
Semantic retrieval: an approach to representing, searching and summarising text documents. Int. J. Inf. Technol. Commun. Convergence 1(2): 221-234 (2011) - [j7]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li, Xiaohu Ge:
Security in Mobile Wireless Sensor Networks - A Survey. J. Commun. 6(2): 128-142 (2011) - [j6]Nils Ulltveit-Moe, Vladimir A. Oleshchuk, Geir M. Køien:
Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context. Wirel. Pers. Commun. 57(3): 317-338 (2011) - [j5]Vladimir A. Oleshchuk, Rune Fensli:
Remote Patient Monitoring Within a Future 5G Infrastructure. Wirel. Pers. Commun. 57(3): 431-439 (2011) - [j4]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
A Composite Privacy Leakage Indicator. Wirel. Pers. Commun. 61(3): 511-526 (2011) - [c33]Konstantinos Pelechrinis, Vladimir Zadorozhny, Vladimir A. Oleshchuk:
Collaborative assessment of information provider's reliability and expertise using subjective logic. CollaborateCom 2011: 352-361 - [c32]Vladimir A. Oleshchuk:
Ontology-based service matching and discovery. IDAACS (2) 2011: 609-612 - [c31]Konstantinos Pelechrinis, Vladimir Zadorozhny, Vladimir A. Oleshchuk:
A Cognitive-based scheme for user reliability and expertise assessment in Q&A social networks. IRI 2011: 545-550 - [c30]Antonis Michalas, Vladimir A. Oleshchuk, Nikos Komninos, Neeli R. Prasad:
Privacy-preserving scheme for mobile ad hoc networks. ISCC 2011: 752-757 - [c29]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li, Selo Sulistyo:
SCARKER: A sensor capture resistance and key refreshing scheme for mobile WSNs. LCN 2011: 271-274 - [c28]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
Mobile Security with Location-Aware Role-Based Access Control. MobiSec 2011: 172-183 - 2010
- [j3]Xianghan Zheng, Vladimir A. Oleshchuk:
A survey on peer-to-peer SIP based communication systems. Peer-to-Peer Netw. Appl. 3(4): 257-264 (2010) - [c27]Sigurd Eskeland, Vladimir A. Oleshchuk:
Secure Group Communication Using Fractional Public Keys. ARES 2010: 254-257 - [c26]Xianghan Zheng, Vladimir A. Oleshchuk:
Secure interworking with P2PSIP and IMS. CTS 2010: 481-488 - [c25]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li:
A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs. GLOBECOM 2010: 1-6 - [c24]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
Privacy Violation Classification of Snort Ruleset. PDP 2010: 654-658 - [c23]Xianghan Zheng, Vladimir A. Oleshchuk:
The Design of Secure and Efficient P2PSIP Communication Systems. WISTP 2010: 253-260
2000 – 2009
- 2009
- [c22]Xianghan Zheng, Vladimir A. Oleshchuk:
Trust-based framework for security enhancement of P2PSIP communication systems. ICITST 2009: 1-6 - [c21]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li:
Secure and Efficient Data Storage in Unattended Wireless Sensor Networks. NTMS 2009: 1-5 - [c20]Nils Ulltveit-Moe, Vladimir A. Oleshchuk:
PRIvacy LEakage Methodology (PRILE) for IDS Rules. PrimeLife 2009: 213-225 - [c19]Xianghan Zheng, Vladimir A. Oleshchuk:
A secure architecture for P2PSIP-based communication systems. SIN 2009: 75-82 - [c18]Yi Ren, Vladimir A. Oleshchuk, Frank Y. Li:
A distributed data storage and retrieval scheme in unattended WSNs using Homomorphic Encryption and secret sharing. Wireless Days 2009: 1-6 - 2008
- [c17]Sigurd Eskeland, Vladimir A. Oleshchuk:
Secure Team-Based EPR Access Acquisition in Wireless Networks. ARES 2008: 943-949 - [c16]Sigurd Eskeland, Vladimir A. Oleshchuk:
Efficient Hierarchical Group-Oriented Key Establishment and Decryption. IAS 2008: 67-72 - 2007
- [c15]Vitaly Klyuev, Vladimir A. Oleshchuk:
Semantic Retrieval of Text Documents. CIT 2007: 189-193 - [c14]Sigurd Eskeland, Vladimir A. Oleshchuk:
Hierarchical Multi-Party Key Agreement for Wireless Networks. IAS 2007: 39-43 - [c13]Sigurd Eskeland, Vladimir A. Oleshchuk:
EPR Access Authorization of Medical Teams Based on Patient Consent. ECEH 2007: 11-21 - [c12]Vladimir A. Oleshchuk:
Privacy Preserving Monitoring and Surveillance in Sensor Networks. ISPA Workshops 2007: 485-492 - 2006
- [c11]Sigurd Eskeland, Vladimir A. Oleshchuk:
Anonymity Preserving Authorization Granting in Medical Information Networks. ECEH 2006: 71-82 - [c10]Frode Hansen, Vladimir A. Oleshchuk:
Location-based Security Framework for use of Handheld Devices in Medical Information Systems. PerCom Workshops 2006: 565-569 - 2005
- [j2]Vladimir A. Oleshchuk:
Modeling, specification and verification of ad-hoc sensor networks using SPIN. Comput. Stand. Interfaces 28(2): 159-165 (2005) - [j1]Vladimir A. Oleshchuk:
Privacy Preserving Pattern Matching on sequences of Events. Int. J. Comput. 4(3): 85-90 (2005) - [c9]Frode Hansen, Vladimir A. Oleshchuk:
Conformance Checking of RBAC Policy and its Implementation. ISPEC 2005: 144-155 - [c8]Geir M. Køien, Vladimir A. Oleshchuk:
Location Privacy for Cellular Systems; Analysis and Solution. Privacy Enhancing Technologies 2005: 40-58 - 2003
- [c7]Vladimir A. Oleshchuk, Asle Pedersen:
Ontology Based Semantic Similarity Comparison of Documents. DEXA Workshops 2003: 735-738 - [c6]Ole-Christoffer Granmo, Vladimir A. Oleshchuk, Mikael Snaprud:
Towards a Probabilistic Framework for Analogous Multi-Modal Human-Computer Interaction. HCI (4) 2003: 1407-1411 - [c5]Geir M. Køien, Vladimir A. Oleshchuk:
Spatio-temporal exposure control. PIMRC 2003: 2760-2764
1990 – 1999
- 1998
- [c4]Vladimir A. Oleshchuk:
On-line Constraint-based Pattern Matching on Sequences. SETA 1998: 330-342 - 1995
- [c3]Vladimir A. Oleshchuk:
On Public-Key Cryptosystem Based on Church-Rosser String-Rewriting Systems (Extended Abstract). COCOON 1995: 264-269 - [c2]Vladimir A. Oleshchuk:
Church-Rosser Codes. IMACC 1995: 199-204
1980 – 1989
- 1987
- [c1]A. V. Anisimov, Vladimir A. Oleshchuk:
Stable Finite Automata Mappings and Church-Rosser Systems. FCT 1987: 30-33
Coauthor Index
aka: Harsha Sandaruwan Gardiyawasam Pussewalage
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint