Devesh C. Jinwala
Orcid: 0000-0003-4830-1702
According to our database1,
Devesh C. Jinwala
authored at least 85 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on svnit.ac.in
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Decentralised ontology-based access control in internet of things using social context.
Int. J. Ad Hoc Ubiquitous Comput., 2024
2023
Security Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious Model.
Proceedings of the 5th International Conference on Image Processing and Machine Vision, 2023
Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things.
Proceedings of the Information Systems Security - 19th International Conference, 2023
Enhancing Robustness of Malware Detection Model Against White Box Adversarial Attacks.
Proceedings of the Distributed Computing and Intelligent Technology, 2023
2022
Int. J. Inf. Comput. Secur., 2022
A reputation-based RPL protocol to detect selective forwarding attack in Internet of Things.
Int. J. Commun. Syst., 2022
2021
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021
Int. J. Inf. Secur. Priv., 2021
Int. J. Inf. Comput. Secur., 2021
Frontiers Comput. Sci., 2021
Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks.
Frontiers Comput. Sci., 2021
Proceedings of the 12th International Conference on Ambient Systems, 2021
2020
P<sup>2</sup> KASE A<sup>2</sup> - privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegation.
IET Inf. Secur., 2020
Data Sci. Eng., 2020
A Semi-automated Approach to Generate an Adaptive Quality Attribute Relationship Matrix.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2020
2019
Wirel. Pers. Commun., 2019
MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data.
Frontiers Inf. Technol. Electron. Eng., 2019
BMMI-tree: A Peer-to-Peer <i>m</i>-ary tree using 1-<i>m</i> node splitting for an efficient multidimensional complex query search.
J. Parallel Distributed Comput., 2019
Improving multidimensional point query search using multi-way peer-to-peer tree network.
Int. J. Inf. Commun. Technol., 2019
Proceedings of the TENCON 2019, 2019
Proceedings of the 2019 2nd International Conference on Geoinformatics and Data Analysis, 2019
BTG-RKASE: Privacy Preserving Revocable Key Aggregate Searchable Encryption with Fine-grained Multi-delegation & Break-The-Glass Access Control.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
2018
STF-DM: a sparsely tagged fragmentation with dynamic marking an IP traceback approach.
Int. Arab J. Inf. Technol., 2018
Performance Analysis of Symmetric Key Ciphers in Linear and Grid Based Sensor Networks.
CoRR, 2018
Comput. Networks, 2018
Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks.
Comput. J., 2018
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018
Proceedings of the Computer and Network Security Essentials., 2018
Information-Theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining.
Proceedings of the Computer and Network Security Essentials., 2018
2017
Wirel. Pers. Commun., 2017
Secur. Commun. Networks, 2017
Int. J. Netw. Secur., 2017
Game-theoretic privacy preserving constructions for rational and malicious secret sharing models for collaborative frequent itemset mining.
Int. J. Knowl. Eng. Data Min., 2017
2016
Wirel. Pers. Commun., 2016
Secur. Commun. Networks, 2016
J. Inf. Sci. Eng., 2016
A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining.
Int. J. Inf. Secur. Priv., 2016
Comput. Networks, 2016
Proceedings of the Joint Proceedings of REFSQ-2016 Workshops, 2016
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016
2015
Resolving Ambiguities in Natural Language Software Requirements: A Comprehensive Survey.
ACM SIGSOFT Softw. Eng. Notes, 2015
Analysis of Conflicting User Requirements in Web Applications Using Graph Transformation.
ACM SIGSOFT Softw. Eng. Notes, 2015
A novel privacy-preserving scheme for collaborative frequent itemset mining across vertically partitioned data.
Secur. Commun. Networks, 2015
Automated Analysis of Internet Key Exchange Protocol v2 for Denial of Service Attacks.
Int. J. Netw. Secur., 2015
Evaluating the impact of fanout and dimension on the performance of a hybrid model for multidimensional indexing in peer-to-peer m-ary tree network.
Int. J. Commun. Networks Distributed Syst., 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Cyber Physical Systems. Design, Modeling, and Evaluation, 2015
2014
Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption.
Secur. Commun. Networks, 2014
Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme.
Int. J. Distributed Syst. Technol., 2014
Analysis and Evaluation of Novel Privacy Preserving Techniques for Collaborative Temporal Association Rule Mining Using Secret Sharing.
Int. J. Distributed Syst. Technol., 2014
A Hybrid Dynamic Load Balancing Algorithm for Distributed Systems Using Genetic Algorithms.
Int. J. Distributed Syst. Technol., 2014
Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks.
Int. J. Distributed Syst. Technol., 2014
Privacy and Integrity Preserving Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the WOSIS 2014, 2014
Proceedings of the Advances in Communication Networking, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
Aggregate MAC Based Authentication for Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014
A Peer-to-Peer multiway tree network with efficient range query search using multidimensional indexing.
Proceedings of the Fourth International Conference on Digital Information and Communication Technology and its Applicationsm DICTAP 2014, 2014
2013
A Game Theory based Repeated Rational Secret Sharing Scheme for Privacy Preserving Distributed Data Mining.
Proceedings of the SECRYPT 2013, 2013
Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Zero Knowledge Proof.
Proceedings of the Distributed Computing and Internet Technology, 2013
Modeling and analysis of internet key exchange protocolv2 and a proposal for its variant.
Proceedings of the 6th ACM India Computing Convention, 2013
2012
FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks
CoRR, 2012
Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks
CoRR, 2012
CoRR, 2012
Privacy Preserving Approaches for Global Cycle Detections for Cyclic Association Rules in Distributed Databases.
Proceedings of the SECRYPT 2012, 2012
An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir's Secret Sharing Scheme.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012
2011
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
2010
Int. J. Commun. Netw. Syst. Sci., 2010
Improving Semantic Matching of Grid Resources Using Refined Ontology with Complement Class.
Int. J. Adv. Comp. Techn., 2010
Proceedings of the Information Processing and Management, 2010
2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
Proceedings of the ARTCom 2009, 2009
2008
Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks.
Proceedings of the Information Systems Security, 4th International Conference, 2008