Dr Sushmita Ruj

Dr Sushmita Ruj

Senior Lecturer
Engineering
Computer Science and Engineering

Faculty of Engineering Lead, IfCyber

I am the  Faculty of Engineering Lead, UNSW Institute for Cybersecurity, IFCYBER and Senior Lecturer (equivalent to US Associate Professor)  in the School of Computer Science and Engineering (CSE), UNSW, Sydney. I am also the Taste of Research (ToR) Coordinator within CSE. This is a unique program which aims to introduce undergraduate students to research, steer them towards innovation and creative thinking and possibly pursue a higher degree or career in research. 

My primary research interests are in applied cryptography, post-quantum cryptography, cybersecurity, blockchains and data privacy. I design practical, efficient and provably secure protocols that can be deployed in real-life applications. My interests are in critical infrastructure including smart grids and cloud, ad hoc networks and data sharing frameworks. As the world builds stronger capability in quantum technology, I am trying to design quantum safe algorithms to transition to a safer Internet. Recently, I have also been interested in ethical aspects of cybersecurity and legal and regulatory aspects around data sharing. 

My aim is to carry out impactful research for the benefit of the society and mentor students to be critical thinkers and leaders.   I love to work with my students and collaborate with the government, academia and industry. This has made research a very enriching experience for me. I have collaborated with researchers across five continents and have delivered over 100 technical lectures around the world. I have won several competitive grants like Samsung GRO Award, NetApp Faculty Fellowship, Cisco Academic Grant and IBM Research grant. I am a senior member of ACM and IEEE. 

I am on the editorial boards of IEEE Transactions on Information Forensics and Security (TIFS), Elsevier Journal Pervasive and Mobile Computing (PMC). I have served as an Associate Editor of Elsevier Journal of Information Security and Applications (JISA). Program Co- Chairs for ACISP 2021 and Indocrypt 2020. Besides, I have served on the program committees of many conferences like ACM ASIACCS, ACNS, ICDCS, Indocrypt, IEEE ICBC, IEEE Globecom, IEEE ICC to name a few. I served as a member of the working group on “Blockchain For Cybersecurity” working group of the National Blockchain Roadmap of Australia and the first Blockchain Working group set up by the Reserve bank of India. I was a member of Trans-Tasman Initiative on Post Quantum Cryptography research.

Prior to joining UNSW, I was a Senior Research Scientist in CSIRO's Data61 (2019-2022) where amongst other project I led a project on Data Sharing which was a Merit Winner at NSW Innovation Award (iAward). Previously, I was an Associate Professor at  Indian Statistical Institute, Kolkata and an Assistant Professor at Indian Institute of Technology (IIT), Indore. I have worked as a Security Researcher at University of Ottawa, Canada and Lund University, Sweden (as a Erasmus Mundas Post Doctoral Fellow). 

I completed a Ph. D. and Master's Degree in Computer Science from Indian Statistical Institute, Kolkata. My Ph. D. thesis was about Cryptographic Key Management. My Master's thesis was about Graph Ramsey Theory and got me an Erdos Number of 2.  I was an undergradate student in Computer Science in Indian Institute of Science, Education and Research (Erstwhile B.E. College, Shibpur), the second oldest Engineering College in India. 

I was born in Durgapur, a beautiful, quiet Indian city known for its Steel Plant. I went to Carmel School, Steel Township and DAV Model School.

Link to my researcher profile: https://research.unsw.edu.au/people/sushmita-ruj

 

Phone
+61 2 9348 0960
Location
School of Computer Science and Engineering Building K17 University of New South Wales, Sydney Kensington, NSW 2052 Australia
  • Books | 2021
    Baek J; Ruj S, 2021, Preface
    Books | 2019
    Hao F; Ruj S; Gupta SS, 2019, Preface
  • Book Chapters | 2024
    Conti M; Gangwal A; Lal C; Ruj S, 2024, 'Bitcoin Blockchain System: An Overview of Security and Privacy Aspects', in Advances in Information Security, pp. 75 - 108, http://dx.doi.org/10.1007/978-3-031-32146-7_3
    Book Chapters | 2024
    Ma B; Pathak VN; Liu L; Ruj S, 2024, 'One-Phase Batch Update on Sparse Merkle Trees for Rollups', in Communications in Computer and Information Science, Springer Nature Singapore, pp. 1 - 21, http://dx.doi.org/10.1007/978-981-97-0006-6_1
    Book Chapters | 2024
    Mazumdar S; Ruj S, 2024, 'Layer 2 Scaling Solutions for Blockchains', in Advances in Information Security, pp. 261 - 300, http://dx.doi.org/10.1007/978-3-031-32146-7_9
    Book Chapters | 2023
    Esgin MF; Steinfeld R; Liu D; Ruj S, 2023, 'Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs', in , pp. 484 - 517, http://dx.doi.org/10.1007/978-3-031-38554-4_16
    Book Chapters | 2023
    Hoenisch P; Mazumdar S; Moreno-Sanchez P; Ruj S, 2023, 'LightSwap: An Atomic Swap Does Not Require Timeouts at both Blockchains', in , pp. 219 - 235, http://dx.doi.org/10.1007/978-3-031-25734-6_14
    Book Chapters | 2023
    Ruj S; Pal A, 2023, 'Cascading Failures in Smart Grids under Random, Targeted, and Adaptive Attacks', in A Practical Guide on Security and Privacy in Cyber-Physical Systems, WORLD SCIENTIFIC, pp. 173 - 211, http://dx.doi.org/10.1142/9789811273551_0006
    Book Chapters | 2022
    Heikamp F; Pan L; Trujillo-Rasua R; Ruj S; Doss R, 2022, 'Forward Traceability for Product Authenticity Using Ethereum Smart Contracts', in , pp. 514 - 523, http://dx.doi.org/10.1007/978-3-031-23020-2_29
    Book Chapters | 2022
    Parimi V; Pal A; Ruj S; Kumaraguru P; Chakraborty T, 2022, 'On the Vulnerability of Community Structure in Complex Networks', in Principles of Social Networking: The New Horizon and Emerging Challenges, pp. 109 - 136, http://dx.doi.org/10.1007/978-981-16-3398-0_6
    Book Chapters | 2022
    Ruj S; Nayak A; Stojmenovic I, 2022, 'Lightweight key management in multi-hop wireless sensor networks', in Distributed Sensor Networks: Sensor Networking and Applications, pp. 829 - 847
    Book Chapters | 2020
    Ruj S; Pal A, 2020, 'Fault Tolerance and Reliability of Smart Grids', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 468 - 478, http://dx.doi.org/10.1007/978-3-319-78262-1_242
    Book Chapters | 2019
    Ruj S; Pal A, 2019, 'Fault Tolerance and Reliability of Smart Grids', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1 - 11, http://dx.doi.org/10.1007/978-3-319-32903-1_242-1
    Book Chapters | 2017
    Ruj S; Saxena R, 2017, 'Securing Cloud Data', in Cloud Computing with e-Science Applications, CRC Press, pp. 41 - 72, http://dx.doi.org/10.1201/b18021-3
    Book Chapters | 2017
    Ruj S; Saxena R, 2017, 'Securing cloud data', in Cloud Computing with e-Science Applications, pp. 41 - 71, http://dx.doi.org/10.1201/b18021
    Book Chapters | 2016
    Ruj S; Nayak A; Stojmenovic I, 2016, '- Lightweight Key Management in Multi-Hop Wireless Sensor Networks', in Distributed Sensor Networks, Taylor & Francis, pp. 854 - 873, http://dx.doi.org/10.1201/b12988-43
    Book Chapters | 2016
    Ruj S; Nayak A; Stojmenovic I, 2016, 'Lightweight Key Management in Multi-Hop Wireless Sensor Networks', in Distributed Sensor Networks: Second Edition: Sensor Networking and Applications, pp. 829 - 847, http://dx.doi.org/10.1201/b12988-43
    Book Chapters | 2016
    2016, '- Maritime Domain Awareness', in Distributed Sensor Networks, Chapman and Hall/CRC, pp. 874 - 899, http://dx.doi.org/10.1201/b12988-44
    Book Chapters | 2015
    Sengupta B; Ruj S, 2015, 'Cloud Data Auditing Using Proofs of Retrievability', in Computer Communications and Networks, Springer International Publishing, pp. 193 - 210, http://dx.doi.org/10.1007/978-3-319-25988-8_11
    Book Chapters | 2011
    Ruj S; Nayak A; Stojmenovic I, 2011, 'Key Predistribution in Wireless Sensor Networks When Sensors Are Within Communication Range', in Nikoletseas S; Rolim JDP (ed.), THEORETICAL ASPECTS OF DISTRIBUTED COMPUTING IN SENSOR NETWORKS, SPRINGER, pp. 787 - 832, http://dx.doi.org/10.1007/978-3-642-14849-1_24
  • Journal articles | 2023
    Banerjee P; Behl D; Kodeswaran P; Kumar C; Ruj S; Sen S; Vinayagamurthy D, 2023, 'Accelerated Verifiable Fair Digital Exchange', Distributed Ledger Technologies: Research and Practice, 2, pp. 1 - 24, http://dx.doi.org/10.1145/3596448
    Journal articles | 2023
    Mazumdar S; Banerjee P; Sinha A; Ruj S; Roy BK, 2023, 'Strategic Analysis of Griefing Attack in Lightning Network', IEEE Transactions on Network and Service Management, 20, pp. 1790 - 1803, http://dx.doi.org/10.1109/TNSM.2022.3230768
    Journal articles | 2023
    Mazumdar S; Ruj S, 2023, 'CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments', IEEE Transactions on Dependable and Secure Computing, 20, pp. 1060 - 1073, http://dx.doi.org/10.1109/TDSC.2022.3148476
    Journal articles | 2023
    Samadi M; Ruj S; Schriemer H; Erol-Kantarci M, 2023, 'Secure and Robust Demand Response Using Stackelberg Game Model and Energy Blockchain', Sensors (Basel, Switzerland), 23, http://dx.doi.org/10.3390/s23208352
    Journal articles | 2023
    Sardar L; Sengupta B; Ruj S, 2023, 'Efficient keyword search on encrypted dynamic cloud data', Advances in Mathematics of Communications, http://dx.doi.org/10.3934/amc.2022101
    Journal articles | 2023
    Sengupta J; Ruj S; Das Bit S, 2023, 'FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT', IEEE Transactions on Network and Service Management, 20, pp. 2929 - 2941, http://dx.doi.org/10.1109/TNSM.2023.3239832
    Journal articles | 2022
    Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2022, 'DIMY: Enabling privacy-preserving contact tracing', Journal of Network and Computer Applications, 202, http://dx.doi.org/10.1016/j.jnca.2022.103356
    Journal articles | 2022
    Sengupta B; Dixit A; Ruj S, 2022, 'Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques', IEEE Transactions on Cloud Computing, 10, pp. 2090 - 2101, http://dx.doi.org/10.1109/TCC.2020.3000342
    Journal articles | 2022
    Singh RG; Shrivastava A; Ruj S, 2022, 'A Digital Asset Inheritance Model to Convey Online Persona Posthumously', International Journal of Information Security, http://dx.doi.org/10.1007/s10207-022-00593-8
    Journal articles | 2021
    Mazumdar S; Ruj S, 2021, 'Design of Anonymous Endorsement System in Hyperledger Fabric', IEEE Transactions on Emerging Topics in Computing, 9, pp. 1780 - 1791, http://dx.doi.org/10.1109/TETC.2019.2920719
    Journal articles | 2021
    Sengupta J; Ruj S; Bit SD, 2021, 'A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0', IEEE Transactions on Industrial Informatics, 17, pp. 2316 - 2324, http://dx.doi.org/10.1109/TII.2020.2998105
    Journal articles | 2021
    Tanusree Chatterjee ; Ruj S; Das Bit S, 2021, 'Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie', Automatic Control and Computer Sciences, 55, pp. 319 - 333, http://dx.doi.org/10.3103/S0146411621040039
    Journal articles | 2020
    Ahmed N; Michelin RA; Xue W; Ruj S; Malaney R; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha SK, 2020, 'A Survey of COVID-19 Contact Tracing Apps', IEEE Access, 8, pp. 134577 - 134601, http://dx.doi.org/10.1109/ACCESS.2020.3010226
    Journal articles | 2020
    De SJ; Ruj S, 2020, 'Efficient Decentralized Attribute Based Access Control for Mobile Clouds', IEEE Transactions on Cloud Computing, 8, pp. 124 - 137, http://dx.doi.org/10.1109/TCC.2017.2754255
