* Hiral Trivedi and Sankita Patel. Design of Secure Authentication Protocol for Dynamic User Addition in Distributed Internet-of-Things, Computer Networks, vol. 178, article no. 107335, Elsevier, May 2020
* Unnati Shah, Sankita Patel and Devesh Jinwala. Constructing a Knowledge-Based Quality Attributes Relationship Matrix to Identify Conflicts in Non-Functional Requirements, Journal of Computational and Theoretical Nanoscience, vol. 17, no. 1, pp. 122-129, American Scientific Publishers, January 2020
* Kamalkumar Macwan and Sankita Patel. K-NMF Anonymization in Social Network Data Publishing, The Computer Journal, vol. 61, no. 4, pp. 601-613, Oxford press, April 2018
* Kamalkumar Macwan and Sankita Patel. Node Differential Privacy in Social Graph Degree Publishing, Procedia Computer Science, vol. 143, pp. 786-793, Elsevier, January 2018
* Kamal Macwan and Sankita Patel. K-Degree Anonymity Model for Social Network Data Publishing, Advances in Electrical and Computer Engineering, vol.17, no.4, pp.117-124, Stefan cel Mare University of Suceava, November 2017, doi:10.4316/AECE.2017.04014
* Vivaksha Jariwala and Sankita Patel. An Improved Approach for Secure Data Aggregation in Wireless Sensor Networks, International Journal of Computer Applications, vol. 137, no.9, pp. 10-14, Foundation of Computer Science, USA, March 2016
* Sankita Patel, Dharmen Punjani and Devesh Jinwala. An Efficient Approach for Privacy Preserving Distributed Clustering in Semi-honest Model using Elliptic Curve Cryptography, International Journal of Network Security, vol. 17, no. 3, pp. 328-339, Candy C. H. Lin, Taiwan, May 2015
* Sankita Patel, Mitali Sonar and Devesh C Jinwala. Privacy Preserving Distributed K-Means Clustering in Malicious Modle using Verifiable Secret Sharing scheme. International Journal of Distributed Systems and Technology, vol. 5, no. 2, pp. 44-70, IGI-Global, April 2014
* Sankita Patel, Ankit Chouhan and Devesh C Jinwala. Comparative Evaluation of Elliptic Curve Cryptography based Homomorphic Encryption schemes for a Novel Security Multiparty Computation, Journal of Information Security, vol.5 no.1, Scietific Research Publishing, January 2014, DOI: 10.4236/jis.2014.51002
* Rutvij Jhaveri, Sankita Patel, Devesh Jinwala. Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs, INFOCOMP Journal of Computer Science, vol. 11, no. 1, pp. 1-12, Federal University of Lavras, Brazil, ISSN: 1807-4545, March 2012
* Devesh Jinwala, Dhiren Patel, Sankita Patel and K S Dasgupta. Optimizing the Replay Protection at the Link Layer Security Framework in Wireless Sensor Networks. IAENG International Journal of Computer Science, International Association of Engineers Publication, Hong Kong, 2010

