Bitcoin block withholding attack: Analysis and mitigation S Bag, S Ruj, K Sakurai IEEE Transactions on Information Forensics and Security 12 (8), 1967-1978, 2016 | 221 | 2016 |
Decentralized self-enforcing trust management system for social Internet of Things MA Azad, S Bag, F Hao, A Shalaginov IEEE Internet of Things Journal 7 (4), 2690-2703, 2020 | 84 | 2020 |
A smart contract system for decentralized borda count voting S Panja, S Bag, F Hao, B Roy IEEE Transactions on Engineering Management 67 (4), 1323-1339, 2020 | 63 | 2020 |
PrivBox: Verifiable decentralized reputation system for online marketplaces MA Azad, S Bag, F Hao Future Generation Computer Systems 89, 44-57, 2018 | 56 | 2018 |
TrustVote: Privacy-preserving node ranking in vehicular networks MA Azad, S Bag, S Parkinson, F Hao IEEE Internet of Things Journal 6 (4), 5878-5891, 2018 | 52 | 2018 |
Retricoin: Bitcoin based on compact proofs of retrievability B Sengupta, S Bag, S Ruj, K Sakurai Proceedings of the 17th International Conference on Distributed Computing …, 2016 | 51 | 2016 |
SEAL: Sealed-bid auction without auctioneers S Bag, F Hao, SF Shahandashti, IG Ray IEEE Transactions on Information Forensics and Security 15, 2042-2052, 2019 | 47 | 2019 |
Yet another note on block withholding attack on bitcoin mining pools S Bag, K Sakurai Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016 | 43 | 2016 |
A privacy-aware decentralized and personalized reputation system S Bag, MA Azad, F Hao Computers & Security 77, 514-530, 2018 | 38 | 2018 |
M2m-rep: Reputation system for machines in the internet of things MA Azad, S Bag, F Hao, K Salah Computers & Security 79, 1-16, 2018 | 34 | 2018 |
Authentic caller: Self-enforcing authentication in a next-generation network MA Azad, S Bag, C Perera, M Barhamgi, F Hao IEEE Transactions on Industrial Informatics 16 (5), 3606-3615, 2019 | 31 | 2019 |
Privy: Privacy preserving collaboration across multiple service providers to combat telecom spams MA Azad, S Bag, S Tabassum, F Hao IEEE transactions on emerging topics in computing 8 (2), 313-327, 2017 | 30 | 2017 |
M2m-rep: Reputation of machines in the internet of things MA Azad, S Bag, F Hao Proceedings of the 12th international conference on availability …, 2017 | 19 | 2017 |
A new key predistribution scheme for grid-group deployment of wireless sensor networks. S Bag Adhoc & Sensor Wireless Networks 27, 2015 | 19 | 2015 |
Key distribution in wireless sensor networks using finite affine plane S Bag, S Ruj 2011 IEEE Workshops of International Conference on Advanced Information …, 2011 | 15 | 2011 |
A new key predistribution scheme for general and grid-group deployment of wireless sensor networks S Bag, B Roy EURASIP Journal on Wireless Communications and Networking 2013, 1-19, 2013 | 14 | 2013 |
Decentralized privacy-aware collaborative filtering of smart spammers in a telecommunication network MA Azad, S Bag Proceedings of the Symposium on Applied Computing, 1711-1717, 2017 | 13 | 2017 |
100% connectivity for location aware code based KPD in clustered WSN: merging blocks S Bag, A Dhar, P Sarkar Information Security: 15th International Conference, ISC 2012, Passau …, 2012 | 13 | 2012 |
Two channel hopping schemes for jamming resistant wireless communication S Bag, B Roy 2013 IEEE 9th International Conference on Wireless and Mobile Computing …, 2013 | 9 | 2013 |
End-to-end verifiable e-voting trial for polling station voting F Hao, S Wang, S Bag, R Procter, SF Shahandashti, M Mehrnezhad, ... IEEE Security & Privacy 18 (6), 6-13, 2020 | 8 | 2020 |