DoS attacks in mobile ad hoc networks: A survey RH Jhaveri, SJ Patel, DC Jinwala 2012 second international conference on advanced computing & communication …, 2012 | 456* | 2012 |
Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs RH Jhaveri, SJ Patel, DC Jinwala INFOCOMP Journal of Computer Science 11 (1), 1-12, 2012 | 55 | 2012 |
An efficient approach for privacy preserving distributed k-means clustering based on shamir’s secret sharing scheme S Patel, S Garasia, D Jinwala Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 …, 2012 | 38 | 2012 |
An excursion to software development life cycle models: an old to ever-growing models US Shah, DC Jinwala, SJ Patel ACM SIGSOFT Software Engineering Notes 41 (1), 1-6, 2016 | 32 | 2016 |
Privacy preserving distributed k-means clustering in malicious model using zero knowledge proof S Patel, V Patel, D Jinwala Distributed Computing and Internet Technology: 9th International Conference …, 2013 | 31 | 2013 |
A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing S Shukla, SJ Patel Computing 104 (5), 1173-1202, 2022 | 26 | 2022 |
Node differential privacy in social graph degree publishing KR Macwan, SJ Patel Procedia computer science 143, 786-793, 2018 | 24 | 2018 |
A survey on elliptic curve digital signature algorithm and its variants G Sarath, DC Jinwala, S Patel Computer Science & Information Technology (CS & IT)–CSCP, 121-136, 2014 | 24 | 2014 |
Homomorphic cryptosystem-based secure data processing model for edge-assisted IoT healthcare systems HS Trivedi, SJ Patel Internet of Things 22, 100693, 2023 | 22 | 2023 |
Design of Secure Authentication Protocol for Dynamic User Addition in Distributed Internet-of-Things HS Trivedi, SJ Patel Computer Networks, 107335, 2020 | 20 | 2020 |
A novel solution for grayhole attack in aodv based manets RH Jhaveri, SJ Patel, DC Jinwala Advances in Communication, Network, and Computing: Third International …, 2012 | 20 | 2012 |
k-NMF Anonymization in Social Network Data Publishing KR Macwan, SJ Patel The Computer Journal 61 (4), 601-613, 2018 | 19 | 2018 |
Comparative evaluation of elliptic curve cryptography based homomorphic encryption schemes for a novel secure multiparty computation SJ Patel, A Chouhan, DC Jinwala Journal of Information Security 2014, 2014 | 19 | 2014 |
An efficient approach for privacy preserving distributed clustering in semi-honest model using elliptic curve cryptography SJ Patel, D Punjani, DC Jinwala International Journal of Network Security 17 (3), 328-339, 2015 | 18 | 2015 |
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment S Shukla, SJ Patel IET Information Security 15 (3), 256-266, 2021 | 12 | 2021 |
Privacy preserving approach in dynamic social network data publishing K Macwan, S Patel Information Security Practice and Experience: 15th International Conference …, 2019 | 12 | 2019 |
Detecting Intra-Conflicts in Non-Functional Requirements U Shah, S Patel, DC Jinwala International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems …, 2021 | 11 | 2021 |
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture S Shukla, SJ Patel Cluster Computing 27 (2), 1559-1580, 2024 | 8 | 2024 |
k-Degree Anonymity Model for Social Network Data Publishing. KR Macwan, SJ Patel Advances in Electrical & Computer Engineering 17 (4), 2017 | 8 | 2017 |
Specification of Non-Functional Requirements: A Hybrid Approach. US Shah, S Patel, D Jinwala REFSQ Workshops, 2016 | 8 | 2016 |