Dr Sushmita Ruj
Senior Lecturer

Dr Sushmita Ruj

Engineering
Computer Science and Engineering

Senior Lecturer

I am a Senior Lecturer in the School of Computer Science and Engineering, UNSW, Sydney. I am the Taste of Research (ToR) Coordinator within CSE. This is a unique program which aims to introduce undergraduate students to research, steer them towards innovation and creative thinking and possibly pursue a higher degree or career in research. 

My primary research interests are in applied cryptography, post-quantum cryptography, cybersecurity, blockchains and data privacy. I design practical, efficient and provably secure protocols that can be deployed in real-life applications. My interests are in critical infrastructure including smart grids and cloud, ad hoc networks and data sharing frameworks. As the world builds stronger capability in quantum technology, I am trying to design quantum safe algorithms to transition to a safer Internet. Recently, I have also been interested in ethical aspects of cybersecurity and legal and regulatory aspects around data sharing. 

My aim is to carry out impactful research for the benefit of the society and mentor students to be critical thinkers and leaders.   I love to work with my students and collaborate with the government, academia and industry. This has made research a very enriching experience for me. I have collaborated with researchers across five continents and have delivered over 80 technical lectures around the world. I have won several competitive grants like Samsung GRO Award, NetApp Faculty Fellowship, Cisco Academic Grant and IBM Research grant. I am a senior member of ACM and IEEE. 

I am on the editorial boards of Elsevier Journal Pervasive and Mobile Computing (PMC) and Elsevier Journal of Information Security and Applications (JISA). I have served as Program Co- Chairs for ACISP 2021 and Indocrypt 2020. Besides, I have served on the program committees of many conferences like ACM ASIACCS, ACNS, ICDCS, IEEE ICBC, IEEE Globecom, IEEE ICC to name a few. I served as a member of the working group on “Blockchain For Cybersecurity” working group of the National Blockchain Roadmap of Australia and as a member of Trans-Tasman Initiative on Post Quantum Cryptography research.

Prior to joining UNSW, I was a Senior Research Scientist in CSIRO's Data61 (2019-2022) and Assistant and Associate Professor at  Indian Statistical Institute, Kolkata. I started my academic career as an Assistant Professor at Indian Institute of Technology (IIT), Indore. 

I completed a Ph. D. and Master's Degree in Computer Science from Indian Statistical Institute, Kolkata. My Ph. D. thesis was about Cryptographic Key Management. My Master's thesis was about Graph Ramsey Theory and got me an Erdos Number of 2. Many years ago, I was an undergradate student in Computer Science in Indian Institute of Science, Education and Research (Erstwhile B.E. College, Shibpur), the second oldest Engineering College in India. 

I was born in Durgapur, a beautiful, quiet Indian city famous for its Steel Plant. I went to Carmel School, Steel Township and DAV Model School.

Link to my researcher profile: https://research.unsw.edu.au/people/sushmita-ruj

 

