Devesh Jinwala
Devesh Jinwala
S V National Institute of Technology, Surat, India
Verified email at - Homepage
Cited by
Cited by
DoS attacks in mobile ad hoc networks: A survey
RH Jhaveri, SJ Patel, DC Jinwala
2012 second international conference on advanced computing & communication …, 2012
Improving AODV protocol against blackhole attacks
N Mistry, DC Jinwala, M Zaveri
Proceedings of the international multi conference of engineers and computer …, 2010
Resolving ambiguities in natural language software requirements: a comprehensive survey
US Shah, DC Jinwala
ACM SIGSOFT Software Engineering Notes 40 (5), 1-7, 2015
A novel approach for grayhole and blackhole attacks in mobile ad hoc networks
RH Jhaveri, SJ Patel, DC Jinwala
2012 Second International Conference on Advanced Computing & Communication …, 2012
A clustering approach for the-diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm
PR Bhaladhare, DC Jinwala
Advances in Computer Engineering 2014, 2014
FlexiSec: a configurable link layer security architecture for wireless sensor networks
D Jinwala, D Patel, K Dasgupta
arXiv preprint arXiv:1203.4697, 2012
A comparative analysis of tools for verification of security protocols
N Dalal, J Shah, K Hisaria, D Jinwala
Int'l J. of Communications, Network and System Sciences 3 (10), 779, 2010
Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs
RH Jhaveri, SJ Patel, DC Jinwala
INFOCOMP Journal of Computer Science 11 (1), 1-12, 2012
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption
N Doshi, DC Jinwala
Security and Communication Networks 7 (11), 1988-2002, 2014
Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model.
PR Bhaladhare, DC Jinwala
J. Inf. Sci. Eng. 32 (1), 63-78, 2016
Prevention of wormhole attack in wireless sensor network
DH Buch, D Jinwala
arXiv preprint arXiv:1110.1928, 2011
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
N Doshi, D Jinwala
International Conference on Advanced Computing, Networking and Security, 515-523, 2011
MOSAODV: solution to secure AODV against blackhole attack
NH Mistry, DC Jinwala, MA Zaveri
IJCNS) International Journal of Computer and Network Security 1 (3), 42-45, 2009
An efficient approach for privacy preserving distributed k-means clustering based on shamir’s secret sharing scheme
S Patel, S Garasia, D Jinwala
IFIP International Conference on Trust Management, 129-141, 2012
Experimenting with the novel approaches in text steganography
S Dulera, D Jinwala, A Dasgupta
arXiv preprint arXiv:1203.3644, 2012
Detection of wormhole attacks in wireless sensor network
D Buch, D Jinwala
IET Digital Library, 2011
Evaluating homomorphic encryption algorithms for privacy in wireless sensor networks
V Jariwala, D Jinwala
International Journal of Advancements in Computing Technology 3 (6), 2011
Constant ciphertext length in multi-authority ciphertext policy attribute based encryption
N Doshi, D Jinwala
2011 2nd International Conference on Computer and Communication Technology …, 2011
Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks
D Jinwala, D Patel, K Dasgupta
International Conference on Information Systems Security, 258-272, 2008
A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator
S Surati, DC Jinwala, S Garg
Engineering Science and Technology, an International Journal 20 (2), 705-720, 2017
The system can't perform the operation now. Try again later.
Articles 1–20