Follow
Devesh Jinwala
Devesh Jinwala
S V National Institute of Technology, Surat, India
Verified email at acm.org - Homepage
Title
Cited by
Cited by
Year
DoS attacks in mobile ad hoc networks: A survey
RH Jhaveri, SJ Patel, DC Jinwala
2012 second international conference on advanced computing & communication …, 2012
3272012
Improving AODV protocol against blackhole attacks
N Mistry, DC Jinwala, M Zaveri
Proceedings of the international multi conference of engineers and computer …, 2010
2122010
Resolving ambiguities in natural language software requirements: a comprehensive survey
US Shah, DC Jinwala
ACM SIGSOFT Software Engineering Notes 40 (5), 1-7, 2015
922015
A novel approach for grayhole and blackhole attacks in mobile ad hoc networks
RH Jhaveri, SJ Patel, DC Jinwala
2012 Second International Conference on Advanced Computing & Communication …, 2012
922012
A clustering approach for the-diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm
PR Bhaladhare, DC Jinwala
Advances in Computer Engineering 2014, 2014
722014
FlexiSec: a configurable link layer security architecture for wireless sensor networks
D Jinwala, D Patel, K Dasgupta
arXiv preprint arXiv:1203.4697, 2012
542012
A comparative analysis of tools for verification of security protocols
N Dalal, J Shah, K Hisaria, D Jinwala
Int'l J. of Communications, Network and System Sciences 3 (10), 779, 2010
512010
Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs
RH Jhaveri, SJ Patel, DC Jinwala
INFOCOMP Journal of Computer Science 11 (1), 1-12, 2012
452012
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption
N Doshi, DC Jinwala
Security and Communication Networks 7 (11), 1988-2002, 2014
402014
Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model.
PR Bhaladhare, DC Jinwala
J. Inf. Sci. Eng. 32 (1), 63-78, 2016
382016
Prevention of wormhole attack in wireless sensor network
DH Buch, D Jinwala
arXiv preprint arXiv:1110.1928, 2011
372011
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
N Doshi, D Jinwala
International Conference on Advanced Computing, Networking and Security, 515-523, 2011
342011
MOSAODV: solution to secure AODV against blackhole attack
NH Mistry, DC Jinwala, MA Zaveri
IJCNS) International Journal of Computer and Network Security 1 (3), 42-45, 2009
332009
An efficient approach for privacy preserving distributed k-means clustering based on shamir’s secret sharing scheme
S Patel, S Garasia, D Jinwala
IFIP International Conference on Trust Management, 129-141, 2012
322012
Experimenting with the novel approaches in text steganography
S Dulera, D Jinwala, A Dasgupta
arXiv preprint arXiv:1203.3644, 2012
322012
Detection of wormhole attacks in wireless sensor network
D Buch, D Jinwala
IET Digital Library, 2011
282011
Evaluating homomorphic encryption algorithms for privacy in wireless sensor networks
V Jariwala, D Jinwala
International Journal of Advancements in Computing Technology 3 (6), 2011
262011
Constant ciphertext length in multi-authority ciphertext policy attribute based encryption
N Doshi, D Jinwala
2011 2nd International Conference on Computer and Communication Technology …, 2011
252011
Optimizing the block cipher and modes of operations overhead at the link layer security framework in the wireless sensor networks
D Jinwala, D Patel, K Dasgupta
International Conference on Information Systems Security, 258-272, 2008
252008
A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator
S Surati, DC Jinwala, S Garg
Engineering Science and Technology, an International Journal 20 (2), 705-720, 2017
242017
The system can't perform the operation now. Try again later.
Articles 1–20