Computer Standards & Interfaces

Papers
(The median citation count of Computer Standards & Interfaces is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Periodic watermarking for copyright protection of large language models in cloud computing security130
A heuristic design toolkit for web conferencing software based on self-determination theory110
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing99
Editorial Board92
Lattice-based dynamic decentralized anonymous credential scheme supporting batch verification71
Sharing as You Desire: A fuzzy certificateless proxy re-encryption scheme for efficient and privacy-preserving cloud data sharing70
MExpm: Fair computation offloading for batch modular exponentiation with improved privacy and checkability in IoV65
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester63
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping60
Over-threshold multi-party private set operation protocols for lightweight clients58
Practical reusable garbled circuits with parallel updates55
Evaluating large language models for software testing50
Fuzzy Password Authentication Key Exchange protocol in universal composable framework for blockchain privacy protection46
Patient-centric medical service matching with fine-grained access control and dynamic user management40
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates38
Provably secure multi-signature scheme based on the standard SM2 signature scheme37
Construction of a high-precision general geographical location words dataset36
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet36
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network35
Towards projection of the individualised risk assessment for the cybersecurity workforce34
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size34
An effective image annotation using self-attention based stacked bidirectional capsule network31
AdaTraj-DP: An adaptive privacy framework for context-aware trajectory data publishing30
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system30
FGPB-EMR: Fine-grained privacy blockchain for electronic medical record sharing30
Key-aggregate based access control encryption for flexible cloud data sharing30
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology29
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud29
Round efficient privacy-preserving federated learning based on MKFHE27
Prototype, method, and experiment for evaluating usability of smart home user interfaces26
An autonomous deep reinforcement learning-based approach for memory configuration in serverless computing26
Traceable signatures from lattices26
RSH-BU: Revocable secret handshakes with backward unlinkability from VLR group signatures26
Can LLMs revolutionize text mining in chemistry? A comparative study with domain-specific tools25
Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering co24
Blockchain based lightweight authentication scheme for internet of things using lattice encryption algorithm24
Logarithmic identity-based ring signature over lattices and linkable variant24
Securing social platform from misinformation using deep learning24
Designing usability/user experience heuristics to evaluate e-assessments administered to children24
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks23
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities23
Advanced Electronic Signatures and eIDAS – Analysis of the Concept22
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption22
KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse21
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing21
AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks21
HT20
Optimal shard number determination algorithm based on security and performance in sharded blockchain20
ScaFedCrowd: A secure cross-system anonymous authentication and privacy-preserving task recommendation scheme for federated crowdsourcing20
Information technologies exposing children to privacy risks: Domains and children-specific technical controls20
Securing Wireless Body Area Network with lightweight certificateless signcryption scheme using equality test20
Multiuser data integrity auditing atop blockchain with secure user revocation for cognitive IoT networks19
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property19
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR19
An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage18
Online/offline remote data auditing with strong key-exposure resilience for cloud storage18
Towards a new standard for network access authentication: EAP-EDHOC17
SiamIDS: A novel cloud-centric Siamese Bi-LSTM framework for interpretable intrusion detection in large-scale IoT networks17
Exploring users’ switching intention and behavior on social networking sites: Linear and nonlinear perspectives17
Can a conventional email phishing nudge help fight SMiShing attacks?17
State of the art of Agile User Experience: Challenges and solution approaches17
