Select Publications

Preprints

Mazumdar S; Banerjee P; Ruj S, 2020, Griefing-Penalty: Countermeasure for Griefing Attack in Lightning Network, http://dx.doi.org/10.48550/arxiv.2005.09327

Mazumdar S; Ruj S, 2020, CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments, http://dx.doi.org/10.48550/arxiv.2005.07574

Sengupta J; Ruj S; Bit SD, 2020, A Secure Fog Based Architecture for Industrial Internet of Things and Industry 4.0, http://dx.doi.org/10.48550/arxiv.2005.07147

Mazumdar S; Ruj S; Singh RG; Pal A, 2020, HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments, http://dx.doi.org/10.48550/arxiv.2002.05071

Banerjee P; Behl D; Kodeswaran P; Kumar C; Ruj S; Sen S, 2020, Verifiable and Auditable Digital Interchange Framework, http://dx.doi.org/10.48550/arxiv.2001.03717

Sardar L; Ruj S, 2019, FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme, http://dx.doi.org/10.48550/arxiv.1910.00034

Banerjee P; Nikam N; Mazumdar S; Ruj S, 2019, Cumulus: Blockchain-Enabled Privacy Preserving Data Audit in Cloud, http://dx.doi.org/10.48550/arxiv.1904.12362

Sardar L; Ruj S, 2019, The Secure Link Prediction Problem, http://dx.doi.org/10.48550/arxiv.1901.11308

Banerjee P; Ruj S, 2018, Blockchain Enabled Data Marketplace -- Design and Challenges, http://dx.doi.org/10.48550/arxiv.1811.11462

Mazumdar S; Ruj S, 2018, Design of Anonymous Endorsement System in Hyperledger Fabric, http://dx.doi.org/10.48550/arxiv.1811.01410

Sengupta B; Nikam N; Ruj S; Narayanamurthy S; Nandi S, 2018, An Efficient Secure Distributed Cloud Storage for Append-only Data, http://dx.doi.org/10.48550/arxiv.1805.02970

Conti M; Gangwal A; Ruj S, 2018, On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective, http://dx.doi.org/10.48550/arxiv.1804.01341

Sengupta B; Ruj S, 2017, Keyword-Based Delegable Proofs of Storage, http://dx.doi.org/10.48550/arxiv.1712.04417

Sengupta B; Ruj S, 2017, Cloud Data Auditing Using Proofs of Retrievability, http://dx.doi.org/10.48550/arxiv.1711.06039

Conti M; E SK; Lal C; Ruj S, 2017, A Survey on Security and Privacy Issues of Bitcoin, http://dx.doi.org/10.48550/arxiv.1706.00916

Singh A; Sengupta B; Ruj S, 2017, Certificate Transparency with Enhancements and Short Proofs, http://dx.doi.org/10.48550/arxiv.1704.04937

Sengupta B; Dixit A; Ruj S, 2016, Secure Cloud Storage Protocols with Data Dynamics Using Secure Network Coding Techniques, http://dx.doi.org/10.48550/arxiv.1612.08029

Sengupta B; Ruj S, 2016, Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage, http://dx.doi.org/10.48550/arxiv.1611.03982

Ruj S; Pal A, 2016, Preferential Attachment Model with Degree Bound and its Application to Key Predistribution in WSN, http://dx.doi.org/10.48550/arxiv.1604.00590

Pal A; Ruj S, 2015, CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications, http://dx.doi.org/10.48550/arxiv.1501.04894

Ruj S; Pal A, 2014, Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks, http://dx.doi.org/10.48550/arxiv.1402.6809

Ruj S; Nayak A; Stojmenovic I, 2011, A Security Architecture for Data Aggregation and Access Control in Smart Grids, http://dx.doi.org/10.48550/arxiv.1111.2619

Ruj S; Cavenaghi MA; Huang Z; Nayak A; Stojmenovic I, 2011, Data-centric Misbehavior Detection in VANETs, http://dx.doi.org/10.48550/arxiv.1103.2404

Bhattacharya S; Ruj S; Roy B, 2011, Combinatorial Batch Codes: A Lower Bound and Optimal Constructions, http://dx.doi.org/10.48550/arxiv.1102.4951

Ruj S; Roy B, 2008, More on Combinatorial Batch Codes, http://dx.doi.org/10.48550/arxiv.0809.3357


Back to profile page