Our selected publications :
- P. Jain, T. Rodrigues, G. Magno, P. Kumaraguru, and V. Almeida: 3rd International Conference on Social Computing (2011). .
- S. Asthana, P. Singh, P. Kumaraguru, A. Singh, and V. Naik:Tring! tring! - An exploration and analysis of interactive voice response systems.India HCI (2012).
- A. Gupta and P. Kumaraguru:ranking of tweets during high impact events.Workshop on Privacy and Security in Online Social Media, Co-located with WWW (2012).
- G. Rauber, V. Almeida, and P. Kumaraguru: Privacy Albeit Late. WEBMEDIA, Brazilian Symposium on Multimedia and the Web (2011).
- S. Chhabra, A. Aggarwal, F. Benevenuto and P. Kumaraguru: Phi.sh/$oCiaL: The Phishing Landscape through Short URLs. 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS 2011).
- I. Ion, N. Sachdeva, P. Kumaraguru and S. Capkun: Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage. Symposium on Usable Privacy and Security (SOUPS) (2011)
- V. Agarwal, V. Desai, S. Kapoor, P. Kumaraguru and S. Mittal: Enhancing the Rural Self Help Group – Bank Linkage Program. IEEE International Conference on Service Operations and Logistics, and Informatics (2011).
- A. Gupta, K. K. Viswanathan, A. Joshi, T. Finin and P. Kumaraguru: Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasks. In Proceedings of the Information Integration on the Web (IIWeb), Co-located workshop at WWW (2011).
- R. Khot, S. Kannan and P. Kumaraguru: A Novel Jigsaw Based Authentication Scheme using Tagging. In Proceedings of the 29th International Conference on Human Factors in Computing Systems. CHI 2011.
- N. Bagheri, M. Safkhani, M.Naderi and H. BehnamSanadhya, S. “On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al.'s Protocol”with at DPM 2011, LNCS.
- N. Bagheri, M. Safkhani, M.Naderi and H. BehnamSanadhya, S. “Security Analysis of LMAP++, an RFID Authentication Protocol”at RISC 2011.
- A. S. Saxena, M. Pundir, V. Goyal, D. Bera: Preserving Location Privacy for Continuous Queries on Known Route, 7th International Conference of Information Systems Security (ICISS 2011): 265-279, 15-19 December 2011, Jadavpur University, Kolkata
- Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L., and Downs, J. Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions. Accepted at CHI 2010.
- Nagaraja, S., and Anderson, R. Snooping dragon: Social malware surveillance of the tibetan movement. Tech. Rep. 746, Computer Laboratory, University of Cambridge, 2009.
- Sanadhya, S., and Sarkar, P. A New Hash Family Obtained by Modifying the SHA-2 Family . In Rei Safavi-Naini and Vijay Varadharajan, editors, ASIACCS 2009, 4th International Conference, March 10-12, 2009, Sydney, Australia, ACM Conference Proceedings, ACM, 2009.
- Kumaraguru, P., Cranshaw, J., Acquisti, A., Cranor, L., Hong, J., Blair, M. A., and Pham, T. School of Phish: A Real-World Evaluation of Anti-Phishing Training. Symposium On Usable Privacy and Security, 2009.
- Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L., and Hong, J. Teaching Johnny Not to Fall for Phish. Accepted in Association for Computing Machinery's Transactions on Internet Technology (TOIT).
- Sheng, S., Kumaraguru, P., Acquisti, A., Cranor, L., and Hong, J. Improving Phishing Countermeasures: An Analysis of Expert Interviews. e-Crime Researchers Summit, Anti-Phishing Working Group, 2009.
- Sanadhya, S., and Sarkar, P. Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. In Tzong-Chen Wu and Chin-Laung Lei and Vincent Rijmen and Der-Tsai Lee, editors, Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 2008, Proceedings, volume 5222 of LNCS, pages 244–259. Springer, 2008.
- Sanadhya, S., and Sarkar, P. New Collision Attacks Against Up To 24-step SHA-2 . In D.R. Chowdhury, V. Rijmen, and A. Das, editors, Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, December 2008, Proceedings, volume 5365 of Lecture Notes in Computer Science, pages 91–103. Springer, 2008.
- Sanadhya, S., and Sarkar, P. New Local Collisions for the SHA-2 Hash Family. In Kil-Hyun Nam and Gwangsoo Rhee, editors, Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, volume 4817 of Lecture Notes in Computer Science, pages 193–205. Springer, 2007.
- Anderson, R., Moore, T., Nagaraja, S., and Ozment, A. Incentives and information security. In Algorithmic Game Theory (2007), N. Nisan and T. Roughgarden and E. Tardos and V. Vazirani, Ed., Cambridge University Press.
- Barika, M., Gupta, G., Sinha, S., Mishra, A., and Mazumdar, C. An efficient technique for enhancing forensic capabilities of Ext2 file system, Digital Investigation. Volume 4, Supplement 1, September 2007, Pages 55-61, Elsevier.
- Gupta, G., Saha, S.K., Chakraborty, S., and Mazumdar, C. Document Frauds: Identification and Linking Fake Document to Scanners and Printers, Computing: Theory and Applications, 2007. ICCTA apos;07. International Conference on Volume , Issue , 5-7 March 2007 Page(s):497 - 501.
- Nagaraja, S. Anonymity in the wild: Mixes on unstructured networks. In Symposium on Privacy Enhancing Technologies (PET 2007) (2007), N. Borisov and P. Golle, Eds., no. 4776, LNCS, Springer-Verlag, Heidelberg, Germany, pp. 254–271.
- Gupta, G., Mazumdar, C., Rao, M.S., and Bhosale, R.B. Paradigm shift in document related frauds: Characteristics identification for development of a non-destructive automated system for printed documents. Digital Investigation, Volume 3, Issue 1, March 2006, Pages 43-55, Elsevier.
- Nagaraja, S., and Anderson, R. The topology of covert conflict. In Workshop on the Economics of Information Security (2006).
- Gupta, G., Mazumdar, C., and Rao, M.S. Digital Forensic Analysis of E-Mails: A Trusted E-Mail Protocol,International Journal of Digital Evidence (IJDE) Spring 2004 Volume 2, Issue 4.