S. Ruj
Latest
- CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments
- CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments
- On the Vulnerability of Community Structure in Complex Networks
- On the Vulnerability of Community Structure in Complex Networks
- SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT
- SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT
- Strategic Analysis to defend against Griefing Attack in Lightning Network
- Strategic Analysis to defend against Griefing Attack in Lightning Network
- Design of Anonymous Endorsement System in Hyperledger Fabric
- Design of Anonymous Endorsement System in Hyperledger Fabric
- Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie
- Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie
- Preface
- Preface
- Smart HealthCare System
- Smart HealthCare System
- A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT
- A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT
- A parallelized disjunctive query based searchable encryption scheme for big data
- A parallelized disjunctive query based searchable encryption scheme for big data
- A Secure Fog Based Architecture for Industrial Internet of Things and Industry 4.0
- A Secure Fog Based Architecture for Industrial Internet of Things and Industry 4.0
- A Technical Look At The Indian Personal Data Protection Bill
- A Technical Look At The Indian Personal Data Protection Bill
- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings
- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings
- Griefing-penalty: Countermeasure for griefing attack in lightning network
- Griefing-penalty: Countermeasure for griefing attack in lightning network
- HushRelay: A privacy-preserving, efficient, and scalable routing algorithm for off-chain payments
- HushRelay: A privacy-preserving, efficient, and scalable routing algorithm for off-chain payments
- Reliable, fair and decentralized marketplace for content sharing using blockchain
- Reliable, fair and decentralized marketplace for content sharing using blockchain
- Verifiable and auditable digital interchange framework#
- Verifiable and auditable digital interchange framework#
- Blockchain enabled privacy preserving data audit
- Blockchain enabled privacy preserving data audit
- FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme
- FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme
- Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment
- Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment
- LowSHeP: Low-overhead forwarding and update Solution in ndn with Hexadecimal Patricia trie
- LowSHeP: Low-overhead forwarding and update Solution in ndn with Hexadecimal Patricia trie
- Maximal contrast color visual secret sharing schemes
- Maximal contrast color visual secret sharing schemes
- The secure link prediction problem
- The secure link prediction problem
- A survey on security and privacy issues of bitcoin
- A survey on security and privacy issues of bitcoin
- An Efficient Secure Distributed Cloud Storage for Append-Only Data
- An Efficient Secure Distributed Cloud Storage for Append-Only Data
- Applying transmission-coverage algorithms for secure geocasting in VANETs
- Applying transmission-coverage algorithms for secure geocasting in VANETs
- Blockchain Enabled Data Marketplace - Design and Challenges
- Blockchain Enabled Data Marketplace - Design and Challenges
- BlockStore: A secure decentralized storage framework on blockchain
- BlockStore: A secure decentralized storage framework on blockchain
- Data forwarding and update propagation in grid network for NDN: A low-overhead approach
- Data forwarding and update propagation in grid network for NDN: A low-overhead approach
- Key predistribution using transversal design on a grid of wireless sensor network
- Key predistribution using transversal design on a grid of wireless sensor network
- Keyword-based delegable proofs of storage
- Keyword-based delegable proofs of storage
- On the economic significance of ransomware campaigns: A Bitcoin transactions perspective
- On the economic significance of ransomware campaigns: A Bitcoin transactions perspective
- Secure computation of inner product of vectors with distributed entries and its applications to SVM
- Secure computation of inner product of vectors with distributed entries and its applications to SVM
- Security issues in named data networks
- Security issues in named data networks
- A graph analytics framework for ranking authors, papers and venues
- A graph analytics framework for ranking authors, papers and venues
- Bitcoin Block Withholding Attack: Analysis and Mitigation
- Bitcoin Block Withholding Attack: Analysis and Mitigation
- Certificate Transparency with Enhancements and Short Proofs
- Certificate Transparency with Enhancements and Short Proofs
- Cloud Data Auditing Using Proofs of Retrievability
- Cloud Data Auditing Using Proofs of Retrievability
- Expressive rating scheme by signatures with predications on ratees
- Expressive rating scheme by signatures with predications on ratees
- Failure tolerant rational secret sharing
- Failure tolerant rational secret sharing
- On the application of clique problem for proof-of-work in cryptocurrencies
- On the application of clique problem for proof-of-work in cryptocurrencies
- Preferential attachment model with degree bound and its application to key predistribution in WSN
- Preferential attachment model with degree bound and its application to key predistribution in WSN
- Achieving data survivability and confidentiality in unattended wireless sensor networks
- Achieving data survivability and confidentiality in unattended wireless sensor networks
- CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications
- CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications
- A social network approach to trust management in VANETs
- A social network approach to trust management in VANETs
- Analyzing cascading failures in smart grids under random and targeted attacks
- Analyzing cascading failures in smart grids under random and targeted attacks
- Decentralized access control with anonymous authentication of data stored in clouds
- Decentralized access control with anonymous authentication of data stored in clouds
- Security services using crowdsourcing
- Security services using crowdsourcing
- Should silence be heard? Fair rational secret sharing with silent and non-silent players
- Should silence be heard? Fair rational secret sharing with silent and non-silent players
- A decentralized security framework for data aggregation and access control in smart grids
- A decentralized security framework for data aggregation and access control in smart grids
- Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary
- Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary
- Enhanced privacy and reliability for secure geocasting in VANET
- Enhanced privacy and reliability for secure geocasting in VANET
- Jamming resistant schemes for wireless communication: A combinatorial approach
- Jamming resistant schemes for wireless communication: A combinatorial approach
- Pairwise and triple key distribution in wireless sensor networks with applications
- Pairwise and triple key distribution in wireless sensor networks with applications
- Combinatorial batch codes: A lower bound and optimal constructions
- Combinatorial batch codes: A lower bound and optimal constructions
- Improved distinguishers for HC-128
- Improved distinguishers for HC-128
- Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs
- Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs
- Improved access control mechanism in vehicular ad hoc networks
- Improved access control mechanism in vehicular ad hoc networks
- Key pre-distribution using partially balanced designs in wireless sensor networks
- Key pre-distribution using partially balanced designs in wireless sensor networks
- On data-centric misbehavior detection in VANETs
- On data-centric misbehavior detection in VANETs
- Key predistribution schemes using codes in wireless sensor networks
- Key predistribution schemes using codes in wireless sensor networks
- Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks
- Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks
- Revisiting Key Predistribution Using Transversal Designs for a Grid-Based Deployment Scheme
- Revisiting Key Predistribution Using Transversal Designs for a Grid-Based Deployment Scheme