Sushmita Ruj
#136,906
Most Influential Person Now
Indian computer scientist
Sushmita Ruj's AcademicInfluence.com Rankings
Sushmita Rujcomputer-science Degrees
Computer Science
#9452
World Rank
#9926
Historical Rank
Network Security
#18
World Rank
#18
Historical Rank
Database
#8622
World Rank
#9037
Historical Rank
Download Badge
Computer Science
Sushmita Ruj's Degrees
- Bachelors Computer Science Jadavpur University
Similar Degrees You Can Earn
Why Is Sushmita Ruj Influential?
(Suggest an Edit or Addition)According to Wikipedia, Sushmita Ruj is an Indian-Australian computer scientist whose research concerns access control, computer security and information privacy. Formerly an associate professor at the Indian Statistical Institute and senior research scientist at CSIRO in Australia, she is a senior lecturer in computer science and engineering at the University of New South Wales.
Sushmita Ruj's Published Works
Published Works
- A Survey on Security and Privacy Issues of Bitcoin (2017) (677)
- A Survey of COVID-19 Contact Tracing Apps (2020) (425)
- A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT (2020) (362)
- DACC: Distributed Access Control in Clouds (2011) (325)
- Decentralized Access Control with Anonymous Authentication of Data Stored in Clouds (2014) (260)
- Privacy Preserving Access Control with Authentication for Securing Data in Clouds (2012) (229)
- On Data-Centric Misbehavior Detection in VANETs (2011) (171)
- A Decentralized Security Framework for Data Aggregation and Access Control in Smart Grids (2013) (145)
- Bitcoin Block Withholding Attack: Analysis and Mitigation (2017) (126)
- A social network approach to trust management in VANETs (2012) (117)
- A Blockchain Framework for Insurance Processes (2018) (106)
- Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications (2013) (90)
- On the Economic Significance of Ransomware Campaigns: A Bitcoin Transactions Perspective (2018) (83)
- Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks (2007) (72)
- Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory (2013) (72)
- Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks (2009) (71)
- Analyzing Cascading Failures in Smart Grids under Random and Targeted Attacks (2014) (66)
- Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs (2011) (62)
- Efficient Decentralized Attribute Based Access Control for Mobile Clouds (2020) (45)
- Key Predistribution Schemes Using Codes in Wireless Sensor Networks (2009) (39)
- Distributed Fine-Grained Access Control in Wireless Sensor Networks (2011) (39)
- Retricoin: Bitcoin based on compact proofs of retrievability (2016) (37)
- A Security Architecture for Data Aggregation and Access Control in Smart Grids (2011) (37)
- Combinatorial batch codes: A lower bound and optimal constructions (2011) (35)
- A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data (2019) (34)
- A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0 (2020) (33)
- Limitations of trust management schemes in VANET and countermeasures (2011) (31)
- Security Issues in Named Data Networks (2018) (28)
- Design of Anonymous Endorsement System in Hyperledger Fabric (2018) (23)
- BlockStore: A Secure Decentralized Storage Framework on Blockchain (2018) (21)
- On blockchain-based authorization architecture for beyond-5G mobile services (2017) (21)
- Key pre-distribution using partially balanced designs in wireless sensor networks (2011) (20)
- Improved Access Control Mechanism in Vehicular Ad Hoc Networks (2011) (20)
- Attribute based access control in clouds: A survey (2014) (17)
- Blockchain Enabled Data Marketplace - Design and Challenges (2018) (17)
- Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks (2009) (16)
- Key Predistribution in Wireless Sensor Networks When Sensors Are Within Communication Range (2011) (15)
- BlockV: A Blockchain Enabled Peer-Peer Ride Sharing Service (2019) (14)
- Revisiting Key Predistribution Using Transversal Designs for a Grid-Based Deployment Scheme (2009) (14)
- Improved distinguishers for HC-128 (2012) (14)
- Decentralized Access Control on Data in the Cloud with Fast Encryption and Outsourced Decryption (2014) (14)
- Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage (2016) (14)
- Key Distribution in Wireless Sensor Networks Using Finite Affine Plane (2011) (13)
- Temporal Access Control with User Revocation for Cloud Data (2014) (13)
- Maximal contrast color visual secret sharing schemes (2018) (13)
- End to end secure anonymous communication for secure directed diffusion in IoT (2019) (13)
- CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications (2015) (12)
- Enhanced privacy and reliability for secure geocasting in VANET (2013) (12)
- Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary (2013) (11)
- A parallelized disjunctive query based searchable encryption scheme for big data (2020) (11)
- Security Services Using Crowdsourcing (2014) (11)
- Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment (2019) (11)
- Certificate Transparency with Enhancements and Short Proofs (2017) (10)
- Distributed data survivability schemes in mobile Unattended Wireless Sensor Networks (2012) (10)
- Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSN (2016) (9)
- An Efficient and Secure Directed Diffusion in Industrial Wireless Sensor Networks (2018) (9)
- Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding (2016) (9)
- Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes (2008) (8)
- Securing Cloud Data (2017) (8)
- Griefing-Penalty: Countermeasure for Griefing Attack in Lightning Network (2020) (8)
- HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments (2020) (8)
- A social network approach to trust management in VANETs (2012) (6)
- Blockchain Enabled Privacy Preserving Data Audit (2019) (6)
- DIMY: Enabling privacy-preserving contact tracing (2021) (5)
- Key Predistribution Using Transversal Design on a Grid of Wireless Sensor Network (2008) (5)
- A Technical Look At The Indian Personal Data Protection Bill (2020) (5)
- Time is Money: Countering Griefing Attack in Lightning Network (2020) (5)
- Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach (2013) (4)
- Data forwarding and update propagation in grid network for NDN: A low-overhead approach (2018) (4)
- Achieving Data Survivability and Confidentiality in Unattended Wireless Sensor Networks (2015) (4)
- Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts (2017) (4)
- An Efficient Disjunctive Query Enabled Ranked Searchable Encryption Scheme (2017) (4)
- Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings (2020) (4)
- Applying transmission-coverage algorithms for secure geocasting in VANETs (2018) (4)
- Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques (2016) (4)
- CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments (2020) (4)
- Strategic Analysis to defend against Griefing Attack in Lightning Network (2022) (3)
- FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme (2019) (3)
- LowSHeP: Low-overhead forwarding and update Solution in ndn with Hexadecimal Patricia trie (2019) (3)
- Towards Privacy-preserving Digital Contact Tracing (2021) (3)
- Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique (2013) (3)
- More on Combinatorial Batch Codes (2008) (3)
- Rational Mining Of Bitcoin (2019) (3)
- Griefing-Penalty: Countermeasure for Griefing Attack in Bitcoin-compatible PCNs (2020) (3)
- Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs (2022) (3)
- The Secure Link Prediction Problem (2019) (3)
- Reliable, Fair and Decentralized Marketplace for Content Sharing Using Blockchain (2020) (2)
- Public Key Infrastructure for Named Data Networks (2020) (2)
- SPRITE: A Scalable Privacy-Preserving and Verifiable Collaborative Learning for Industrial IoT (2022) (2)
- On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies (2015) (2)
- CryptoMaze: Atomic Off-Chain Payments in Payment Channel Network (2020) (2)
- A Graph Analytics Framework for Ranking Authors, Papers and Venues (2017) (2)
- Fault Tolerance and Reliability of Smart Grids (2019) (1)
- Securing home networks using Physically Unclonable Functions (2012) (1)
- Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM (2018) (1)
- Failure Tolerant Rational Secret Sharing (2016) (1)
- Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-silent Players (2014) (1)
- Cloud Data Auditing Using Proofs of Retrievability (2017) (1)
- An Efficient Secure Distributed Cloud Storage for Append-Only Data (2018) (1)
- Blockchain Enabled Data Trading with User Consent (2021) (1)
- A Digital Asset Inheritance Model to Convey Online Persona Posthumously (2022) (1)
- Improved distinguishers for HC-128 (2011) (0)
- C A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data (2017) (0)
- Revisiting Block Withholding Attack in Bitcoin Cryptocurrency Samiran Bag (2015) (0)
- FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT (2023) (0)
- Secrecy performance analysis of relay selection in adaptive DF relaying network with active adversary (2017) (0)
- Revisiting Block Withholding Attack in Bitcoin Cryptocurrency (2015) (0)
- Verifiable and forward private conjunctive keyword search from DIA tree (2022) (0)
- BCC'18 chairs' welcome (2018) (0)
- LightSwap: An Atomic Swap Does Not Require Timeouts At Both Blockchains (2022) (0)
- Application of Graph Problem for Bitcoin Mining Samiran Bag (2015) (0)
- Blockchain-Enabled Secure and Smart HealthCare System (2022) (0)
- Lightweight Key Management in Multi-Hop Wireless Sensor Networks (2012) (0)
- TSP 2013: message from workshop chairs (2014) (0)
- Secure Cloud Storage with Data Dynamics and Privacy-Preserving Audits Using Secure Network Coding (2016) (0)
- Expressive Rating Scheme by Signatures with Predications on Ratees (2016) (0)
- Cumulus: Blockchain-Enabled Privacy Preserving Data Audit in Cloud (2019) (0)
- NFSP 2013: message from the chairs (2013) (0)
- Securely Computing Clustering Coefficient for Outsourced Dynamic Encrypted Graph Data (2021) (0)
- On the Vulnerability of Community Structure in Complex Networks (2021) (0)
- Energy Blockchain for Demand Response and Distributed Energy Resource Management (2021) (0)
- Efficient keyword search on encrypted dynamic cloud data (2023) (0)
- N ov 2 01 7 Cloud Data Auditing Using Proofs of Retrievability ⋆ (0)
- Cascading Failures in Smart Grids under Random, Targeted and Adaptive Attacks (2022) (0)
- Message from the STPA 2016 Workshop Organizers (2016) (0)
- Fast Real-Time Authentication Scheme for Smart Grids (2017) (0)
- Maximal contrast color visual secret sharing schemes (2018) (0)
- BCC'17 chairs' Welcome (2017) (0)
- Understanding Vulnerability of Communities in Complex Networks (2019) (0)
- Forward Traceability for Product Authenticity Using Ethereum Smart Contracts (2022) (0)
- Verifiable and Auditable Digital Interchange Framework (2020) (0)
- Keyword-Based Delegable Proofs of Storage (2017) (0)
- Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie (2021) (0)
- Strategic Analysis of Griefing Attack in Lightning Network (2022) (0)
This paper list is powered by the following services:
Other Resources About Sushmita Ruj
What Schools Are Affiliated With Sushmita Ruj?
Sushmita Ruj is affiliated with the following schools: