Select Publications

Journal articles

Samadi M; Ruj S; Schriemer H; Erol-Kantarci M, 2023, 'Secure and Robust Demand Response Using Stackelberg Game Model and Energy Blockchain', Sensors (Basel, Switzerland), 23, http://dx.doi.org/10.3390/s23208352

Banerjee P; Behl D; Kodeswaran P; Kumar C; Ruj S; Sen S; Vinayagamurthy D, 2023, 'Accelerated Verifiable Fair Digital Exchange', Distributed Ledger Technologies: Research and Practice, 2, pp. 1 - 24, http://dx.doi.org/10.1145/3596448

Sengupta J; Ruj S; Das Bit S, 2023, 'FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT', IEEE Transactions on Network and Service Management, 20, pp. 2929 - 2941, http://dx.doi.org/10.1109/TNSM.2023.3239832

Mazumdar S; Banerjee P; Sinha A; Ruj S; Roy BK, 2023, 'Strategic Analysis of Griefing Attack in Lightning Network', IEEE Transactions on Network and Service Management, 20, pp. 1790 - 1803, http://dx.doi.org/10.1109/TNSM.2022.3230768

Mazumdar S; Ruj S, 2023, 'CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments', IEEE Transactions on Dependable and Secure Computing, 20, pp. 1060 - 1073, http://dx.doi.org/10.1109/TDSC.2022.3148476

Sardar L; Sengupta B; Ruj S, 2023, 'Efficient keyword search on encrypted dynamic cloud data', Advances in Mathematics of Communications, http://dx.doi.org/10.3934/amc.2022101

Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2022, 'DIMY: Enabling privacy-preserving contact tracing', Journal of Network and Computer Applications, 202, http://dx.doi.org/10.1016/j.jnca.2022.103356

Singh RG; Shrivastava A; Ruj S, 2022, 'A Digital Asset Inheritance Model to Convey Online Persona Posthumously', International Journal of Information Security, http://dx.doi.org/10.1007/s10207-022-00593-8

Sengupta B; Dixit A; Ruj S, 2022, 'Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques', IEEE Transactions on Cloud Computing, 10, pp. 2090 - 2101, http://dx.doi.org/10.1109/TCC.2020.3000342

Tanusree Chatterjee ; Ruj S; Das Bit S, 2021, 'Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie', Automatic Control and Computer Sciences, 55, pp. 319 - 333, http://dx.doi.org/10.3103/S0146411621040039

Sengupta J; Ruj S; Bit SD, 2021, 'A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0', IEEE Transactions on Industrial Informatics, 17, pp. 2316 - 2324, http://dx.doi.org/10.1109/TII.2020.2998105

Mazumdar S; Ruj S, 2021, 'Design of Anonymous Endorsement System in Hyperledger Fabric', IEEE Transactions on Emerging Topics in Computing, 9, pp. 1780 - 1791, http://dx.doi.org/10.1109/TETC.2019.2920719

Tahir S; Steponkus L; Ruj S; Rajarajan M; Sajjad A, 2020, 'A parallelized disjunctive query based searchable encryption scheme for big data', Future Generation Computer Systems, 109, pp. 583 - 592, http://dx.doi.org/10.1016/j.future.2018.05.048

Sengupta J; Ruj S; Das Bit S, 2020, 'A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT', Journal of Network and Computer Applications, 149, http://dx.doi.org/10.1016/j.jnca.2019.102481

Ahmed N; Michelin RA; Xue W; Ruj S; Malaney R; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha SK, 2020, 'A Survey of COVID-19 Contact Tracing Apps', IEEE Access, 8, pp. 134577 - 134601, http://dx.doi.org/10.1109/ACCESS.2020.3010226

De SJ; Ruj S, 2020, 'Efficient Decentralized Attribute Based Access Control for Mobile Clouds', IEEE Transactions on Cloud Computing, 8, pp. 124 - 137, http://dx.doi.org/10.1109/TCC.2017.2754255

Sengupta B; Ruj S, 2020, 'Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage', IEEE Transactions on Cloud Computing, 8, pp. 138 - 151, http://dx.doi.org/10.1109/TCC.2017.2767584

Sardar L; Ruj S, 2019, 'The secure link prediction problem', Advances in Mathematics of Communications, 13, pp. 733 - 757, http://dx.doi.org/10.3934/amc.2019043

Tahir S; Ruj S; Rahulamathavan Y; Rajarajan M; Glackin C, 2019, 'A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data', IEEE Transactions on Emerging Topics in Computing, 7, pp. 530 - 544, http://dx.doi.org/10.1109/TETC.2017.2737789

