Computer Standards & Interfaces

Papers
(The H4-Index of Computer Standards & Interfaces is 31. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
A heuristic design toolkit for web conferencing software based on self-determination theory108
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing104
Editorial Board98
Lattice-based dynamic decentralized anonymous credential scheme supporting batch verification90
Toward secure distributed data storage with error locating in blockchain enabled edge computing78
Periodic watermarking for copyright protection of large language models in cloud computing security72
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping65
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester64
Fuzzy Password Authentication Key Exchange protocol in universal composable framework for blockchain privacy protection60
Provably secure multi-signature scheme based on the standard SM2 signature scheme59
Construction of a high-precision general geographical location words dataset59
Patient-centric medical service matching with fine-grained access control and dynamic user management55
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet53
Over-threshold multi-party private set operation protocols for lightweight clients53
Practical reusable garbled circuits with parallel updates52
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates51
Evaluating large language models for software testing50
Unveiling process insights from refactoring practices49
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network47
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture47
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology47
Towards projection of the individualised risk assessment for the cybersecurity workforce40
An effective image annotation using self-attention based stacked bidirectional capsule network37
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system36
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size35
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud34
Key-aggregate based access control encryption for flexible cloud data sharing33
AdaTraj-DP: An adaptive privacy framework for context-aware trajectory data publishing33
Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering co32
RSH-BU: Revocable secret handshakes with backward unlinkability from VLR group signatures32
Can LLMs revolutionize text mining in chemistry? A comparative study with domain-specific tools31
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks31
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities31
0.15443992614746