Testability-driven development: An improvement to the TDD efficiency17
TDBAMLA: Temporal and dynamic behavior analysis in Android malware using LSTM and attention mechanisms16
Delayed chaotic image encryption algorithm using cross-layer and DNA coding techniques16
A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare16
Certificate-based proxy signature scheme with revocation for Industrial Internet of Things16
Large language models for code completion: A systematic literature review15
An analysis model for detecting misbehaviors in anonymous cryptocurrency14
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior14
Create your own MUSE: A method for updating security level evaluation instruments13
Difference-based firefly programming for symbolic regression problems13
Breaking cross-domain model protection via surrogate-guided unsupervised distribution transformation13
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption13
Designing novel proxy-based access control scheme for implantable medical devices13
Fields of the future: Digital transformation in smart agriculture with large language models and generative AI13
Proofs of retrievability with tag outsourcing based on Goppa codes13
Computing performance requirements for web service compositions13
A Dynamic Multimodal Causal Graph framework for standardized Emotion Recognition in Conversations12
Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm12
Time-controlled proxy searchable re-encryption against collusion attacks12
Generative AI and educational sustainability: Examining the role of knowledge management factors and AI attributes using a deep learning-based hybrid SEM-ANN approach12
Collaboration with Generative AI to improve Requirements Change11
FedSam: Enhancing federated learning accuracy with differential privacy and data heterogeneity mitigation11
Privacy-preserving compromised credential checking protocol for account protection11
A parallel programming assessment for stream processing applications on multi-core systems11
A secure and efficient certificateless authenticated key agreement protocol for smart healthcare11
Full black-box retrievable and accountable identity-based encryption11
COBLAH: A chaotic OBL initialized hybrid algebraic-heuristic algorithm for optimal S-box construction11
Enhanced YOLOv8 model for accurate and real-time remote sensing target detection11
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks11
Research on the standardization model of data semantics in the knowledge graph construction of Oil&Gas industry11
Inner product encryption from Middle-Product Learning With Errors11
FDF-HybridFS: Towards design of a failure detection framework using hybrid feature selection method for IP core networks that connect 5G core in NFV-based test environment10
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient10
New tag-based signatures and their applications on linearly homomorphic signatures10
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics10
A critical analysis of Zero Trust Architecture (ZTA)10
Efficient dynamic multi-client searchable encryption supporting fuzzy search10
Cryptanalysis of an additively homomorphic public key encryption scheme10
Pypen: Code instrumentation tool for dynamic analysis and energy efficiency evaluation10
Enhancing security, privacy, and usability in social robots: A software development framework10
Abuse-resistant deniable encryption10
Efficient encrypted conjunctive search with volume and result pattern leakage resistance9
Using a process algebra interface for verification and validation of UML statecharts9
Blockchain-based verifiable privacy-preserving data classification protocol for medical data9
A hybrid search and model-based approach for testing the self-adaptive unmanned aircraft system software9
A robust analysis of adversarial attacks on federated learning environments9
MRAN: Multimodal relationship-aware attention network for fake news detection9
Publicly verifiable secret sharing: Generic constructions and lattice-based instantiations in the standard model9
A hybrid coot based CNN model for thyroid cancer detection9
Determining a core view of research quality in empirical software engineering9
An environment-aware Q-learning-based trust evaluation scheme in Underwater Acoustic Sensor Networks (UASNs)8
Is mouse dynamics information credible for user behavior research? An empirical investigation8
Spanish MEACorpus 2023: A multimodal speech–text corpus for emotion analysis in Spanish from natural environments8
A model-driven approach to adopt good practices for agile process configuration and certification8
Retraction notice to “Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine d8
A new multi-image encryption scheme for Smart Home IoT integrating hyperchaos and compressive sensing8
MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping8
More efficient tightly-secure lattice-based IBE with equality test8
DEA-GAO: A two-stage approach optimal controller placement in software-defined networks using data envelopment analysis8
A new modified Skew Tent Map and its application in pseudo-random number generator8
Detection of DDoS attacks in SDN-based VANET using optimized TabNet8
A blockchain-based compact audit-enabled deduplication in decentralized storage8
Secure decision tree classification with decentralized authorization and access control8
A new deep learning based electricity theft detection framework for smart grids in cloud computing7
A blockchain-based multi-keyword rank search scheme for B+ tree inverted index7
Intelligent and trusted metaheuristic optimization model for reliable agricultural network7
Editorial Board7
Chaos experiments in microservice architectures: A systematic literature review7
Privacy-preserving top-k spatio-temporal keyword preference query7
Signer revocability for threshold ring signatures7
Logarithmic certificate-less linkable ring signature over lattices and application in electronic voting systems7
Integrating agentic risk signalling in trusted research environments: Automating VEX with Agent2Agent protocols and model context protocol (MCP) in SACRO and TREvolution pipelines7
Multi-key Fully Homomorphic Encryption without CRS from RLWE7
A novel secure privacy-preserving data sharing model with deep-based key generation on the blockchain network in the cloud7
Revisiting “online/offline provable data possession” schemes7
Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing7
Artificial intelligence in web accessibility: A systematic mapping study7
An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system7
RDHE3DM-SPDM: Reversible data hiding in encrypted 3D meshes based on short-path generation and dynamic multi-MSB prediction7
BcFCKA:Blockchain-based Fair and continuous key agreement for DIDComm in Self-Sovereign Identity7
Adaptive optimized residual convolutional image annotation model with bionic feature selection model6
Sahand 1.0: A new model for extracting information from source code in object-oriented projects6
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems6
Editorial Board6
A preliminary conceptual structure for Computer-based Process Maturity Models, using a Cone-Based Conceptual Network and NIAM diagrams6
Leveraging activation and optimisation layers as dynamic strategies in the multi-task fuzzing scheme6
Quality assessment for software data validation in automotive industry: A systematic literature review6
An Identity-Based Encryption with Equality Test scheme for healthcare social apps6
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption6
Privacy-preserving kNN classification for cross-platform electric vehicle data analytics6
A secure and lightweight data management scheme based on redactable blockchain for Digital Copyright6
Elliptic code-based oblivious polynomial evaluation6
An extension of iStar for Machine Learning requirements by following the PRISE methodology6
Are you copying my prompt? Protecting the copyright of vision prompt for VPaaS via watermarking6
A lightweight delegated private set intersection cardinality protocol6
Efficient and secure multi-user k 6
Editorial Board6
Ensemble feature selection and classification methods for machine learning-based coronary artery disease diagnosis5
A contextual framework to standardise the communication of machine learning cyber security characteristics5
PSCBO: A provably secure consensus-based blockchain Oracle5
Accountable outsourcing data storage atop blockchain5
Is it worth adopting DevOps practices in Global Software Engineering? Possible challenges and benefits5
Secure cloud file sharing scheme using blockchain and attribute-based encryption5
Assessing the quantum readiness of cryptographic standards: Recommendations toward quantum-era compliance5
LAMB: An open-source software framework to create artificial intelligence assistants deployed and integrated into learning management systems5
Agile-CMMI V2.0 alignment: Bringing to light the agile artifacts pointed out by CMMI5
BMSE: Blockchain-based multi-keyword searchable encryption for electronic medical records5
BLPCA-ledger: A lightweight plenum consensus protocols for consortium blockchain based on the hyperledger indy5
ANDES: An approach to embed search services on the Web browser5
Consensus algorithms based on collusion resistant publicly verifiable random number seeds5
Hybrid unsupervised web-attack detection and classification – A deep learning approach5
Local differential privacy and its applications: A comprehensive survey5
Grammar-obeying program synthesis: A novel approach using large language models and many-objective genetic programming5
HEArgmax: Secure homomorphic encryption-based protocols for Argmax function5
Reputation is not enough: Ensuring strong order-fairness in Byzantine consensus5
ISH: Isogeny-based Secret Handshakes with 5
S-box using fractional-order 4D hyperchaotic system and its application to RSA cryptosystem-based color image encryption5
