Segui
Devesh Jinwala
Devesh Jinwala
Altri nomiDevesh C Jinwala, D C Jinwala
S V National Institute of Technology, Surat, India
Email verificata su acm.org - Home page
Titolo
Citata da
Citata da
Anno
DoS attacks in mobile ad hoc networks: A survey
RH Jhaveri, SJ Patel, DC Jinwala
2012 second international conference on advanced computing & communication …, 2012
3642012
Improving AODV protocol against blackhole attacks
N Mistry, DC Jinwala, M Zaveri
international multiconference of engineers and computer scientists 2 (6), 1-6, 2010
2242010
A Clustering Approach for the l‐Diversity Model in Privacy Preserving Data Mining Using Fractional Calculus‐Bacterial Foraging Optimization Algorithm
PR Bhaladhare, DC Jinwala
Advances in Computer Engineering 2014 (1), 396529, 2014
1902014
Resolving ambiguities in natural language software requirements: a comprehensive survey
US Shah, DC Jinwala
ACM SIGSOFT Software Engineering Notes 40 (5), 1-7, 2015
1292015
A novel approach for grayhole and blackhole attacks in mobile ad hoc networks
RH Jhaveri, SJ Patel, DC Jinwala
2012 Second International Conference on Advanced Computing & Communication …, 2012
1022012
A comparative analysis of tools for verification of security protocols
N Dalal, J Shah, K Hisaria, D Jinwala
Int'l J. of Communications, Network and System Sciences 3 (10), 779, 2010
622010
Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs
RH Jhaveri, SJ Patel, DC Jinwala
INFOCOMP Journal of Computer Science 11 (1), 1-12, 2012
552012
Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model.
PR Bhaladhare, DC Jinwala
J. Inf. Sci. Eng. 32 (1), 63-78, 2016
512016
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption
N Doshi, DC Jinwala
Security and Communication Networks 7 (11), 1988-2002, 2014
462014
FlexiSec: a configurable link layer security architecture for wireless sensor networks
D Jinwala, D Patel, K Dasgupta
arXiv preprint arXiv:1203.4697, 2012
462012
Experimenting with the novel approaches in text steganography
S Dulera, D Jinwala, A Dasgupta
arXiv preprint arXiv:1203.3644, 2012
422012
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
N Doshi, D Jinwala
International Conference on Advanced Computing, Networking and Security, 515-523, 2011
392011
An efficient approach for privacy preserving distributed k-means clustering based on shamir’s secret sharing scheme
S Patel, S Garasia, D Jinwala
Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 …, 2012
382012
Prevention of wormhole attack in wireless sensor network
DH Buch, D Jinwala
arXiv preprint arXiv:1110.1928, 2011
372011
MOSAODV: solution to secure AODV against blackhole attack
NH Mistry, DC Jinwala, MA Zaveri
IJCNS) International Journal of Computer and Network Security 1 (3), 42-45, 2009
372009
A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator
S Surati, DC Jinwala, S Garg
Engineering Science and Technology, an International Journal 20 (2), 705-720, 2017
342017
A reputation‐based RPL protocol to detect selective forwarding attack in Internet of Things
A Patel, D Jinwala
International Journal of Communication Systems 35 (1), e5007, 2022
312022
Privacy preserving distributed k-means clustering in malicious model using zero knowledge proof
S Patel, V Patel, D Jinwala
Distributed Computing and Internet Technology: 9th International Conference …, 2013
312013
Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach
HB Patel, DC Jinwala
TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 947-954, 2019
302019
Concealed data aggregation in wireless sensor networks: A comprehensive survey
K Parmar, DC Jinwala
Computer Networks 103, 207-227, 2016
302016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20