Select Publications

Conference Papers

Sengupta B; Bag S; Sakurai K; Ruj S, 2016, 'Retricoin: Bitcoin based on compact proofs of retrievability', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/2833312.2833317

Anada H; Ruj S; Sakurai K, 2016, 'Expressive rating scheme by signatures with predications on ratees', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 363 - 379, http://dx.doi.org/10.1007/978-3-319-46298-1_24

Bag S; Ruj S; Sakurai K, 2016, 'On the application of clique problem for proof-of-work in cryptocurrencies', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 260 - 279, http://dx.doi.org/10.1007/978-3-319-38898-4_16

De SJ; Ruj S, 2015, 'Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption', in 2015 IEEE Global Communications Conference (GLOBECOM), IEEE, presented at GLOBECOM 2015 - 2015 IEEE Global Communications Conference, 06 December 2015 - 10 December 2015, http://dx.doi.org/10.1109/glocom.2015.7417639

Pal A; Ruj S, 2015, 'CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications', in IEEE International Conference on Communications, Institute of Electrical and Electronics Engineers (IEEE), pp. 1256 - 1261, presented at 2015 IEEE International Conference on Communications (ICC), 08 June 2015 - 12 June 2015, http://dx.doi.org/10.1109/ICC.2015.7248495

Sen A; Ghosh S; Basak A; Puria HP; Ruj S, 2015, 'Achieving data survivability and confidentiality in unattended wireless sensor networks', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 239 - 246, http://dx.doi.org/10.1109/AINA.2015.191

Balani N; Ruj S, 2015, 'Temporal access control with user revocation for cloud data', in Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, pp. 336 - 343, http://dx.doi.org/10.1109/TrustCom.2014.45

De SJ; Ruj S, 2015, 'Decentralized access control on data in the cloud with fast encryption and outsourced decryption', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOCOM.2014.7417639

Ruj S, 2014, 'Attribute based access control in clouds: A survey', in 2014 International Conference on Signal Processing and Communications, SPCOM 2014, http://dx.doi.org/10.1109/SPCOM.2014.6983992

Ruj S; Pal A, 2014, 'Analyzing cascading failures in smart grids under random and targeted attacks', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 226 - 233, http://dx.doi.org/10.1109/AINA.2014.32

Verma R; Ruj S, 2014, 'Security services using crowdsourcing', in Procedia Computer Science, pp. 505 - 512, http://dx.doi.org/10.1016/j.procs.2014.05.454

De SJ; Ruj S; Pal AK, 2014, 'Should silence be heard? Fair rational secret sharing with silent and non-silent players', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 240 - 255, http://dx.doi.org/10.1007/978-3-319-12280-9_16

Min G; Varadharajan V; Ko RKL; Xiang Y; Marmol FG; Ruj S; Wang G; Yang LT, 2014, 'TSP 2013: Message from workshop chairs', in Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013, http://dx.doi.org/10.1109/HPCC.and.EUC.2013.350

Bag S; Ruj S; Roy B, 2013, 'Jamming resistant schemes for wireless communication: A combinatorial approach', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 43 - 62, http://dx.doi.org/10.1007/978-3-642-45204-8_4

Yu S; Wang H; Lin X; Ruj S, 2013, 'NFSP 2013: Message from the chairs', in Proceedings - International Conference on Distributed Computing Systems, http://dx.doi.org/10.1109/ICDCSW.2013.73

Reddy SKVL; Ruj S; Nayak A, 2013, 'Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 1836 - 1841, http://dx.doi.org/10.1109/WCNC.2013.6554843

Huang Z; Wang C; Ruj S; Stojmenovic M; Nayak A, 2013, 'Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory', in Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications, ICIEA 2013, pp. 1023 - 1028, http://dx.doi.org/10.1109/ICIEA.2013.6566517

Prado A; Ruj S; Nayak A, 2013, 'Enhanced privacy and reliability for secure geocasting in VANET', in IEEE International Conference on Communications, pp. 1599 - 1603, http://dx.doi.org/10.1109/ICC.2013.6654743

Ruj S; Sakurai K, 2013, 'Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique', in Proceedings - IEEE Global Communications Conference, GLOBECOM, pp. 402 - 407, http://dx.doi.org/10.1109/GLOCOM.2013.6831104

Ruj S; Nayak A; Naik S, 2012, 'Securing home networks using Physically Unclonable Functions', in ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program, pp. 288 - 293, http://dx.doi.org/10.1109/ICUFN.2012.6261713

Ruj S; Stojmenovic M; Nayak A, 2012, 'Privacy preserving access control with authentication for securing data in clouds', in Proceedings - 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012, pp. 556 - 563, http://dx.doi.org/10.1109/CCGrid.2012.92

Reddy SKVL; Ruj S; Nayak A, 2012, 'Distributed data survivability schemes in mobile Unattended Wireless Sensor Networks', in Proceedings - IEEE Global Communications Conference, GLOBECOM, pp. 979 - 984, http://dx.doi.org/10.1109/GLOCOM.2012.6503240

Ruj S; Cavenaghi MA; Huang Z; Nayak A; Stojmenovic I, 2011, 'On data-centric misbehavior detection in VANETs', in IEEE Vehicular Technology Conference, http://dx.doi.org/10.1109/VETECF.2011.6093096

Ruj S; Nayak A; Stojmenovic I, 2011, 'DACC: Distributed access control in clouds', in Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, pp. 91 - 98, http://dx.doi.org/10.1109/TrustCom.2011.15

Huang Z; Ruj S; Cavenaghi M; Nayak A, 2011, 'Limitations of trust management schemes in VANET and countermeasures', in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, pp. 1228 - 1232, http://dx.doi.org/10.1109/PIMRC.2011.6139695

Ruj S; Nayak A; Stojmenovic I, 2011, 'Distributed fine-grained access control in wireless sensor networks', in Proceedings - 25th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2011, pp. 352 - 362, http://dx.doi.org/10.1109/IPDPS.2011.42

Ruj S; Nayak A; Stojmenovic I, 2011, 'Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs', in Proceedings - IEEE INFOCOM, pp. 326 - 330, http://dx.doi.org/10.1109/INFCOM.2011.5935175

Ruj S; Nayak A; Stojmenovic I, 2011, 'Improved access control mechanism in vehicular ad hoc networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 191 - 205, http://dx.doi.org/10.1007/978-3-642-22450-8_15

Bag S; Ruj S, 2011, 'Key distribution in wireless sensor networks using finite affine plane', in Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, pp. 436 - 441, http://dx.doi.org/10.1109/WAINA.2011.39

Ruj S; Seberry J; Roy B, 2009, 'Key predistribution schemes using block designs inwireless sensor networks', in Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, pp. 873 - 878, http://dx.doi.org/10.1109/CSE.2009.35

Ruj S; Roy B, 2009, 'Key predistribution schemes using codes in wireless sensor networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 275 - 288, http://dx.doi.org/10.1007/978-3-642-01440-6_22

Ruj S; Roy B, 2008, 'Key establishment algorithms for some deterministic key predistribution schemes', in Security in Information Systems - Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008; In Conjunction with ICEIS 2008, pp. 68 - 77

Ruj S; Roy B, 2007, 'Key predistribution using partially balanced designs in wireless sensor networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 431 - 445, http://dx.doi.org/10.1007/978-3-540-74742-0_40

Preprints

Krul E; Paik H-Y; Ruj S; Kanhere SS, 2024, SoK: Trusting Self-Sovereign Identity, , http://dx.doi.org/10.48550/arxiv.2404.06729

Ma B; Pathak VN; Liu L; Ruj S, 2023, One-Phase Batch Update on Sparse Merkle Trees for Rollups, , http://dx.doi.org/10.48550/arxiv.2310.13328

Chamikara MAP; Jang SI; Oppermann I; Liu D; Roberto M; Ruj S; Pal A; Mohammady M; Camtepe S; Young S; Dorrian C; David N, 2023, OptimShare: A Unified Framework for Privacy Preserving Data Sharing -- Towards the Practical Utility of Data with Privacy, , http://dx.doi.org/10.48550/arxiv.2306.03379

Sengupta J; Ruj S; Bit SD, 2023, FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT, , http://dx.doi.org/10.48550/arxiv.2301.09761

Ruj S; Pal A, 2022, Cascading Failures in Smart Grids under Random, Targeted and Adaptive Attacks, , http://arxiv.org/abs/2206.12735v1

Sengupta J; Ruj S; Bit SD, 2022, SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT, , http://dx.doi.org/10.48550/arxiv.2203.11914

Mazumdar S; Banerjee P; Sinha A; Ruj S; Roy B, 2022, Strategic Analysis of Griefing Attack in Lightning Network, , http://dx.doi.org/10.48550/arxiv.2203.10533

Das D, 2021, Application of Blockchain in Healthcare and Health Insurance Sector, , http://dx.doi.org/10.48550/arxiv.2108.00807

Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2021, DIMY: Enabling Privacy-preserving Contact Tracing, , http://dx.doi.org/10.48550/arxiv.2103.05873

Banerjee P; Govindarajan C; Jayachandran P; Ruj S, 2020, Reliable, Fair and Decentralized Marketplace for Content Sharing Using Blockchain, , http://dx.doi.org/10.48550/arxiv.2009.11033

Ahmed N; Michelin RA; Xue W; Ruj S; Malaney R; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha S, 2020, A Survey of COVID-19 Contact Tracing Apps, , http://dx.doi.org/10.48550/arxiv.2006.10306

Singh RG; Ruj S, 2020, A Technical Look At The Indian Personal Data Protection Bill, , http://dx.doi.org/10.48550/arxiv.2005.13812

Mazumdar S; Banerjee P; Ruj S, 2020, Griefing-Penalty: Countermeasure for Griefing Attack in Lightning Network, , http://dx.doi.org/10.48550/arxiv.2005.09327

Mazumdar S; Ruj S, 2020, CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments, , http://dx.doi.org/10.48550/arxiv.2005.07574

Sengupta J; Ruj S; Bit SD, 2020, A Secure Fog Based Architecture for Industrial Internet of Things and Industry 4.0, , http://dx.doi.org/10.48550/arxiv.2005.07147

Mazumdar S; Ruj S; Singh RG; Pal A, 2020, HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments, , http://dx.doi.org/10.48550/arxiv.2002.05071

Banerjee P; Behl D; Kodeswaran P; Kumar C; Ruj S; Sen S, 2020, Verifiable and Auditable Digital Interchange Framework, , http://dx.doi.org/10.48550/arxiv.2001.03717


Back to profile page