International Conferences

* Unnati Shah, Sankita Patel, and Devesh Jinwala. A Semi-automated Approach to Generate an Adaptive Quality Attribute Relationship Matrix. In: Madhavji N., Pasquale L. (eds) 26th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2020, Pisa, Italy, March 24–27, 2020, LNCS vol. 12045, pp 239-256, Springer, Cham
* Bintu Kadhiwala and Sankita Patel. A Novel k-Anonymization Approach to Prevent Insider Attack in Collaborative Social Network Data Publishing. In: Garg D., Kumar N., Shyamasundar R. (eds) Information Systems Security, ICISS 2019, Hydrabad, India, December 16-20, 2019, LNCS vol. 11952, pp. 255-275, Springer, Cham
* Kamal Macwan and Sankita Patel. Privacy Preserving Approach in Dynamic Social Network Data Publishing. In: Heng SH., Lopez J. (eds) Information Security Practice and Experience, ISPEC 2019, November 26-28 2019, Kualalumpur, Malaysia, LNCS vol. 11879, Springer, Cham
* Unnati Shah, Sankita Patel and Devesh Jinwala, An Ontological Approach to Specify Conflicts among Non-Functional Requirements. Proceedings of 2nd International Conference on Geoinformatics and Data Analysis,ICGDA 2019, March 15-17, 2019, Prague Czech Republic, pp. 145-149, ACM
* Shivangi Shukla and Sankita Patel, Context-Aware Approach to Enhance Service Utility for Location Privacy in Internet of Things. In: Singh M., Gupta P., Tyagi V., Flusser J., Ören T., Kashyap R. (eds) Advances in Computing and Data Sciences. ICACDS 2019, April 12-13, 2019, Ghazibad, India, CCIS vol. 1046, pp. 529-542. Springer, Singapore
* Unnati Shah, Sankita Patel and Devesh Jinwala, Constructing a Knowledge-based Quality Attributes Relationship Matrix to Identify Conflicts in Non-Functional Requirements.¯ In: Proceedings of 1st International Conference on Intelligent Computing, ICIC 2018, October 25-27, 2018, Bangalore,India
* Kamal Macwan and Sankita Patel, Mutual Friend Attack Prevention in Social Network Data Publishing. In: Sk Subidh Ali, Jean-Luc Danger, Thomas Eisenbarth (eds), 7th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2017, December 13-17, 2017, Goa, India, LNCS vol. 10662, pp. 210-225, Springer, Cham
* Slesha Sanghvi and Sankita Patel. Investigating Privacy Preserving Technique for Genome Data. In: Patel Z., Gupta S. (eds), 1st EAI International Conference of Future Internet Technologies and Trends, ICFITT 2017, Aug 31-Sep 2 2017, Surat, India, LNICT vol. 220, pp. 106-115, Springer, Berlin, Heidelberg
* Unnati Shah, Sankita Patel and Devesh Jinwala. Specification of Non-Functional Requirements: A Hybrid Approach. Joint Proceedings REFSQ-2016 Workshops, Doctoral Symposium, Research Method Track, and Poster Track co-located with the 22nd International Conference on Requirements Engineering: Foundation for Software Quality (REFSQ 2016), Gothenburg, Sweden, March 14, 2016. CEUR Workshop Proceedings 1564, CEUR-WS.org
* Greeshma Sarath, Devesh Jinwala and Sankita Patel. A Survey on Elliptic Curve Digital Signature Algorithm and its Variants. In: Proceedings of Second International Conference of Database and Data Mining, DBDM 2014, Dubai, UAE, Arpil 4-5, 2014
* Sankita Patel, Viren Patel and Devesh Jinwala. Privacy Preserving Distributed K-Means clustering in Malicious model using Zero Knowledge Proof. In: C. Hota and P.K. Srimani (eds)International Conference on Distributed Computing and Internet Technology, ICDCIT 2013, January 9-12, 2013, Bhubaneshwar, India, LNCS vol. 7753, pp. 420-431, Springer, Berlin, Heidelberg
* Sankita Patel, Sweta Garasia and Devesh Jinwala. An efficient approach for Privacy Preserving Distributed K-Means clustering based on Shamir's Secret Sharing scheme. In: Theo Dimitrakos, Rajat Moona, Dhiren Patel, D. Harrison McKnight (eds)6th IFIP WG 11.11 International conference of Trust Management, IFIPTM 2012, May 21-25 2012, Surat, India, Springer, Berlin, Heidelberg
* Rutvij Jhaveri, Sankita Patel and Devesh Jinwala. DOS Attacks in Mobile Ad-hoc Networks: A Survey. In: Proceedings of Second International Conference of Advanced Computing and Communication Technologies, Rohtak, Haryana, January 2012, pp. 535-541, Conference Publishing Services(CPS)
* Rutvij Jhaveri, Sankita Patel and Devesh Jinwala. A Novel Approach for Grayhole and Blackhole Attacks in Mobile Ad-hoc Networks, In: Proceedings of Second International Conference of Advanced Computing and Communication Technologies, Rohtak, Haryana, January 2012, pp. 556-560, Conference Publishing Services(CPS)
* Rutvij Jhaveri, Sankita Patel and Devesh Jinwala. A Robust Solution for Grayhole Attack in AODV Based MANETs. In: Das V.V., Stephen J.(eds) Third International Conference on Advances in Communication, Network, and Computing, CNC 2012, Feb 24-25 2012, Chennai, India, LNICT vol. 108, Springer, Berlin, Heidelberg
* Vivek Patel, Sankita Patel and Devesh Jinwala. A Novel Approach for Light Weight User Authentication Scheme in Wireless Sensor Network. In: Proceedings of 10th International Conference on Security and Management, SAM 2011, July 18-21, 2011, USA, vol. 2, pp.749-755
* Kiran Bhagiya and Sankita Patel. Implementing Mobile Phone As a Multi-Purpose Controller using 3D Sensor Technology. In: Proceedings of 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, July 9-11, 2010, Chengdu, China
* Dharmishtha Chaudhari and Sankita Patel. Investigating Caching Strategies in Personal Communication Services. In: Proceedings of 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010, July 9-11, 2010, Chengdu, China
* Devesh Jinwala, Dhiren Patel, Sankita Patel and K S Dasgupta. Replay Protection at the Link layer Security in Wireless Sensor Networks. In: Proceedings of the 2009 World Congress on Computer Science and Information Engineering, CSIE 2009, Los Angeles, USA, pp. 160-165, IEEE Computer Society
* Sankita Patel and Vivaksha Jariwala. Security in Wireless Sensor Network. In: Proceedings of the International conference on Sensor, Security, Software and Intelligent Systems, ISSSIS 2009, Coimbatore, India

