Follow
Devashish Gosain
Title
Cited by
Cited by
Year
Hybrid energy-efficient multi-path routing for wireless sensor networks
M Sajwan, D Gosain, AK Sharma
Computers & Electrical Engineering 67, 96-113, 2018
912018
Where the light gets in: Analyzing web censorship mechanisms in india
TK Yadav, A Sinha, D Gosain, PK Sharma, S Chakravarty
Proceedings of the Internet Measurement Conference 2018, 252-264, 2018
712018
CAMP: cluster aided multi-path routing protocol for wireless sensor networks
M Sajwan, D Gosain, AK Sharma
Wireless Networks 25, 2603-2620, 2019
662019
Aroma tells a thousand pictures: digital scent technology a new chapter in IT industry
D Gosain, M Sajwan
Int. J. Curr. Eng. Tech 4 (2014), 2804-2812, 2014
222014
Analysis of scalability for routing protocols in wireless sensor networks
I Snigdh, D Gosain
Optik 127 (5), 2535-2538, 2016
212016
Mending wall: On the implementation of censorship in India
D Gosain, A Agarwal, S Shekhawat, HB Acharya, S Chakravarty
International Conference on Security and Privacy in Communication Systems …, 2017
202017
Few throats to choke: On the current structure of the internet
HB Acharya, S Chakravarty, D Gosain
2017 IEEE 42nd conference on local computer networks (LCN), 339-346, 2017
192017
Exploring the cookieverse: A multi-perspective analysis of web cookies
A Rasaii, S Singh, D Gosain, O Gasser
International Conference on Passive and Active Network Measurement, 623-651, 2023
142023
Optimal sink placement in backbone assisted wireless sensor networks
I Snigdh, D Gosain, N Gupta
Egyptian informatics journal 17 (2), 217-225, 2016
132016
Flocking behaviour simulation: Explanation and enhancements in boid algorithm
M Sajwan, D Gosain, S Surani
International Journal of Computer Science and Information Technologies (IJCSIT), 2014
132014
The devil's in the details: Placing decoy routers in the internet
D Gosain, A Agarwal, S Chakravarty, HB Acharya
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
122017
On the anonymity of peer-to-peer network anonymity schemes used by cryptocurrencies
PK Sharma, D Gosain, C Diaz
arXiv preprint arXiv:2201.11860, 2022
92022
Mixim: Mixnet design decisions and empirical evaluation
I Ben Guirat, D Gosain, C Diaz
Proceedings of the 20th Workshop on Workshop on Privacy in the Electronic …, 2021
92021
Siegebreaker: An sdn based practical decoy routing system
PK Sharma, D Gosain, H Sagar, C Kumar, A Dogra, V Naik, HB Acharya, ...
Proceedings on Privacy Enhancing Technologies, 2020
92020
EERA: Energy efficient reliable routing algorithm for WSN
NF Shah, S Gautam, D Gosain
2016 1st India International Conference on Information Processing (IICIP), 1-5, 2016
92016
Automatic detection of fake key attacks in secure messaging
TK Yadav, D Gosain, A Herzberg, D Zappala, K Seamons
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
82022
Camoufler: Accessing the censored Web by utilizing instant messaging channels
PK Sharma, D Gosain, S Chakravarty
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
82021
Energy analysis for trajectory based sink mobility in WSN
I Snigdh, D Gosain
Procedia Computer Science 54, 118-126, 2015
52015
Too close for comfort: Morasses of (anti-) censorship in the era of CDNs
D Gosain, M Mohindra, S Chakravarty
Proceedings on Privacy Enhancing Technologies, 2021
42021
MiXiM: A general purpose simulator for mixnet
IB Guirat, D Gosain, C Diaz
Privacy Enhancing Technologies Symposium–HotPETs Workshop, 2020
42020
The system can't perform the operation now. Try again later.
Articles 1–20