Computer Standards & Interfaces

Papers
(The median citation count of Computer Standards & Interfaces is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Editorial Board106
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing91
Toward secure distributed data storage with error locating in blockchain enabled edge computing83
A heuristic design toolkit for web conferencing software based on self-determination theory80
Periodic watermarking for copyright protection of large language models in cloud computing security64
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester63
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping60
Provably secure multi-signature scheme based on the standard SM2 signature scheme57
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network57
Construction of a high-precision general geographical location words dataset54
Unveiling process insights from refactoring practices53
Practical reusable garbled circuits with parallel updates51
Over-threshold multi-party private set operation protocols for lightweight clients51
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet48
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates48
Evaluating large language models for software testing46
Patient-centric medical service matching with fine-grained access control and dynamic user management45
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture44
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system42
Towards projection of the individualised risk assessment for the cybersecurity workforce40
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology35
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size34
An effective image annotation using self-attention based stacked bidirectional capsule network33
Key-aggregate based access control encryption for flexible cloud data sharing33
RSH-BU: Revocable secret handshakes with backward unlinkability from VLR group signatures32
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud32
Can LLMs revolutionize text mining in chemistry? A comparative study with domain-specific tools31
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities31
Prototype, method, and experiment for evaluating usability of smart home user interfaces29
Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering co29
Designing usability/user experience heuristics to evaluate e-assessments administered to children29
Round efficient privacy-preserving federated learning based on MKFHE27
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks27
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA26
Blockchain based lightweight authentication scheme for internet of things using lattice encryption algorithm26
Securing social platform from misinformation using deep learning26
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing25
Information technologies exposing children to privacy risks: Domains and children-specific technical controls23
KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse22
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption22
On the effects of continuous delivery on code quality: A case study in industry22
Advanced Electronic Signatures and eIDAS – Analysis of the Concept22
HT21
Performance evaluation of secured network traffic classification using a machine learning approach20
AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks20
A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare19
Module learning with rounding based key agreement scheme with modified reconciliation19
Context checklist for industrial software engineering research and practice19
Online/offline remote data auditing with strong key-exposure resilience for cloud storage19
Delayed chaotic image encryption algorithm using cross-layer and DNA coding techniques18
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property18
TDBAMLA: Temporal and dynamic behavior analysis in Android malware using LSTM and attention mechanisms18
Exploring users’ switching intention and behavior on social networking sites: Linear and nonlinear perspectives18
Comparative effects of knowledge-based antecedents in different realms of CMMI-based software process improvement success17
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis17
Testability-driven development: An improvement to the TDD efficiency17
Large language models for code completion: A systematic literature review16
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR16
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior16
Create your own MUSE: A method for updating security level evaluation instruments16
An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage16
Designing novel proxy-based access control scheme for implantable medical devices16
Full black-box retrievable and accountable identity-based encryption15
Computing performance requirements for web service compositions15
Fields of the future: Digital transformation in smart agriculture with large language models and generative AI15
Difference-based firefly programming for symbolic regression problems15
Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm15
Proofs of retrievability with tag outsourcing based on Goppa codes15
An analysis model for detecting misbehaviors in anonymous cryptocurrency14
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption14
Generative AI and educational sustainability: Examining the role of knowledge management factors and AI attributes using a deep learning-based hybrid SEM-ANN approach14
Research on the standardization model of data semantics in the knowledge graph construction of Oil&Gas industry14
Cryptanalysis of an additively homomorphic public key encryption scheme13
COBLAH: A chaotic OBL initialized hybrid algebraic-heuristic algorithm for optimal S-box construction12
Collaboration with Generative AI to improve Requirements Change12
Inner product encryption from Middle-Product Learning With Errors12
A process assessment model for big data analytics12
Privacy-preserving compromised credential checking protocol for account protection12
A secure and efficient certificateless authenticated key agreement protocol for smart healthcare12
New tag-based signatures and their applications on linearly homomorphic signatures11
Abuse-resistant deniable encryption11
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks11
A hybrid search and model-based approach for testing the self-adaptive unmanned aircraft system software11
A parallel programming assessment for stream processing applications on multi-core systems11
FDF-HybridFS: Towards design of a failure detection framework using hybrid feature selection method for IP core networks that connect 5G core in NFV-based test environment11
DOA tracking for seamless connectivity in beamformed IoT-based drones10
MRAN: Multimodal relationship-aware attention network for fake news detection10
Efficient dynamic multi-client searchable encryption supporting fuzzy search10
Blockchain-based verifiable privacy-preserving data classification protocol for medical data10
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics9
MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping9
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient9
A hybrid coot based CNN model for thyroid cancer detection9
A critical analysis of Zero Trust Architecture (ZTA)9
A robust analysis of adversarial attacks on federated learning environments9
Editorial Board9
Availability and service disruption of network services: From high-level requirements to low-level configuration constraints9
Pypen: Code instrumentation tool for dynamic analysis and energy efficiency evaluation9
Repudiable ring signature: Stronger security and logarithmic-size8
Using a process algebra interface for verification and validation of UML statecharts8
A new modified Skew Tent Map and its application in pseudo-random number generator8
Secure decision tree classification with decentralized authorization and access control8
Spanish MEACorpus 2023: A multimodal speech–text corpus for emotion analysis in Spanish from natural environments8
Is mouse dynamics information credible for user behavior research? An empirical investigation8
Generic server-aided secure multi-party computation in cloud computing8
A model-driven approach to adopt good practices for agile process configuration and certification8
Signer revocability for threshold ring signatures7
A blockchain-based compact audit-enabled deduplication in decentralized storage7
Artificial intelligence in web accessibility: A systematic mapping study7
Editorial Board7
Determining a core view of research quality in empirical software engineering7
A blockchain-based multi-keyword rank search scheme for B+ tree inverted index7
Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing7
An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system7
Injecting domain knowledge in multi-objective optimization problems: A semantic approach7
Detection of DDoS attacks in SDN-based VANET using optimized TabNet7
A new deep learning based electricity theft detection framework for smart grids in cloud computing7
More efficient tightly-secure lattice-based IBE with equality test7
Energy aware algorithm based on actual utilization for periodic tasks in mixed-criticality real-time systems7
Intelligent and trusted metaheuristic optimization model for reliable agricultural network7
A new secure arrangement for privacy-preserving data collection6
BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records6
An extension of iStar for Machine Learning requirements by following the PRISE methodology6
Editorial Board6
A novel secure privacy-preserving data sharing model with deep-based key generation on the blockchain network in the cloud6
Revisiting “online/offline provable data possession” schemes6
Adaptive optimized residual convolutional image annotation model with bionic feature selection model6
PSCBO: A provably secure consensus-based blockchain Oracle6
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems6
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security6
Privacy-preserving top-k spatio-temporal keyword preference query6
Multi-key Fully Homomorphic Encryption without CRS from RLWE6
A preliminary conceptual structure for Computer-based Process Maturity Models, using a Cone-Based Conceptual Network and NIAM diagrams6
MOOCsChain: A blockchain-based secure storage and sharing scheme for MOOCs learning6
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption6
A taxonomy of attack mechanisms in the automotive domain6
Leveraging activation and optimisation layers as dynamic strategies in the multi-task fuzzing scheme6
A secure and lightweight data management scheme based on redactable blockchain for Digital Copyright6
Elliptic code-based oblivious polynomial evaluation6
A contextual framework to standardise the communication of machine learning cyber security characteristics6
Are you copying my prompt? Protecting the copyright of vision prompt for VPaaS via watermarking5
A lightweight delegated private set intersection cardinality protocol5
Ensemble feature selection and classification methods for machine learning-based coronary artery disease diagnosis5
Access network selection based on available bandwidth estimation for heterogeneous networks5
Agile-CMMI V2.0 alignment: Bringing to light the agile artifacts pointed out by CMMI5
A visual approach for identification and annotation of business process elements in process descriptions5
An Identity-Based Encryption with Equality Test scheme for healthcare social apps5
LAMB: An open-source software framework to create artificial intelligence assistants deployed and integrated into learning management systems5
Grammar-obeying program synthesis: A novel approach using large language models and many-objective genetic programming5
Accountable outsourcing data storage atop blockchain5
Secure cloud file sharing scheme using blockchain and attribute-based encryption5
Sahand 1.0: A new model for extracting information from source code in object-oriented projects5
Local differential privacy and its applications: A comprehensive survey5
BLPCA-ledger: A lightweight plenum consensus protocols for consortium blockchain based on the hyperledger indy5
Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus5
Hybrid unsupervised web-attack detection and classification – A deep learning approach5
Public-key encryption with bidirectional keyword search and its application to encrypted emails4
PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption4
ANDES: An approach to embed search services on the Web browser4
Application of retrieval-augmented generation for interactive industrial knowledge management via a large language model4
Editorial Board4
An efficient rejection-free threshold ring signature from lattices and its application in receipt-free cloud e-voting4
Efficient public key authenticated searchable encryption scheme without bilinear pairings4
Real-time privacy-preserved auditing for shared outsourced data4
A dynamic Bayesian network risk assessment model for coal-fired power plants based on grey correlation and triangular fuzzy theory4
Analysis and practical validation of a standard SDN-based framework for IPsec management4
Privacy-preserving multi-party logistic regression in cloud computing4
An IoT-based approach for optimal relative positioning of solar panel arrays during backtracking4
S-box using fractional-order 4D hyperchaotic system and its application to RSA cryptosystem-based color image encryption4
Consensus algorithms based on collusion resistant publicly verifiable random number seeds4
ISH: Isogeny-based Secret Handshakes with 4
Is it worth adopting DevOps practices in Global Software Engineering? Possible challenges and benefits4
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems3
Post-quantum signature algorithms on noncommutative algebras, using difficulty of solving systems of quadratic equations3
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment3
Designing secure and lightweight user access to drone for smart city surveillance3
A BERT-Based Sequential POI Recommender system in Social Media3
Practically secure linear-map vector commitment and its applications3
Optimized routing technique for IoT enabled software-defined heterogeneous WSNs using genetic mutation based PSO3
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks3
Intrinsic graph topological correlation for graph convolutional network propagation3
Editorial Board3
Towards the automatic restructuring of structural aesthetic design of Android user interfaces3
Spanish MTLHateCorpus 2023: Multi-task learning for hate speech detection to identify speech type, target, target group and intensity3
Demand response process assessment model: Development and case study assessment3
Toward pre-standardization of reputation-based trust models beyond 5G3
Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud3
TASIS: A typology of architectural strategies for interoperability in software-intensive systems3
Editorial Board3
A privacy-preserving traceability system for self-sovereign identity-based inter-organizational business processes3
Agile governance practices by aligning CMMI V2.0 with portfolio SAFe 5.03
People 4.0 — A model for Human-in-the-Loop CPS-based systems3
Compact and efficient KEMs over NTRU lattices3
Network analysis in a peer-to-peer energy trading model using blockchain and machine learning3
A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique3
Revocable identity-based designated verifier proxy re-signature with signature evolution3
Side-channel information leakage analysis and countermeasures in an embedded CPU microarchitecture3
Privacy preservation of electronic health records with adversarial attacks identification in hybrid cloud3
Revocable attribute-based encryption from standard lattices3
Model-driven approach running route two-level SVD with context information and feature entities in recommender system3
0.091895818710327