Sushmita Ruj

Orcid: 0000-0002-8698-6709

Affiliations:
  • Indian Statistical Institute, Kolkata, India


According to our database1, Sushmita Ruj authored at least 116 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-Enabled Private and Secure Task Allocation Framework.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
Secure and Robust Demand Response Using Stackelberg Game Model and Energy Blockchain.
Sensors, October, 2023

FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT.
IEEE Trans. Netw. Serv. Manag., September, 2023

Accelerated Verifiable Fair Digital Exchange.
Distributed Ledger Technol. Res. Pract., September, 2023

Strategic Analysis of Griefing Attack in Lightning Network.
IEEE Trans. Netw. Serv. Manag., June, 2023

One-Phase Batch Update on Sparse Merkle Trees for Rollups.
CoRR, 2023

OptimShare: A Unified Framework for Privacy Preserving Data Sharing - Towards the Practical Utility of Data with Privacy.
CoRR, 2023

ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

2022
Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques.
IEEE Trans. Cloud Comput., 2022

DIMY: Enabling privacy-preserving contact tracing.
J. Netw. Comput. Appl., 2022

A Digital Asset Inheritance Model to Convey Online Persona Posthumously.
Int. J. Inf. Sec., 2022

Verifiable and forward private conjunctive keyword search from DIA tree.
IACR Cryptol. ePrint Arch., 2022

CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments.
IACR Cryptol. ePrint Arch., 2022

LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains.
IACR Cryptol. ePrint Arch., 2022

Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs.
IACR Cryptol. ePrint Arch., 2022

Cascading Failures in Smart Grids under Random, Targeted and Adaptive Attacks.
CoRR, 2022

Strategic Analysis to defend against Griefing Attack in Lightning Network.
CoRR, 2022

Forward Traceability for Product Authenticity Using Ethereum Smart Contracts.
Proceedings of the Network and System Security - 16th International Conference, 2022

Blockchain-Enabled Secure and Smart Healthcare System.
Proceedings of the Transdisciplinary Reach of Design Science Research, 2022

SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

2021
A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0.
IEEE Trans. Ind. Informatics, 2021

Design of Anonymous Endorsement System in Hyperledger Fabric.
IEEE Trans. Emerg. Top. Comput., 2021

Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie.
Autom. Control. Comput. Sci., 2021

Energy Blockchain for Demand Response and Distributed Energy Resource Management.
Proceedings of the IEEE International Conference on Communications, 2021

Towards Privacy-preserving Digital Contact Tracing.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

Blockchain Enabled Data Trading with User Consent.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2020
Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage.
IEEE Trans. Cloud Comput., 2020

Efficient Decentralized Attribute Based Access Control for Mobile Clouds.
IEEE Trans. Cloud Comput., 2020

A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT.
J. Netw. Comput. Appl., 2020

A parallelized disjunctive query based searchable encryption scheme for big data.
Future Gener. Comput. Syst., 2020

A Technical Look At The Indian Personal Data Protection Bill.
CoRR, 2020

Griefing-Penalty: Countermeasure for Griefing Attack in Bitcoin-compatible PCNs.
CoRR, 2020

CryptoMaze: Atomic Off-Chain Payments in Payment Channel Network.
CoRR, 2020

Verifiable and Auditable Digital Interchange Framework.
CoRR, 2020

A Survey of COVID-19 Contact Tracing Apps.
IEEE Access, 2020

Time is Money: Countering Griefing Attack in Lightning Network.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings.
Proceedings of the Information Systems Security - 16th International Conference, 2020

Public Key Infrastructure for Named Data Networks.
Proceedings of the ICDCN 2020: 21st International Conference on Distributed Computing and Networking, 2020

HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Reliable, Fair and Decentralized Marketplace for Content Sharing Using Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data.
IEEE Trans. Emerg. Top. Comput., 2019

FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme.
IACR Cryptol. ePrint Arch., 2019

Maximal contrast color visual secret sharing schemes.
Des. Codes Cryptogr., 2019

Understanding Vulnerability of Communities in Complex Networks.
CoRR, 2019

Blockchain Enabled Privacy Preserving Data Audit.
CoRR, 2019

Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment.
Comput. Commun., 2019

The secure link prediction problem.
Adv. Math. Commun., 2019

End to end secure anonymous communication for secure directed diffusion in IoT.
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019

Rational Mining Of Bitcoin.
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019

BlockV: A Blockchain Enabled Peer-Peer Ride Sharing Service.
Proceedings of the IEEE International Conference on Blockchain, 2019

LowSHeP: Low-overhead forwarding and update Solution in ndn with Hexadecimal Patricia trie.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