    Journal articles | 2020
    Sengupta B; Ruj S, 2020, 'Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage', IEEE Transactions on Cloud Computing, 8, pp. 138 - 151, http://dx.doi.org/10.1109/TCC.2017.2767584
    Journal articles | 2020
    Sengupta J; Ruj S; Das Bit S, 2020, 'A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT', Journal of Network and Computer Applications, 149, http://dx.doi.org/10.1016/j.jnca.2019.102481
    Journal articles | 2020
    Tahir S; Steponkus L; Ruj S; Rajarajan M; Sajjad A, 2020, 'A parallelized disjunctive query based searchable encryption scheme for big data', Future Generation Computer Systems, 109, pp. 583 - 592, http://dx.doi.org/10.1016/j.future.2018.05.048
    Journal articles | 2019
    Dutta S; Adhikari A; Ruj S, 2019, 'Maximal contrast color visual secret sharing schemes', Designs, Codes, and Cryptography, 87, pp. 1699 - 1711, http://dx.doi.org/10.1007/s10623-018-0570-6
    Journal articles | 2019
    Parimi V; Pal A; Ruj S; Kumaraguru P; Chakraborty T, 2019, 'Understanding Vulnerability of Communities in Complex Networks',
    Journal articles | 2019
    Sardar L; Ruj S, 2019, 'The secure link prediction problem', Advances in Mathematics of Communications, 13, pp. 733 - 757, http://dx.doi.org/10.3934/amc.2019043
    Journal articles | 2019
    Tahir S; Ruj S; Rahulamathavan Y; Rajarajan M; Glackin C, 2019, 'A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data', IEEE Transactions on Emerging Topics in Computing, 7, pp. 530 - 544, http://dx.doi.org/10.1109/TETC.2017.2737789
    Journal articles | 2019
    Tahir S; Ruj S; Sajjad A; Rajarajan M, 2019, 'Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment', Computer Communications, 133, pp. 102 - 114, http://dx.doi.org/10.1016/j.comcom.2018.08.004
    Journal articles | 2018
    Chatterjee T; Ruj S; Bit SD, 2018, 'Security issues in named data networks', Computer, 51, pp. 66 - 75, http://dx.doi.org/10.1109/MC.2018.1151010
    Journal articles | 2018
    Conti M; Gangwal A; Ruj S, 2018, 'On the economic significance of ransomware campaigns: A Bitcoin transactions perspective', Computers and Security, 79, pp. 162 - 189, http://dx.doi.org/10.1016/j.cose.2018.08.008
    Journal articles | 2018
    Conti M; Sandeep KE; Lal C; Ruj S, 2018, 'A survey on security and privacy issues of bitcoin', IEEE Communications Surveys and Tutorials, 20, pp. 3416 - 3452, http://dx.doi.org/10.1109/COMST.2018.2842460
    Journal articles | 2018
    Ruj S; Maitra S; Roy B, 2018, 'Key predistribution using transversal design on a grid of wireless sensor network', Ad-Hoc and Sensor Wireless Networks, 5, pp. 247 - 264
    Journal articles | 2017
    Bag S; Ruj S; Sakurai K, 2017, 'Bitcoin Block Withholding Attack: Analysis and Mitigation', IEEE Transactions on Information Forensics and Security, 12, pp. 1967 - 1978, http://dx.doi.org/10.1109/TIFS.2016.2623588
    Journal articles | 2017
    Pal A; Ruj S, 2017, 'A Graph Analytics Framework for Ranking Authors, Papers and Venues', , http://arxiv.org/abs/1708.00329v1
    Journal articles | 2014
    Huang Z; Ruj S; Cavenaghi MA; Stojmenovic M; Nayak A, 2014, 'A social network approach to trust management in VANETs', Peer-to-Peer Networking and Applications, 7, pp. 229 - 242, http://dx.doi.org/10.1007/s12083-012-0136-8
    Journal articles | 2014
    Ruj S; Stojmenovic M; Nayak A, 2014, 'Decentralized access control with anonymous authentication of data stored in clouds', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 384 - 394, http://dx.doi.org/10.1109/TPDS.2013.38
    Journal articles | 2014
    Stojmenovic M; Nayak A; Prado A; Ruj S, 2014, 'Applying transmission-coverage algorithms for secure geocasting in VANETs', International Journal of Computational Science and Engineering, 1, pp. 1 - 1, http://dx.doi.org/10.1504/ijcse.2014.10006161
    Journal articles | 2013
    Ruj S; Nayak A; Stojmenovic I, 2013, 'Pairwise and triple key distribution in wireless sensor networks with applications', IEEE Transactions on Computers, 62, pp. 2224 - 2237, http://dx.doi.org/10.1109/TC.2012.138
    Journal articles | 2013
    Ruj S; Nayak A, 2013, 'A decentralized security framework for data aggregation and access control in smart grids', IEEE Transactions on Smart Grid, 4, pp. 196 - 205, http://dx.doi.org/10.1109/TSG.2012.2224389
    Journal articles | 2012
    Bhattacharya S; Ruj S; Roy B, 2012, 'Combinatorial batch codes: A lower bound and optimal constructions', Advances in Mathematics of Communications, 6, pp. 165 - 174, http://dx.doi.org/10.3934/amc.2012.6.165
    Journal articles | 2012
    Stankovski P; Ruj S; Hell M; Johansson T, 2012, 'Improved distinguishers for HC-128', Designs, Codes, and Cryptography, 63, pp. 225 - 240, http://dx.doi.org/10.1007/s10623-011-9550-9
    Journal articles | 2011
    Ruj S; Roy B, 2011, 'Key pre-distribution using partially balanced designs in wireless sensor networks', International Journal of High Performance Computing and Networking, 7, pp. 19 - 28, http://dx.doi.org/10.1504/IJHPCN.2011.038707
    Journal articles | 2009
    Ruj S; Roy B, 2009, 'Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks', ACM Transactions on Sensor Networks, 6, http://dx.doi.org/10.1145/1653760.1653764
    Journal articles | 2009
    Ruj S; Roy B, 2009, 'Revisiting Key Predistribution Using Transversal Designs for a Grid-Based Deployment Scheme', International Journal of Distributed Sensor Networks, 5, pp. 660 - 674, http://dx.doi.org/10.1080/15501320802581466
  • Preprints | 2024
    Krul E; Paik H-Y; Ruj S; Kanhere SS, 2024, SoK: Trusting Self-Sovereign Identity,
    Conference Papers | 2024
    Orang AV; Dorri A; Gaspers S; Ruj S, 2024, 'Blockchain-Enabled Private and Secure Task Allocation Framework', in 2024 16th International Conference on COMmunication Systems and NETworkS, COMSNETS 2024, pp. 666 - 670, http://dx.doi.org/10.1109/COMSNETS59351.2024.10427531
    Preprints | 2023
    Chamikara MAP; Jang SI; Oppermann I; Liu D; Roberto M; Ruj S; Pal A; Mohammady M; Camtepe S; Young S; Dorrian C; David N, 2023, OptimShare: A Unified Framework for Privacy Preserving Data Sharing -- Towards the Practical Utility of Data with Privacy, , http://dx.doi.org/10.48550/arxiv.2306.03379
    Conference Papers | 2023
    Heikamp F; Pan L; Doss R; Trujillo-Rasua R; Ruj S, 2023, 'ForTrac: a Secure NFT-based Forward Traceability System for Providing Data Accuracy and Completeness', in Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, ACM, presented at ASIA CCS '23: ACM Asia Conference on Computer and Communications Security, http://dx.doi.org/10.1145/3594556.3594608
    Preprints | 2023
    Ma B; Pathak VN; Liu L; Ruj S, 2023, One-Phase Batch Update on Sparse Merkle Trees for Rollups,
    Preprints | 2023
    Sengupta J; Ruj S; Bit SD, 2023, FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT, , http://dx.doi.org/10.48550/arxiv.2301.09761
    Conference Papers | 2023
    Singh RG; Ruj S, 2023, 'Encoding of security properties for transparent consent data processing', in 2023 IEEE Guwahati Subsection Conference, GCON 2023, IEEE, presented at 2023 IEEE Guwahati Subsection Conference (GCON), 23 June 2023 - 25 June 2023, http://dx.doi.org/10.1109/GCON58516.2023.10183463
    Conference Papers | 2022
    Das D; Muthaiah A; Ruj S, 2022, 'Blockchain-Enabled Secure and Smart Healthcare System', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), St. Petersburg, Florida, The United States of America, pp. 97 - 109, presented at 17th International Conference on Design Science Research in Information Systems and Technology, DESTRIST 2022, St. Petersburg, Florida, The United States of America, 01 June 2022 - 03 June 2022, http://dx.doi.org/10.1007/978-3-031-06516-3_8
    Preprints | 2022
    Mazumdar S; Banerjee P; Sinha A; Ruj S; Roy B, 2022, Strategic Analysis of Griefing Attack in Lightning Network, , http://dx.doi.org/10.48550/arxiv.2203.10533
    Preprints | 2022
    Ruj S; Pal A, 2022, Cascading Failures in Smart Grids under Random, Targeted and Adaptive Attacks, , http://arxiv.org/abs/2206.12735v1
    Conference Papers | 2022
    Sengupta J; Ruj S; Bit SD, 2022, 'SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT', in Proceedings - 22nd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, CCGrid 2022, pp. 249 - 258, http://dx.doi.org/10.1109/CCGrid54584.2022.00034
    Preprints | 2022
    Sengupta J; Ruj S; Bit SD, 2022, SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT, , http://dx.doi.org/10.48550/arxiv.2203.11914
    Preprints | 2021
    Ahmed N; Michelin RA; Xue W; Putra GD; Ruj S; Kanhere SS; Jha S, 2021, DIMY: Enabling Privacy-preserving Contact Tracing, , http://dx.doi.org/10.48550/arxiv.2103.05873
    Conference Papers | 2021
    Ahmed N; Michelin RA; Xue W; Putra GD; Song W; Ruj S; Kanhere SS; Jha S, 2021, 'Towards privacy-preserving digital contact tracing', in IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2021, http://dx.doi.org/10.1109/ICBC51069.2021.9461052
    Conference Papers | 2021
    Banerjee P; Muthaiah A; Ruj S, 2021, 'Blockchain Enabled Data Trading with User Consent', in 2021 International Conference on COMmunication Systems and NETworkS, COMSNETS 2021, pp. 263 - 271, http://dx.doi.org/10.1109/COMSNETS51098.2021.9352817
    Preprints | 2021
    Das D, 2021, Application of Blockchain in Healthcare and Health Insurance Sector, , http://dx.doi.org/10.48550/arxiv.2108.00807
    Conference Papers | 2021
    Samadi M; Schriemer H; Ruj S; Erol-Kantarci M, 2021, 'Energy Blockchain for Demand Response and Distributed Energy Resource Management', in 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2021, pp. 425 - 431, http://dx.doi.org/10.1109/SmartGridComm51999.2021.9632326
    Conference Papers | 2021
    Sardar L; Bansal G; Ruj S; Sakurai K, 2021, 'Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data', in 2021 International Conference on COMmunication Systems and NETworkS, COMSNETS 2021, pp. 465 - 473, http://dx.doi.org/10.1109/COMSNETS51098.2021.9352809
    Preprints | 2020
    Ahmed N; Michelin RA; Xue W; Ruj S; Malaney R; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha S, 2020, A Survey of COVID-19 Contact Tracing Apps, , http://dx.doi.org/10.48550/arxiv.2006.10306
    Preprints | 2020
    Banerjee P; Behl D; Kodeswaran P; Kumar C; Ruj S; Sen S, 2020, Verifiable and Auditable Digital Interchange Framework, , http://dx.doi.org/10.48550/arxiv.2001.03717
    Conference Papers | 2020
    Banerjee P; Govindarajan C; Jayachandran P; Ruj S, 2020, 'Reliable, Fair and Decentralized Marketplace for Content Sharing Using Blockchain', in Proceedings - 2020 IEEE International Conference on Blockchain, Blockchain 2020, pp. 365 - 370, http://dx.doi.org/10.1109/Blockchain50366.2020.00053
    Preprints | 2020
    Banerjee P; Govindarajan C; Jayachandran P; Ruj S, 2020, Reliable, Fair and Decentralized Marketplace for Content Sharing Using Blockchain, , http://dx.doi.org/10.48550/arxiv.2009.11033
    Conference Papers | 2020
    Chatterjee R; Ruj S; Dasbit S, 2020, 'Public Key Infrastructure for Named Data Networks', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3369740.3369790
    Conference Papers | 2020
    Dutta S; Sardar MK; Adhikari A; Ruj S; Sakurai K, 2020, 'Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 198 - 217, http://dx.doi.org/10.1007/978-3-030-65610-2_13
    Conference Papers | 2020
    Mazumdar S; Banerjee P; Ruj S, 2020, 'Time is money: Countering griefing attack in lightning network', in Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, pp. 1036 - 1043, http://dx.doi.org/10.1109/TrustCom50675.2020.00138
    Preprints | 2020
    Mazumdar S; Banerjee P; Ruj S, 2020, Griefing-Penalty: Countermeasure for Griefing Attack in Lightning Network, , http://dx.doi.org/10.48550/arxiv.2005.09327
    Conference Papers | 2020
    Mazumdar S; Ruj S; Singh RG; Pal A, 2020, 'HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments', in IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020, http://dx.doi.org/10.1109/ICBC48266.2020.9169405
    Preprints | 2020
    Mazumdar S; Ruj S; Singh RG; Pal A, 2020, HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments, , http://dx.doi.org/10.48550/arxiv.2002.05071
    Preprints | 2020
    Mazumdar S; Ruj S, 2020, CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments, , http://dx.doi.org/10.48550/arxiv.2005.07574
    Preprints | 2020
    Sengupta J; Ruj S; Bit SD, 2020, A Secure Fog Based Architecture for Industrial Internet of Things and Industry 4.0, , http://dx.doi.org/10.48550/arxiv.2005.07147
    Preprints | 2020
    Singh RG; Ruj S, 2020, A Technical Look At The Indian Personal Data Protection Bill, , http://dx.doi.org/10.48550/arxiv.2005.13812
    Preprints | 2019
    Banerjee P; Nikam N; Mazumdar S; Ruj S, 2019, Cumulus: Blockchain-Enabled Privacy Preserving Data Audit in Cloud, , http://dx.doi.org/10.48550/arxiv.1904.12362
    Conference Papers | 2019
    Chatterjee T; Ruj S; Dasbit S, 2019, 'LowSHeP: Low-overhead forwarding and update Solution in ndn with Hexadecimal Patricia trie', in International Symposium on Advanced Networks and Telecommunication Systems, ANTS, http://dx.doi.org/10.1109/ANTS47819.2019.9117924
    Conference Papers | 2019
    Lokam S; Ruj S; Sakurai K, 2019, 'BCC'19 chairs' welcome', in BCC 2019 - Proceedings of the 3rd ACM Workshop on Blockchains, Cryptocurrencies and Contracts, co-located with AsiaCCS 2019, pp. III
    Conference Papers | 2019
    Pachal S; Ruj S, 2019, 'Rational Mining of Bitcoin', in 2019 11th International Conference on Communication Systems and Networks, COMSNETS 2019, pp. 1 - 8, http://dx.doi.org/10.1109/COMSNETS.2019.8711445
    Conference Papers | 2019
    Pal P; Ruj S, 2019, 'BlockV: A blockchain enabled peer-peer ride sharing service', in Proceedings - 2019 2nd IEEE International Conference on Blockchain, Blockchain 2019, pp. 463 - 468, http://dx.doi.org/10.1109/Blockchain.2019.00070
    Conference Papers | 2019
    Pannuto P; Pan S; Salim F; Kjærgaard M, 2019, 'Message from the chairs', in DATA 2019 - Proceedings of the 2nd ACM Workshop on Data Acquisition To Analysis, Part of SenSys 2019
    Conference Papers | 2019
    Sardar L; Ruj S, 2019, 'FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 355 - 371, http://dx.doi.org/10.1007/978-3-030-31919-9_23
    Preprints | 2019
    Sardar L; Ruj S, 2019, FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme, , http://dx.doi.org/10.48550/arxiv.1910.00034
    Preprints | 2019
    Sardar L; Ruj S, 2019, The Secure Link Prediction Problem, , http://dx.doi.org/10.48550/arxiv.1901.11308
    Conference Papers | 2019
    Sengupta J; Ruj S; Bit SD, 2019, 'End to end secure anonymous communication for secure directed diffusion in IoT', in ACM International Conference Proceeding Series, pp. 445 - 450, http://dx.doi.org/10.1145/3288599.3295577
    Preprints | 2018
    Banerjee P; Ruj S, 2018, Blockchain Enabled Data Marketplace -- Design and Challenges, , http://dx.doi.org/10.48550/arxiv.1811.11462
    Conference Papers | 2018
    Chatterjee T; Ruj S; Dasbit S, 2018, 'Data forwarding and update propagation in grid network for NDN: A low-overhead approach', in International Symposium on Advanced Networks and Telecommunication Systems, ANTS, http://dx.doi.org/10.1109/ANTS.2018.8710136
    Preprints | 2018
    Conti M; Gangwal A; Ruj S, 2018, On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective, , http://dx.doi.org/10.48550/arxiv.1804.01341
    Conference Papers | 2018
