Sushmita Ruj
Orcid: 0000-0002-8698-6709Affiliations:
- Indian Statistical Institute, Kolkata, India
According to our database1,
Sushmita Ruj
authored at least 123 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on isical.ac.in
On csauthors.net:
Bibliography
2024
IEEE Trans. Intell. Transp. Syst., October, 2024
DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs.
IACR Cryptol. ePrint Arch., 2024
Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024
2023
Secure and Robust Demand Response Using Stackelberg Game Model and Energy Blockchain.
Sensors, October, 2023
FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT.
IEEE Trans. Netw. Serv. Manag., September, 2023
Distributed Ledger Technol. Res. Pract., September, 2023
IEEE Trans. Netw. Serv. Manag., June, 2023
IEEE Trans. Dependable Secur. Comput., 2023
OptimShare: A Unified Framework for Privacy Preserving Data Sharing - Towards the Practical Utility of Data with Privacy.
CoRR, 2023
ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
2022
IEEE Trans. Cloud Comput., 2022
Int. J. Inf. Sec., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
CoRR, 2022
CoRR, 2022
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the Transdisciplinary Reach of Design Science Research, 2022
SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022
2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Emerg. Top. Comput., 2021
Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie.
Autom. Control. Comput. Sci., 2021
Proceedings of the IEEE International Conference on Communications, 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021
2020
Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage.
IEEE Trans. Cloud Comput., 2020
IEEE Trans. Cloud Comput., 2020
A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT.
J. Netw. Comput. Appl., 2020
Future Gener. Comput. Syst., 2020
CoRR, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
Proceedings of the ICDCN 2020: 21st International Conference on Distributed Computing and Networking, 2020
HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020
Proceedings of the IEEE International Conference on Blockchain, 2020
2019
IEEE Trans. Emerg. Top. Comput., 2019
IACR Cryptol. ePrint Arch., 2019
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment.
Comput. Commun., 2019
Proceedings of the 20th International Conference on Distributed Computing and Networking, 2019
Proceedings of the 11th International Conference on Communication Systems & Networks, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
LowSHeP: Low-overhead forwarding and update Solution in ndn with Hexadecimal Patricia trie.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019
2018
Int. J. Comput. Sci. Eng., 2018
IEEE Commun. Surv. Tutorials, 2018
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective.
Comput. Secur., 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the 1st International Workshop on Future Industrial Communication Networks, 2018
Proceedings of the Information Security Practice and Experience, 2018
Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM.
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
Data forwarding and update propagation in grid network for NDN: A low-overhead approach.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Secrecy performance analysis of relay selection in adaptive DF relaying network with active adversary.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017
2016
Secure Cloud Storage with Data Dynamics and Privacy-Preserving Audits Using Secure Network Coding.
CoRR, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016
Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSN.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
Achieving Data Survivability and Confidentiality in Unattended Wireless Sensor Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Peer-to-Peer Netw. Appl., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-silent Players.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
Proceedings of the 5th International Conference on Ambient Systems, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
A Decentralized Security Framework for Data Aggregation and Access Control in Smart Grids.
IEEE Trans. Smart Grid, 2013
IEEE Trans. Computers, 2013
Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of IEEE International Conference on Communications, 2013
Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
Adv. Math. Commun., 2012
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012
Distributed data survivability schemes in mobile Unattended Wireless Sensor Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012
2011
Key Predistribution in Wireless Sensor Networks When Sensors Are Within Communication Range.
Proceedings of the Theoretical Aspects of Distributed Computing in Sensor Networks, 2011
Int. J. High Perform. Comput. Netw., 2011
CoRR, 2011
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the IEEE 22nd International Symposium on Personal, 2011
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011
2009
Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks.
ACM Trans. Sens. Networks, 2009
Revisiting Key Predistribution using Transversal Designs for a Grid-based Deployment Scheme.
Int. J. Distributed Sens. Networks, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Ad Hoc Sens. Wirel. Networks, 2008
Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes.
Proceedings of the Security in Information Systems, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
Proceedings of the Parallel and Distributed Processing and Applications, 2007