Phone
+61 2 9348 0960
Location
School of Computer Science and Engineering Building K17 University of New South Wales, Sydney Kensington, NSW 2052 Australia
  • Books | 2021
    2021, Preface
    Books | 2019
    2019, Preface
  • Book Chapters | 2023
    2023, 'LightSwap: An Atomic Swap Does Not Require Timeouts at both Blockchains', in Lecture Notes in Computer Science, Springer International Publishing, pp. 219 - 235, http://dx.doi.org/10.1007/978-3-031-25734-6_14
    Book Chapters | 2022
    2022, 'Forward Traceability for Product Authenticity Using Ethereum Smart Contracts', in Network and System Security, Springer Nature Switzerland, pp. 514 - 523, http://dx.doi.org/10.1007/978-3-031-23020-2_29
    Book Chapters | 2022
    2022, 'Lightweight key management in multi-hop wireless sensor networks', in Distributed Sensor Networks: Sensor Networking and Applications, pp. 829 - 847
    Book Chapters | 2022
    2022, 'On the Vulnerability of Community Structure in Complex Networks', in Principles of Social Networking: The New Horizon and Emerging Challenges, pp. 109 - 136, http://dx.doi.org/10.1007/978-981-16-3398-0_6
    Book Chapters | 2020
    2020, 'Fault Tolerance and Reliability of Smart Grids', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 468 - 478, http://dx.doi.org/10.1007/978-3-319-78262-1_242
    Book Chapters | 2019
    2019, 'Fault Tolerance and Reliability of Smart Grids', in Encyclopedia of Wireless Networks, Springer International Publishing, pp. 1 - 11, http://dx.doi.org/10.1007/978-3-319-32903-1_242-1
    Book Chapters | 2017
    2017, 'Securing cloud data', in Cloud Computing with e-Science Applications, pp. 41 - 71, http://dx.doi.org/10.1201/b18021
    Book Chapters | 2016
    2016, '- Maritime Domain Awareness', in Distributed Sensor Networks, Chapman and Hall/CRC, pp. 874 - 899, http://dx.doi.org/10.1201/b12988-44
    Book Chapters | 2016
    2016, 'Lightweight Key Management in Multi-Hop Wireless Sensor Networks', in Distributed Sensor Networks: Second Edition: Sensor Networking and Applications, pp. 829 - 847, http://dx.doi.org/10.1201/b12988-43
    Book Chapters | 2015
    2015, 'Cloud Data Auditing Using Proofs of Retrievability', in Computer Communications and Networks, Springer International Publishing, pp. 193 - 210, http://dx.doi.org/10.1007/978-3-319-25988-8_11
    Book Chapters | 2011
    2011, 'Key Predistribution in Wireless Sensor Networks When Sensors Are Within Communication Range', in Nikoletseas S; Rolim JDP (ed.), THEORETICAL ASPECTS OF DISTRIBUTED COMPUTING IN SENSOR NETWORKS, SPRINGER, pp. 787 - 832, http://dx.doi.org/10.1007/978-3-642-14849-1_24
  • Journal articles | 2023
    2023, 'CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments', IEEE Transactions on Dependable and Secure Computing, 20, pp. 1060 - 1073, http://dx.doi.org/10.1109/TDSC.2022.3148476
    Journal articles | 2023
    2023, 'Efficient keyword search on encrypted dynamic cloud data', Advances in Mathematics of Communications, http://dx.doi.org/10.3934/amc.2022101
    Journal articles | 2023
    2023, 'FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT', IEEE Transactions on Network and Service Management, pp. 1 - 1, http://dx.doi.org/10.1109/TNSM.2023.3239832
    Journal articles | 2022
    Sengupta B; Dixit A; Ruj S, 2022, 'Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques', IEEE Transactions on Cloud Computing, 10, pp. 2090 - 2101, http://dx.doi.org/10.1109/TCC.2020.3000342
    Journal articles | 2022
    2022, 'A Digital Asset Inheritance Model to Convey Online Persona Posthumously', International Journal of Information Security, 21, pp. 983 - 1003, http://dx.doi.org/10.1007/s10207-022-00593-8
    Journal articles | 2022
    2022, 'DIMY: Enabling privacy-preserving contact tracing', Journal of Network and Computer Applications, 202, pp. 103356 - 103356, http://dx.doi.org/10.1016/j.jnca.2022.103356
    Journal articles | 2022
    2022, 'Strategic Analysis of Griefing Attack in Lightning Network', IEEE Transactions on Network and Service Management, pp. 1 - 1, http://dx.doi.org/10.1109/TNSM.2022.3230768
    Journal articles | 2021
    Mazumdar S; Ruj S, 2021, 'Design of Anonymous Endorsement System in Hyperledger Fabric', IEEE Transactions on Emerging Topics in Computing, 9, pp. 1780 - 1791, http://dx.doi.org/10.1109/TETC.2019.2920719
    Journal articles | 2021
    Sengupta J; Ruj S; Bit SD, 2021, 'A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0', IEEE Transactions on Industrial Informatics, 17, pp. 2316 - 2324, http://dx.doi.org/10.1109/TII.2020.2998105
    Journal articles | 2021
    2021, 'Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie', Automatic Control and Computer Sciences, 55, pp. 319 - 333, http://dx.doi.org/10.3103/S0146411621040039
    Journal articles | 2020
    Ahmed N; Michelin RA; Xue W; Ruj S; Malaney R; Kanhere SS; Seneviratne A; Hu W; Janicke H; Jha SK, 2020, 'A Survey of COVID-19 Contact Tracing Apps', IEEE Access, 8, pp. 134577 - 134601, http://dx.doi.org/10.1109/ACCESS.2020.3010226
    Journal articles | 2020
    De SJ; Ruj S, 2020, 'Efficient Decentralized Attribute Based Access Control for Mobile Clouds', IEEE Transactions on Cloud Computing, 8, pp. 124 - 137, http://dx.doi.org/10.1109/TCC.2017.2754255
    Journal articles | 2020
    Sengupta B; Ruj S, 2020, 'Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage', IEEE Transactions on Cloud Computing, 8, pp. 138 - 151, http://dx.doi.org/10.1109/TCC.2017.2767584
    Journal articles | 2020
    Sengupta J; Ruj S; Das Bit S, 2020, 'A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT', Journal of Network and Computer Applications, 149, http://dx.doi.org/10.1016/j.jnca.2019.102481
    Journal articles | 2020
    Tahir S; Steponkus L; Ruj S; Rajarajan M; Sajjad A, 2020, 'A parallelized disjunctive query based searchable encryption scheme for big data', Future Generation Computer Systems, 109, pp. 583 - 592, http://dx.doi.org/10.1016/j.future.2018.05.048
    Journal articles | 2019
    Dutta S; Adhikari A; Ruj S, 2019, 'Maximal contrast color visual secret sharing schemes', Designs, Codes, and Cryptography, 87, pp. 1699 - 1711, http://dx.doi.org/10.1007/s10623-018-0570-6
    Journal articles | 2019
    Sardar L; Ruj S, 2019, 'The secure link prediction problem', Advances in Mathematics of Communications, 13, pp. 733 - 757, http://dx.doi.org/10.3934/amc.2019043
    Journal articles | 2019
    Tahir S; Ruj S; Rahulamathavan Y; Rajarajan M; Glackin C, 2019, 'A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data', IEEE Transactions on Emerging Topics in Computing, 7, pp. 530 - 544, http://dx.doi.org/10.1109/TETC.2017.2737789
    Journal articles | 2019
    Tahir S; Ruj S; Sajjad A; Rajarajan M, 2019, 'Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment', Computer Communications, 133, pp. 102 - 114, http://dx.doi.org/10.1016/j.comcom.2018.08.004
    Journal articles | 2019
    2019, 'Understanding Vulnerability of Communities in Complex Networks', , http://arxiv.org/abs/1906.05238v2
    Journal articles | 2018
    Chatterjee T; Ruj S; Bit SD, 2018, 'Security issues in named data networks', Computer, 51, pp. 66 - 75, http://dx.doi.org/10.1109/MC.2018.1151010
    Journal articles | 2018
    Conti M; Gangwal A; Ruj S, 2018, 'On the economic significance of ransomware campaigns: A Bitcoin transactions perspective', Computers and Security, 79, pp. 162 - 189, http://dx.doi.org/10.1016/j.cose.2018.08.008
    Journal articles | 2018
    Conti M; Sandeep KE; Lal C; Ruj S, 2018, 'A survey on security and privacy issues of bitcoin', IEEE Communications Surveys and Tutorials, 20, pp. 3416 - 3452, http://dx.doi.org/10.1109/COMST.2018.2842460
    Journal articles | 2018
    2018, 'Key predistribution using transversal design on a grid of wireless sensor network', Ad-Hoc and Sensor Wireless Networks, 5, pp. 247 - 264
    Journal articles | 2017
    Bag S; Ruj S; Sakurai K, 2017, 'Bitcoin Block Withholding Attack: Analysis and Mitigation', IEEE Transactions on Information Forensics and Security, 12, pp. 1967 - 1978, http://dx.doi.org/10.1109/TIFS.2016.2623588
    Journal articles | 2017
    Pal A; Ruj S, 2017, 'A Graph Analytics Framework for Ranking Authors, Papers and Venues', , http://arxiv.org/abs/1708.00329v1
    Journal articles | 2014
    Huang Z; Ruj S; Cavenaghi MA; Stojmenovic M; Nayak A, 2014, 'A social network approach to trust management in VANETs', Peer-to-Peer Networking and Applications, 7, pp. 229 - 242, http://dx.doi.org/10.1007/s12083-012-0136-8
    Journal articles | 2014
    Ruj S; Stojmenovic M; Nayak A, 2014, 'Decentralized access control with anonymous authentication of data stored in clouds', IEEE Transactions on Parallel and Distributed Systems, 25, pp. 384 - 394, http://dx.doi.org/10.1109/TPDS.2013.38
    Journal articles | 2014
    2014, 'Applying transmission-coverage algorithms for secure geocasting in VANETs', International Journal of Computational Science and Engineering, 1, pp. 1 - 1, http://dx.doi.org/10.1504/ijcse.2014.10006161
    Journal articles | 2013
    Ruj S; Nayak A; Stojmenovic I, 2013, 'Pairwise and triple key distribution in wireless sensor networks with applications', IEEE Transactions on Computers, 62, pp. 2224 - 2237, http://dx.doi.org/10.1109/TC.2012.138
    Journal articles | 2013
    Ruj S; Nayak A, 2013, 'A decentralized security framework for data aggregation and access control in smart grids', IEEE Transactions on Smart Grid, 4, pp. 196 - 205, http://dx.doi.org/10.1109/TSG.2012.2224389
    Journal articles | 2012
    Bhattacharya S; Ruj S; Roy B, 2012, 'Combinatorial batch codes: A lower bound and optimal constructions', Advances in Mathematics of Communications, 6, pp. 165 - 174, http://dx.doi.org/10.3934/amc.2012.6.165
    Journal articles | 2012
    Stankovski P; Ruj S; Hell M; Johansson T, 2012, 'Improved distinguishers for HC-128', Designs, Codes, and Cryptography, 63, pp. 225 - 240, http://dx.doi.org/10.1007/s10623-011-9550-9
    Journal articles | 2011
    Ruj S; Roy B, 2011, 'Key pre-distribution using partially balanced designs in wireless sensor networks', International Journal of High Performance Computing and Networking, 7, pp. 19 - 28, http://dx.doi.org/10.1504/IJHPCN.2011.038707
    Journal articles | 2009
    2009, 'Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks', ACM Transactions on Sensor Networks, 6, http://dx.doi.org/10.1145/1653760.1653764
    Journal articles | 2009
    2009, 'Revisiting Key Predistribution Using Transversal Designs for a Grid-Based Deployment Scheme', International Journal of Distributed Sensor Networks, 5, pp. 660 - 674, http://dx.doi.org/10.1080/15501320802581466
  • Preprints | 2023
    2023, FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT, , http://dx.doi.org/10.48550/arxiv.2301.09761
    Conference Papers | 2022
    Das D; Muthaiah A; Ruj S, 2022, 'Blockchain-Enabled Secure and Smart Healthcare System', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), St. Petersburg, Florida, The United States of America, pp. 97 - 109, presented at 17th International Conference on Design Science Research in Information Systems and Technology, DESTRIST 2022, St. Petersburg, Florida, The United States of America, 01 June 2022 - 03 June 2022, http://dx.doi.org/10.1007/978-3-031-06516-3_8
    Conference Papers | 2022
    2022, 'SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT', in Proceedings - 22nd IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, CCGrid 2022, IEEE, pp. 249 - 258, presented at 2022 22nd International Symposium on Cluster, Cloud and Internet Computing (CCGrid), 16 May 2022 - 19 May 2022, http://dx.doi.org/10.1109/CCGrid54584.2022.00034
    Preprints | 2022
    2022, Cascading Failures in Smart Grids under Random, Targeted and Adaptive Attacks, , http://arxiv.org/abs/2206.12735v1
    Preprints | 2022
    2022, SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT, , http://dx.doi.org/10.48550/arxiv.2203.11914
    Preprints | 2022
    2022, Strategic Analysis of Griefing Attack in Lightning Network, , http://dx.doi.org/10.48550/arxiv.2203.10533
    Conference Papers | 2021
    Ahmed N; Michelin RA; Xue W; Putra GD; Song W; Ruj S; Kanhere SS; Jha S, 2021, 'Towards privacy-preserving digital contact tracing', in IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2021, IEEE, presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 03 May 2021 - 06 May 2021, http://dx.doi.org/10.1109/ICBC51069.2021.9461052
    Conference Papers | 2021
    Banerjee P; Muthaiah A; Ruj S, 2021, 'Blockchain Enabled Data Trading with User Consent', in 2021 International Conference on COMmunication Systems and NETworkS, COMSNETS 2021, pp. 263 - 271, http://dx.doi.org/10.1109/COMSNETS51098.2021.9352817
    Conference Papers | 2021
    Samadi M; Schriemer H; Ruj S; Erol-Kantarci M, 2021, 'Energy Blockchain for Demand Response and Distributed Energy Resource Management', in 2021 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2021, pp. 425 - 431, http://dx.doi.org/10.1109/SmartGridComm51999.2021.9632326
    Conference Papers | 2021
    2021, 'Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data', in 2021 International Conference on COMmunication Systems and NETworkS, COMSNETS 2021, pp. 465 - 473, http://dx.doi.org/10.1109/COMSNETS51098.2021.9352809
    Preprints | 2021
    2021, Application of Blockchain in Healthcare and Health Insurance Sector, , http://dx.doi.org/10.48550/arxiv.2108.00807
    Preprints | 2021
    2021, DIMY: Enabling Privacy-preserving Contact Tracing, , http://dx.doi.org/10.48550/arxiv.2103.05873
    Preprints | 2020
    Banerjee P; Behl D; Kodeswaran P; Kumar C; Ruj S; Sen S, 2020, Verifiable and Auditable Digital Interchange Framework, , http://dx.doi.org/10.48550/arxiv.2001.03717
    Conference Papers | 2020
    Banerjee P; Govindarajan C; Jayachandran P; Ruj S, 2020, 'Reliable, Fair and Decentralized Marketplace for Content Sharing Using Blockchain', in Proceedings - 2020 IEEE International Conference on Blockchain, Blockchain 2020, pp. 365 - 370, http://dx.doi.org/10.1109/Blockchain50366.2020.00053
    Conference Papers | 2020
    Chatterjee R; Ruj S; Dasbit S, 2020, 'Public Key Infrastructure for Named Data Networks', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3369740.3369790
    Conference Papers | 2020
    Dutta S; Sardar MK; Adhikari A; Ruj S; Sakurai K, 2020, 'Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 198 - 217, http://dx.doi.org/10.1007/978-3-030-65610-2_13
    Conference Papers | 2020
    Mazumdar S; Banerjee P; Ruj S, 2020, 'Time is money: Countering griefing attack in lightning network', in Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, pp. 1036 - 1043, http://dx.doi.org/10.1109/TrustCom50675.2020.00138
    Conference Papers | 2020
    Mazumdar S; Ruj S; Singh RG; Pal A, 2020, 'HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments', in IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020, http://dx.doi.org/10.1109/ICBC48266.2020.9169405
    Preprints | 2020
    2020, A Secure Fog Based Architecture for Industrial Internet of Things and Industry 4.0, , http://dx.doi.org/10.48550/arxiv.2005.07147
    Preprints | 2020
    2020, A Survey of COVID-19 Contact Tracing Apps, , http://dx.doi.org/10.48550/arxiv.2006.10306
    Preprints | 2020
    2020, A Technical Look At The Indian Personal Data Protection Bill, , http://dx.doi.org/10.48550/arxiv.2005.13812
    Preprints | 2020
    2020, CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments, , http://dx.doi.org/10.48550/arxiv.2005.07574
    Preprints | 2020
    2020, Griefing-Penalty: Countermeasure for Griefing Attack in Lightning Network, , http://dx.doi.org/10.48550/arxiv.2005.09327
    Preprints | 2020
    2020, HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments, , http://dx.doi.org/10.48550/arxiv.2002.05071
    Preprints | 2020
    2020, Reliable, Fair and Decentralized Marketplace for Content Sharing Using Blockchain, , http://dx.doi.org/10.48550/arxiv.2009.11033
    Conference Papers | 2019
    Chatterjee T; Ruj S; Dasbit S, 2019, 'LowSHeP: Low-overhead forwarding and update Solution in ndn with Hexadecimal Patricia trie', in International Symposium on Advanced Networks and Telecommunication Systems, ANTS, http://dx.doi.org/10.1109/ANTS47819.2019.9117924
    Conference Papers | 2019
    Pachal S; Ruj S, 2019, 'Rational Mining of Bitcoin', in 2019 11th International Conference on Communication Systems and Networks, COMSNETS 2019, pp. 1 - 8, http://dx.doi.org/10.1109/COMSNETS.2019.8711445
    Conference Papers | 2019
    Pal P; Ruj S, 2019, 'BlockV: A blockchain enabled peer-peer ride sharing service', in Proceedings - 2019 2nd IEEE International Conference on Blockchain, Blockchain 2019, pp. 463 - 468, http://dx.doi.org/10.1109/Blockchain.2019.00070
    Conference Papers | 2019
    Sardar L; Ruj S, 2019, 'FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 355 - 371, http://dx.doi.org/10.1007/978-3-030-31919-9_23
    Conference Papers | 2019
    Sengupta J; Ruj S; Bit SD, 2019, 'End to end secure anonymous communication for secure directed diffusion in IoT', in ACM International Conference Proceeding Series, pp. 445 - 450, http://dx.doi.org/10.1145/3288599.3295577
    Conference Papers | 2019
    2019, 'BCC'19 chairs' welcome', in BCC 2019 - Proceedings of the 3rd ACM Workshop on Blockchains, Cryptocurrencies and Contracts, co-located with AsiaCCS 2019, pp. III
    Conference Papers | 2019
    2019, 'Message from the chairs', in DATA 2019 - Proceedings of the 2nd ACM Workshop on Data Acquisition To Analysis, Part of SenSys 2019
    Preprints | 2019
    2019, Cumulus: Blockchain-Enabled Privacy Preserving Data Audit in Cloud, , http://dx.doi.org/10.48550/arxiv.1904.12362
    Preprints | 2019
    2019, FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme, , http://dx.doi.org/10.48550/arxiv.1910.00034
    Preprints | 2019
    2019, The Secure Link Prediction Problem, , http://dx.doi.org/10.48550/arxiv.1901.11308
    Conference Papers | 2018
    Chatterjee T; Ruj S; Dasbit S, 2018, 'Data forwarding and update propagation in grid network for NDN: A low-overhead approach', in International Symposium on Advanced Networks and Telecommunication Systems, ANTS, http://dx.doi.org/10.1109/ANTS.2018.8710136
    Conference Papers | 2018
    Kiyomoto S; Basu A; Rahman MS; Ruj S, 2018, 'On blockchain-based authorization architecture for beyond-5G mobile services', in 2017 12th International Conference for Internet Technology and Secured Transactions, ICITST 2017, pp. 136 - 141, http://dx.doi.org/10.23919/ICITST.2017.8356363
    Conference Papers | 2018
    Raikwar M; Mazumdar S; Ruj S; Sen Gupta S; Chattopadhyay A; Lam KY, 2018, 'A Blockchain Framework for Insurance Processes', in 2018 9th IFIP International Conference on New Technologies, Mobility and Security, NTMS 2018 - Proceedings, pp. 1 - 4, http://dx.doi.org/10.1109/NTMS.2018.8328731
    Conference Papers | 2018
    Ruj S; Rahman MS; Basu A; Kiyomoto S, 2018, 'BlockStore: A secure decentralized storage framework on blockchain', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 1096 - 1103, http://dx.doi.org/10.1109/AINA.2018.00157
    Conference Papers | 2018
    Sengupta J; Ruj S; Bit SD, 2018, 'An efficient and secure directed diffusion in industrial wireless sensor networks', in Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 41 - 46, http://dx.doi.org/10.1145/3243318.3243320
    Conference Papers | 2018
    2018, 'An Efficient Secure Distributed Cloud Storage for Append-Only Data', in IEEE International Conference on Cloud Computing, CLOUD, pp. 146 - 153, http://dx.doi.org/10.1109/CLOUD.2018.00026
    Conference Papers | 2018
    2018, 'Applying transmission-coverage algorithms for secure geocasting in VANETs', in International Journal of Computational Science and Engineering, pp. 17 - 26, http://dx.doi.org/10.1504/IJCSE.2018.089574
    Conference Papers | 2018
    2018, 'BCC'18 chairs' welcome', in BCC 2018 - Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, Co-located with ASIA CCS 2018, pp. iii
    Conference Papers | 2018
    2018, 'Keyword-based delegable proofs of storage', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 282 - 298, http://dx.doi.org/10.1007/978-3-319-99807-7_17
    Conference Papers | 2018
    2018, 'Secrecy performance analysis of relay selection in adaptive DF relaying network with active adversary', in 11th IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2017, pp. 1 - 6, http://dx.doi.org/10.1109/ANTS.2017.8384089
    Conference Papers | 2018
    2018, 'Secure computation of inner product of vectors with distributed entries and its applications to SVM', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 533 - 543, http://dx.doi.org/10.1007/978-3-319-99807-7_34
    Preprints | 2018
    2018, An Efficient Secure Distributed Cloud Storage for Append-only Data, , http://dx.doi.org/10.48550/arxiv.1805.02970
    Preprints | 2018
    2018, Blockchain Enabled Data Marketplace -- Design and Challenges, , http://dx.doi.org/10.48550/arxiv.1811.11462
    Preprints | 2018
    2018, Design of Anonymous Endorsement System in Hyperledger Fabric, , http://dx.doi.org/10.48550/arxiv.1811.01410
    Preprints | 2018
    2018, On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective, , http://dx.doi.org/10.48550/arxiv.1804.01341
    Conference Papers | 2017
    Singh A; Sengupta B; Ruj S, 2017, 'Certificate transparency with enhancements and short proofs', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 381 - 389, http://dx.doi.org/10.1007/978-3-319-59870-3_22
    Conference Papers | 2017
    2017, 'An efficient disjunctive query enabled ranked searchable encryption scheme', in Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017, pp. 425 - 432, http://dx.doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.267
    Conference Papers | 2017
    2017, 'BCC'17 chairs' Welcome', in BCC 2017 - Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, co-located with ASIA CCS 2017, pp. iii
    Conference Papers | 2017
    2017, 'Fast real-time authentication scheme for smart grids', in IoTSec 2017 - Proceedings of the ACM Workshop on Internet of Things (IoT) Security: Issues and Innovations, http://dx.doi.org/10.1145/3084030.3084033
    Preprints | 2017
    2017, A Survey on Security and Privacy Issues of Bitcoin, , http://dx.doi.org/10.48550/arxiv.1706.00916
    Preprints | 2017
    2017, Certificate Transparency with Enhancements and Short Proofs, , http://dx.doi.org/10.48550/arxiv.1704.04937
    Preprints | 2017
    2017, Cloud Data Auditing Using Proofs of Retrievability, , http://dx.doi.org/10.48550/arxiv.1711.06039
    Preprints | 2017
    2017, Keyword-Based Delegable Proofs of Storage, , http://dx.doi.org/10.48550/arxiv.1712.04417
    Conference Papers | 2016
    De SJ; Ruj S, 2016, 'Failure tolerant rational secret sharing', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 925 - 932, http://dx.doi.org/10.1109/AINA.2016.65
    Conference Papers | 2016
    Sengupta B; Bag S; Sakurai K; Ruj S, 2016, 'Retricoin: Bitcoin based on compact proofs of retrievability', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/2833312.2833317
    Conference Papers | 2016
    Sengupta B; Ruj S, 2016, 'Publicly verifiable secure cloud storage for dynamic data using secure network coding', in ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, pp. 107 - 118, http://dx.doi.org/10.1145/2897845.2897915
    Conference Papers | 2016
    2016, 'Expressive rating scheme by signatures with predications on ratees', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 363 - 379, http://dx.doi.org/10.1007/978-3-319-46298-1_24
    Conference Papers | 2016
    2016, 'Message from the STPA 2016 Workshop Organizers', in Proceedings - IEEE 30th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2016, pp. lxviii, http://dx.doi.org/10.1109/WAINA.2016.215
    Conference Papers | 2016
    2016, 'On the application of clique problem for proof-of-work in cryptocurrencies', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 260 - 279, http://dx.doi.org/10.1007/978-3-319-38898-4_16
    Conference Papers | 2016
    2016, 'Preferential attachment model with degree bound and its application to key predistribution in WSN', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 677 - 683, http://dx.doi.org/10.1109/AINA.2016.141
    Preprints | 2016
    2016, Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage, , http://dx.doi.org/10.48550/arxiv.1611.03982
    Preprints | 2016
    2016, Preferential Attachment Model with Degree Bound and its Application to Key Predistribution in WSN, , http://dx.doi.org/10.48550/arxiv.1604.00590
    Preprints | 2016
    2016, Secure Cloud Storage Protocols with Data Dynamics Using Secure Network Coding Techniques, , http://dx.doi.org/10.48550/arxiv.1612.08029
    Conference Papers | 2015
    Balani N; Ruj S, 2015, 'Temporal access control with user revocation for cloud data', in Proceedings - 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, pp. 336 - 343, http://dx.doi.org/10.1109/TrustCom.2014.45
    Conference Papers | 2015
    De SJ; Ruj S, 2015, 'Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption', in 2015 IEEE Global Communications Conference (GLOBECOM), IEEE, pp. 1 - 6, presented at GLOBECOM 2015 - 2015 IEEE Global Communications Conference, 06 December 2015 - 10 December 2015, http://dx.doi.org/10.1109/glocom.2015.7417639
    Conference Papers | 2015
    De SJ; Ruj S, 2015, 'Decentralized access control on data in the cloud with fast encryption and outsourced decryption', in 2015 IEEE Global Communications Conference, GLOBECOM 2015, http://dx.doi.org/10.1109/GLOCOM.2014.7417639
    Conference Papers | 2015
    2015, 'Achieving data survivability and confidentiality in unattended wireless sensor networks', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 239 - 246, http://dx.doi.org/10.1109/AINA.2015.191
    Conference Papers | 2015
    2015, 'CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications', in IEEE International Conference on Communications, pp. 1256 - 1261, http://dx.doi.org/10.1109/ICC.2015.7248495
    Preprints | 2015
    2015, CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications, , http://dx.doi.org/10.48550/arxiv.1501.04894
    Conference Papers | 2014
    De SJ; Ruj S; Pal AK, 2014, 'Should silence be heard? Fair rational secret sharing with silent and non-silent players', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 240 - 255, http://dx.doi.org/10.1007/978-3-319-12280-9_16
    Conference Papers | 2014
    Ruj S; Pal A, 2014, 'Analyzing cascading failures in smart grids under random and targeted attacks', in Proceedings - International Conference on Advanced Information Networking and Applications, AINA, pp. 226 - 233, http://dx.doi.org/10.1109/AINA.2014.32
    Conference Papers | 2014
    Verma R; Ruj S, 2014, 'Security services using crowdsourcing', in Procedia Computer Science, pp. 505 - 512, http://dx.doi.org/10.1016/j.procs.2014.05.454
    Conference Papers | 2014
    2014, 'Attribute based access control in clouds: A survey', in 2014 International Conference on Signal Processing and Communications, SPCOM 2014, http://dx.doi.org/10.1109/SPCOM.2014.6983992
    Conference Papers | 2014
    2014, 'TSP 2013: Message from workshop chairs', in Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013, http://dx.doi.org/10.1109/HPCC.and.EUC.2013.350
    Preprints | 2014
    2014, Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks, , http://dx.doi.org/10.48550/arxiv.1402.6809
    Conference Papers | 2013
    Huang Z; Wang C; Ruj S; Stojmenovic M; Nayak A, 2013, 'Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory', in Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications, ICIEA 2013, IEEE, Swinburne Univ Technol, Melbourne, AUSTRALIA, pp. 1023 - 1028, presented at 8th IEEE Conference on Industrial Electronics and Applications (ICIEA), Swinburne Univ Technol, Melbourne, AUSTRALIA, 19 June 2013 - 21 June 2013, http://dx.doi.org/10.1109/ICIEA.2013.6566517
    Conference Papers | 2013
    Reddy SKVL; Ruj S; Nayak A, 2013, 'Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary', in IEEE Wireless Communications and Networking Conference, WCNC, IEEE, Shanghai, PEOPLES R CHINA, pp. 1836 - 1841, presented at IEEE Wireless Communications and Networking Conference (WCNC), Shanghai, PEOPLES R CHINA, 07 April 2013 - 10 April 2013, http://dx.doi.org/10.1109/WCNC.2013.6554843
    Conference Papers | 2013
    2013, 'Enhanced privacy and reliability for secure geocasting in VANET', in IEEE International Conference on Communications, IEEE, Budapest, HUNGARY, pp. 1599 - 1603, presented at IEEE International Conference on Communications (ICC), Budapest, HUNGARY, 09 June 2013 - 13 June 2013, http://dx.doi.org/10.1109/ICC.2013.6654743
    Conference Papers | 2013
    2013, 'Jamming resistant schemes for wireless communication: A combinatorial approach', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 43 - 62, http://dx.doi.org/10.1007/978-3-642-45204-8_4
    Conference Papers | 2013
    2013, 'NFSP 2013: Message from the chairs', in Proceedings - International Conference on Distributed Computing Systems, http://dx.doi.org/10.1109/ICDCSW.2013.73
    Conference Papers | 2013
    2013, 'Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique', in GLOBECOM - IEEE Global Telecommunications Conference, pp. 402 - 407, http://dx.doi.org/10.1109/GLOCOM.2013.6831104
    Conference Papers | 2012
    Ruj S; Stojmenovic M; Nayak A, 2012, 'Privacy preserving access control with authentication for securing data in clouds', in Proceedings - 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, CCGrid 2012, pp. 556 - 563, http://dx.doi.org/10.1109/CCGrid.2012.92
    Conference Papers | 2012
    2012, 'Distributed data survivability schemes in mobile Unattended Wireless Sensor Networks', in GLOBECOM - IEEE Global Telecommunications Conference, IEEE, Anaheim, CA, pp. 979 - 984, presented at IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, 03 December 2012 - 07 December 2012, http://dx.doi.org/10.1109/GLOCOM.2012.6503240
    Conference Papers | 2012
    2012, 'Securing home networks using Physically Unclonable Functions', in ICUFN 2012 - 4th International Conference on Ubiquitous and Future Networks, Final Program, pp. 288 - 293, http://dx.doi.org/10.1109/ICUFN.2012.6261713
    Conference Papers | 2011
    Huang Z; Ruj S; Cavenaghi M; Nayak A, 2011, 'Limitations of trust management schemes in VANET and countermeasures', in IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, IEEE, Toronto, CANADA, pp. 1228 - 1232, presented at 22nd IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Toronto, CANADA, 11 September 2011 - 14 September 2011, http://dx.doi.org/10.1109/PIMRC.2011.6139695
    Conference Papers | 2011
    Ruj S; Cavenaghi MA; Huang Z; Nayak A; Stojmenovic I, 2011, 'On data-centric misbehavior detection in VANETs', in IEEE Vehicular Technology Conference, IEEE, San Francisco, CA, presented at IEEE 74th Vehicular Technology Conference (VTC), San Francisco, CA, 05 September 2011 - 08 September 2011, http://dx.doi.org/10.1109/VETECF.2011.6093096
    Conference Papers | 2011
    Ruj S; Nayak A; Stojmenovic I, 2011, 'DACC: Distributed access control in clouds', in Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011, pp. 91 - 98, http://dx.doi.org/10.1109/TrustCom.2011.15
    Conference Papers | 2011
    Ruj S; Nayak A; Stojmenovic I, 2011, 'Distributed fine-grained access control in wireless sensor networks', in Proceedings - 25th IEEE International Parallel and Distributed Processing Symposium, IPDPS 2011, pp. 352 - 362, http://dx.doi.org/10.1109/IPDPS.2011.42
    Conference Papers | 2011
    Ruj S; Nayak A; Stojmenovic I, 2011, 'Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs', in Proceedings - IEEE INFOCOM, IEEE, Shanghai, PEOPLES R CHINA, pp. 326 - 330, presented at IEEE INFOCOM Conference, Shanghai, PEOPLES R CHINA, 10 April 2011 - 15 April 2011, http://dx.doi.org/10.1109/INFCOM.2011.5935175
    Conference Papers | 2011
    Ruj S; Nayak A; Stojmenovic I, 2011, 'Improved access control mechanism in vehicular ad hoc networks', in Frey H; Li X; Ruehrup S (eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), SPRINGER-VERLAG BERLIN, Univ Paderborn, Paderborn, GERMANY, pp. 191 - 205, presented at 10th International Conference on Ad-Hoc Networks and Wireless (ADHOC-NOW), Univ Paderborn, Paderborn, GERMANY, 18 July 2011 - 20 July 2011, http://dx.doi.org/10.1007/978-3-642-22450-8_15
    Conference Papers | 2011
    2011, 'Key distribution in wireless sensor networks using finite affine plane', in Proceedings - 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, pp. 436 - 441, http://dx.doi.org/10.1109/WAINA.2011.39
    Preprints | 2011
    2011, A Security Architecture for Data Aggregation and Access Control in Smart Grids, , http://dx.doi.org/10.48550/arxiv.1111.2619
    Preprints | 2011
    2011, Combinatorial Batch Codes: A Lower Bound and Optimal Constructions, , http://dx.doi.org/10.48550/arxiv.1102.4951
    Preprints | 2011
    2011, Data-centric Misbehavior Detection in VANETs, , http://dx.doi.org/10.48550/arxiv.1103.2404
    Conference Papers | 2009
    Ruj S; Roy B, 2009, 'Key predistribution schemes using codes in wireless sensor networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 275 - 288, http://dx.doi.org/10.1007/978-3-642-01440-6_22
    Conference Papers | 2009
    2009, 'Key predistribution schemes using block designs inwireless sensor networks', in Proceedings - 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, pp. 873 - 878, http://dx.doi.org/10.1109/CSE.2009.35
    Conference Papers | 2008
    2008, 'Key establishment algorithms for some deterministic key predistribution schemes', in Security in Information Systems - Proceedings of the 6th International Workshop on Security in Information Systems, WOSIS 2008; In Conjunction with ICEIS 2008, pp. 68 - 77
    Preprints | 2008
    2008, More on Combinatorial Batch Codes, , http://dx.doi.org/10.48550/arxiv.0809.3357
    Conference Papers | 2007
    Ruj S; Roy B, 2007, 'Key predistribution using partially balanced designs in wireless sensor networks', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 431 - 445, http://dx.doi.org/10.1007/978-3-540-74742-0_40

Selected Grants: 

- Lead Chief Investigator: Security and Privacy of Blockchain Enabled Carbon Trading Platforms. Center for Critical Digital Infrastructure, UNSW, Sydney, 2022. 

- Joint Lead Chief Investigator: Analysing Proof of Stake Protocols. Joint award from School of Computer Science and Engineering and School of Information Systems and Technology Management, UNSW, Sydney, 2022-2023.  

- Project Lead, “Automatic Assessment and Protection of Personal Information for Data Sharing”, Cyber Security CRC, WA, Government, NSW Government and Australian Computer Society. 2020-2022.

- Chief Investigator,  “ Securing Cloud Storage”, Funding Agency, Cisco, Inc, USA, 2017 - 2019.

- Chief Investigator, “Auditing Schemes for Cloud Storage”. Funding agency, NetApp Inc, USA. 2016 -2019.

- Chief Investigator, “Study on Security and Privacy of Internet of Things (IoT)”. Funding agency, Samsung Electronics, Korea,  2014-2016.

-Chief Investigator (India Side), “Computational Aspects of Mathematical Design and Analysis of Secure Communication Systems Based on Cryptographic Primitives”, Indo-Japan Cooperative Science Program. Funding Agency DST, Govt. of India and JSPS, Japan. 2014-2016. 

 

  •  
  • NSW Innovation Award (iAward) Merit Winner, 2022 (Awarded to project on Personal Information Assessment and Protection, led at CSIRO) 
  • Women in Science Award CSIRO (SCS, Data61), June 2020.
  • WIE Best Paper award in IEEE ANTS, December, 2017.
  • Cisco Academic Research Grant, March 2017.
  • University Partner (CI), Open Collaborative Science Project (OCSP) Program with IBM Research on Blockchains, February 2017.
  • ACM Senior Member, 2016.
  • NetApp faculty fellowship, 2016.
  • Selected for Japan Trust International Research Collaboration Program. Collaborated with KDDI R&D Labs, Japan. (April-June 2016).
  • IEEE Senior Member, 2015.
  • Samsung GRO award, 2014.
  • Finalist for (Indian National Science Academy) INSA Young Scientist Award 2014.
  • Best Paper Award at 22nd IEEE PIMRC, 2011.
  • Best Paper Award at The Fifth International Symposium on Parallel and Distributed Processing and Applications, ISPA07, 2007.

Applied Cryptography, Post Quantum Cryptography, Blockchains, Data privacy, Cybersecurity. 

My Teaching

COMP2521 Data Structure and Algorithms 

ZZEN9201 Foundations of Cybersecurity

ZZEN9214 Cloud Security