    Dutta S; Nikam N; Ruj S, 2018, 'Secure computation of inner product of vectors with distributed entries and its applications to SVM', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 533 - 543, http://dx.doi.org/10.1007/978-3-319-99807-7_34
    Conference Papers | 2018
    Ghose S; Ruj S, 2018, 'Secrecy performance analysis of relay selection in adaptive DF relaying network with active adversary', in 11th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2017, pp. 1 - 6, http://dx.doi.org/10.1109/ANTS.2017.8384089
    Conference Papers | 2018
    Kiyomoto S; Basu A; Rahman MS; Ruj S, 2018, 'On blockchain-based authorization architecture for beyond-5G mobile services', in 2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, pp. 136 - 141, http://dx.doi.org/10.23919/ICITST.2017.8356363
    Conference Papers | 2018
    Lokam S; Ruj S; Sakurai K, 2018, 'BCC'18 chairs' welcome', in BCC 2018 - Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Co-located with ASIA CCS 2018, pp. iii
    Preprints | 2018
    Mazumdar S; Ruj S, 2018, Design of Anonymous Endorsement System in Hyperledger Fabric, , http://dx.doi.org/10.48550/arxiv.1811.01410
    Conference Papers | 2018
    Prado A; Ruj S; Stojmenovic M; Nayak A, 2018, 'Applying transmission-coverage algorithms for secure geocasting in VANETs', in International Journal of Computational Science and Engineering, pp. 17 - 26, http://dx.doi.org/10.1504/IJCSE.2018.089574
    Conference Papers | 2018
    Raikwar M; Mazumdar S; Ruj S; Sen Gupta S; Chattopadhyay A; Lam KY, 2018, 'A Blockchain Framework for Insurance Processes', in 2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings, pp. 1 - 4, http://dx.doi.org/10.1109/NTMS.2018.8328731
    Conference Papers | 2018
    Ruj S; Rahman MS; Basu A; Kiyomoto S, 2018, 'BlockStore: A secure decentralized storage framework on blockchain', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 1096 - 1103, http://dx.doi.org/10.1109/AINA.2018.00157
    Conference Papers | 2018
    Sengupta B; Nikam N; Ruj S; Narayanamurthy S; Nandi S, 2018, 'An Efficient Secure Distributed Cloud Storage for Append-Only Data', in IEEE International Conference on Cloud Computing, CLOUD, pp. 146 - 153, http://dx.doi.org/10.1109/CLOUD.2018.00026
    Preprints | 2018
    Sengupta B; Nikam N; Ruj S; Narayanamurthy S; Nandi S, 2018, An Efficient Secure Distributed Cloud Storage for Append-only Data, , http://dx.doi.org/10.48550/arxiv.1805.02970
    Conference Papers | 2018
    Sengupta B; Ruj S, 2018, 'Keyword-based delegable proofs of storage', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 282 - 298, http://dx.doi.org/10.1007/978-3-319-99807-7_17
    Conference Papers | 2018
    Sengupta J; Ruj S; Bit SD, 2018, 'An efficient and secure directed diffusion in industrial wireless sensor networks', in Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 41 - 46, http://dx.doi.org/10.1145/3243318.3243320
    Preprints | 2017
    Conti M; E SK; Lal C; Ruj S, 2017, A Survey on Security and Privacy Issues of Bitcoin, , http://dx.doi.org/10.48550/arxiv.1706.00916
    Conference Papers | 2017
    Ghosh S; Ruj S, 2017, 'Fast real-time authentication scheme for smart grids', in IoTSec 2017 - Proceedings of the ACM Workshop on Internet of Things (IoT) Security: Issues and Innovations, http://dx.doi.org/10.1145/3084030.3084033
    Conference Papers | 2017
    Lokam S; Ruj S; Sakurai K, 2017, 'BCC'17 chairs' Welcome', in BCC 2017 - Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, co-located with ASIA CCS 2017, pp. iii
    Preprints | 2017
    Sengupta B; Ruj S, 2017, Cloud Data Auditing Using Proofs of Retrievability, , http://dx.doi.org/10.48550/arxiv.1711.06039
    Preprints | 2017
    Sengupta B; Ruj S, 2017, Keyword-Based Delegable Proofs of Storage, , http://dx.doi.org/10.48550/arxiv.1712.04417
    Conference Papers | 2017
    Singh A; Sengupta B; Ruj S, 2017, 'Certificate transparency with enhancements and short proofs', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 381 - 389, http://dx.doi.org/10.1007/978-3-319-59870-3_22
    Preprints | 2017
    Singh A; Sengupta B; Ruj S, 2017, Certificate Transparency with Enhancements and Short Proofs, , http://dx.doi.org/10.48550/arxiv.1704.04937
    Conference Papers | 2017
    Tahir S; Ruj S; Rajarajan M, 2017, 'An efficient disjunctive query enabled ranked searchable encryption scheme', in Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, pp. 425 - 432, http://dx.doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.267
    Conference Papers | 2016
    Anada H; Ruj S; Sakurai K, 2016, 'Expressive rating scheme by signatures with predications on ratees', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 363 - 379, http://dx.doi.org/10.1007/978-3-319-46298-1_24
    Conference Papers | 2016
    Bag S; Ruj S; Sakurai K, 2016, 'On the application of clique problem for proof-of-work in cryptocurrencies', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 260 - 279, http://dx.doi.org/10.1007/978-3-319-38898-4_16
    Conference Papers | 2016
    De SJ; Ruj S, 2016, 'Failure tolerant rational secret sharing', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 925 - 932, http://dx.doi.org/10.1109/AINA.2016.65
    Conference Papers | 2016
    Ruj S; Pal A, 2016, 'Preferential attachment model with degree bound and its application to key predistribution in WSN', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, Institute of Electrical and Electronics Engineers (IEEE), pp. 677 - 683, presented at 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), 23 March 2016 - 25 March 2016, http://dx.doi.org/10.1109/aina.2016.141
    Preprints | 2016
    Ruj S; Pal A, 2016, Preferential Attachment Model with Degree Bound and its Application to Key Predistribution in WSN, , http://dx.doi.org/10.48550/arxiv.1604.00590
    Conference Papers | 2016
    Sakurai K; Nayak A; Ruj S; Zhu H; Pal A, 2016, 'Message from the STPA 2016 Workshop Organizers', in Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016, pp. lxviii, http://dx.doi.org/10.1109/WAINA.2016.215
    Conference Papers | 2016
    Sengupta B; Bag S; Sakurai K; Ruj S, 2016, 'Retricoin: Bitcoin based on compact proofs of retrievability', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/2833312.2833317
    Preprints | 2016
    Sengupta B; Dixit A; Ruj S, 2016, Secure Cloud Storage Protocols with Data Dynamics Using Secure Network Coding Techniques, , http://dx.doi.org/10.48550/arxiv.1612.08029
    Conference Papers | 2016
    Sengupta B; Ruj S, 2016, 'Publicly verifiable secure cloud storage for dynamic data using secure network coding', in ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, pp. 107 - 118, http://dx.doi.org/10.1145/2897845.2897915
    Preprints | 2016
    Sengupta B; Ruj S, 2016, Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage, , http://dx.doi.org/10.48550/arxiv.1611.03982
    Conference Papers | 2015
    Balani N; Ruj S, 2015, 'Temporal access control with user revocation for cloud data', in Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, pp. 336 - 343, http://dx.doi.org/10.1109/TrustCom.2014.45
    Conference Papers | 2015
    De SJ; Ruj S, 2015, 'Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption', in 2015 IEEE Global Communications Conference (GLOBECOM), IEEE, presented at GLOBECOM 2015 - 2015 IEEE Global Communications Conference, 06 December 2015 - 10 December 2015, http://dx.doi.org/10.1109/glocom.2015.7417639
    Conference Papers | 2015
    De SJ; Ruj S, 2015, 'Decentralized access control on data in the cloud with fast encryption and outsourced decryption', in Proceedings - IEEE Global Communications Conference, GLOBECOM, http://dx.doi.org/10.1109/GLOCOM.2014.7417639
    Conference Papers | 2015
