Sankita Patel
Sankita Patel
Assistant Professor of Computer Engineering, SVNIT, Surat
Verified email at - Homepage
Cited by
Cited by
DoS attacks in mobile ad hoc networks: A survey
RH Jhaveri, SJ Patel, DC Jinwala
2012 second international conference on advanced computing & communication …, 2012
Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs
RH Jhaveri, SJ Patel, DC Jinwala
INFOCOMP Journal of Computer Science 11 (1), 1-12, 2012
An efficient approach for privacy preserving distributed k-means clustering based on shamir’s secret sharing scheme
S Patel, S Garasia, D Jinwala
Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 …, 2012
Privacy preserving distributed k-means clustering in malicious model using zero knowledge proof
S Patel, V Patel, D Jinwala
Distributed Computing and Internet Technology: 9th International Conference …, 2013
An excursion to software development life cycle models: an old to ever-growing models
US Shah, DC Jinwala, SJ Patel
ACM SIGSOFT Software Engineering Notes 41 (1), 1-6, 2016
A survey on elliptic curve digital signature algorithm and its variants
G Sarath, DC Jinwala, S Patel
Computer Science & Information Technology (CS & IT)–CSCP, 121-136, 2014
Design of Secure Authentication Protocol for Dynamic User Addition in Distributed Internet-of-Things
HS Trivedi, SJ Patel
Computer Networks, 107335, 2020
Homomorphic cryptosystem-based secure data processing model for edge-assisted IoT healthcare systems
HS Trivedi, SJ Patel
Internet of Things 22, 100693, 2023
A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing
S Shukla, SJ Patel
Computing 104 (5), 1173-1202, 2022
Node differential privacy in social graph degree publishing
KR Macwan, SJ Patel
Procedia computer science 143, 786-793, 2018
A novel solution for grayhole attack in aodv based manets
RH Jhaveri, SJ Patel, DC Jinwala
Advances in Communication, Network, and Computing: Third International …, 2012
k-NMF Anonymization in Social Network Data Publishing
KR Macwan, SJ Patel
The Computer Journal 61 (4), 601-613, 2018
An efficient approach for privacy preserving distributed clustering in semi-honest model using elliptic curve cryptography
SJ Patel, D Punjani, DC Jinwala
International Journal of Network Security 17 (3), 328-339, 2015
Comparative evaluation of elliptic curve cryptography based homomorphic encryption schemes for a novel secure multiparty computation
SJ Patel, A Chouhan, DC Jinwala
Journal of Information Security 2014, 2014
Privacy preserving approach in dynamic social network data publishing
K Macwan, S Patel
Information Security Practice and Experience: 15th International Conference …, 2019
Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
S Shukla, SJ Patel
IET Information Security 15 (3), 256-266, 2021
k-Degree Anonymity Model for Social Network Data Publishing.
KR Macwan, SJ Patel
Advances in Electrical & Computer Engineering 17 (4), 2017
Specification of Non-Functional Requirements: A Hybrid Approach.
US Shah, S Patel, D Jinwala
REFSQ Workshops, 2016
Replay protection at the link layer security in wireless sensor networks
D Jinwala, D Patel, S Patel, KS Dasgupta
2009 WRI World Congress on Computer Science and Information Engineering 1 …, 2009
Detecting Intra-Conflicts in Non-Functional Requirements
U Shah, S Patel, DC Jinwala
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20