Select Publications

Conference Papers

Verma R; Ruj S, 2014, 'Security services using crowdsourcing', in Procedia Computer Science, pp. 505 - 512, http://dx.doi.org/10.1016/j.procs.2014.05.454

De SJ; Ruj S; Pal AK, 2014, 'Should silence be heard? Fair rational secret sharing with silent and non-silent players', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 240 - 255, http://dx.doi.org/10.1007/978-3-319-12280-9_16

Min G; Varadharajan V; Ko RKL; Xiang Y; Marmol FG; Ruj S; Wang G; Yang LT, 2014, 'TSP 2013: Message from workshop chairs', in Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013, http://dx.doi.org/10.1109/HPCC.and.EUC.2013.350

Bag S; Ruj S; Roy B, 2013, 'Jamming resistant schemes for wireless communication: A combinatorial approach', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 43 - 62, http://dx.doi.org/10.1007/978-3-642-45204-8_4

Yu S; Wang H; Lin X; Ruj S, 2013, 'NFSP 2013: Message from the chairs', in Proceedings - International Conference on Distributed Computing Systems, http://dx.doi.org/10.1109/ICDCSW.2013.73

Reddy SKVL; Ruj S; Nayak A, 2013, 'Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 1836 - 1841, http://dx.doi.org/10.1109/WCNC.2013.6554843

Huang Z; Wang C; Ruj S; Stojmenovic M; Nayak A, 2013, 'Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory', in Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications, ICIEA 2013, pp. 1023 - 1028, http://dx.doi.org/10.1109/ICIEA.2013.6566517

Prado A; Ruj S; Nayak A, 2013, 'Enhanced privacy and reliability for secure geocasting in VANET', in IEEE International Conference on Communications, pp. 1599 - 1603, http://dx.doi.org/10.1109/ICC.2013.6654743

Ruj S; Sakurai K, 2013, 'Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique', in Proceedings - IEEE Global Communications Conference, GLOBECOM, pp. 402 - 407, http://dx.doi.org/10.1109/GLOCOM.2013.6831104

Ruj S; Nayak A; Naik S, 2012, 'Securing home networks using Physically Unclonable Functions', in ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program, pp. 288 - 293, http://dx.doi.org/10.1109/ICUFN.2012.6261713

Ruj S; Stojmenovic M; Nayak A, 2012, 'Privacy preserving access control with authentication for securing data in clouds', in Proceedings - 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012, pp. 556 - 563, http://dx.doi.org/10.1109/CCGrid.2012.92

Reddy SKVL; Ruj S; Nayak A, 2012, 'Distributed data survivability schemes in mobile Unattended Wireless Sensor Networks', in Proceedings - IEEE Global Communications Conference, GLOBECOM, pp. 979 - 984, http://dx.doi.org/10.1109/GLOCOM.2012.6503240

Ruj S; Cavenaghi MA; Huang Z; Nayak A; Stojmenovic I, 2011, 'On data-centric misbehavior detection in VANETs', in IEEE Vehicular Technology Conference, http://dx.doi.org/10.1109/VETECF.2011.6093096

Ruj S; Nayak A; Stojmenovic I, 2011, 'DACC: Distributed access control in clouds', in Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, pp. 91 - 98, http://dx.doi.org/10.1109/TrustCom.2011.15

Huang Z; Ruj S; Cavenaghi M; Nayak A, 2011, 'Limitations of trust management schemes in VANET and countermeasures', in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, pp. 1228 - 1232, http://dx.doi.org/10.1109/PIMRC.2011.6139695

Ruj S; Nayak A; Stojmenovic I, 2011, 'Distributed fine-grained access control in wireless sensor networks', in Proceedings - 25th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2011, pp. 352 - 362, http://dx.doi.org/10.1109/IPDPS.2011.42

Ruj S; Nayak A; Stojmenovic I, 2011, 'Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs', in Proceedings - IEEE INFOCOM, pp. 326 - 330, http://dx.doi.org/10.1109/INFCOM.2011.5935175

Ruj S; Nayak A; Stojmenovic I, 2011, 'Improved access control mechanism in vehicular ad hoc networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 191 - 205, http://dx.doi.org/10.1007/978-3-642-22450-8_15

Bag S; Ruj S, 2011, 'Key distribution in wireless sensor networks using finite affine plane', in Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, pp. 436 - 441, http://dx.doi.org/10.1109/WAINA.2011.39

Ruj S; Seberry J; Roy B, 2009, 'Key predistribution schemes using block designs inwireless sensor networks', in Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, pp. 873 - 878, http://dx.doi.org/10.1109/CSE.2009.35

Ruj S; Roy B, 2009, 'Key predistribution schemes using codes in wireless sensor networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 275 - 288, http://dx.doi.org/10.1007/978-3-642-01440-6_22

Ruj S; Roy B, 2008, 'Key establishment algorithms for some deterministic key predistribution schemes', in Security in Information Systems - Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008; In Conjunction with ICEIS 2008, pp. 68 - 77

Ruj S; Roy B, 2007, 'Key predistribution using partially balanced designs in wireless sensor networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 431 - 445, http://dx.doi.org/10.1007/978-3-540-74742-0_40


Back to profile page