Devesh C. Jinwala

Orcid: 0000-0003-4830-1702

According to our database1, Devesh C. Jinwala authored at least 85 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Decentralised ontology-based access control in internet of things using social context.
Int. J. Ad Hoc Ubiquitous Comput., 2024

2023
Security Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious Model.
Proceedings of the 5th International Conference on Image Processing and Machine Vision, 2023

Escrow and Pairing Free CP-ABE Scheme with Forward and Backward Secrecy for Healthcare Internet of Things.
Proceedings of the Information Systems Security - 19th International Conference, 2023

Enhancing Robustness of Malware Detection Model Against White Box Adversarial Attacks.
Proceedings of the Distributed Computing and Intelligent Technology, 2023

2022
Revocable key aggregate searchable encryption with user privacy and anonymity.
Int. J. Inf. Comput. Secur., 2022

A reputation-based RPL protocol to detect selective forwarding attack in Internet of Things.
Int. J. Commun. Syst., 2022

2021
Detecting Intra-Conflicts in Non-Functional Requirements.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2021

A Trust-Integrated RPL Protocol to Detect Blackhole Attack in Internet of Things.
Int. J. Inf. Secur. Priv., 2021

Multi-writer multi-reader conjunctive keyword searchable encryption.
Int. J. Inf. Comput. Secur., 2021

Simple index based symmetric searchable encryption with result verifiability.
Frontiers Comput. Sci., 2021

Privacy preserving secure expansive aggregation with malicious node identification in linear wireless sensor networks.
Frontiers Comput. Sci., 2021

6MID: Mircochain based Intrusion Detection for 6LoWPAN based IoT networks.
Proceedings of the 12th International Conference on Ambient Systems, 2021

2020
Aggregate Searchable Encryption With Result Privacy.
Int. J. Inf. Secur. Priv., 2020

P<sup>2</sup> KASE A<sup>2</sup> - privacy-preserving key aggregate searchable encryption supporting authentication and access control on multi-delegation.
IET Inf. Secur., 2020

R-OO-KASE: Revocable Online/Offline Key Aggregate Searchable Encryption.
Data Sci. Eng., 2020

A Semi-automated Approach to Generate an Adaptive Quality Attribute Relationship Matrix.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2020

2019
Novel Approach of Key Predistribution for Grid Based Sensor Networks.
Wirel. Pers. Commun., 2019

MULKASE: a novel approach for key-aggregate searchable encryption for multi-owner data.
Frontiers Inf. Technol. Electron. Eng., 2019

BMMI-tree: A Peer-to-Peer <i>m</i>-ary tree using 1-<i>m</i> node splitting for an efficient multidimensional complex query search.
J. Parallel Distributed Comput., 2019

Improving multidimensional point query search using multi-way peer-to-peer tree network.
Int. J. Inf. Commun. Technol., 2019

Blackhole Detection in 6LoWPAN Based Internet of Things: An Anomaly Based Approach.
Proceedings of the TENCON 2019, 2019

An Ontological Approach to Specify Conflicts among Non-Functional Requirements.
Proceedings of the 2019 2nd International Conference on Geoinformatics and Data Analysis, 2019

BTG-RKASE: Privacy Preserving Revocable Key Aggregate Searchable Encryption with Fine-grained Multi-delegation & Break-The-Glass Access Control.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

2018
STF-DM: a sparsely tagged fragmentation with dynamic marking an IP traceback approach.
Int. Arab J. Inf. Technol., 2018

Performance Analysis of Symmetric Key Ciphers in Linear and Grid Based Sensor Networks.
CoRR, 2018

LPM: A lightweight authenticated packet marking approach for IP traceback.
Comput. Networks, 2018

Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks.
Comput. J., 2018

Encrypted data ordering with functional encryption.
Proceedings of the 2018 4th International Conference on Recent Advances in Information Technology (RAIT), 2018

Malleable Cryptosystems and Their Applications in Wireless Sensor Networks.
Proceedings of the Computer and Network Security Essentials., 2018

Information-Theoretically Secure Privacy Preserving Approaches for Collaborative Association Rule Mining.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Novel Approach for Pre-distributing Keys in WSNs for Linear Infrastructure.
Wirel. Pers. Commun., 2017

Multiuser Searchable Encryption with Token Freshness Verification.
Secur. Commun. Networks, 2017

A Secure Communication Model for Expressive Access Control Using CP-ABE.
Int. J. Netw. Secur., 2017

Game-theoretic privacy preserving constructions for rational and malicious secret sharing models for collaborative frequent itemset mining.
Int. J. Knowl. Eng. Data Min., 2017

2016
Malleability Resilient Concealed Data Aggregation in Wireless Sensor Networks.
Wirel. Pers. Commun., 2016

A novel approach for privacy homomorphism using attribute-based encryption.
Secur. Commun. Networks, 2016

Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model.
J. Inf. Sci. Eng., 2016

A Clustering Approach Using Fractional Calculus-Bacterial Foraging Optimization Algorithm for k-Anonymization in Privacy Preserving Data Mining.
Int. J. Inf. Secur. Priv., 2016

Concealed data aggregation in wireless sensor networks: A comprehensive survey.
Comput. Networks, 2016

Specification of Non-Functional Requirements: A Hybrid Approach.
Proceedings of the Joint Proceedings of REFSQ-2016 Workshops, 2016

