Computer Standards & Interfaces

Papers
(The TQCC of Computer Standards & Interfaces is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Editorial Board109
A heuristic design toolkit for web conferencing software based on self-determination theory103
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications102
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester94
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing81
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping69
Toward secure distributed data storage with error locating in blockchain enabled edge computing60
Patient-centric medical service matching with fine-grained access control and dynamic user management57
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network54
Unveiling process insights from refactoring practices52
Provably secure multi-signature scheme based on the standard SM2 signature scheme51
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet48
Practical reusable garbled circuits with parallel updates47
Over-threshold multi-party private set operation protocols for lightweight clients47
Construction of a high-precision general geographical location words dataset46
Evaluating large language models for software testing44
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates44
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture43
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology42
Key-aggregate based access control encryption for flexible cloud data sharing40
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size40
Towards projection of the individualised risk assessment for the cybersecurity workforce37
An effective image annotation using self-attention based stacked bidirectional capsule network36
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system33
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud31
Round efficient privacy-preserving federated learning based on MKFHE30
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks30
Prototype, method, and experiment for evaluating usability of smart home user interfaces29
Designing usability/user experience heuristics to evaluate e-assessments administered to children28
RSH-BU: Revocable secret handshakes with backward unlinkability from VLR group signatures27
Blockchain based lightweight authentication scheme for internet of things using lattice encryption algorithm27
Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering co27
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities26
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA26
Securing social platform from misinformation using deep learning26
6G-enabled Edge Intelligence for Ultra -Reliable Low Latency Applications: Vision and Mission26
Advanced Electronic Signatures and eIDAS – Analysis of the Concept25
Context checklist for industrial software engineering research and practice25
On the effects of continuous delivery on code quality: A case study in industry24
HT24
Information technologies exposing children to privacy risks: Domains and children-specific technical controls22
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing22
KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse19
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption18
Module learning with rounding based key agreement scheme with modified reconciliation18
Performance evaluation of secured network traffic classification using a machine learning approach18
AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks18
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property18
Testability-driven development: An improvement to the TDD efficiency17
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis17
Comparative effects of knowledge-based antecedents in different realms of CMMI-based software process improvement success17
Exploring users’ switching intention and behavior on social networking sites: Linear and nonlinear perspectives17
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR17
Large language models for code completion: A systematic literature review16
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior16
Online/offline remote data auditing with strong key-exposure resilience for cloud storage16
Delayed chaotic image encryption algorithm using cross-layer and DNA coding techniques16
TDBAMLA: Temporal and dynamic behavior analysis in Android malware using LSTM and attention mechanisms15
An analysis model for detecting misbehaviors in anonymous cryptocurrency15
An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage15
A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare15
Difference-based firefly programming for symbolic regression problems15
Optimal 5G network slicing using machine learning and deep learning concepts15
Editorial Board15
Generative AI and educational sustainability: Examining the role of knowledge management factors and AI attributes using a deep learning-based hybrid SEM-ANN approach14
Computing performance requirements for web service compositions14
Full black-box retrievable and accountable identity-based encryption13
Create your own MUSE: A method for updating security level evaluation instruments13
Designing novel proxy-based access control scheme for implantable medical devices12
Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm12
Privacy-preserving compromised credential checking protocol for account protection12
Proofs of retrievability with tag outsourcing based on Goppa codes12
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption12
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks11
Inner product encryption from Middle-Product Learning With Errors11
A process assessment model for big data analytics11
COBLAH: A chaotic OBL initialized hybrid algebraic-heuristic algorithm for optimal S-box construction11
Cryptanalysis of an additively homomorphic public key encryption scheme11
A parallel programming assessment for stream processing applications on multi-core systems11
A hybrid search and model-based approach for testing the self-adaptive unmanned aircraft system software10
Collaboration with Generative AI to improve Requirements Change10
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics10
A secure and efficient certificateless authenticated key agreement protocol for smart healthcare10
Abuse-resistant deniable encryption10
Research on the standardization model of data semantics in the knowledge graph construction of Oil&Gas industry10
Editorial Board9
FDF-HybridFS: Towards design of a failure detection framework using hybrid feature selection method for IP core networks that connect 5G core in NFV-based test environment9
Blockchain-based verifiable privacy-preserving data classification protocol for medical data9
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient9
A robust analysis of adversarial attacks on federated learning environments9
A critical analysis of Zero Trust Architecture (ZTA)9
DOA tracking for seamless connectivity in beamformed IoT-based drones9
MRAN: Multimodal relationship-aware attention network for fake news detection9
New tag-based signatures and their applications on linearly homomorphic signatures9
Efficient dynamic multi-client searchable encryption supporting fuzzy search9
0.077531099319458