    Pal A; Ruj S, 2015, 'CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications', in IEEE International Conference on Communications, Institute of Electrical and Electronics Engineers (IEEE), pp. 1256 - 1261, presented at 2015 IEEE International Conference on Communications (ICC), 08 June 2015 - 12 June 2015, http://dx.doi.org/10.1109/ICC.2015.7248495
    Preprints | 2015
    Pal A; Ruj S, 2015, CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications, , http://dx.doi.org/10.48550/arxiv.1501.04894
    Conference Papers | 2015
    Sen A; Ghosh S; Basak A; Puria HP; Ruj S, 2015, 'Achieving data survivability and confidentiality in unattended wireless sensor networks', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 239 - 246, http://dx.doi.org/10.1109/AINA.2015.191
    Conference Papers | 2014
    De SJ; Ruj S; Pal AK, 2014, 'Should silence be heard? Fair rational secret sharing with silent and non-silent players', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 240 - 255, http://dx.doi.org/10.1007/978-3-319-12280-9_16
    Conference Papers | 2014
    Min G; Varadharajan V; Ko RKL; Xiang Y; Marmol FG; Ruj S; Wang G; Yang LT, 2014, 'TSP 2013: Message from workshop chairs', in Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013, http://dx.doi.org/10.1109/HPCC.and.EUC.2013.350
    Conference Papers | 2014
    Ruj S; Pal A, 2014, 'Analyzing cascading failures in smart grids under random and targeted attacks', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 226 - 233, http://dx.doi.org/10.1109/AINA.2014.32
    Preprints | 2014
    Ruj S; Pal A, 2014, Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks, , http://dx.doi.org/10.48550/arxiv.1402.6809
    Conference Papers | 2014
    Ruj S, 2014, 'Attribute based access control in clouds: A survey', in 2014 International Conference on Signal Processing and Communications, SPCOM 2014, http://dx.doi.org/10.1109/SPCOM.2014.6983992
    Conference Papers | 2014
    Verma R; Ruj S, 2014, 'Security services using crowdsourcing', in Procedia Computer Science, pp. 505 - 512, http://dx.doi.org/10.1016/j.procs.2014.05.454
    Conference Papers | 2013
    Bag S; Ruj S; Roy B, 2013, 'Jamming resistant schemes for wireless communication: A combinatorial approach', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 43 - 62, http://dx.doi.org/10.1007/978-3-642-45204-8_4
    Conference Papers | 2013
    Huang Z; Wang C; Ruj S; Stojmenovic M; Nayak A, 2013, 'Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory', in Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications, ICIEA 2013, pp. 1023 - 1028, http://dx.doi.org/10.1109/ICIEA.2013.6566517
    Conference Papers | 2013
    Prado A; Ruj S; Nayak A, 2013, 'Enhanced privacy and reliability for secure geocasting in VANET', in IEEE International Conference on Communications, pp. 1599 - 1603, http://dx.doi.org/10.1109/ICC.2013.6654743
    Conference Papers | 2013
    Reddy SKVL; Ruj S; Nayak A, 2013, 'Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary', in IEEE Wireless Communications and Networking Conference, WCNC, pp. 1836 - 1841, http://dx.doi.org/10.1109/WCNC.2013.6554843
    Conference Papers | 2013
    Ruj S; Sakurai K, 2013, 'Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique', in Proceedings - IEEE Global Communications Conference, GLOBECOM, pp. 402 - 407, http://dx.doi.org/10.1109/GLOCOM.2013.6831104
    Conference Papers | 2013
    Yu S; Wang H; Lin X; Ruj S, 2013, 'NFSP 2013: Message from the chairs', in Proceedings - International Conference on Distributed Computing Systems, http://dx.doi.org/10.1109/ICDCSW.2013.73
    Conference Papers | 2012
    Reddy SKVL; Ruj S; Nayak A, 2012, 'Distributed data survivability schemes in mobile Unattended Wireless Sensor Networks', in Proceedings - IEEE Global Communications Conference, GLOBECOM, pp. 979 - 984, http://dx.doi.org/10.1109/GLOCOM.2012.6503240
    Conference Papers | 2012
    Ruj S; Nayak A; Naik S, 2012, 'Securing home networks using Physically Unclonable Functions', in ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program, pp. 288 - 293, http://dx.doi.org/10.1109/ICUFN.2012.6261713
    Conference Papers | 2012
    Ruj S; Stojmenovic M; Nayak A, 2012, 'Privacy preserving access control with authentication for securing data in clouds', in Proceedings - 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012, pp. 556 - 563, http://dx.doi.org/10.1109/CCGrid.2012.92
    Conference Papers | 2011
    Bag S; Ruj S, 2011, 'Key distribution in wireless sensor networks using finite affine plane', in Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, pp. 436 - 441, http://dx.doi.org/10.1109/WAINA.2011.39
    Preprints | 2011
    Bhattacharya S; Ruj S; Roy B, 2011, Combinatorial Batch Codes: A Lower Bound and Optimal Constructions, , http://dx.doi.org/10.48550/arxiv.1102.4951
    Conference Papers | 2011
    Huang Z; Ruj S; Cavenaghi M; Nayak A, 2011, 'Limitations of trust management schemes in VANET and countermeasures', in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, pp. 1228 - 1232, http://dx.doi.org/10.1109/PIMRC.2011.6139695
    Conference Papers | 2011
    Ruj S; Cavenaghi MA; Huang Z; Nayak A; Stojmenovic I, 2011, 'On data-centric misbehavior detection in VANETs', in IEEE Vehicular Technology Conference, http://dx.doi.org/10.1109/VETECF.2011.6093096
    Preprints | 2011
    Ruj S; Cavenaghi MA; Huang Z; Nayak A; Stojmenovic I, 2011, Data-centric Misbehavior Detection in VANETs, , http://dx.doi.org/10.48550/arxiv.1103.2404
    Conference Papers | 2011
    Ruj S; Nayak A; Stojmenovic I, 2011, 'DACC: Distributed access control in clouds', in Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, pp. 91 - 98, http://dx.doi.org/10.1109/TrustCom.2011.15
    Conference Papers | 2011
    Ruj S; Nayak A; Stojmenovic I, 2011, 'Distributed fine-grained access control in wireless sensor networks', in Proceedings - 25th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2011, pp. 352 - 362, http://dx.doi.org/10.1109/IPDPS.2011.42
    Conference Papers | 2011
    Ruj S; Nayak A; Stojmenovic I, 2011, 'Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs', in Proceedings - IEEE INFOCOM, pp. 326 - 330, http://dx.doi.org/10.1109/INFCOM.2011.5935175
    Conference Papers | 2011
    Ruj S; Nayak A; Stojmenovic I, 2011, 'Improved access control mechanism in vehicular ad hoc networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 191 - 205, http://dx.doi.org/10.1007/978-3-642-22450-8_15
    Preprints | 2011
    Ruj S; Nayak A; Stojmenovic I, 2011, A Security Architecture for Data Aggregation and Access Control in Smart Grids, , http://dx.doi.org/10.48550/arxiv.1111.2619
    Conference Papers | 2009
    Ruj S; Roy B, 2009, 'Key predistribution schemes using codes in wireless sensor networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 275 - 288, http://dx.doi.org/10.1007/978-3-642-01440-6_22
    Conference Papers | 2009
    Ruj S; Seberry J; Roy B, 2009, 'Key predistribution schemes using block designs inwireless sensor networks', in Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, pp. 873 - 878, http://dx.doi.org/10.1109/CSE.2009.35
    Conference Papers | 2008
    Ruj S; Roy B, 2008, 'Key establishment algorithms for some deterministic key predistribution schemes', in Security in Information Systems - Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008; In Conjunction with ICEIS 2008, pp. 68 - 77
    Preprints | 2008
    Ruj S; Roy B, 2008, More on Combinatorial Batch Codes, , http://dx.doi.org/10.48550/arxiv.0809.3357
    Conference Papers | 2007
    Ruj S; Roy B, 2007, 'Key predistribution using partially balanced designs in wireless sensor networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 431 - 445, http://dx.doi.org/10.1007/978-3-540-74742-0_40

Selected Grants: 

- Lead Chief Investigator: "Analysing DNS Abuse in .au Domains", auDA, 2023-2024. 

- Lead Chief Investigator, “Privacy and Verifiability for Responsible Technologies”, Global Research and Innovation Program (GRIP), UNSW, 2023-2024. 

- Chief Investigator: “Trusted Automation for Industrial Internet of Things”, CSIRO Next Generation Graduates Program (QUT-UNSW Collaboration), 2022-2027. 

- Lead Chief Investigator: Security and Privacy of Blockchain Enabled Carbon Trading Platforms. Center for Critical Digital Infrastructure, UNSW, Sydney, 2022. 

- Joint Lead Chief Investigator: Analysing Proof of Stake Protocols. Joint award from School of Computer Science and Engineering and School of Information Systems and Technology Management, UNSW, Sydney, 2022-2023.  

- Project Lead, “Automatic Assessment and Protection of Personal Information for Data Sharing”, Cyber Security CRC, WA, Government, NSW Government and Australian Computer Society. 2020-2022.

- Chief Investigator, “Data61 CRP43 - Novel security solutions in the context of AI and potential quantum supremacy”, 2020-2023.

- Chief Investigator,  “ Securing Cloud Storage”, Funding Agency, Cisco, Inc, USA, 2017 - 2019.

- Chief Investigator, “Auditing Schemes for Cloud Storage”. Funding agency, NetApp Inc, USA. 2016 -2019.

- Chief Investigator, “Study on Security and Privacy of Internet of Things (IoT)”. Funding agency, Samsung Electronics, Korea,  2014-2016.

-Chief Investigator (India Side), “Computational Aspects of Mathematical Design and Analysis of Secure Communication Systems Based on Cryptographic Primitives”, Indo-Japan Cooperative Science Program. Funding Agency DST, Govt. of India and JSPS, Japan. 2014-2016. 

 

  •  

  • JNCA Best Survey Award for the paper "A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT", Elsevier Journal of Network and Computer Applications, December 2023. 

  • NSW Innovation Award (iAward) Merit Winner, 2022 (Awarded to project on Personal Information Assessment and Protection, led at CSIRO) 

  • Women in Science Award CSIRO (SCS, Data61), June 2020.

  • WIE Best Paper award in IEEE ANTS, December, 2017.

  • Cisco Academic Research Grant, March 2017.

  • University Partner (CI), Open Collaborative Science Project (OCSP) Program with IBM Research on Blockchains, February 2017.

  • ACM Senior Member, 2016.

  • NetApp faculty fellowship, 2016.

  • Selected for Japan Trust International Research Collaboration Program. Collaborated with KDDI R&D Labs, Japan. (April-June 2016).

  • IEEE Senior Member, 2015.

  • Samsung GRO award, 2014.

  • Finalist for (Indian National Science Academy) INSA Young Scientist Award 2014.

  • Best Paper Award at 22nd IEEE PIMRC, 2011.

  • Best Paper Award at The Fifth International Symposium on Parallel and Distributed Processing and Applications, ISPA07, 2007.

Applied Cryptography, Post Quantum Cryptography, Blockchains, Data privacy, Cybersecurity. 

Google Scholar, DBLP

Recent (since 2022) Selected Publications: 

Conference

  • Evan Krul, Helen Paik, Sushmita Ruj, Salil Kanhere, SOK: Trusting Self-Sovereign Identity, Privacy Enhancing Technologies Symposium, PETS, 2024. 
  • Xinyu Zhang, Ron Steinfeld, Joseph Liu, Muhammed F. Esgin, Dongxi Liu and Sushmita Ruj, DualRing-PRF: Post-Quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs, ACISP 2024. 
  • Muhammed F. Esgin, Ron Steinfeld, Dongxi Liu, and Sushmita Ruj. Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs, IACR Crypto, 2023. 
  •  Boqian Ma, Vir Pathak, Lanping Liu and Sushmita Ruj, One-Phase Batch Update on Sparse Merkle Trees for Rollups, Symposium on Digital Ledger Technologies, 2023. 
  • Jayasree Sengupta, Sushmita Ruj, Sipra Das Bit. SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT, IEEE/ACM CCGrid, 2022.
  • Philipp Hoenisch, Subhra Mazumdar, Sushmita Ruj and Pedro Moreno-Sanchez, LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains. Esorics Workshop, Cryptocurrencies and Blockchain Technology - ESORICS CBT 2022.

 

 

Journals

  • Subhra Mazumdar, Prabal Banerjee, Abhinandan Sinha, Sushmita Ruj, Bimal Roy. Strategic Analysis of Griefing Attack in Lightning Network, IEEE Transactions on Network and Service Management, 20(2): 1790-1803, 2023.
  • Jayashree Sengupta, Sushmita Ruj, Sipra DasBit, FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT, IEEE Transactions on Network and Service Management, 2023. 
  • Prabal Banerjee, Dushyant Behl, Palanivel Kodeswaran, Chaitanya Kumar, Sushmita Ruj, Sayandeep Sen. Accelerated Verifiable Fair Digital Exchange, ACM Distributed Ledger Technologies, 2023.
  • Subhra Mazumdar, Sushmita Ruj. CryptoMaze: Atomic Off-Chain Payments in Payment Channel Network, IEEE Transactions on Dependable and Secure Computing., 2022.
  • Govind Singh, Ananya Shrivastava, Sushmita Ruj. A digital asset inheritance model to convey online persona posthumously, International Journal of Information Security, 2022.
  • Nadeem Ahmed, Regio A. Michelin, Wanli Xue, Guntur Dharma Putra, Sushmita Ruj, Salil S. Kanhere, Sanjay K. Jha. DIMY: Enabling privacy-preserving contact tracing, J. Netw. Comput. Appl., Volume 202, Issue, 10335, 2022.

