Computer Standards & Interfaces

Papers
(The TQCC of Computer Standards & Interfaces is 10. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Editorial Board111
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications104
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing103
Toward secure distributed data storage with error locating in blockchain enabled edge computing95
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester83
A heuristic design toolkit for web conferencing software based on self-determination theory74
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping62
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture59
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network57
Over-threshold multi-party private set operation protocols for lightweight clients54
Provably secure multi-signature scheme based on the standard SM2 signature scheme53
Practical reusable garbled circuits with parallel updates50
Construction of a high-precision general geographical location words dataset49
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates48
Unveiling process insights from refactoring practices48
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet47
Patient-centric medical service matching with fine-grained access control and dynamic user management45
Evaluating large language models for software testing45
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size44
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud42
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system42
Towards projection of the individualised risk assessment for the cybersecurity workforce40
An effective image annotation using self-attention based stacked bidirectional capsule network39
Key-aggregate based access control encryption for flexible cloud data sharing38
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology34
Blockchain based lightweight authentication scheme for internet of things using lattice encryption algorithm33
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities31
RSH-BU: Revocable secret handshakes with backward unlinkability from VLR group signatures31
Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering co28
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA28
Securing social platform from misinformation using deep learning28
Round efficient privacy-preserving federated learning based on MKFHE28
Prototype, method, and experiment for evaluating usability of smart home user interfaces27
Designing usability/user experience heuristics to evaluate e-assessments administered to children27
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks27
Information technologies exposing children to privacy risks: Domains and children-specific technical controls26
6G-enabled Edge Intelligence for Ultra -Reliable Low Latency Applications: Vision and Mission26
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption25
HT24
Performance evaluation of secured network traffic classification using a machine learning approach24
Advanced Electronic Signatures and eIDAS – Analysis of the Concept22
Context checklist for industrial software engineering research and practice22
On the effects of continuous delivery on code quality: A case study in industry20
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing19
KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse19
AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks19
Exploring users’ switching intention and behavior on social networking sites: Linear and nonlinear perspectives18
Module learning with rounding based key agreement scheme with modified reconciliation18
Optimal 5G network slicing using machine learning and deep learning concepts18
Comparative effects of knowledge-based antecedents in different realms of CMMI-based software process improvement success18
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis18
Testability-driven development: An improvement to the TDD efficiency17
Online/offline remote data auditing with strong key-exposure resilience for cloud storage17
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property17
Delayed chaotic image encryption algorithm using cross-layer and DNA coding techniques17
An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage16
A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare16
Large language models for code completion: A systematic literature review16
TDBAMLA: Temporal and dynamic behavior analysis in Android malware using LSTM and attention mechanisms16
Proofs of retrievability with tag outsourcing based on Goppa codes15
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior15
Difference-based firefly programming for symbolic regression problems15
Full black-box retrievable and accountable identity-based encryption15
Editorial Board15
Designing novel proxy-based access control scheme for implantable medical devices15
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR15
Create your own MUSE: A method for updating security level evaluation instruments15
An analysis model for detecting misbehaviors in anonymous cryptocurrency14
Computing performance requirements for web service compositions14
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption14
Generative AI and educational sustainability: Examining the role of knowledge management factors and AI attributes using a deep learning-based hybrid SEM-ANN approach13
Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm13
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks13
COBLAH: A chaotic OBL initialized hybrid algebraic-heuristic algorithm for optimal S-box construction12
Cryptanalysis of an additively homomorphic public key encryption scheme12
A process assessment model for big data analytics12
Inner product encryption from Middle-Product Learning With Errors12
Privacy-preserving compromised credential checking protocol for account protection12
Research on the standardization model of data semantics in the knowledge graph construction of Oil&Gas industry12
A parallel programming assessment for stream processing applications on multi-core systems11
New tag-based signatures and their applications on linearly homomorphic signatures11
A secure and efficient certificateless authenticated key agreement protocol for smart healthcare11
A hybrid search and model-based approach for testing the self-adaptive unmanned aircraft system software11
FDF-HybridFS: Towards design of a failure detection framework using hybrid feature selection method for IP core networks that connect 5G core in NFV-based test environment10
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics10
DOA tracking for seamless connectivity in beamformed IoT-based drones10
Blockchain-based verifiable privacy-preserving data classification protocol for medical data10
MRAN: Multimodal relationship-aware attention network for fake news detection10
Efficient dynamic multi-client searchable encryption supporting fuzzy search10
Abuse-resistant deniable encryption10
A robust analysis of adversarial attacks on federated learning environments10
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient10
1.0712678432465