Follow
Devesh Jinwala
Devesh Jinwala
Other namesDevesh C Jinwala, D C Jinwala
S V National Institute of Technology, Surat, India
Verified email at acm.org - Homepage
Title
Cited by
Cited by
Year
DoS attacks in mobile ad hoc networks: A survey
RH Jhaveri, SJ Patel, DC Jinwala
2012 second international conference on advanced computing & communication …, 2012
3542012
Improving AODV protocol against blackhole attacks
N Mistry, DC Jinwala, M Zaveri
international multiconference of engineers and computer scientists 2 (6), 1-6, 2010
2202010
A clustering approach for the-diversity model in privacy preserving data mining using fractional calculus-bacterial foraging optimization algorithm
PR Bhaladhare, DC Jinwala
Advances in Computer Engineering 2014, 2014
1392014
Resolving ambiguities in natural language software requirements: a comprehensive survey
US Shah, DC Jinwala
ACM SIGSOFT Software Engineering Notes 40 (5), 1-7, 2015
1222015
A novel approach for grayhole and blackhole attacks in mobile ad hoc networks
RH Jhaveri, SJ Patel, DC Jinwala
2012 Second International Conference on Advanced Computing & Communication …, 2012
992012
A comparative analysis of tools for verification of security protocols
N Dalal, J Shah, K Hisaria, D Jinwala
Int'l J. of Communications, Network and System Sciences 3 (10), 779, 2010
592010
Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs
RH Jhaveri, SJ Patel, DC Jinwala
INFOCOMP Journal of Computer Science 11 (1), 1-12, 2012
522012
Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model.
PR Bhaladhare, DC Jinwala
J. Inf. Sci. Eng. 32 (1), 63-78, 2016
502016
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption
N Doshi, DC Jinwala
Security and Communication Networks 7 (11), 1988-2002, 2014
462014
FlexiSec: a configurable link layer security architecture for wireless sensor networks
D Jinwala, D Patel, K Dasgupta
arXiv preprint arXiv:1203.4697, 2012
442012
Experimenting with the novel approaches in text steganography
S Dulera, D Jinwala, A Dasgupta
arXiv preprint arXiv:1203.3644, 2012
422012
Prevention of wormhole attack in wireless sensor network
DH Buch, D Jinwala
arXiv preprint arXiv:1110.1928, 2011
392011
An efficient approach for privacy preserving distributed k-means clustering based on shamir’s secret sharing scheme
S Patel, S Garasia, D Jinwala
Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 …, 2012
362012
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext
N Doshi, D Jinwala
International Conference on Advanced Computing, Networking and Security, 515-523, 2011
362011
MOSAODV: solution to secure AODV against blackhole attack
NH Mistry, DC Jinwala, MA Zaveri
IJCNS) International Journal of Computer and Network Security 1 (3), 42-45, 2009
362009
A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator
S Surati, DC Jinwala, S Garg
Engineering Science and Technology, an International Journal 20 (2), 705-720, 2017
312017
Evaluating homomorphic encryption algorithms for privacy in wireless sensor networks
V Jariwala, D Jinwala
International Journal of Advancements in Computing Technology 3 (6), 2011
292011
Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach
HB Patel, DC Jinwala
TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 947-954, 2019
282019
Concealed data aggregation in wireless sensor networks: A comprehensive survey
K Parmar, DC Jinwala
Computer Networks 103, 207-227, 2016
282016
Detection of wormhole attacks in wireless sensor network
D Buch, D Jinwala
IET Digital Library, 2011
282011
The system can't perform the operation now. Try again later.
Articles 1–20