Baseline Intrusion Detection Framework for 6LoWPAN Devices.
Proceedings of the Adjunct Proceedings of the 13th International Conference on Mobile and Ubiquitous Systems: Computing Networking and Services, 2016

2015
Resolving Ambiguities in Natural Language Software Requirements: A Comprehensive Survey.
ACM SIGSOFT Softw. Eng. Notes, 2015

Analysis of Conflicting User Requirements in Web Applications Using Graph Transformation.
ACM SIGSOFT Softw. Eng. Notes, 2015

A novel privacy-preserving scheme for collaborative frequent itemset mining across vertically partitioned data.
Secur. Commun. Networks, 2015

Automated Analysis of Internet Key Exchange Protocol v2 for Denial of Service Attacks.
Int. J. Netw. Secur., 2015

Evaluating the impact of fanout and dimension on the performance of a hybrid model for multidimensional indexing in peer-to-peer m-ary tree network.
Int. J. Commun. Networks Distributed Syst., 2015

Functional Encryption in IoT E-Health Care System.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Hybrid Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the Cyber Physical Systems. Design, Modeling, and Evaluation, 2015

2014
Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption.
Secur. Commun. Networks, 2014

A Hybrid Dynamic Load Balancing Algorithm for Distributed System.
J. Comput., 2014

Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Verifiable Secret Sharing Scheme.
Int. J. Distributed Syst. Technol., 2014

Analysis and Evaluation of Novel Privacy Preserving Techniques for Collaborative Temporal Association Rule Mining Using Secret Sharing.
Int. J. Distributed Syst. Technol., 2014

A Hybrid Dynamic Load Balancing Algorithm for Distributed Systems Using Genetic Algorithms.
Int. J. Distributed Syst. Technol., 2014

Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks.
Int. J. Distributed Syst. Technol., 2014

Privacy and Integrity Preserving Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the WOSIS 2014, 2014

Malleability Resilient Concealed Data Aggregation.
Proceedings of the Advances in Communication Networking, 2014

A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-Policy.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Aggregate MAC Based Authentication for Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the Intelligent Computing Methodologies - 10th International Conference, 2014

A Peer-to-Peer multiway tree network with efficient range query search using multidimensional indexing.
Proceedings of the Fourth International Conference on Digital Information and Communication Technology and its Applicationsm DICTAP 2014, 2014

2013
Key Generation Protocol in IBC.
Int. J. Netw. Secur., 2013

A Game Theory based Repeated Rational Secret Sharing Scheme for Privacy Preserving Distributed Data Mining.
Proceedings of the SECRYPT 2013, 2013

Privacy Preserving Distributed K-Means Clustering in Malicious Model Using Zero Knowledge Proof.
Proceedings of the Distributed Computing and Internet Technology, 2013

Modeling and analysis of internet key exchange protocolv2 and a proposal for its variant.
Proceedings of the 6th ACM India Computing Convention, 2013

2012
Constant Ciphertext Length in CP-ABE.
IACR Cryptol. ePrint Arch., 2012

Updating attribute in CP-ABE: A New Approach.
IACR Cryptol. ePrint Arch., 2012

A Novel Approach for Secure Data Aggregation in Wireless Sensor Networks
CoRR, 2012

FlexiSec: A Configurable Link Layer Security Architecture for Wireless Sensor Networks
CoRR, 2012

Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks
CoRR, 2012

Experimenting with the Novel Approaches in Text Steganography
CoRR, 2012

A Sensitive Attribute based Clustering Method for kanonymization
CoRR, 2012

A Novel Approach for Verifiable Secret Sharing by using a One Way Hash Function
CoRR, 2012

Privacy Preserving Approaches for Global Cycle Detections for Cyclic Association Rules in Distributed Databases.
Proceedings of the SECRYPT 2012, 2012

An Efficient Approach for Privacy Preserving Distributed K-Means Clustering Based on Shamir's Secret Sharing Scheme.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

2011
Prevention of Wormhole Attack in Wireless Sensor Network
CoRR, 2011

A Novel Approach for Web Services Discovery Using Rough Sets.
Proceedings of the International Conference on Soft Computing for Problem Solving (SocProS 2011) December 20-22, 2011, 2011

Anonymity in Attribute-Based Group Signatures.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

Hidden Access Structure Ciphertext Policy Attribute Based Encryption with Constant Length Ciphertext.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

A Sensitive Attribute Based Clustering Method for k-Anonymization.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011

2010
A Comparative Analysis of Tools for Verification of Security Protocols.
Int. J. Commun. Netw. Syst. Sci., 2010

Improving Semantic Matching of Grid Resources Using Refined Ontology with Complement Class.
Int. J. Adv. Comp. Techn., 2010

Optimizing the Hybrid Approach for Time Synchronization in Wireless Sensor Networks.
Proceedings of the Information Processing and Management, 2010

2009
A taxonomy of security attacks on the advanced encryption standard.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

Replay Protection at the Link Layer Security in Wireless Sensor Networks.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Analysis of Time Synchronization Protocols in Wireless Sensor Networks.
Proceedings of the ARTCom 2009, 2009

2008
Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks.
Proceedings of the Information Systems Security, 4th International Conference, 2008


  Loading...