Devesh C. Jinwala

Learn More
This errata is published to clarify the differences between the paper and our previously published related work. 1 Clarification In [2], we proposed a modification of AODV that explains functionality in the form of flow-charts; the PEAK value is calculated by RREP sequence number, routing table sequence number and number of replies that gives lower(More)
In Ciphertext-Policy Attribute Based Encryption (CP-ABE), attributes are attached to the user's secret key and access policy is attached to the ciphertext. If attributes in the secret key of a user satisfy the policy then only the user can decrypt the ciphertext. However, such scenario also necessitates periodic updating of the secret key with the(More)
Requirements Engineering is one of the most vital activities in the entire Software Development Life Cycle. The success of the software is largely dependent on how well the users' requirements have been understood and converted into appropriate functionalities in the software. Typically, the users convey their requirements in natural language statements(More)
—The proliferation of Mobile Adhoc Networks (MANETs) help to realize the nomadic computing paradigm with ubiquitous access. Though they ensure self-maintainable, dynamic and temporary topology, the MANETS also suffer from constraints in power, storage and computational resources. In addition, the pervasiveness, ubiquity and the inherent wireless nature,(More)
Ensuring communications security in Wireless Sensor Networks (WSNs) indeed is critical; due to the criticality of the resources in the sensor nodes as well as due to their ubiquitous and pervasive deployment, with varying attributes and degrees of security required. The proliferation of the next generation sensor nodes, has not solved this problem, because(More)
The area of formal verification of protocols has gained substantial importance in the recent years. The research results and subsequent applications have amply demonstrated that the formal verification tools have indeed helped correct the protocols even after being standardized. However, the standard protocol verification tools and techniques do not verify(More)
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities.(More)
Privacy preserving data mining has gained considerable attention because of the increased concerns to ensure privacy of sensitive information. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication(More)