Application of retrieval-augmented generation for interactive industrial knowledge management via a large language model5
A dynamic Bayesian network risk assessment model for coal-fired power plants based on grey correlation and triangular fuzzy theory4
Model-driven approach running route two-level SVD with context information and feature entities in recommender system4
Highway to Hack — Security gaps in ETSI ITS standards4
Breaking barriers in healthcare: A secure identity framework for seamless access4
TASIS: A typology of architectural strategies for interoperability in software-intensive systems4
An efficient rejection-free threshold ring signature from lattices and its application in receipt-free cloud e-voting4
Efficient public key authenticated searchable encryption scheme without bilinear pairings4
Real-time privacy-preserved auditing for shared outsourced data4
A privacy-preserving traceability system for self-sovereign identity-based inter-organizational business processes4
A secure reversible image hiding approach combining block based intelligence with dual stego matrix encoding4
A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique4
Revocable attribute-based encryption from standard lattices4
A BERT-Based Sequential POI Recommender system in Social Media4
Reliability techniques and architectures for blockchain-enabled internet of things: Current applications, systematic review, and future trends4
Editorial Board4
Analysis and practical validation of a standard SDN-based framework for IPsec management4
Privacy-preserving multi-party logistic regression in cloud computing4
Revocable identity-based designated verifier proxy re-signature with signature evolution4
Agile governance practices by aligning CMMI V2.0 with portfolio SAFe 5.04
Practically secure linear-map vector commitment and its applications4
Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud4
Intrinsic graph topological correlation for graph convolutional network propagation4
Software defect prediction using graph sample and aggregate-attention network optimized with nomadic people optimizer for enhancing the software reliability4
PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption4
A BIPMU-based network security situation assessment method for wireless network3
Compact and efficient KEMs over NTRU lattices3
Who are the best contributors? Designing a multimodal science communication interface based on the ECM, TAM and the Taguchi methods3
Editorial Board3
Robust zero-watermarking method for multi-medical images based on Chebyshev–Fourier moments and Contourlet-FFT3
Pairing-free public-key authenticated encryption with keyword search3
GSParLib: A multi-level programming interface unifying OpenCL and CUDA for expressing stream and data parallelism3
Integrating IoT security practices into a risk-based framework for small and medium enterprises (SMEs)3
40 years of Computer Standards & Interfaces: A bibliometric retrospective3
Network analysis in a peer-to-peer energy trading model using blockchain and machine learning3
People 4.0 — A model for Human-in-the-Loop CPS-based systems3
Demand response process assessment model: Development and case study assessment3
Decentralized multi-client boolean keyword search for encrypted cloud storage3
Editorial Board3
A novel clustering approach for recommendation systems using adaptive fuzzy clustering with Jensen–Shannon divergence3
Enhancing differential evolution with a target vector replacement strategy3
SecureMD5: A new stream cipher for secure file systems and encryption key generation with artificial intelligence3
Mutual authentication scheme for smart devices in IoT-enabled smart home systems3
Revocable certificateless Provable Data Possession with identity privacy in cloud storage3
Editorial Board3
Conjunctive multi-key searchable encryption with attribute-based access control for EHR systems3
Editorial Board3
Post-quantum signature algorithms on noncommutative algebras, using difficulty of solving systems of quadratic equations3
LHSC-SGC: A lightweight hybrid signcryption scheme for smart grid communications in heterogeneous cryptographic public-key systems3
EIVBoost: An efficient and interpretable gradient boosting framework for Vertical Federated Learning3
A multi-criteria process for IT project success evaluation–Addressing a critical gap in standard practices3
SM9-based device-friendly distributed decryption scheme for IoHT3
Editorial Board3
Blockchain beyond immutability: Application firewalls on ethereum-based platforms3
Improving efficiency and security of Camenisch–Lysyanskaya signatures for anonymous credential systems3
Survey of reversible data hiding: Statistics, current trends, and future outlook3
Spanish MTLHateCorpus 2023: Multi-task learning for hate speech detection to identify speech type, target, target group and intensity3
Harnessing generative AI for personalized E-commerce product descriptions: A framework and practical insights3
Blockchain-aided secure and fair multi-view data outsourcing computation scheme3
0.11273288726807