 

Editorship of Journals (Selected)

  1. Associate Editor, IEEE Transactions on Information Security and Forensics, since November 2022.
  2. Associate Editor, Elsevier Journal Pervasive and Mobile Computing (PMC), May 2021- May 2023.
  3. Associate Editor, Elsevier Journal of Information Security and Applications (JISA),  2019 - May 2023.
  4. Editorial board member, IEICE transactions on Information and Systems, June 2016- December 2019.

 

Conference Organisation (Selected)

  1. Workshop Co-Chair, IEEE World Forum, Internet of Things (WF-IoT), Ottawa, Canada, 2024. 
  2. Publicity Co-Chair, IEEE ICBC, Ireland, 2023.
  3. Publicity Co-Chair, ACM AsiaCCS, Australia, 2023.
  4. Program Co-Chair, ACISP 2021, Perth, Australia.
  5. Program Co-Chair, Indocrypt 2019, Hyderabad, India.
  6. Publicity Co-Chair, IEEE ICBC, Virtual, 2021.

 

Program Committee Member (Selected)
IACR ACNS (2024, 2022, 2021, 2020), ACM AsiaCCS (2022, 2016), ICDCS 2021, IEEE ICBC (2020-2023), Indocrypt (2010, 2015, 2021-2023), IEEE Globecom (2012-2022), IEEE ICC (2013-2022), IEEE CNS 2020, IEEE IEEE/IFIP NOMS 2018, Secrypt 2018, IEEE Trustcom 2017, IEEE PST 2017, IEEE AINA (2017-2018), ISPEC (2018-2019),  Mobiquitous (2014,2016), NSS (2016, 2022), ACISP 2016, IEEE Cloudnet (2015, 2016, 2018), etc.

Invited Talks/Panels (Selected)

  1. Panellist, “Quantum Safe Internet and Blockchains”, Quantum Australia, Sydney, 2024. (upcoming).
  2. “Proofs of Storage and Applications”, COMSNETS 2024, Bangalore, India, January 2024. (Invited Speaker).
  3. Panellist, The Future of Intelligent Networking: Mobile Computing and Cyber-Physical Systems, COMSNETS 2024, Bangalore, India, January 2024.
  4. Layer-2 Scaling for Blockchains. Symposium on Distributed Ledger Technologies, Brisbane, Australia, November 2023. (Invited Speaker)
  5. Panellist, “Privacy-Preserving, Data Sharing and Collaboration in the Cloud”, Sydney November 2023.
  6. Panellist on the panel “AISecurity: the view from Asia and Oceania” at DIGITALmeet, Italy. DIGITALMEET is the biggest Festival on Digital Literacy in Italy.
  7. Panellist, “Future of Money” hosted by Algohub (of Algorand Foundation) and UNSW University Network for CryptoCurrency and Blockchain.
  8. Moderator, “Women in Security”, ACM AsiaCCS, Melbourne, July 2023.
  9. Panellist, “Building Trust in an Online Future”, Organised by auDA, Sydney, June 2023.
  10. Layer-2 Scaling Solutions for Blockchains. Algorand Center For Excellence Summer School, Melbourne, February 2023. (Invited Speaker)
  11. Panellist: Post Quantum Cryptography for Future Enterprises. (Organised by HCL Tech), November 2022.
  12. Blockchain for Data Sharing, Blockchain In Business, Sydney, November 2022. Invited Speaker.
  13. Panellist: Cybersecurity at UNSW, CSE 30th Anniversary, UNSW, September 2022.
  14. Blockchain Enabled Data Marketplaces, APAC Forums Blockchain Summit, June 2022. Invited Speaker.
  15. Tutorial: Scaling Solutions for Blockchain, IEEE ICBC, May 2022. 


 

 

My Research Supervision

HDR Students at UNSW, Sydney

1. Vir Pathak, Ph. D. Student at UNSW, Sydney (Primary Supervisor)

2. Nhi Nguyen, Ph. D. Student at UNSW, Sydney (Primary Supervisor)

3. Ayada Orang, Ph. D. Student at UNSW, Sydney (Jointly with Serge Gaspers)

4. Godfrey Wang, Ph. D. Student at UNSW, Sydney (secondary supervisor, primary supervisor Ron vander Meyden)

5. Evan Krul, MPhil Student, UNSW, Sydney (Jointly with Helen Paik)

Current Honours Thesis Students at UNSW, Sydney

Srija Mukherjee, Privacy preserving search on Genomic Data.

Cameron McGowan, Post Quantum Signatures. 

Joseph Hilsberg, Privacy Preserving and Censorship Resistant Blockchains. 

Jibitesh Saha, Efficient Data structures for ZK-Rollups.

 

Past Ph. D. Students

  1. Ram Govind Singh, Thesis on Enhanced Security Approaches for Data Protection: Managing Consent, Data Breach, and Asset Inheritance, Thesis Submitted. 
  2. Prabal Banerjee,  Thesis on Blockchain Enabled Data Storage. Graduated 2023. (Co-Founder, Avail, Ex-Polygon).
  3. Subhra Mazumdar, Thesis on Payment Channel Networks. Graduated 2022. (Now Assistant Professor at IIT Indore, past Post Doc at TU Wien, Austria).
  4. Jayasree Sengupta,  Thesis on Security of Industrial IoT. Graduated 2022. (Now Post Doc at CISPA Helmholtz Center for Information Security, Germany).
  5. Laltu Sardar,  Thesis on Queryable Encryption. Graduated 2021. (Now at TCG Crest, India)
  6. Tanusree Chatterjee. Thesis on Named Data Networks, Graduated 2022. (Now Assistant Professor, MAKAUT, India)
  7. Binanda Sengupta,  Thesis title: “Proof-of-Storage Constructions for Checking Integrity of Cloud Data”, Graduated 2018. (Now Assistant Professor at IIT Dhanbad, India, Ex-A STAR, Singapore )

 

Past Honours Thesis Students at UNSW, Sydney

  1. Niraj Sapkota, Packet Fragmentation in Post Quantum DNSSEC.
  2. Hibah Ansari: Post Quantum DNSSEC.
  3. Boqian Ma. Optimising ZK-rollups.
  4. Kanishka Yamani, ZK Rollups for Blockchains.
  5. Michael Agius, Building a secure Carbon Trading Platform.
  6. Martin Tenny, Dynamic Searchable Encryption.
  7. Edwin Tang, Post Quantum Privacy Preserving Certificate Transparency
  8. Lanping Liu, Optimising ZK-Rollups.
  9. Jae Jeon, Griefing attacks in Payment Channel Networks. 

 

Taste of Research students (UG)

  1. James Liu (2024), ZK-Rollup Optimizations
  2. Chenlu Zhu (2023), Data Availability for Blockchains
  3. Cameron McGowan (2022), Decentralised Storage 

 

My Teaching

COMP2521 Data Structure and Algorithms 

COMP6453 Applied Cryptography

ZZEN9201 Foundations of Cybersecurity

ZZEN9214 Cloud Security