DoS attacks in mobile ad hoc networks: A survey RH Jhaveri, SJ Patel, DC Jinwala 2012 second international conference on advanced computing & communication …, 2012 | 357 | 2012 |
Improving AODV protocol against blackhole attacks N Mistry, DC Jinwala, M Zaveri international multiconference of engineers and computer scientists 2 (6), 1-6, 2010 | 222 | 2010 |
A Clustering Approach for the l‐Diversity Model in Privacy Preserving Data Mining Using Fractional Calculus‐Bacterial Foraging Optimization Algorithm PR Bhaladhare, DC Jinwala Advances in Computer Engineering 2014 (1), 396529, 2014 | 151 | 2014 |
Resolving ambiguities in natural language software requirements: a comprehensive survey US Shah, DC Jinwala ACM SIGSOFT Software Engineering Notes 40 (5), 1-7, 2015 | 123 | 2015 |
A novel approach for grayhole and blackhole attacks in mobile ad hoc networks RH Jhaveri, SJ Patel, DC Jinwala 2012 Second International Conference on Advanced Computing & Communication …, 2012 | 101 | 2012 |
A comparative analysis of tools for verification of security protocols N Dalal, J Shah, K Hisaria, D Jinwala Int'l J. of Communications, Network and System Sciences 3 (10), 779, 2010 | 59 | 2010 |
Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs RH Jhaveri, SJ Patel, DC Jinwala INFOCOMP Journal of Computer Science 11 (1), 1-12, 2012 | 53 | 2012 |
Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model. PR Bhaladhare, DC Jinwala J. Inf. Sci. Eng. 32 (1), 63-78, 2016 | 50 | 2016 |
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption N Doshi, DC Jinwala Security and Communication Networks 7 (11), 1988-2002, 2014 | 46 | 2014 |
FlexiSec: a configurable link layer security architecture for wireless sensor networks D Jinwala, D Patel, K Dasgupta arXiv preprint arXiv:1203.4697, 2012 | 44 | 2012 |
Experimenting with the novel approaches in text steganography S Dulera, D Jinwala, A Dasgupta arXiv preprint arXiv:1203.3644, 2012 | 43 | 2012 |
Prevention of wormhole attack in wireless sensor network DH Buch, D Jinwala arXiv preprint arXiv:1110.1928, 2011 | 39 | 2011 |
An efficient approach for privacy preserving distributed k-means clustering based on shamir’s secret sharing scheme S Patel, S Garasia, D Jinwala Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 …, 2012 | 37 | 2012 |
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext N Doshi, D Jinwala International Conference on Advanced Computing, Networking and Security, 515-523, 2011 | 36 | 2011 |
MOSAODV: solution to secure AODV against blackhole attack NH Mistry, DC Jinwala, MA Zaveri IJCNS) International Journal of Computer and Network Security 1 (3), 42-45, 2009 | 36 | 2009 |
A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator S Surati, DC Jinwala, S Garg Engineering Science and Technology, an International Journal 20 (2), 705-720, 2017 | 33 | 2017 |
Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach HB Patel, DC Jinwala TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 947-954, 2019 | 29 | 2019 |
Privacy preserving distributed k-means clustering in malicious model using zero knowledge proof S Patel, V Patel, D Jinwala Distributed Computing and Internet Technology: 9th International Conference …, 2013 | 29 | 2013 |
Evaluating homomorphic encryption algorithms for privacy in wireless sensor networks V Jariwala, D Jinwala International Journal of Advancements in Computing Technology 3 (6), 2011 | 29 | 2011 |
Concealed data aggregation in wireless sensor networks: A comprehensive survey K Parmar, DC Jinwala Computer Networks 103, 207-227, 2016 | 28 | 2016 |