Journal of Information Security and Applications

Papers
(The median citation count of Journal of Information Security and Applications is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
An authentication scheme for color images with grayscale invariance and recoverability using image demosaicing89
Profiled side channel attacks against the RSA cryptosystem using neural networks87
Authentication of rotogravure print-outs using a regular test pattern74
An efficient differential fault attack against SIMON key schedule53
Editorial Board50
Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques50
EO-PSI-CA: Efficient outsourced private set intersection cardinality44
Certificateless multi-source elliptic curve ring signcryption for cloud computing43
Editorial Board42
Two-party interactive secure deduplication with efficient data ownership management in cloud storage41
Editorial Board41
Distributed auditing protocol for untraceable transactions40
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders37
SNN-PPRL: A secure record matching scheme based on siamese neural network37
Two statistical traffic features for certain APT group identification37
Robust image watermarking algorithm using chaotic sequences34
A motional but temporally consistent physical video examples33
Robustness enhancement against adversarial steganography via steganalyzer outputs33
Impossible differential cryptanalysis of FBC-12831
A post-quantum signcryption scheme using isogeny based cryptography30
Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map30
Editorial Board28
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM28
Understanding the effects of situational crime prevention and personality factors on insider compliance28
Describing correct UAVs cooperation architectures applied on an anti-terrorism scenario26
Image data security using Quasigroup combined with Fibonacci Q-transformation25
Secure encryption key management as a SecaaS based on Chinese wall security policy25
A new Private Mutual Authentication scheme with group discovery25
Introduction to the special issue on privacy and security for location-based services and devices25
The reality of backdoored S-Boxes—An eye opener25
PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage25
Special issue on risk and security of smart systems24
Hybrid prediction error and histogram shifting method for reversible data hiding in video system23
Accuracy-aware differential privacy in federated learning of large transformer models23
A heuristic assisted cyber attack detection system using multi-scale and attention-based adaptive hybrid network23
Intelligent detection framework for IoT-botnet detection: DBN-RNN with improved feature set23
Perceptual visual security index: Analyzing image content leakage for vision language models23
Editorial Board23
PGAN framework for synthesizing sensor data privately23
Formal verification of a V2X scheme mixing traditional PKI and group signatures22
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images22
Information-theoretic bounds for steganography in visual multimedia21
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage21
Reversible data hiding in Redundancy-Free cipher images through pixel rotation and multi-MSB replacement21
LDAC: A lightweight data access control scheme with constant size ciphertext in VSNs based on blockchain21
Security policies by design in NoSQL document databases20
A risk-aware and recommender distributed intrusion detection system for home robots20
Verifiable quaternion fully homomorphic encryption scheme for mitigating false data injection attacks by privacy preservation in fog environment20
Fuzzy-CNN: Improving personal human identification based on IRIS recognition using LBP features20
SeizeMaliciousURL: A novel learning approach to detect malicious URLs19
Preserving authentication and availability security services through Multivariate Statistical Network Monitoring19
Bottom-boosting differential evolution based digital image security analysis19
Secure AAC steganography scheme based on multi-view statistical distortion (SofMvD)19
AI@TSS- Intelligent technical support scam detection system19
A detector for Android repackaged applications with layout-fingerprint19
A differential privacy based multi-stage network fingerprinting deception game method19
Mapping based Residual Convolution Neural Network for Non-embedding and Blind Image Watermarking19
Efficient binary diffusion matrix structures for dynamic key-dependent cryptographic algorithms18
Multi-party transaction framework for drone services based on alliance blockchain in smart cities18
Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions18
Deniable search of encrypted cloud-storage data18
Privacy-preserving model for biometric-based authentication and Key Derivation Function17
A deep learning assisted personalized deception system for countering web application attacks17
IFKMS: Inverse Function-based Key Management Scheme for IoT networks17
Reversible transformation of tetrahedral mesh models for data protection and information hiding17
KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage17
Bane or Boon: Measuring the effect of evasive malware on system call classifiers17
Image encryption algorithm based on improved Zigzag transformation and quaternary DNA coding16
A modified secure hash design to circumvent collision and length extension attacks16
Attribute-based access control scheme for data sharing on hyperledger fabric16
Smart contracts vulnerability detection model based on adversarial multi-task learning16
A robust and lossless commutative encryption and watermarking algorithm for vector geographic data16
(k, n) secret image sharing scheme with privileged set15
Refined statistical attacks against searchable symmetric encryption using non-indexed documents15
A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm15
PSEEMV: Provably secure and efficient emergency message verification scheme based on ECC and CRT for Space Information Network15
Privacy-preserving outsourcing decision tree evaluation from homomorphic encryption15
V-A3tS: A rapid text steganalysis method based on position information and variable parameter multi-head self-attention controlled by length15
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression15
A novel link fabrication attack detection method for low-latency SDN networks14
An efficient feature selection and explainable classification method for EEG-based epileptic seizure detection14
Cryptographic primitives based on compact knapsack problem14
PVO-based reversible data hiding using bit plane segmentation and pixel expansion14
A novel DNA tree-based chaotic image encryption algorithm14
Enhancing logistic chaotic map for improved cryptographic security in random number generation14
A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things13
Detection of Evasive Android Malware Using EigenGCN13
Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures13
A novel 5-bit S-box design for lightweight cryptography algorithms13
Incorporating deep learning into capacitive images for smartphone user authentication13
HierFedPDP:Hierarchical federated learning with personalized differential privacy13
Adversarial attacks by attaching noise markers on the face against deep face recognition13
A large-scale analysis of Wi-Fi passwords13
A lightweight privacy-preserving truth discovery in mobile crowdsensing systems13
Statistical privacy protection for secure data access control in cloud13
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi13
Distributed secret sharing scheme based on the high-dimensional rotation paraboloid13
The robustness of behavior-verification-based slider CAPTCHAs13
Role mining under User-Distribution cardinality constraint12
A novel compression-based 2D-chaotic sine map for enhancing privacy and security of biometric identification systems12
A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart cities12
FSDS: A practical and fully secure document similarity search over encrypted data with lightweight client12
Maaker: A framework for detecting and defeating evasion techniques in Android malware12
A vision transformer-based automated human identification using ear biometrics12
Classified data authentication scheme for IoT based on aggregate signature and Hyperledger Fabric12
IP packet-level encrypted traffic classification using machine learning with a light weight feature engineering method12
A secure recharge scheme for blockchain payment channels12
DDoS attack resisting authentication protocol for mobile based online social network applications12
An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring12
The evolution of Mirai botnet scans over a six-year period12
A screen-shooting resilient data-hiding algorithm based on two-level singular value decomposition12
Insights into security and privacy issues in smart healthcare systems based on medical images11
Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things11
An efficient multimedia compression-encryption scheme using latin squares for securing Internet-of-things networks11
LWR-based Quantum-Safe Pseudo-Random Number Generator11
Detection of malicious Android applications using Ontology-based intelligent model in mobile cloud environment11
A pseudo-random bit generator based on chaotic maps enhanced with a bit-XOR operation11
Dead or alive: Discovering server HTTP endpoints in both reachable and dead client-side code11
A secure and energy efficient key agreement framework for vehicle-grid system11
Editorial Board11
OCR post-correction for detecting adversarial text images11
My data, my control: A secure data sharing and access scheme over blockchain11
Deep learning-based biometric image feature extraction for securing medical images through data hiding and joint encryption–compression11
A provably secure multi-server authentication scheme based on Chebyshev chaotic map11
Quantum Reversible Audio Steganalysis Using Quantum Schmidt Decomposition and Quantum Support Vector Machine11
