Computer Standards & Interfaces

Papers
(The TQCC of Computer Standards & Interfaces is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-09-01 to 2025-09-01.)
ArticleCitations
Editorial Board106
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing91
Toward secure distributed data storage with error locating in blockchain enabled edge computing83
A heuristic design toolkit for web conferencing software based on self-determination theory80
Periodic watermarking for copyright protection of large language models in cloud computing security64
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester63
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping60
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network57
Provably secure multi-signature scheme based on the standard SM2 signature scheme57
Construction of a high-precision general geographical location words dataset54
Unveiling process insights from refactoring practices53
Practical reusable garbled circuits with parallel updates51
Over-threshold multi-party private set operation protocols for lightweight clients51
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates48
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet48
Evaluating large language models for software testing46
Patient-centric medical service matching with fine-grained access control and dynamic user management45
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture44
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system42
Towards projection of the individualised risk assessment for the cybersecurity workforce40
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology35
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size34
An effective image annotation using self-attention based stacked bidirectional capsule network33
Key-aggregate based access control encryption for flexible cloud data sharing33
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud32
RSH-BU: Revocable secret handshakes with backward unlinkability from VLR group signatures32
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities31
Can LLMs revolutionize text mining in chemistry? A comparative study with domain-specific tools31
Designing usability/user experience heuristics to evaluate e-assessments administered to children29
Prototype, method, and experiment for evaluating usability of smart home user interfaces29
Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering co29
Round efficient privacy-preserving federated learning based on MKFHE27
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks27
Securing social platform from misinformation using deep learning26
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA26
Blockchain based lightweight authentication scheme for internet of things using lattice encryption algorithm26
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing25
Information technologies exposing children to privacy risks: Domains and children-specific technical controls23
Advanced Electronic Signatures and eIDAS – Analysis of the Concept22
KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse22
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption22
On the effects of continuous delivery on code quality: A case study in industry22
HT21
Performance evaluation of secured network traffic classification using a machine learning approach20
AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks20
Context checklist for industrial software engineering research and practice19
Online/offline remote data auditing with strong key-exposure resilience for cloud storage19
A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare19
Module learning with rounding based key agreement scheme with modified reconciliation19
Delayed chaotic image encryption algorithm using cross-layer and DNA coding techniques18
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property18
TDBAMLA: Temporal and dynamic behavior analysis in Android malware using LSTM and attention mechanisms18
Exploring users’ switching intention and behavior on social networking sites: Linear and nonlinear perspectives18
Testability-driven development: An improvement to the TDD efficiency17
Comparative effects of knowledge-based antecedents in different realms of CMMI-based software process improvement success17
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis17
An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage16
Designing novel proxy-based access control scheme for implantable medical devices16
Large language models for code completion: A systematic literature review16
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR16
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior16
Create your own MUSE: A method for updating security level evaluation instruments16
Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm15
Proofs of retrievability with tag outsourcing based on Goppa codes15
Full black-box retrievable and accountable identity-based encryption15
Computing performance requirements for web service compositions15
Fields of the future: Digital transformation in smart agriculture with large language models and generative AI15
Difference-based firefly programming for symbolic regression problems15
Generative AI and educational sustainability: Examining the role of knowledge management factors and AI attributes using a deep learning-based hybrid SEM-ANN approach14
Research on the standardization model of data semantics in the knowledge graph construction of Oil&Gas industry14
An analysis model for detecting misbehaviors in anonymous cryptocurrency14
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption14
Cryptanalysis of an additively homomorphic public key encryption scheme13
Privacy-preserving compromised credential checking protocol for account protection12
A secure and efficient certificateless authenticated key agreement protocol for smart healthcare12
COBLAH: A chaotic OBL initialized hybrid algebraic-heuristic algorithm for optimal S-box construction12
Collaboration with Generative AI to improve Requirements Change12
Inner product encryption from Middle-Product Learning With Errors12
A process assessment model for big data analytics12
FDF-HybridFS: Towards design of a failure detection framework using hybrid feature selection method for IP core networks that connect 5G core in NFV-based test environment11
New tag-based signatures and their applications on linearly homomorphic signatures11
Abuse-resistant deniable encryption11
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks11
A hybrid search and model-based approach for testing the self-adaptive unmanned aircraft system software11
A parallel programming assessment for stream processing applications on multi-core systems11
Blockchain-based verifiable privacy-preserving data classification protocol for medical data10
MRAN: Multimodal relationship-aware attention network for fake news detection10
DOA tracking for seamless connectivity in beamformed IoT-based drones10
Efficient dynamic multi-client searchable encryption supporting fuzzy search10
A robust analysis of adversarial attacks on federated learning environments9
Editorial Board9
Availability and service disruption of network services: From high-level requirements to low-level configuration constraints9
Pypen: Code instrumentation tool for dynamic analysis and energy efficiency evaluation9
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics9
MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping9
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient9
A hybrid coot based CNN model for thyroid cancer detection9
A critical analysis of Zero Trust Architecture (ZTA)9
0.59134411811829