Zobrazeno 1 - 10
of 139
pro vyhledávání: '"Jinwala, Devesh"'
Autor:
Shah, Kaushal, Jinwala, Devesh C.
The linear and grid based Wireless Sensor Networks (WSN) are formed by applications where objects being monitored are either placed in linear or grid based form. E.g. monitoring oil, water or gas pipelines; perimeter surveillance; monitoring traffic
Externí odkaz:
http://arxiv.org/abs/1809.06587
Publikováno v:
Software: Practice & Experience; Dec2024, Vol. 54 Issue 12, p2481-2501, 21p
Autor:
Patel, Himanshu B., Jinwala, Devesh C.
Publikováno v:
International Journal of Computational Science and Engineering; 2025, Vol. 28 Issue: 1 p100-113, 14p
Autor:
Patel, Himanshu B., Jinwala, Devesh C.
Publikováno v:
In Procedia Computer Science 2021 184:929-934
Autor:
Doshi, Nishant, Jinwala, Devesh
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which user with secret key containing attributes, only able to decrypt the message if the attributes in the policy match with the attributes in secret key. The existing methods t
Externí odkaz:
http://arxiv.org/abs/1208.5991
Autor:
Doshi, Nishant, Jinwala, Devesh
In Ciphertext-Policy Attribute Based Encryption (CP-ABE), attributes are attached to the user's secret key and access policy is at-tached to the ciphertext. If attributes in the secret key of a user satisfy the policy then only the genuine user can d
Externí odkaz:
http://arxiv.org/abs/1208.5848
Autor:
Jariwala, Vivaksha, Jinwala, Devesh
The Wireless Sensor Networks (WSNs) are composed of resource starved sensor nodes that are deployed to sense, process and communicate vital information to the base station. Due to the stringent constraints on the resources in the sensor nodes on one
Externí odkaz:
http://arxiv.org/abs/1203.4698
Publikováno v:
Journal of Information Assurance and Security 4 (2009) pp. 582-603
Ensuring communications security in Wireless Sensor Networks (WSNs) indeed is critical; due to the criticality of the resources in the sensor nodes as well as due to their ubiquitous and pervasive deployment, with varying attributes and degrees of se
Externí odkaz:
http://arxiv.org/abs/1203.4697
Ensuring communications security in Wireless Sensor Networks (WSNs) is very vital because the security protocols therein, should be devised to work at the link layer. Theoretically, any link layer security protocol must support three vital security a
Externí odkaz:
http://arxiv.org/abs/1203.4694
Publikováno v:
International Journal of Network Security & Its Applications (IJNSA), Vol 3, Issue 6, pp. 213-225, ISSN: Online - 0974 - 9330, ISSN: Print - 0975 - 2307, November 2011
As is commonly known, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders to protect the data from the prying eyes. However, using text as the targ
Externí odkaz:
http://arxiv.org/abs/1203.3644