关注
Devesh Jinwala
Devesh Jinwala
其他姓名Devesh C Jinwala, D C Jinwala
S V National Institute of Technology, Surat, India
在 acm.org 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
DoS attacks in mobile ad hoc networks: A survey
RH Jhaveri, SJ Patel, DC Jinwala
2012 second international conference on advanced computing & communication …, 2012
3572012
Improving AODV protocol against blackhole attacks
N Mistry, DC Jinwala, M Zaveri
international multiconference of engineers and computer scientists 2 (6), 1-6, 2010
2222010
A Clustering Approach for the l‐Diversity Model in Privacy Preserving Data Mining Using Fractional Calculus‐Bacterial Foraging Optimization Algorithm
PR Bhaladhare, DC Jinwala
Advances in Computer Engineering 2014 (1), 396529, 2014
1512014
Resolving ambiguities in natural language software requirements: a comprehensive survey
US Shah, DC Jinwala
ACM SIGSOFT Software Engineering Notes 40 (5), 1-7, 2015
1232015
A novel approach for grayhole and blackhole attacks in mobile ad hoc networks
RH Jhaveri, SJ Patel, DC Jinwala
2012 Second International Conference on Advanced Computing & Communication …, 2012
1012012
A comparative analysis of tools for verification of security protocols
N Dalal, J Shah, K Hisaria, D Jinwala
Int'l J. of Communications, Network and System Sciences 3 (10), 779, 2010
592010
Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs
RH Jhaveri, SJ Patel, DC Jinwala
INFOCOMP Journal of Computer Science 11 (1), 1-12, 2012
532012
Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model.
PR Bhaladhare, DC Jinwala
J. Inf. Sci. Eng. 32 (1), 63-78, 2016
502016
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption
N Doshi, DC Jinwala
Security and Communication Networks 7 (11), 1988-2002, 2014
462014
FlexiSec: a configurable link layer security architecture for wireless sensor networks
D Jinwala, D Patel, K Dasgupta
arXiv preprint arXiv:1203.4697, 2012
442012
Experimenting with the novel approaches in text steganography
S Dulera, D Jinwala, A Dasgupta
arXiv preprint arXiv:1203.3644, 2012
432012
Prevention of wormhole attack in wireless sensor network
DH Buch, D Jinwala
arXiv preprint arXiv:1110.1928, 2011
392011
An efficient approach for privacy preserving distributed k-means clustering based on shamir’s secret sharing scheme
S Patel, S Garasia, D Jinwala
Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 …, 2012
372012
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
N Doshi, D Jinwala
International Conference on Advanced Computing, Networking and Security, 515-523, 2011
362011
MOSAODV: solution to secure AODV against blackhole attack
NH Mistry, DC Jinwala, MA Zaveri
IJCNS) International Journal of Computer and Network Security 1 (3), 42-45, 2009
362009
A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator
S Surati, DC Jinwala, S Garg
Engineering Science and Technology, an International Journal 20 (2), 705-720, 2017
332017
Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach
HB Patel, DC Jinwala
TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 947-954, 2019
292019
Privacy preserving distributed k-means clustering in malicious model using zero knowledge proof
S Patel, V Patel, D Jinwala
Distributed Computing and Internet Technology: 9th International Conference …, 2013
292013
Evaluating homomorphic encryption algorithms for privacy in wireless sensor networks
V Jariwala, D Jinwala
International Journal of Advancements in Computing Technology 3 (6), 2011
292011
Concealed data aggregation in wireless sensor networks: A comprehensive survey
K Parmar, DC Jinwala
Computer Networks 103, 207-227, 2016
282016
系统目前无法执行此操作,请稍后再试。
文章 1–20