Følg
Devesh Jinwala
Devesh Jinwala
Andre navneDevesh C Jinwala, D C Jinwala
S V National Institute of Technology, Surat, India
Verificeret mail på acm.org - Startside
Titel
Citeret af
Citeret af
År
DoS attacks in mobile ad hoc networks: A survey
RH Jhaveri, SJ Patel, DC Jinwala
2012 second international conference on advanced computing & communication …, 2012
3612012
Improving AODV protocol against blackhole attacks
N Mistry, DC Jinwala, M Zaveri
international multiconference of engineers and computer scientists 2 (6), 1-6, 2010
2202010
A Clustering Approach for the l‐Diversity Model in Privacy Preserving Data Mining Using Fractional Calculus‐Bacterial Foraging Optimization Algorithm
PR Bhaladhare, DC Jinwala
Advances in Computer Engineering 2014 (1), 396529, 2014
2132014
Resolving ambiguities in natural language software requirements: a comprehensive survey
US Shah, DC Jinwala
ACM SIGSOFT Software Engineering Notes 40 (5), 1-7, 2015
1322015
A novel approach for grayhole and blackhole attacks in mobile ad hoc networks
RH Jhaveri, SJ Patel, DC Jinwala
2012 Second International Conference on Advanced Computing & Communication …, 2012
1032012
A comparative analysis of tools for verification of security protocols
N Dalal, J Shah, K Hisaria, D Jinwala
International Journal of Communications, Network and System Sciences 3 (10 …, 2010
642010
Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model.
PR Bhaladhare, DC Jinwala
J. Inf. Sci. Eng. 32 (1), 63-78, 2016
542016
Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs
RH Jhaveri, SJ Patel, DC Jinwala
INFOCOMP Journal of Computer Science 11 (1), 1-12, 2012
542012
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption
N Doshi, DC Jinwala
Security and Communication Networks 7 (11), 1988-2002, 2014
472014
FlexiSec: a configurable link layer security architecture for wireless sensor networks
D Jinwala, D Patel, K Dasgupta
arXiv preprint arXiv:1203.4697, 2012
472012
Experimenting with the novel approaches in text steganography
S Dulera, D Jinwala, A Dasgupta
arXiv preprint arXiv:1203.3644, 2012
412012
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
N Doshi, D Jinwala
International Conference on Advanced Computing, Networking and Security, 515-523, 2011
402011
An efficient approach for privacy preserving distributed k-means clustering based on shamir’s secret sharing scheme
S Patel, S Garasia, D Jinwala
Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 …, 2012
382012
MOSAODV: solution to secure AODV against blackhole attack
NH Mistry, DC Jinwala, MA Zaveri
IJCNS) International Journal of Computer and Network Security 1 (3), 42-45, 2009
372009
Prevention of wormhole attack in wireless sensor network
DH Buch, D Jinwala
arXiv preprint arXiv:1110.1928, 2011
362011
A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator
S Surati, DC Jinwala, S Garg
Engineering Science and Technology, an International Journal 20 (2), 705-720, 2017
342017
An excursion to software development life cycle models: an old to ever-growing models
US Shah, DC Jinwala, SJ Patel
ACM SIGSOFT Software Engineering Notes 41 (1), 1-6, 2016
322016
A reputation‐based RPL protocol to detect selective forwarding attack in Internet of Things
A Patel, D Jinwala
International Journal of Communication Systems 35 (1), e5007, 2022
312022
Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach
HB Patel, DC Jinwala
TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 947-954, 2019
312019
Concealed data aggregation in wireless sensor networks: A comprehensive survey
K Parmar, DC Jinwala
Computer Networks 103, 207-227, 2016
312016
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20