Dutta S; Adhikari A; Ruj S, 2019, 'Maximal contrast color visual secret sharing schemes', Designs, Codes, and Cryptography, 87, pp. 1699 - 1711, http://dx.doi.org/10.1007/s10623-018-0570-6

Parimi V; Pal A; Ruj S; Kumaraguru P; Chakraborty T, 2019, 'Understanding Vulnerability of Communities in Complex Networks', , http://dx.doi.org/10.48550/arxiv.1906.05238

Tahir S; Ruj S; Sajjad A; Rajarajan M, 2019, 'Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment', Computer Communications, 133, pp. 102 - 114, http://dx.doi.org/10.1016/j.comcom.2018.08.004

Conti M; Gangwal A; Ruj S, 2018, 'On the economic significance of ransomware campaigns: A Bitcoin transactions perspective', Computers and Security, 79, pp. 162 - 189, http://dx.doi.org/10.1016/j.cose.2018.08.008

Conti M; Sandeep KE; Lal C; Ruj S, 2018, 'A survey on security and privacy issues of bitcoin', IEEE Communications Surveys and Tutorials, 20, pp. 3416 - 3452, http://dx.doi.org/10.1109/COMST.2018.2842460

Ruj S; Maitra S; Roy B, 2018, 'Key predistribution using transversal design on a grid of wireless sensor network', Ad-Hoc and Sensor Wireless Networks, 5, pp. 247 - 264

Chatterjee T; Ruj S; Bit SD, 2018, 'Security issues in named data networks', Computer, 51, pp. 66 - 75, http://dx.doi.org/10.1109/MC.2018.1151010

Bag S; Ruj S; Sakurai K, 2017, 'Bitcoin Block Withholding Attack: Analysis and Mitigation', IEEE Transactions on Information Forensics and Security, 12, pp. 1967 - 1978, http://dx.doi.org/10.1109/TIFS.2016.2623588

Pal A; Ruj S, 2017, 'A Graph Analytics Framework for Ranking Authors, Papers and Venues', , http://arxiv.org/abs/1708.00329v1

Ruj S; Stojmenovic M; Nayak A, 2014, 'Decentralized access control with anonymous authentication of data stored in clouds', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 384 - 394, http://dx.doi.org/10.1109/TPDS.2013.38

Huang Z; Ruj S; Cavenaghi MA; Stojmenovic M; Nayak A, 2014, 'A social network approach to trust management in VANETs', Peer-to-Peer Networking and Applications, 7, pp. 229 - 242, http://dx.doi.org/10.1007/s12083-012-0136-8

Stojmenovic M; Nayak A; Prado A; Ruj S, 2014, 'Applying transmission-coverage algorithms for secure geocasting in VANETs', International Journal of Computational Science and Engineering, 1, pp. 1 - 1, http://dx.doi.org/10.1504/ijcse.2014.10006161

Ruj S; Nayak A; Stojmenovic I, 2013, 'Pairwise and triple key distribution in wireless sensor networks with applications', IEEE Transactions on Computers, 62, pp. 2224 - 2237, http://dx.doi.org/10.1109/TC.2012.138

Ruj S; Nayak A, 2013, 'A decentralized security framework for data aggregation and access control in smart grids', IEEE Transactions on Smart Grid, 4, pp. 196 - 205, http://dx.doi.org/10.1109/TSG.2012.2224389

Bhattacharya S; Ruj S; Roy B, 2012, 'Combinatorial batch codes: A lower bound and optimal constructions', Advances in Mathematics of Communications, 6, pp. 165 - 174, http://dx.doi.org/10.3934/amc.2012.6.165

Stankovski P; Ruj S; Hell M; Johansson T, 2012, 'Improved distinguishers for HC-128', Designs, Codes, and Cryptography, 63, pp. 225 - 240, http://dx.doi.org/10.1007/s10623-011-9550-9

Ruj S; Roy B, 2011, 'Key pre-distribution using partially balanced designs in wireless sensor networks', International Journal of High Performance Computing and Networking, 7, pp. 19 - 28, http://dx.doi.org/10.1504/IJHPCN.2011.038707

Ruj S; Roy B, 2009, 'Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks', ACM Transactions on Sensor Networks, 6, http://dx.doi.org/10.1145/1653760.1653764

Ruj S; Roy B, 2009, 'Revisiting Key Predistribution Using Transversal Designs for a Grid-Based Deployment Scheme', International Journal of Distributed Sensor Networks, 5, pp. 660 - 674, http://dx.doi.org/10.1080/15501320802581466


Back to profile page