Security and privacy issues in cloud, fog and edge computing S Parikh, D Dave, R Patel, N Doshi Procedia Computer Science 160, 734-739, 2019 | 53 | 2019 |
Comparative analysis of formal model checking tools for security protocol verification R Patel, B Borisaniya, A Patel, D Patel, M Rajarajan, A Zisman International Conference on Network Security and Applications, 152-163, 2010 | 45 | 2010 |
A survey on blockchain technology and its proposed solutions D Dave, S Parikh, R Patel, N Doshi Procedia Computer Science 160, 740-745, 2019 | 27 | 2019 |
A Comparative study of applications of Game Theory in Cyber Security and Cloud Computing. V Kakkad, H Shah, R Patel, N Doshi Procedia Computer Science 155, 680-685, 2019 | 22 | 2019 |
Real time adaptive traffic control system: a hybrid approach P Faldu, N Doshi, R Patel 2019 IEEE 4th international conference on computer and communication systems …, 2019 | 10 | 2019 |
A survey on game theoretic approaches for privacy preservation in data mining and network security H Shah, V Kakkad, R Patel, N Doshi Procedia Computer Science 155, 686-691, 2019 | 7 | 2019 |
Python: the most advanced programming language for computer science applications AJ Dhruv, R Patel, N Doshi Proceedings of the international conference on culture heritage, education …, 2021 | 5 | 2021 |
Artificial intelligence framework for MSME sectors with focus on design and manufacturing industries P Sharma, J Shah, R Patel Materials Today: Proceedings, 2022 | 4 | 2022 |
On-the-fly symmetry reduction of explicitly represented probabilistic models R Patel, K Patel, D Patel International Conference on Distributed Computing and Internet Technology …, 2015 | 3 | 2015 |
A quantitative analysis of collision resolution protocol for wireless sensor network R Patel, D Patel Journal of Software Engineering and Applications 8 (08), 361, 2015 | 3 | 2015 |
Network-based Intrusion Detection in Eucalyptus Private Cloud B Borisaniya, A Patel, R Patel, D Patel 2010 International Conference on Advances in Communication, Network, and …, 2010 | 2 | 2010 |
Scalable and Efficient Mutual Authentication Strategy in Fog Computing J Bavishi, MS Shaikh, R Patel 2020 8th IEEE International Conference on Mobile Cloud Computing, Services …, 2020 | 1 | 2020 |
A Survey of Cryptographic Techniques to Secure Genomic Data H Nadpara, K Kushwaha, R Patel, N Doshi Proceedings of First International Conference on Computing, Communications …, 2020 | 1 | 2020 |
ExplicitPRISMSymm: Symmetry Reduction Technique for Explicit Models in PRISM R Patel, K Patel, D Patel International Conference on Theory and Applications of Models of Computation …, 2015 | 1 | 2015 |
An Improved Approach in CP-ABE with Proxy Re-Encryption N Doshi, R Patel e-Prime-Advances in Electrical Engineering, Electronics and Energy, 100042, 2022 | | 2022 |
Blockchain-Based Drug Regulation System Y Solanki, R Patel Security, Privacy and Data Analytics, 283-292, 2022 | | 2022 |
Decoding with Purpose: Improving Image Reconstruction from fMRI with Multitask Learning A Lad, R Patel 2021 IEEE 4th International Conference on Computing, Power and Communication …, 2021 | | 2021 |
Secure, Efficient and Dynamic Data Search using Searchable Symmetric Encryption MS Shaikh, J Bavishi, R Patel 2020 5th International Conference on Cloud Computing and Artificial …, 2020 | | 2020 |
Static Analysis and Symbolic Code Execution D Patel, M Parikh, R Patel CSI Journal of, 14, 0 | | |