Trust and priority-based drone assisted routing and mobility and service-oriented solution for the internet of vehicles networks10
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones10
Android malware detection based on a novel mixed bytecode image combined with attention mechanism10
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)10
The differential fault analysis on block cipher KLEIN-9610
Access control mechanism for the Internet of Things based on blockchain and inner product encryption10
Efficient data hiding method for videos based on adaptive inverted LSB332 and secure frame selection with enhanced Vigenere cipher10
QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks10
Blockchain-based public key encryption with keyword search for medical data sharing in cloud environment10
CVTStego-Net: A convolutional vision transformer architecture for spatial image steganalysis10
Flaw and amendment of a two-party authenticated key agreement protocol for post-quantum environments10
Dynamic secure multi-keyword ranked search over encrypted cloud data10
Certificateless ring signature from NTRU lattice for electronic voting10
Partial palm vein based biometric authentication10
BloAC10
A time-efficient and noise-resistant cryptosystem based on discrete wavelet transform and chaos theory: An application in image encryption10
Novel lightweight RFID authentication protocols for inexpensive tags10
SVScanner: Detecting smart contract vulnerabilities via deep semantic extraction10
Reversible data hiding in encrypted images using block-based adaptive MSBs prediction10
BP-AKAA: Blockchain-enforced Privacy-preserving Authentication and Key Agreement and Access Control for IIoT10
A semantic element representation model for malicious domain name detection9
Does the layout of the Android unlock pattern affect the security and usability of the password?9
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability9
A memristive RLC oscillator dynamics applied to image encryption9
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey9
TPPSUPPLY : A traceable and privacy-preserving blockchain system architecture for the supply chain9
On the construction of a post-quantum blockchain for smart city9
A multiclass hybrid approach to estimating software vulnerability vectors and severity score9
GAIN: Decentralized Privacy-Preserving Federated Learning9
Security model for protecting intellectual property of state-of-the-art microfluidic biochips9
A novel privacy-preserving multi-level aggregate signcryption and query scheme for Smart Grid via mobile fog computing9
A low-rate DDoS detection and mitigation for SDN using Renyi Entropy with Packet Drop9
Workplace security and privacy implications in the GenAI age: A survey8
Fed-GWAS: Privacy-preserving individualized incentive-based cross-device federated GWAS learning8
Towards a robust and trustworthy machine learning system development: An engineering perspective8
Severity-based triage of cybersecurity incidents using kill chain attack graphs8
Enhancing android malware detection explainability through function call graph APIs8
TPEIP: Thumbnail preserving encryption based on sum preserving for image privacy8
Shape-driven lightweight CNN for finger-vein biometrics8
RPCP-PURI: A robust and precise computational predictor for Phishing Uniform Resource Identification8
Privacy-preserving word vectors learning using partially homomorphic encryption8
BSFL: A blockchain-oriented secure federated learning scheme for 5G8
FRAPE: A Framework for Risk Assessment, Prioritization and Explainability of vulnerabilities in cybersecurity8
DAG blockchain-based lightweight authentication and authorization scheme for IoT devices8
A new lattice-based authentication scheme for IoT8
4D mixed chaotic system and its application to RGB image encryption using substitution-diffusion8
Low-rate DoS attack detection method based on hybrid deep neural networks8
Secure mobile internet voting system using biometric authentication and wavelet based AES8
Secure and incentivized V2G Participation with blockchain and game theory8
Network coding and MPTCP: Enhancing security and performance in an SDN environment8
Multi-datasource machine learning in intrusion detection: Packet flows, system logs and host statistics8
A novel key and image concealing with static-dynamic pattern using modified periodic table8
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats8
Adaptive to pixel value and pixel value difference irreversible spatial data hiding method using modified LSB for grayscale images8
Practical dynamic group signature with efficient concurrent joins and batch verifications8
DMRP: Privacy-Preserving Deep Learning Model with Dynamic Masking and Random Permutation8
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments7
Android mobile malware detection using fuzzy AHP7
Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms7
Preserving manipulated and synthetic Deepfake detection through face texture naturalness7
An improved privacy attack on smartphones exploiting the accelerometer7