2018
Applying transmission-coverage algorithms for secure geocasting in VANETs.
Int. J. Comput. Sci. Eng., 2018

Blockchain Enabled Data Marketplace - Design and Challenges.
CoRR, 2018

A Survey on Security and Privacy Issues of Bitcoin.
IEEE Commun. Surv. Tutorials, 2018

Security Issues in Named Data Networks.
Computer, 2018

On the economic significance of ransomware campaigns: A Bitcoin transactions perspective.
Comput. Secur., 2018

A Blockchain Framework for Insurance Processes.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

An Efficient and Secure Directed Diffusion in Industrial Wireless Sensor Networks.
Proceedings of the 1st International Workshop on Future Industrial Communication Networks, 2018

Keyword-Based Delegable Proofs of Storage.
Proceedings of the Information Security Practice and Experience, 2018

Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM.
Proceedings of the Information Security Practice and Experience, 2018

BlockStore: A Secure Decentralized Storage Framework on Blockchain.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

An Efficient Secure Distributed Cloud Storage for Append-Only Data.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

Data forwarding and update propagation in grid network for NDN: A low-overhead approach.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
Bitcoin Block Withholding Attack: Analysis and Mitigation.
IEEE Trans. Inf. Forensics Secur., 2017

Cloud Data Auditing Using Proofs of Retrievability.
CoRR, 2017

A Graph Analytics Framework for Ranking Authors, Papers and Venues.
CoRR, 2017

An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

On blockchain-based authorization architecture for beyond-5G mobile services.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

Certificate Transparency with Enhancements and Short Proofs.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Secrecy performance analysis of relay selection in adaptive DF relaying network with active adversary.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

2016
Secure Cloud Storage with Data Dynamics and Privacy-Preserving Audits Using Secure Network Coding.
CoRR, 2016

Expressive Rating Scheme by Signatures with Predications on Ratees.
Proceedings of the Network and System Security - 10th International Conference, 2016

Retricoin: Bitcoin based on compact proofs of retrievability.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSN.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Failure Tolerant Rational Secret Sharing.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Achieving Data Survivability and Confidentiality in Unattended Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds.
IEEE Trans. Parallel Distributed Syst., 2014

A social network approach to trust management in VANETs.
Peer-to-Peer Netw. Appl., 2014

Temporal Access Control with User Revocation for Cloud Data.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-silent Players.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

Security Services Using Crowdsourcing.
Proceedings of the 5th International Conference on Ambient Systems, 2014

Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
A Decentralized Security Framework for Data Aggregation and Access Control in Smart Grids.
IEEE Trans. Smart Grid, 2013

Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications.
IEEE Trans. Computers, 2013

Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Enhanced privacy and reliability for secure geocasting in VANET.
Proceedings of IEEE International Conference on Communications, 2013

Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Improved distinguishers for HC-128.
Des. Codes Cryptogr., 2012

Combinatorial batch codes: A lower bound and optimal constructions.
Adv. Math. Commun., 2012

Securing home networks using Physically Unclonable Functions.
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012

Distributed data survivability schemes in mobile Unattended Wireless Sensor Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Privacy Preserving Access Control with Authentication for Securing Data in Clouds.
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012

2011
Key Predistribution in Wireless Sensor Networks When Sensors Are Within Communication Range.
Proceedings of the Theoretical Aspects of Distributed Computing in Sensor Networks, 2011

Key pre-distribution using partially balanced designs in wireless sensor networks.
Int. J. High Perform. Comput. Netw., 2011

A Security Architecture for Data Aggregation and Access Control in Smart Grids
CoRR, 2011

On Data-Centric Misbehavior Detection in VANETs.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011

DACC: Distributed Access Control in Clouds.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Limitations of trust management schemes in VANET and countermeasures.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

Distributed Fine-Grained Access Control in Wireless Sensor Networks.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Key Distribution in Wireless Sensor Networks Using Finite Affine Plane.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

Improved Access Control Mechanism in Vehicular Ad Hoc Networks.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011

2009
Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks.
ACM Trans. Sens. Networks, 2009

Revisiting Key Predistribution using Transversal Designs for a Grid-based Deployment Scheme.
Int. J. Distributed Sens. Networks, 2009

Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
More on Combinatorial Batch Codes
CoRR, 2008

Key Predistribution Using Transversal Design on a Grid of Wireless Sensor Network.
Ad Hoc Sens. Wirel. Networks, 2008

Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes.
Proceedings of the Security in Information Systems, 2008

Key Predistribution Schemes Using Codes in Wireless Sensor Networks.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2007


  Loading...