Follow
Devesh Jinwala
Devesh Jinwala
Other namesDevesh C Jinwala, D C Jinwala
S V National Institute of Technology, Surat, India
Verified email at acm.org - Homepage
Title
Cited by
Cited by
Year
DoS attacks in mobile ad hoc networks: A survey
RH Jhaveri, SJ Patel, DC Jinwala
2012 second international conference on advanced computing & communication …, 2012
3532012
Improving AODV protocol against blackhole attacks
N Mistry, DC Jinwala, M Zaveri
international multiconference of engineers and computer scientists 2 (6), 1-6, 2010
2192010
A clustering approach for the-diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm
PR Bhaladhare, DC Jinwala
Advances in Computer Engineering 2014, 2014
1232014
Resolving ambiguities in natural language software requirements: a comprehensive survey
US Shah, DC Jinwala
ACM SIGSOFT Software Engineering Notes 40 (5), 1-7, 2015
1152015
A novel approach for grayhole and blackhole attacks in mobile ad hoc networks
RH Jhaveri, SJ Patel, DC Jinwala
2012 Second International Conference on Advanced Computing & Communication …, 2012
972012
A comparative analysis of tools for verification of security protocols
N Dalal, J Shah, K Hisaria, D Jinwala
Int'l J. of Communications, Network and System Sciences 3 (10), 779, 2010
572010
FlexiSec: a configurable link layer security architecture for wireless sensor networks
D Jinwala, D Patel, K Dasgupta
arXiv preprint arXiv:1203.4697, 2012
542012
Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs
RH Jhaveri, SJ Patel, DC Jinwala
INFOCOMP Journal of Computer Science 11 (1), 1-12, 2012
502012
Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model.
PR Bhaladhare, DC Jinwala
J. Inf. Sci. Eng. 32 (1), 63-78, 2016
482016
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
N Doshi, D Jinwala
International Conference on Advanced Computing, Networking and Security, 515-523, 2011
472011
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption
N Doshi, DC Jinwala
Security and Communication Networks 7 (11), 1988-2002, 2014
462014
Experimenting with the novel approaches in text steganography
S Dulera, D Jinwala, A Dasgupta
arXiv preprint arXiv:1203.3644, 2012
412012
An efficient approach for privacy preserving distributed k-means clustering based on shamir’s secret sharing scheme
S Patel, S Garasia, D Jinwala
Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 …, 2012
362012
Prevention of wormhole attack in wireless sensor network
DH Buch, D Jinwala
arXiv preprint arXiv:1110.1928, 2011
362011
MOSAODV: solution to secure AODV against blackhole attack
NH Mistry, DC Jinwala, MA Zaveri
IJCNS) International Journal of Computer and Network Security 1 (3), 42-45, 2009
352009
A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator
S Surati, DC Jinwala, S Garg
Engineering Science and Technology, an International Journal 20 (2), 705-720, 2017
292017
Concealed data aggregation in wireless sensor networks: A comprehensive survey
K Parmar, DC Jinwala
Computer Networks 103, 207-227, 2016
292016
Constant ciphertext length in multi-authority ciphertext policy attribute based encryption
N Doshi, D Jinwala
2011 2nd International Conference on Computer and Communication Technology …, 2011
282011
Evaluating homomorphic encryption algorithms for privacy in wireless sensor networks
V Jariwala, D Jinwala
International Journal of Advancements in Computing Technology 3 (6), 2011
282011
Detection of wormhole attacks in wireless sensor network
D Buch, D Jinwala
IET Digital Library, 2011
272011
The system can't perform the operation now. Try again later.
Articles 1–20