Journal of Information Security and Applications

Papers
(The H4-Index of Journal of Information Security and Applications is 25. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
An authentication scheme for color images with grayscale invariance and recoverability using image demosaicing89
Profiled side channel attacks against the RSA cryptosystem using neural networks87
Authentication of rotogravure print-outs using a regular test pattern74
An efficient differential fault attack against SIMON key schedule53
Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques50
Editorial Board50
EO-PSI-CA: Efficient outsourced private set intersection cardinality44
Certificateless multi-source elliptic curve ring signcryption for cloud computing43
Editorial Board42
Two-party interactive secure deduplication with efficient data ownership management in cloud storage41
Editorial Board41
Distributed auditing protocol for untraceable transactions40
SNN-PPRL: A secure record matching scheme based on siamese neural network37
Two statistical traffic features for certain APT group identification37
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders37
Robust image watermarking algorithm using chaotic sequences34
Robustness enhancement against adversarial steganography via steganalyzer outputs33
A motional but temporally consistent physical video examples33
Impossible differential cryptanalysis of FBC-12831
Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map30
A post-quantum signcryption scheme using isogeny based cryptography30
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM28
Understanding the effects of situational crime prevention and personality factors on insider compliance28
Editorial Board28
Describing correct UAVs cooperation architectures applied on an anti-terrorism scenario26
Secure encryption key management as a SecaaS based on Chinese wall security policy25
A new Private Mutual Authentication scheme with group discovery25
Introduction to the special issue on privacy and security for location-based services and devices25
The reality of backdoored S-Boxes—An eye opener25
PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage25
Image data security using Quasigroup combined with Fibonacci Q-transformation25
0.050862789154053