Wildcarded identity-based ring signatures based on linearly homomorphic signatures7
PARGMF: A provenance-enabled automated rule generation and matching framework with multi-level attack description model7
BCRS-DS: A Privacy-protected data sharing scheme for IoT based on blockchain and certificateless ring signature7
A Deep Learning Ensemble Approach to Detecting Unknown Network Attacks7
A new anonymous authentication framework for secure smart grids applications7
Security-driven prioritization for tactical mobile networks7
An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment7
Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things7
Verifiable (t, n) Secret Image Sharing Scheme Based on Slim Turtle Shell Matrix7
Classifying attack traffic in IoT environments via few-shot learning7
A different base approach for better efficiency on range proofs7
A scalable decentralized privacy-preserving e-voting system based on zero-knowledge off-chain computations7
Corrigendum to “An extended Attribute-based access control with controlled delegation in IoT” [Journal of Information Systems and Applications 76 (2023) 103473]7
High-throughput block cipher implementations with SIMD7
Improved Sine-Tangent chaotic map with application in medical images encryption7
Dual adversarial attacks: Fooling humans and classifiers7
Editorial Board7
A lightweight certificateless authentication scheme and group key agreement with dynamic updating mechanism for LTE-V-based internet of vehicles in smart cities7
Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things6
Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing Systems6
VSTNet: Robust watermarking scheme based on voxel space transformation for diffusion tensor imaging images6
Improved differential attacks on the reduced-round SNOW-V and SNOW-Vi stream cipher6
Editorial Board6
Forensic analysis of web browsers lifecycle: A case study6
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks6
Using private set intersection to achieve privacy-preserving authorization for IoT systems6
A chaotic video steganography technique for carrying different types of secret messages6
Efficient privacy-preserving face verification scheme6
A practical privacy-preserving communication scheme for CAMs in C-ITS6
A location privacy protection method in spatial crowdsourcing6
Provably secure and biometric-based secure access of e-Governance services using mobile devices6
Blockchain for edge-enabled smart cities applications6
Trustworthy adaptive adversarial perturbations in social networks6
Reversible data hiding in multispectral images for satellite communications6
An information-theoretically secure quantum multiparty private set intersection6
A SM2 based efficient and lightweight batch verification approach for IC cards6
Detecting malicious encrypted traffic with privacy set intersection in cloud-assisted industrial internet6
PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption6
A randomized encryption deduplication method against frequency attack6
Security of multiple RGB images in the time domain and frequency domain6
Permission-based Android malware analysis by using dimension reduction with PCA and LDA6
A blockchain-based keyword search scheme with dual authorization for electronic health record sharing6
A method of classifying IoT devices based on attack sensitivity6
Lightweight capability-token for consent-based authentication protocol for smart sensor nodes6
Editorial Board6
PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication6
Improved mixture differential attacks on 6-round AES-like ciphers towards time and data complexities6
Multi-level reversible data hiding for crypto-imagery via a block-wise substitution-transposition cipher6
An efficient and practical approach for privacy-preserving Naive Bayes classification6
Two hardware implementations for modular multiplication in the AMNS: Sequential and semi-parallel6
Post-quantum identity-based traitor tracing6
NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research6
NATICUSdroid: A malware detection framework for Android using native and custom permissions6
Generalized implicit-key attacks on RSA6
An efficient perturbation approach for multivariate data in sensitive and reliable data mining6
Implementation of face recognition system using BioCryptosystem as template protection scheme6
Securing emergent behaviour in swarm robotics6
A two-layer consortium blockchain with transaction privacy protection based on sharding technology5
Towards AI forensics: Did the artificial intelligence system do it?5
RiderAuth: A cancelable touch-signature based rider authentication scheme for driverless taxis5
Distilling blockchain requirements for digital investigation platforms5
Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things5
Blockchain-based digital chain of custody multimedia evidence preservation framework for internet-of-things5
Novel Hybrid Model for Intrusion Prediction on Cyber Physical Systems’ Communication Networks based on Bio-inspired Deep Neural Network Structure5
0.1561861038208