default search action
Devesh C. Jinwala
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Surendra Tyagi, Devesh C. Jinwala, Subhasis Bhattacharjee:
Decentralised ontology-based access control in internet of things using social context. Int. J. Ad Hoc Ubiquitous Comput. 45(4): 213-225 (2024) - 2023
- [c32]Riya Singhal, Meet Soni, Shruti Bhatt, Manav Khorasiya, Devesh C. Jinwala:
Enhancing Robustness of Malware Detection Model Against White Box Adversarial Attacks. ICDCIT 2023: 181-196 - [c31]Sourabh Bhaskar, Keyur Parmar, Devesh C. Jinwala:
Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things. ICISS 2023: 306-316 - [c30]Krishnaraj Bhat, Devesh Jinwala, Yamuna Prasad, Mukesh A. Zaveri:
Security Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious Model. IPMV 2023: 86-92 - 2022
- [j40]Anshuman Patel, Devesh Jinwala:
A reputation-based RPL protocol to detect selective forwarding attack in Internet of Things. Int. J. Commun. Syst. 35(1) (2022) - [j39]Mukti Padhya, Devesh C. Jinwala:
Revocable key aggregate searchable encryption with user privacy and anonymity. Int. J. Inf. Comput. Secur. 19(1/2): 1-33 (2022) - 2021
- [j38]Dhruti Sharma, Devesh Jinwala:
Simple index based symmetric searchable encryption with result verifiability. Frontiers Comput. Sci. 15(2): 152805 (2021) - [j37]Kaushal A. Shah, Devesh Jinwala:
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks. Frontiers Comput. Sci. 15(6): 156813 (2021) - [j36]Dhruti Sharma, Devesh C. Jinwala:
Multi-writer multi-reader conjunctive keyword searchable encryption. Int. J. Inf. Comput. Secur. 15(2/3): 141-162 (2021) - [j35]Anshuman Patel, Devesh Jinwala:
A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things. Int. J. Inf. Secur. Priv. 15(4): 1-17 (2021) - [j34]Unnati S. Shah, Sankita J. Patel, Devesh C. Jinwala:
Detecting Intra-Conflicts in Non-Functional Requirements. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 29(3): 435-461 (2021) - [c29]Himanshu B. Patel, Devesh C. Jinwala:
6MID: Mircochain based Intrusion Detection for 6LoWPAN based IoT networks. ANT/EDI40 2021: 929-934 - 2020
- [j33]Mukti Padhya, Devesh C. Jinwala:
R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption. Data Sci. Eng. 5(4): 391-418 (2020) - [j32]Mukti Padhya, Devesh C. Jinwala:
P2 KASE A2 - privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegation. IET Inf. Secur. 14(6): 704-723 (2020) - [j31]Dhruti Sharma, Devesh C. Jinwala:
Aggregate Searchable Encryption With Result Privacy. Int. J. Inf. Secur. Priv. 14(2): 62-82 (2020) - [c28]Unnati S. Shah, Sankita J. Patel, Devesh Jinwala:
A Semi-automated Approach to Generate an Adaptive Quality Attribute Relationship Matrix. REFSQ 2020: 239-256
2010 – 2019
- 2019
- [j30]Shivangi Surati, Devesh C. Jinwala, Sanjay Garg:
Improving multidimensional point query search using multi-way peer-to-peer tree network. Int. J. Inf. Commun. Technol. 14(2): 125-138 (2019) - [j29]Shivangi Surati, Devesh C. Jinwala, Sanjay Garg:
BMMI-tree: A Peer-to-Peer m-ary tree using 1-m node splitting for an efficient multidimensional complex query search. J. Parallel Distributed Comput. 125: 1-17 (2019) - [j28]Mukti Padhya, Devesh C. Jinwala:
MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data. Frontiers Inf. Technol. Electron. Eng. 20(12): 1717-1748 (2019) - [j27]Kaushal A. Shah, Devesh C. Jinwala:
Novel Approach of Key Predistribution for Grid Based Sensor Networks. Wirel. Pers. Commun. 108(2): 939-955 (2019) - [c27]Mukti Padhya, Devesh C. Jinwala:
BTG-RKASE: Privacy Preserving Revocable Key Aggregate Searchable Encryption with Fine-grained Multi-delegation & Break-The-Glass Access Control. ICETE (2) 2019: 109-124 - [c26]Unnati S. Shah, Sankita J. Patel, Devesh Jinwala:
An Ontological Approach to Specify Conflicts among Non-Functional Requirements. ICGDA 2019: 145-149 - [c25]Himanshu B. Patel, Devesh C. Jinwala:
Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach. TENCON 2019: 947-954 - [e1]Sukumar Nandi, Devesh Jinwala, Virendra Singh, Vijay Laxmi, Manoj Singh Gaur, Parvez Faruki:
Security and Privacy - Second ISEA International Conference, ISEA-ISAP 2018, Jaipur, India, January, 9-11, 2019, Revised Selected Papers. Communications in Computer and Information Science 939, Springer 2019, ISBN 978-981-13-7560-6 [contents] - 2018
- [j26]Kaushal A. Shah, Devesh C. Jinwala:
Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks. Comput. J. 61(4): 614-628 (2018) - [j25]Hasmukh Patel, Devesh C. Jinwala:
LPM: A lightweight authenticated packet marking approach for IP traceback. Comput. Networks 140: 41-50 (2018) - [j24]Hasmukh Patel, Devesh Jinwala:
STF-DM: a sparsely tagged fragmentation with dynamic marking an IP traceback approach. Int. Arab J. Inf. Technol. 15(4): 721-728 (2018) - [c24]Dhruti Sharma, Devesh C. Jinwala:
Encrypted data ordering with functional encryption. RAIT 2018: 1-8 - [p2]Nirali R. Nanavati, Devesh C. Jinwala:
Information-Theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining. Computer and Network Security Essentials 2018: 65-78 - [p1]Keyur Parmar, Devesh C. Jinwala:
Malleable Cryptosystems and Their Applications in Wireless Sensor Networks. Computer and Network Security Essentials 2018: 97-111 - [i10]Kaushal A. Shah, Devesh C. Jinwala:
Performance Analysis of Symmetric Key Ciphers in Linear and Grid Based Sensor Networks. CoRR abs/1809.06587 (2018) - 2017
- [j23]Nirali R. Nanavati, Prakash Lalwani, Devesh C. Jinwala:
Game-theoretic privacy preserving constructions for rational and malicious secret sharing models for collaborative frequent itemset mining. Int. J. Knowl. Eng. Data Min. 4(3/4): 320-346 (2017) - [j22]Jayam Modi, Manav Prajapati, Abhinav Sharma, Ravi Ojha, Devesh Jinwala:
A Secure Communication Model for Expressive Access Control Using CP-ABE. Int. J. Netw. Secur. 19(2): 193-204 (2017) - [j21]Dhruti Sharma, Devesh C. Jinwala:
Multiuser Searchable Encryption with Token Freshness Verification. Secur. Commun. Networks 2017: 6435138:1-6435138:16 (2017) - [j20]Kaushal A. Shah, Devesh C. Jinwala:
Novel Approach for Pre-distributing Keys in WSNs for Linear Infrastructure. Wirel. Pers. Commun. 95(4): 3905-3921 (2017) - 2016
- [j19]Keyur Parmar, Devesh C. Jinwala:
Concealed data aggregation in wireless sensor networks: A comprehensive survey. Comput. Networks 103: 207-227 (2016) - [j18]Pawan R. Bhaladhare, Devesh C. Jinwala:
A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining. Int. J. Inf. Secur. Priv. 10(1): 45-65 (2016) - [j17]Pawan R. Bhaladhare, Devesh C. Jinwala:
Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model. J. Inf. Sci. Eng. 32(1): 63-78 (2016) - [j16]Nishant Doshi, Devesh C. Jinwala:
A novel approach for privacy homomorphism using attribute-based encryption. Secur. Commun. Networks 9(17): 4451-4467 (2016) - [j15]Keyur Parmar, Devesh C. Jinwala:
Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks. Wirel. Pers. Commun. 87(3): 971-993 (2016) - [c23]Himanshu B. Patel, Devesh C. Jinwala, Dhiren R. Patel:
Baseline Intrusion Detection Framework for 6LoWPAN Devices. MobiQuitous (Adjunct Proceedings) 2016: 72-76 - [c22]Unnati S. Shah, Sankita J. Patel, Devesh Jinwala:
Specification of Non-Functional Requirements: A Hybrid Approach. REFSQ Workshops 2016 - 2015
- [j14]Shivangi Surati, Devesh C. Jinwala, Sanjay Garg:
Evaluating the impact of fanout and dimension on the performance of a hybrid model for multidimensional indexing in peer-to-peer m-ary tree network. Int. J. Commun. Networks Distributed Syst. 14(2): 185-201 (2015) - [j13]Hasmukh Patel, Devesh C. Jinwala:
Automated Analysis of Internet Key Exchange Protocol v2 for Denial of Service Attacks. Int. J. Netw. Secur. 17(1): 66-71 (2015) - [j12]Nirali R. Nanavati, Devesh C. Jinwala:
A novel privacy-preserving scheme for collaborative frequent itemset mining across vertically partitioned data. Secur. Commun. Networks 8(18): 4407-4420 (2015) - [j11]Rashmi Phalnikar, Devesh Jinwala:
Analysis of Conflicting User Requirements in Web Applications Using Graph Transformation. ACM SIGSOFT Softw. Eng. Notes 40(2): 1-7 (2015) - [j10]Unnati S. Shah, Devesh C. Jinwala:
Resolving Ambiguities in Natural Language Software Requirements: A Comprehensive Survey. ACM SIGSOFT Softw. Eng. Notes 40(5): 1-7 (2015) - [c21]Keyur Parmar, Devesh C. Jinwala:
Hybrid Secure Data Aggregation in Wireless Sensor Networks. CyPhy 2015: 116-131 - [c20]Dhruti Sharma, Devesh Jinwala:
Functional Encryption in IoT E-Health Care System. ICISS 2015: 345-363 - 2014
- [j9]Sankita J. Patel, Mitali Sonar, Devesh C. Jinwala:
Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme. Int. J. Distributed Syst. Technol. 5(2): 44-70 (2014) - [j8]Mayuri A. Mehta, Devesh C. Jinwala:
A Hybrid Dynamic Load Balancing Algorithm for Distributed Systems Using Genetic Algorithms. Int. J. Distributed Syst. Technol. 5(3): 1-23 (2014) - [j7]Nirali R. Nanavati, Neeraj Sen, Devesh C. Jinwala:
Analysis and Evaluation of Novel Privacy Preserving Techniques for Collaborative Temporal Association Rule Mining Using Secret Sharing. Int. J. Distributed Syst. Technol. 5(3): 58-76 (2014) - [j6]Vivaksha J. Jariwala, Himanshu B. Patel, Parth Patel, Devesh C. Jinwala:
Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks. Int. J. Distributed Syst. Technol. 5(3): 77-99 (2014) - [j5]Mayuri A. Mehta, Devesh C. Jinwala:
A Hybrid Dynamic Load Balancing Algorithm for Distributed System. J. Comput. 9(8): 1825-1833 (2014) - [j4]Nishant Doshi, Devesh C. Jinwala:
Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption. Secur. Commun. Networks 7(11): 1988-2002 (2014) - [c19]Shivangi Surati, Devesh C. Jinwala, Sanjay Garg:
A Peer-to-Peer multiway tree network with efficient range query search using multidimensional indexing. DICTAP 2014: 1-6 - [c18]Keyur Parmar, Devesh C. Jinwala:
Aggregate MAC Based Authentication for Secure Data Aggregation in Wireless Sensor Networks. ICIC (2) 2014: 475-483 - [c17]Mukti Padhya, Devesh Jinwala:
A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy. ICISS 2014: 167-184 - [c16]Keyur Parmar, Devesh C. Jinwala:
Malleability Resilient Concealed Data Aggregation. EUNICE 2014: 160-172 - [c15]Vivaksha J. Jariwala, Devesh C. Jinwala:
Privacy and Integrity Preserving Secure Data Aggregation in Wireless Sensor Networks. WOSIS 2014: 49-60 - 2013
- [j3]Dhruti Sharma, Devesh Jinwala:
Key Generation Protocol in IBC. Int. J. Netw. Secur. 15(5): 341-349 (2013) - [c14]Hasmukh Patel, Devesh C. Jinwala:
Modeling and analysis of internet key exchange protocolv2 and a proposal for its variant. COMPUTE 2013: 15:1-15:6 - [c13]Sankita J. Patel, Viren Patel, Devesh C. Jinwala:
Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Zero Knowledge Proof. ICDCIT 2013: 420-431 - [c12]Nirali R. Nanavati, Devesh C. Jinwala:
A Game Theory based Repeated Rational Secret Sharing Scheme for Privacy Preserving Distributed Data Mining. SECRYPT 2013: 512-517 - 2012
- [c11]Sankita J. Patel, Sweta Garasia, Devesh C. Jinwala:
An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir's Secret Sharing Scheme. IFIPTM 2012: 129-141 - [c10]Nirali R. Nanavati, Devesh C. Jinwala:
Privacy Preserving Approaches for Global Cycle Detections for Cyclic Association Rules in Distributed Databases. SECRYPT 2012: 368-371 - [i9]Keyur Parmar, Devesh Jinwala:
A Novel Approach for Verifiable Secret Sharing by using a One Way Hash Function. CoRR abs/1203.3620 (2012) - [i8]Pawan Bhaladhare, Devesh Jinwala:
A Sensitive Attribute based Clustering Method for kanonymization. CoRR abs/1203.3622 (2012) - [i7]Shraddha Dulera, Devesh Jinwala, Aroop Dasgupta:
Experimenting with the Novel Approaches in Text Steganography. CoRR abs/1203.3644 (2012) - [i6]Devesh C. Jinwala, Dhiren R. Patel, Sankita J. Patel, Kankar S. Dasgupta:
Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks. CoRR abs/1203.4694 (2012) - [i5]Devesh Jinwala, Dhiren R. Patel, Kankar S. Dasgupta:
FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks. CoRR abs/1203.4697 (2012) - [i4]Vivaksha J. Jariwala, Devesh Jinwala:
A Novel Approach for Secure Data Aggregation in Wireless Sensor Networks. CoRR abs/1203.4698 (2012) - [i3]Nishant Doshi, Devesh Jinwala:
Updating attribute in CP-ABE: A New Approach. IACR Cryptol. ePrint Arch. 2012: 496 (2012) - [i2]Nishant Doshi, Devesh Jinwala:
Constant Ciphertext Length in CP-ABE. IACR Cryptol. ePrint Arch. 2012: 500 (2012) - 2011
- [c9]Pawan Bhaladhare, Devesh Jinwala:
A Sensitive Attribute Based Clustering Method for k-Anonymization. ADCONS 2011: 163-170 - [c8]Bhumika K. Patel, Devesh Jinwala:
Anonymity in Attribute-Based Group Signatures. ADCONS 2011: 495-504 - [c7]Nishant Doshi, Devesh Jinwala:
Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext. ADCONS 2011: 515-523 - [c6]Ami T. Choksi, Devesh C. Jinwala:
A Novel Approach for Web Services Discovery Using Rough Sets. SocProS (1) 2011: 759-771 - [i1]Dhara Hitarth Buch, Devesh C. Jinwala:
Prevention of Wormhole Attack in Wireless Sensor Network. CoRR abs/1110.1928 (2011) - 2010
- [j2]Ami T. Choksi, Devesh C. Jinwala:
Improving Semantic Matching of Grid Resources Using Refined Ontology with Complement Class. Int. J. Adv. Comp. Techn. 2(5): 129-139 (2010) - [j1]Nitish Dalal, Jenny Shah, Khushboo Hisaria, Devesh Jinwala:
A Comparative Analysis of Tools for Verification of Security Protocols. Int. J. Commun. Netw. Syst. Sci. 3(10): 779-787 (2010) - [c5]Neeta S. Bosamiya, Devesh C. Jinwala:
Optimizing the Hybrid Approach for Time Synchronization in Wireless Sensor Networks. BAIP 2010: 169-174
2000 – 2009
- 2009
- [c4]Neeta S. Bosamiya, Devesh C. Jinwala:
Analysis of Time Synchronization Protocols in Wireless Sensor Networks. ARTCom 2009: 39-41 - [c3]Devesh C. Jinwala, Dhiren R. Patel, Sankita J. Patel, Kankar S. Dasgupta:
Replay Protection at the Link Layer Security in Wireless Sensor Networks. CSIE (1) 2009: 160-165 - [c2]Vivaksha J. Jariwala, Devesh C. Jinwala:
A taxonomy of security attacks on the advanced encryption standard. ICIS 2009: 1302-1305 - 2008
- [c1]Devesh C. Jinwala, Dhiren R. Patel, Kankar S. Dasgupta:
Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. ICISS 2008: 258-272
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint