DoS attacks in mobile ad hoc networks: A survey RH Jhaveri, SJ Patel, DC Jinwala 2012 second international conference on advanced computing & communication …, 2012 | 408* | 2012 |
Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs RH Jhaveri, SJ Patel, DC Jinwala INFOCOMP Journal of Computer Science 11 (1), 1-12, 2012 | 45 | 2012 |
An efficient approach for privacy preserving distributed K-means clustering based on Shamir’s secret sharing scheme S Patel, S Garasia, D Jinwala IFIP International Conference on Trust Management, 129-141, 2012 | 32 | 2012 |
An excursion to software development life cycle models: an old to ever-growing models US Shah, DC Jinwala, SJ Patel ACM SIGSOFT Software Engineering Notes 41 (1), 1-6, 2016 | 22 | 2016 |
Privacy preserving distributed k-means clustering in malicious model using zero knowledge proof S Patel, V Patel, D Jinwala International Conference on Distributed Computing and Internet Technology …, 2013 | 21 | 2013 |
A survey on elliptic curve digital signature algorithm and its variants G Sarath, DC Jinwala, S Patel Computer Science & Information Technology (CS & IT)–CSCP, 121-136, 2014 | 20 | 2014 |
A novel solution for grayhole attack in aodv based manets RH Jhaveri, SJ Patel, DC Jinwala International conference on advances in communication, network, and …, 2012 | 17 | 2012 |
An efficient approach for privacy preserving distributed clustering in semi-honest model using elliptic curve cryptography SJ Patel, D Punjani, DC Jinwala International Journal of Network Security 17 (3), 328-339, 2015 | 14 | 2015 |
Node differential privacy in social graph degree publishing KR Macwan, SJ Patel Procedia computer science 143, 786-793, 2018 | 13 | 2018 |
Comparative evaluation of elliptic curve cryptography based homomorphic encryption schemes for a novel secure multiparty computation SJ Patel, A Chouhan, DC Jinwala Journal of Information Security 2014, 2014 | 13 | 2014 |
k-NMF Anonymization in Social Network Data Publishing KR Macwan, SJ Patel The Computer Journal 61 (4), 601-613, 2018 | 11 | 2018 |
Design of Secure Authentication Protocol for Dynamic User Addition in Distributed Internet-of-Things HS Trivedi, SJ Patel Computer Networks, 107335, 2020 | 10 | 2020 |
k-Degree anonymity model for social network data publishing KR Macwan, SJ Patel Advances in Electrical and Computer Engineering 17 (4), 117-125, 2017 | 8 | 2017 |
Replay protection at the link layer security in wireless sensor networks D Jinwala, D Patel, S Patel, KS Dasgupta 2009 WRI World Congress on Computer Science and Information Engineering 1 …, 2009 | 7 | 2009 |
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment S Shukla, SJ Patel IET Information Security 15 (3), 256-266, 2021 | 5 | 2021 |
Privacy Preservation Approaches for Social Network Data Publishing K Macwan, S Patel Artificial Intelligence for Cyber Security: Methods, Issues and Possible …, 2021 | 5 | 2021 |
An Ontological Approach to Specify Conflicts among Non-Functional Requirements U Shah, S Patel, D Jinwala Proceedings of the 2019 2nd International Conference on Geoinformatics and …, 2019 | 5 | 2019 |
Specification of Non-Functional Requirements: A Hybrid Approach. US Shah, S Patel, D Jinwala REFSQ Workshops, 2016 | 5 | 2016 |
Optimizing the replay protection at the link layer security framework in wireless sensor networks DC Jinwala, DR Patel, S Patel, KS Dasgupta arXiv preprint arXiv:1203.4694, 2012 | 5 | 2012 |
A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing S Shukla, SJ Patel Computing 104 (5), 1173-1202, 2022 | 4 | 2022 |