default search action
Sushmita Ruj
Person information
- affiliation: Indian Statistical Institute, Kolkata, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Laltu Sardar, Binanda Sengupta, Sushmita Ruj:
Efficient keyword search on encrypted dynamic cloud data. Adv. Math. Commun. 18(5): 1442-1470 (2024) - [j37]Evan Krul, Hye-young Paik, Sushmita Ruj, Salil S. Kanhere:
SoK: Trusting Self-Sovereign Identity. Proc. Priv. Enhancing Technol. 2024(3): 297-313 (2024) - [j36]Robert Marlin, Raja Jurdak, Alsharif Abuadbba, Sushmita Ruj, Dimity Miller:
Electric Vehicle Next Charge Location Prediction. IEEE Trans. Intell. Transp. Syst. 25(10): 14128-14139 (2024) - [c66]Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj:
DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs. ACISP (2) 2024: 124-143 - [c65]Ayda Valinezhad Orang, Ali Dorri, Serge Gaspers, Sushmita Ruj:
Blockchain-Enabled Private and Secure Task Allocation Framework. COMSNETS 2024: 666-670 - [c64]Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, Sushmita Ruj:
Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures. CRYPTO (1) 2024: 3-38 - [c63]Sushmita Ruj:
Zero-Knowledge Proofs for Blockchains. DSN-S 2024: 67-68 - [i49]Evan Krul, Hye-young Paik, Sushmita Ruj, Salil S. Kanhere:
SoK: Trusting Self-Sovereign Identity. CoRR abs/2404.06729 (2024) - [i48]Debendranath Das, Sushmita Ruj, Subhamoy Maitra:
SecureVAX: A Blockchain-Enabled Secure Vaccine Passport System. CoRR abs/2407.13852 (2024) - [i47]Xinyu Zhang, Ron Steinfeld, Muhammed F. Esgin, Joseph K. Liu, Dongxi Liu, Sushmita Ruj:
Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures. IACR Cryptol. ePrint Arch. 2024: 868 (2024) - [i46]Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj:
DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs. IACR Cryptol. ePrint Arch. 2024: 985 (2024) - 2023
- [j35]Prabal Banerjee, Dushyant Behl, Palanivel A. Kodeswaran, Chaitanya Kumar, Sushmita Ruj, Sayandeep Sen, Dhinakaran Vinayagamurthy:
Accelerated Verifiable Fair Digital Exchange. Distributed Ledger Technol. Res. Pract. 2(3): 1-24 (2023) - [j34]Mikhak Samadi, Sushmita Ruj, Henry Schriemer, Melike Erol-Kantarci:
Secure and Robust Demand Response Using Stackelberg Game Model and Energy Blockchain. Sensors 23(20): 8352 (2023) - [j33]Subhra Mazumdar, Sushmita Ruj:
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments. IEEE Trans. Dependable Secur. Comput. 20(2): 1060-1073 (2023) - [j32]Subhra Mazumdar, Prabal Banerjee, Abhinandan Sinha, Sushmita Ruj, Bimal Kumar Roy:
Strategic Analysis of Griefing Attack in Lightning Network. IEEE Trans. Netw. Serv. Manag. 20(2): 1790-1803 (2023) - [j31]Jayasree Sengupta, Sushmita Ruj, Sipra Das Bit:
FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT. IEEE Trans. Netw. Serv. Manag. 20(3): 2929-2941 (2023) - [c62]Fokke Heikamp, Lei Pan, Robin Doss, Rolando Trujillo-Rasua, Sushmita Ruj:
ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness. BSCI 2023: 1-10 - [c61]Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, Sushmita Ruj:
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs. CRYPTO (5) 2023: 484-517 - [i45]Jayasree Sengupta, Sushmita Ruj, Sipra Das Bit:
FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT. CoRR abs/2301.09761 (2023) - [i44]M. A. P. Chamikara, Seung Ick Jang, Ian J. Oppermann, Dongxi Liu, Musotto Roberto, Sushmita Ruj, Arindam Pal, Meisam Mohammady, Seyit Camtepe, Sylvia Young, Chris Dorrian, Nasir David:
OptimShare: A Unified Framework for Privacy Preserving Data Sharing - Towards the Practical Utility of Data with Privacy. CoRR abs/2306.03379 (2023) - [i43]Boqian Ma, Vir Nath Pathak, Lanping Liu, Sushmita Ruj:
One-Phase Batch Update on Sparse Merkle Trees for Rollups. CoRR abs/2310.13328 (2023) - 2022
- [j30]Ram Govind Singh, Ananya Shrivastava, Sushmita Ruj:
A Digital Asset Inheritance Model to Convey Online Persona Posthumously. Int. J. Inf. Sec. 21(5): 983-1003 (2022) - [j29]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Guntur Dharma Putra, Sushmita Ruj, Salil S. Kanhere, Sanjay K. Jha:
DIMY: Enabling privacy-preserving contact tracing. J. Netw. Comput. Appl. 202: 103356 (2022) - [j28]Binanda Sengupta, Akanksha Dixit, Sushmita Ruj:
Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques. IEEE Trans. Cloud Comput. 10(3): 2090-2101 (2022) - [c60]Jayasree Sengupta, Sushmita Ruj, Sipra Das Bit:
SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT. CCGRID 2022: 249-258 - [c59]Debendranath Das, Amudhan Muthaiah, Sushmita Ruj:
Blockchain-Enabled Secure and Smart Healthcare System. DESRIST 2022: 97-109 - [c58]Philipp Hoenisch, Subhra Mazumdar, Pedro Moreno-Sanchez, Sushmita Ruj:
LightSwap: An Atomic Swap Does Not Require Timeouts at both Blockchains. DPM/CBT@ESORICS 2022: 219-235 - [c57]Fokke Heikamp, Lei Pan, Rolando Trujillo-Rasua, Sushmita Ruj, Robin Doss:
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts. NSS 2022: 514-523 - [i42]Subhra Mazumdar, Prabal Banerjee, Abhinandan Sinha, Sushmita Ruj, Bimal Roy:
Strategic Analysis to defend against Griefing Attack in Lightning Network. CoRR abs/2203.10533 (2022) - [i41]Jayasree Sengupta, Sushmita Ruj, Sipra Das Bit:
SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT. CoRR abs/2203.11914 (2022) - [i40]Sushmita Ruj, Arindam Pal:
Cascading Failures in Smart Grids under Random, Targeted and Adaptive Attacks. CoRR abs/2206.12735 (2022) - [i39]Subhra Mazumdar, Sushmita Ruj:
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments. IACR Cryptol. ePrint Arch. 2022: 123 (2022) - [i38]Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, Sushmita Ruj:
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs. IACR Cryptol. ePrint Arch. 2022: 141 (2022) - [i37]Laltu Sardar, Sushmita Ruj:
Verifiable and forward private conjunctive keyword search from DIA tree. IACR Cryptol. ePrint Arch. 2022: 598 (2022) - [i36]Philipp Hoenisch, Subhra Mazumdar, Pedro Moreno-Sanchez, Sushmita Ruj:
LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains. IACR Cryptol. ePrint Arch. 2022: 1650 (2022) - 2021
- [j27]Tanusree Chatterjee, Sushmita Ruj, Sipra Das Bit:
Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie. Autom. Control. Comput. Sci. 55(4): 319-333 (2021) - [j26]Subhra Mazumdar, Sushmita Ruj:
Design of Anonymous Endorsement System in Hyperledger Fabric. IEEE Trans. Emerg. Top. Comput. 9(4): 1780-1791 (2021) - [j25]Jayasree Sengupta, Sushmita Ruj, Sipra Das Bit:
A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0. IEEE Trans. Ind. Informatics 17(4): 2316-2324 (2021) - [c56]Prabal Banerjee, Amudhan Muthaiah, Sushmita Ruj:
Blockchain Enabled Data Trading with User Consent. COMSNETS 2021: 263-271 - [c55]Laltu Sardar, Gaurav Bansal, Sushmita Ruj, Kouichi Sakurai:
Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data. COMSNETS 2021: 465-473 - [c54]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Guntur Dharma Putra, Wei Song, Sushmita Ruj, Salil S. Kanhere, Sanjay K. Jha:
Towards Privacy-preserving Digital Contact Tracing. IEEE ICBC 2021: 1-3 - [c53]Mikhak Samadi, Henry Schriemer, Sushmita Ruj, Melike Erol-Kantarci:
Energy Blockchain for Demand Response and Distributed Energy Resource Management. SmartGridComm 2021: 425-431 - [e3]Joonsang Baek, Sushmita Ruj:
Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings. Lecture Notes in Computer Science 13083, Springer 2021, ISBN 978-3-030-90566-8 [contents] - [i35]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Guntur Dharma Putra, Sushmita Ruj, Salil S. Kanhere, Sanjay Jha:
DIMY: Enabling Privacy-preserving Contact Tracing. CoRR abs/2103.05873 (2021) - [i34]Debendranath Das, Amudhan Muthaiah, Sushmita Ruj:
Blockchain-Enabled Secure and Smart HealthCare System. CoRR abs/2108.00807 (2021) - 2020
- [j24]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Sushmita Ruj, Robert A. Malaney, Salil S. Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, Sanjay K. Jha:
A Survey of COVID-19 Contact Tracing Apps. IEEE Access 8: 134577-134601 (2020) - [j23]Shahzaib Tahir, Liutauras Steponkus, Sushmita Ruj, Muttukrishnan Rajarajan, Ali Sajjad:
A parallelized disjunctive query based searchable encryption scheme for big data. Future Gener. Comput. Syst. 109: 583-592 (2020) - [j22]Jayasree Sengupta, Sushmita Ruj, Sipra Das Bit:
A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT. J. Netw. Comput. Appl. 149 (2020) - [j21]Sourya Joyee De, Sushmita Ruj:
Efficient Decentralized Attribute Based Access Control for Mobile Clouds. IEEE Trans. Cloud Comput. 8(1): 124-137 (2020) - [j20]Binanda Sengupta, Sushmita Ruj:
Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage. IEEE Trans. Cloud Comput. 8(1): 138-151 (2020) - [c52]Prabal Banerjee, Chander Govindarajan, Praveen Jayachandran, Sushmita Ruj:
Reliable, Fair and Decentralized Marketplace for Content Sharing Using Blockchain. Blockchain 2020: 365-370 - [c51]Subhra Mazumdar, Sushmita Ruj, Ram Govind Singh, Arindam Pal:
HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments. IEEE ICBC 2020: 1-5 - [c50]Ranit Chatterjee, Sushmita Ruj, Sipra Das Bit:
Public Key Infrastructure for Named Data Networks. ICDCN 2020: 25:1-25:10 - [c49]Sabyasachi Dutta, Md Kutubuddin Sardar, Avishek Adhikari, Sushmita Ruj, Kouichi Sakurai:
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. ICISS 2020: 198-217 - [c48]Subhra Mazumdar, Prabal Banerjee, Sushmita Ruj:
Time is Money: Countering Griefing Attack in Lightning Network. TrustCom 2020: 1036-1043 - [i33]Prabal Banerjee, Dushyant Behl, Palanivel A. Kodeswaran, Chaitanya Kumar, Sushmita Ruj, Sayandeep Sen:
Verifiable and Auditable Digital Interchange Framework. CoRR abs/2001.03717 (2020) - [i32]Subhra Mazumdar, Sushmita Ruj, Ram Govind Singh, Arindam Pal:
HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments. CoRR abs/2002.05071 (2020) - [i31]Jayasree Sengupta, Sushmita Ruj, Sipra Das Bit:
A Secure Fog Based Architecture for Industrial Internet of Things and Industry 4.0. CoRR abs/2005.07147 (2020) - [i30]Subhra Mazumdar, Sushmita Ruj:
CryptoMaze: Atomic Off-Chain Payments in Payment Channel Network. CoRR abs/2005.07574 (2020) - [i29]Prabal Banerjee, Subhra Mazumdar, Sushmita Ruj:
Griefing-Penalty: Countermeasure for Griefing Attack in Bitcoin-compatible PCNs. CoRR abs/2005.09327 (2020) - [i28]Ram Govind Singh, Sushmita Ruj:
A Technical Look At The Indian Personal Data Protection Bill. CoRR abs/2005.13812 (2020) - [i27]Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Sushmita Ruj, Robert A. Malaney, Salil S. Kanhere, Aruna Seneviratne, Wen Hu, Helge Janicke, Sanjay K. Jha:
A Survey of COVID-19 Contact Tracing Apps. CoRR abs/2006.10306 (2020) - [i26]Prabal Banerjee, Chander Govindarajan, Praveen Jayachandran, Sushmita Ruj:
Reliable, Fair and Decentralized Marketplace for Content Sharing Using Blockchain. CoRR abs/2009.11033 (2020)
2010 – 2019
- 2019
- [j19]Laltu Sardar, Sushmita Ruj:
The secure link prediction problem. Adv. Math. Commun. 13(4): 733-757 (2019) - [j18]Shahzaib Tahir, Sushmita Ruj, Ali Sajjad, Muttukrishnan Rajarajan:
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment. Comput. Commun. 133: 102-114 (2019) - [j17]Sabyasachi Dutta, Avishek Adhikari, Sushmita Ruj:
Maximal contrast color visual secret sharing schemes. Des. Codes Cryptogr. 87(7): 1699-1711 (2019) - [j16]Shahzaib Tahir, Sushmita Ruj, Yogachandran Rahulamathavan, Muttukrishnan Rajarajan, Cornelius Glackin:
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data. IEEE Trans. Emerg. Top. Comput. 7(4): 530-544 (2019) - [c47]Tanusree Chatterjee, Sushmita Ruj, Sipra Das Bit:
LowSHeP: Low-overhead forwarding and update Solution in ndn with Hexadecimal Patricia trie. ANTS 2019: 1-6 - [c46]Panchalika Pal, Sushmita Ruj:
BlockV: A Blockchain Enabled Peer-Peer Ride Sharing Service. Blockchain 2019: 463-468 - [c45]Soumen Pachal, Sushmita Ruj:
Rational Mining Of Bitcoin. COMSNETS 2019: 1-8 - [c44]Jayasree Sengupta, Sushmita Ruj, Sipra Das Bit:
End to end secure anonymous communication for secure directed diffusion in IoT. ICDCN 2019: 445-450 - [c43]Laltu Sardar, Sushmita Ruj:
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme. ProvSec 2019: 355-371 - [e2]Feng Hao, Sushmita Ruj, Sourav Sen Gupta:
Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings. Lecture Notes in Computer Science 11898, Springer 2019, ISBN 978-3-030-35422-0 [contents] - [i25]Laltu Sardar, Sushmita Ruj:
The Secure Link Prediction Problem. CoRR abs/1901.11308 (2019) - [i24]Prabal Banerjee, Nishant Nikam, Sushmita Ruj:
Blockchain Enabled Privacy Preserving Data Audit. CoRR abs/1904.12362 (2019) - [i23]Viray Parimi, Arindam Pal, Sushmita Ruj, Ponnurangam Kumaraguru, Tanmoy Chakraborty:
Understanding Vulnerability of Communities in Complex Networks. CoRR abs/1906.05238 (2019) - [i22]Laltu Sardar, Sushmita Ruj:
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme. CoRR abs/1910.00034 (2019) - [i21]Laltu Sardar, Sushmita Ruj:
The Secure Link Prediction Problem. IACR Cryptol. ePrint Arch. 2019: 87 (2019) - [i20]Subhra Mazumdar, Sushmita Ruj:
Design of Anonymous Endorsement System in Hyperledger Fabric. IACR Cryptol. ePrint Arch. 2019: 753 (2019) - [i19]Laltu Sardar, Sushmita Ruj:
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme. IACR Cryptol. ePrint Arch. 2019: 1123 (2019) - 2018
- [j15]Mauro Conti, Ankit Gangwal, Sushmita Ruj:
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective. Comput. Secur. 79: 162-189 (2018) - [j14]Tanusree Chatterjee, Sushmita Ruj, Sipra Das Bit:
Security Issues in Named Data Networks. Computer 51(1): 66-75 (2018) - [j13]Mauro Conti, Sandeep Kumar E, Chhagan Lal, Sushmita Ruj:
A Survey on Security and Privacy Issues of Bitcoin. IEEE Commun. Surv. Tutorials 20(4): 3416-3452 (2018) - [j12]Antonio Prado, Sushmita Ruj, Milos Stojmenovic, Amiya Nayak:
Applying transmission-coverage algorithms for secure geocasting in VANETs. Int. J. Comput. Sci. Eng. 16(1): 17-26 (2018) - [c42]Tanusree Chatterjee, Sushmita Ruj, Sipra Das Bit:
Data forwarding and update propagation in grid network for NDN: A low-overhead approach. ANTS 2018: 1-6 - [c41]Binanda Sengupta, Nishant Nikam, Sushmita Ruj, Srinivasan Narayanamurthy, Siddhartha Nandi:
An Efficient Secure Distributed Cloud Storage for Append-Only Data. IEEE CLOUD 2018: 146-153 - [c40]Sushmita Ruj, Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
BlockStore: A Secure Decentralized Storage Framework on Blockchain. AINA 2018: 1096-1103 - [c39]Binanda Sengupta, Sushmita Ruj:
Keyword-Based Delegable Proofs of Storage. ISPEC 2018: 282-298 - [c38]Sabyasachi Dutta, Nishant Nikam, Sushmita Ruj:
Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM. ISPEC 2018: 533-543 - [c37]Jayasree Sengupta, Sushmita Ruj, Sipra Das Bit:
An Efficient and Secure Directed Diffusion in Industrial Wireless Sensor Networks. FICN@MOBICOM 2018: 41-46 - [c36]Mayank Raikwar, Subhra Mazumdar, Sushmita Ruj, Sourav Sen Gupta, Anupam Chattopadhyay, Kwok-Yan Lam:
A Blockchain Framework for Insurance Processes. NTMS 2018: 1-4 - [e1]Satya V. Lokam, Sushmita Ruj, Kouichi Sakurai:
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, BCC@AsiaCCS 2018, Incheon, Republic of Korea, June 4, 2018. ACM 2018 [contents] - [i18]Mauro Conti, Ankit Gangwal, Sushmita Ruj:
On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective. CoRR abs/1804.01341 (2018) - [i17]Binanda Sengupta, Nishant Nikam, Sushmita Ruj, Srinivasan Narayanamurthy, Siddhartha Nandi:
An Efficient Secure Distributed Cloud Storage for Append-only Data. CoRR abs/1805.02970 (2018) - [i16]Subhra Mazumdar, Sushmita Ruj:
Design of Anonymous Endorsement System in Hyperledger Fabric. CoRR abs/1811.01410 (2018) - [i15]Prabal Banerjee, Sushmita Ruj:
Blockchain Enabled Data Marketplace - Design and Challenges. CoRR abs/1811.11462 (2018) - 2017
- [j11]Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
Bitcoin Block Withholding Attack: Analysis and Mitigation. IEEE Trans. Inf. Forensics Secur. 12(8): 1967-1978 (2017) - [c35]Sarbani Ghose, Sushmita Ruj:
Secrecy performance analysis of relay selection in adaptive DF relaying network with active adversary. ANTS 2017: 1-6 - [c34]Abhishek Singh, Binanda Sengupta, Sushmita Ruj:
Certificate Transparency with Enhancements and Short Proofs. ACISP (2) 2017: 381-389 - [c33]Shinsaku Kiyomoto, Anirban Basu, Mohammad Shahriar Rahman, Sushmita Ruj:
On blockchain-based authorization architecture for beyond-5G mobile services. ICITST 2017: 136-141 - [c32]Shahzaib Tahir, Sushmita Ruj, Muttukrishnan Rajarajan:
An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme. TrustCom/BigDataSE/ICESS 2017: 425-432 - [i14]Abhishek Singh, Binanda Sengupta, Sushmita Ruj:
Certificate Transparency with Enhancements and Short Proofs. CoRR abs/1704.04937 (2017) - [i13]Mauro Conti, Sandeep Kumar E, Chhagan Lal, Sushmita Ruj:
A Survey on Security and Privacy Issues of Bitcoin. CoRR abs/1706.00916 (2017) - [i12]Arindam Pal, Sushmita Ruj:
A Graph Analytics Framework for Ranking Authors, Papers and Venues. CoRR abs/1708.00329 (2017) - [i11]Binanda Sengupta, Sushmita Ruj:
Cloud Data Auditing Using Proofs of Retrievability. CoRR abs/1711.06039 (2017) - [i10]Binanda Sengupta, Sushmita Ruj:
Keyword-Based Delegable Proofs of Storage. CoRR abs/1712.04417 (2017) - 2016
- [c31]Sushmita Ruj, Arindam Pal:
Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSN. AINA 2016: 677-683 - [c30]Sourya Joyee De, Sushmita Ruj:
Failure Tolerant Rational Secret Sharing. AINA 2016: 925-932 - [c29]Binanda Sengupta, Sushmita Ruj:
Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding. AsiaCCS 2016: 107-118 - [c28]Binanda Sengupta, Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
Retricoin: Bitcoin based on compact proofs of retrievability. ICDCN 2016: 14:1-14:10 - [c27]Hiroaki Anada, Sushmita Ruj, Kouichi Sakurai:
Expressive Rating Scheme by Signatures with Predications on Ratees. NSS 2016: 363-379 - [i9]Sushmita Ruj, Arindam Pal:
Preferential Attachment Model with Degree Bound and its Application to Key Predistribution in WSN. CoRR abs/1604.00590 (2016) - [i8]Binanda Sengupta, Sushmita Ruj:
Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage. CoRR abs/1611.03982 (2016) - [i7]Binanda Sengupta, Sushmita Ruj:
Secure Cloud Storage with Data Dynamics and Privacy-Preserving Audits Using Secure Network Coding. CoRR abs/1612.08029 (2016) - 2015
- [c26]Arpan Sen, Shrestha Ghosh, Arinjoy Basak, Harsh Parsuram Puria, Sushmita Ruj:
Achieving Data Survivability and Confidentiality in Unattended Wireless Sensor Networks. AINA 2015: 239-246 - [c25]Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies. Inscrypt 2015: 260-279 - [c24]Sourya Joyee De, Sushmita Ruj:
Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption. GLOBECOM 2015: 1-6 - [c23]Arindam Pal, Sushmita Ruj:
CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications. ICC 2015: 1256-1261 - [i6]Arindam Pal, Sushmita Ruj:
CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications. CoRR abs/1501.04894 (2015) - 2014
- [j10]Zhen Huang, Sushmita Ruj, Marcos Antonio Cavenaghi, Milos Stojmenovic, Amiya Nayak:
A social network approach to trust management in VANETs. Peer-to-Peer Netw. Appl. 7(3): 229-242 (2014) - [j9]Sushmita Ruj, Milos Stojmenovic, Amiya Nayak:
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds. IEEE Trans. Parallel Distributed Syst. 25(2): 384-394 (2014) - [c22]Sushmita Ruj, Arindam Pal:
Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks. AINA 2014: 226-233 - [c21]Rohit Verma, Sushmita Ruj:
Security Services Using Crowdsourcing. ANT/SEIT 2014: 505-512 - [c20]Sourya Joyee De, Sushmita Ruj, Asim K. Pal:
Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-silent Players. CANS 2014: 240-255 - [c19]Nihal Balani, Sushmita Ruj:
Temporal Access Control with User Revocation for Cloud Data. TrustCom 2014: 336-343 - [i5]Sushmita Ruj, Arindam Pal:
Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks. CoRR abs/1402.6809 (2014) - 2013
- [j8]Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic:
Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications. IEEE Trans. Computers 62(11): 2224-2237 (2013) - [j7]Sushmita Ruj, Amiya Nayak:
A Decentralized Security Framework for Data Aggregation and Access Control in Smart Grids. IEEE Trans. Smart Grid 4(1): 196-205 (2013) - [c18]Sushmita Ruj, Kouchui Sakurai:
Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique. GLOBECOM 2013: 402-407 - [c17]Antonio Prado, Sushmita Ruj, Amiya Nayak:
Enhanced privacy and reliability for secure geocasting in VANET. ICC 2013: 1599-1603 - [c16]Samiran Bag, Sushmita Ruj, Bimal K. Roy:
Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach. ICISS 2013: 43-62 - [c15]Sasi Kiran V. L. Reddy, Sushmita Ruj, Amiya Nayak:
Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary. WCNC 2013: 1836-1841 - 2012
- [j6]Srimanta Bhattacharya, Sushmita Ruj, Bimal K. Roy:
Combinatorial batch codes: A lower bound and optimal constructions. Adv. Math. Commun. 6(2): 165-174 (2012) - [j5]Paul Stankovski, Sushmita Ruj, Martin Hell, Thomas Johansson:
Improved distinguishers for HC-128. Des. Codes Cryptogr. 63(2): 225-240 (2012) - [c14]Sushmita Ruj, Milos Stojmenovic, Amiya Nayak:
Privacy Preserving Access Control with Authentication for Securing Data in Clouds. CCGRID 2012: 556-563 - [c13]Sasi Kiran V. L. Reddy, Sushmita Ruj, Amiya Nayak:
Distributed data survivability schemes in mobile Unattended Wireless Sensor Networks. GLOBECOM 2012: 979-984 - [c12]Sushmita Ruj, Amiya Nayak, Sagar Naik:
Securing home networks using Physically Unclonable Functions. ICUFN 2012: 288-293 - 2011
- [j4]Sushmita Ruj, Bimal K. Roy:
Key pre-distribution using partially balanced designs in wireless sensor networks. Int. J. High Perform. Comput. Netw. 7(1): 19-28 (2011) - [c11]Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic:
Improved Access Control Mechanism in Vehicular Ad Hoc Networks. ADHOC-NOW 2011: 191-205 - [c10]Samiran Bag, Sushmita Ruj:
Key Distribution in Wireless Sensor Networks Using Finite Affine Plane. AINA Workshops 2011: 436-441 - [c9]Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic:
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs. INFOCOM 2011: 326-330 - [c8]Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic:
Distributed Fine-Grained Access Control in Wireless Sensor Networks. IPDPS 2011: 352-362 - [c7]Zhen Huang, Sushmita Ruj, Marcos Antonio Cavenaghi, Amiya Nayak:
Limitations of trust management schemes in VANET and countermeasures. PIMRC 2011: 1228-1232 - [c6]Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic:
DACC: Distributed Access Control in Clouds. TrustCom 2011: 91-98 - [c5]Sushmita Ruj, Marcos Antonio Cavenaghi, Zhen Huang, Amiya Nayak, Ivan Stojmenovic:
On Data-Centric Misbehavior Detection in VANETs. VTC Fall 2011: 1-5 - [p1]Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic:
Key Predistribution in Wireless Sensor Networks When Sensors Are Within Communication Range. Theoretical Aspects of Distributed Computing in Sensor Networks 2011: 787-832 - [i4]Srimanta Bhattacharya, Sushmita Ruj, Bimal K. Roy:
Combinatorial Batch Codes: A Lower Bound and Optimal Constructions. CoRR abs/1102.4951 (2011) - [i3]Sushmita Ruj, Marcos Antonio Cavenaghi, Zhen Huang, Amiya Nayak, Ivan Stojmenovic:
Data-centric Misbehavior Detection in VANETs. CoRR abs/1103.2404 (2011) - [i2]Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic:
A Security Architecture for Data Aggregation and Access Control in Smart Grids. CoRR abs/1111.2619 (2011)
2000 – 2009
- 2009
- [j3]Sushmita Ruj, Bimal K. Roy:
Revisiting Key Predistribution using Transversal Designs for a Grid-based Deployment Scheme. Int. J. Distributed Sens. Networks 5(6): 660-674 (2009) - [j2]Sushmita Ruj, Bimal K. Roy:
Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks. ACM Trans. Sens. Networks 6(1): 4:1-4:28 (2009) - [c4]Sushmita Ruj, Jennifer Seberry, Bimal K. Roy:
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks. CSE (2) 2009: 873-878 - 2008
- [j1]Sushmita Ruj, Subhamoy Maitra, Bimal K. Roy:
Key Predistribution Using Transversal Design on a Grid of Wireless Sensor Network. Ad Hoc Sens. Wirel. Networks 5(3-4): 247-264 (2008) - [c3]Sushmita Ruj, Bimal K. Roy:
Key Predistribution Schemes Using Codes in Wireless Sensor Networks. Inscrypt 2008: 275-288 - [c2]Sushmita Ruj, Bimal K. Roy:
Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes. WOSIS 2008: 68-77 - [i1]Sushmita Ruj, Bimal K. Roy:
More on Combinatorial Batch Codes. CoRR abs/0809.3357 (2008) - 2007
- [c1]Sushmita Ruj, Bimal K. Roy:
Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks. ISPA 2007: 431-445
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 21:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint