Select Publications

Conference Papers

De SJ; Ruj S, 2015, 'Decentralized access control on data in the cloud with fast encryption and outsourced decryption', in Proceedings IEEE Global Communications Conference Globecom, http://dx.doi.org/10.1109/GLOCOM.2014.7417639

Ruj S, 2014, 'Attribute based access control in clouds: A survey', in 2014 International Conference on Signal Processing and Communications Spcom 2014, http://dx.doi.org/10.1109/SPCOM.2014.6983992

Ruj S; Pal A, 2014, 'Analyzing cascading failures in smart grids under random and targeted attacks', in Proceedings International Conference on Advanced Information Networking and Applications AINA, pp. 226 - 233, http://dx.doi.org/10.1109/AINA.2014.32

Verma R; Ruj S, 2014, 'Security services using crowdsourcing', in Procedia Computer Science, pp. 505 - 512, http://dx.doi.org/10.1016/j.procs.2014.05.454

De SJ; Ruj S; Pal AK, 2014, 'Should silence be heard? Fair rational secret sharing with silent and non-silent players', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 240 - 255, http://dx.doi.org/10.1007/978-3-319-12280-9_16

Min G; Varadharajan V; Ko RKL; Xiang Y; Marmol FG; Ruj S; Wang G; Yang LT, 2014, 'TSP 2013: Message from workshop chairs', in Proceedings 2013 IEEE International Conference on High Performance Computing and Communications Hpcc 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing Euc 2013, http://dx.doi.org/10.1109/HPCC.and.EUC.2013.350

Bag S; Ruj S; Roy B, 2013, 'Jamming resistant schemes for wireless communication: A combinatorial approach', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 43 - 62, http://dx.doi.org/10.1007/978-3-642-45204-8_4

Yu S; Wang H; Lin X; Ruj S, 2013, 'NFSP 2013: Message from the chairs', in Proceedings International Conference on Distributed Computing Systems, http://dx.doi.org/10.1109/ICDCSW.2013.73

Reddy SKVL; Ruj S; Nayak A, 2013, 'Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary', in IEEE Wireless Communications and Networking Conference Wcnc, pp. 1836 - 1841, http://dx.doi.org/10.1109/WCNC.2013.6554843

Huang Z; Wang C; Ruj S; Stojmenovic M; Nayak A, 2013, 'Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory', in Proceedings of the 2013 IEEE 8th Conference on Industrial Electronics and Applications Iciea 2013, pp. 1023 - 1028, http://dx.doi.org/10.1109/ICIEA.2013.6566517

Prado A; Ruj S; Nayak A, 2013, 'Enhanced privacy and reliability for secure geocasting in VANET', in IEEE International Conference on Communications, pp. 1599 - 1603, http://dx.doi.org/10.1109/ICC.2013.6654743

Ruj S; Sakurai K, 2013, 'Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique', in Proceedings IEEE Global Communications Conference Globecom, pp. 402 - 407, http://dx.doi.org/10.1109/GLOCOM.2013.6831104

Ruj S; Nayak A; Naik S, 2012, 'Securing home networks using Physically Unclonable Functions', in Icufn 2012 4th International Conference on Ubiquitous and Future Networks Final Program, pp. 288 - 293, http://dx.doi.org/10.1109/ICUFN.2012.6261713

Ruj S; Stojmenovic M; Nayak A, 2012, 'Privacy preserving access control with authentication for securing data in clouds', in Proceedings 12th IEEE ACM International Symposium on Cluster Cloud and Grid Computing Ccgrid 2012, pp. 556 - 563, http://dx.doi.org/10.1109/CCGrid.2012.92

Reddy SKVL; Ruj S; Nayak A, 2012, 'Distributed data survivability schemes in mobile Unattended Wireless Sensor Networks', in Proceedings IEEE Global Communications Conference Globecom, pp. 979 - 984, http://dx.doi.org/10.1109/GLOCOM.2012.6503240

Ruj S; Cavenaghi MA; Huang Z; Nayak A; Stojmenovic I, 2011, 'On data-centric misbehavior detection in VANETs', in IEEE Vehicular Technology Conference, http://dx.doi.org/10.1109/VETECF.2011.6093096

Ruj S; Nayak A; Stojmenovic I, 2011, 'DACC: Distributed access control in clouds', in Proc 10th IEEE Int Conf on Trust Security and Privacy in Computing and Communications Trustcom 2011 8th IEEE Int Conf on Embedded Software and Systems Icess 2011 6th Int Conf on Fcst 2011, pp. 91 - 98, http://dx.doi.org/10.1109/TrustCom.2011.15

Huang Z; Ruj S; Cavenaghi M; Nayak A, 2011, 'Limitations of trust management schemes in VANET and countermeasures', in IEEE International Symposium on Personal Indoor and Mobile Radio Communications PIMRC, pp. 1228 - 1232, http://dx.doi.org/10.1109/PIMRC.2011.6139695

Ruj S; Nayak A; Stojmenovic I, 2011, 'Distributed fine-grained access control in wireless sensor networks', in Proceedings 25th IEEE International Parallel and Distributed Processing Symposium IPDPS 2011, pp. 352 - 362, http://dx.doi.org/10.1109/IPDPS.2011.42

Ruj S; Nayak A; Stojmenovic I, 2011, 'Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs', in Proceedings IEEE INFOCOM, pp. 326 - 330, http://dx.doi.org/10.1109/INFCOM.2011.5935175

Ruj S; Nayak A; Stojmenovic I, 2011, 'Improved access control mechanism in vehicular ad hoc networks', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 191 - 205, http://dx.doi.org/10.1007/978-3-642-22450-8_15

Bag S; Ruj S, 2011, 'Key distribution in wireless sensor networks using finite affine plane', in Proceedings 25th IEEE International Conference on Advanced Information Networking and Applications Workshops Waina 2011, pp. 436 - 441, http://dx.doi.org/10.1109/WAINA.2011.39

Ruj S; Seberry J; Roy B, 2009, 'Key predistribution schemes using block designs inwireless sensor networks', in Proceedings 12th IEEE International Conference on Computational Science and Engineering Cse 2009, pp. 873 - 878, http://dx.doi.org/10.1109/CSE.2009.35

Ruj S; Roy B, 2009, 'Key predistribution schemes using codes in wireless sensor networks', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 275 - 288, http://dx.doi.org/10.1007/978-3-642-01440-6_22

Ruj S; Roy B, 2008, 'Key establishment algorithms for some deterministic key predistribution schemes', in Security in Information Systems Proceedings of the 6th International Workshop on Security in Information Systems Wosis 2008 in Conjunction with Iceis 2008, pp. 68 - 77

Ruj S; Roy B, 2007, 'Key predistribution using partially balanced designs in wireless sensor networks', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 431 - 445, http://dx.doi.org/10.1007/978-3-540-74742-0_40


Back to profile page