National Journals

* Sankita Patel. Economics of Software verification. Journal of veer narmad south Gujarat university, vol. 5, Gujarat, India

National Conferences/Symposiums/Workshops

* Sankita Patel and Devesh Jinwala. Approaches for Privacy Preserving Distributed Clustering in Semi-honest and Malicious model. Presented Poster at 9th Inter-Research-Institute Student Seminar in Computer Science (co-located with the ACM India Annual event 2015), IRISS 2015, Feburary 5 2015, Goa, India
* Ankit Chouhan, Sankita Patel and D C Jinwala. Comparative Analysis of Elliptic Curve Cryptography based Algorithms to Implement Privacy Preserving Clustering through Secure Multiparty Computation. Security and Privacy Symposium, SPS 2014, 20-22 Feburary, 2014, IIT Kanpur, India
* Urvi Narang, Sankita Patel and D C Jinwala. Privacy Preserving Clustering using Fully Homomorphic Encryption. Security and Privacy Symposium, SPS 2014, 20-22 Feburary, 2014, IIT Kanpur, India (Won the Best Poster Award)
* Sankita Patel and Devesh Jinwala. Privacy Preserving Distributed Clustering in Malicious model. Presented Poster at Security and Privacy Symposium, SPS 2013, IIT Kanpur, India
* Sankita Patel, Viren Patel and Devesh Jinwala. Distributed Privacy Preserving K-Means clustering in Malicious Model using Zero Knowledge Proof. Proceedings of the 12th National Workshop on Cryptology, Cryptology Research Society of India and Vellore Institute of Technology, Vellore, India, pp. 77-90, 2012
* Sankita Patel and Neelam Surti. Ant colony optimization for routing in mobile adhoc networks: A review. National conference on Trends in Advance Computing, NCTIAC 2007, Datta Meghe college of Engg., Navi Mumbai, India, 2007
* Neelam Surti and Sankita Patel. Virtual router: A router for communication between virtual LANs. National conference on Trends in Advance Computing, NCTIAC 2007, Datta Meghe college of Engg., Navi Mumbai, India, 2007