Computer Standards & Interfaces

Papers
(The TQCC of Computer Standards & Interfaces is 9. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
Editorial Board109
A heuristic design toolkit for web conferencing software based on self-determination theory103
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications102
Water supply monitoring system with self-powered LoRa based wireless sensor system powered by solar and hydroelectric energy harvester94
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing81
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping69
Toward secure distributed data storage with error locating in blockchain enabled edge computing60
Patient-centric medical service matching with fine-grained access control and dynamic user management57
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network54
Unveiling process insights from refactoring practices52
Provably secure multi-signature scheme based on the standard SM2 signature scheme51
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet48
Practical reusable garbled circuits with parallel updates47
Over-threshold multi-party private set operation protocols for lightweight clients47
Construction of a high-precision general geographical location words dataset46
Evaluating large language models for software testing44
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates44
Facilitating the monitoring and management of structural health in civil infrastructures with an Edge/Fog/Cloud architecture43
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology42
Key-aggregate based access control encryption for flexible cloud data sharing40
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size40
Towards projection of the individualised risk assessment for the cybersecurity workforce37
An effective image annotation using self-attention based stacked bidirectional capsule network36
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system33
Efficient plane extraction using normal estimation and RANSAC from 3D point cloud31
Round efficient privacy-preserving federated learning based on MKFHE30
MARISMA: A modern and context-aware framework for assessing and managing information cybersecurity risks30
Prototype, method, and experiment for evaluating usability of smart home user interfaces29
Designing usability/user experience heuristics to evaluate e-assessments administered to children28
Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering co27
RSH-BU: Revocable secret handshakes with backward unlinkability from VLR group signatures27
Blockchain based lightweight authentication scheme for internet of things using lattice encryption algorithm27
Securing social platform from misinformation using deep learning26
6G-enabled Edge Intelligence for Ultra -Reliable Low Latency Applications: Vision and Mission26
Quantum-safe Anonymous Hierarchical Identity-Based Encryption with Traceable Identities26
A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA26
Advanced Electronic Signatures and eIDAS – Analysis of the Concept25
Context checklist for industrial software engineering research and practice25
HT24
On the effects of continuous delivery on code quality: A case study in industry24
Information technologies exposing children to privacy risks: Domains and children-specific technical controls22
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing22
KASE-AKA: Key-aggregate keyword searchable encryption against keyword guessing attack and authorization abuse19
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption18
Module learning with rounding based key agreement scheme with modified reconciliation18
Performance evaluation of secured network traffic classification using a machine learning approach18
AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks18
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property18
Testability-driven development: An improvement to the TDD efficiency17
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis17
Comparative effects of knowledge-based antecedents in different realms of CMMI-based software process improvement success17
Exploring users’ switching intention and behavior on social networking sites: Linear and nonlinear perspectives17
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR17
Large language models for code completion: A systematic literature review16
Intelligent driver monitoring system: An Internet of Things-based system for tracking and identifying the driving behavior16
Online/offline remote data auditing with strong key-exposure resilience for cloud storage16
Delayed chaotic image encryption algorithm using cross-layer and DNA coding techniques16
Editorial Board15
TDBAMLA: Temporal and dynamic behavior analysis in Android malware using LSTM and attention mechanisms15
An analysis model for detecting misbehaviors in anonymous cryptocurrency15
An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage15
A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare15
Difference-based firefly programming for symbolic regression problems15
Optimal 5G network slicing using machine learning and deep learning concepts15
Computing performance requirements for web service compositions14
Generative AI and educational sustainability: Examining the role of knowledge management factors and AI attributes using a deep learning-based hybrid SEM-ANN approach14
Create your own MUSE: A method for updating security level evaluation instruments13
Full black-box retrievable and accountable identity-based encryption13
A secure data storage and sharing scheme for port supply chain based on blockchain and dynamic searchable encryption12
Designing novel proxy-based access control scheme for implantable medical devices12
Performance analysis of multiple-input multiple-output orthogonal frequency division multiplexing system using arithmetic optimization algorithm12
Privacy-preserving compromised credential checking protocol for account protection12
Proofs of retrievability with tag outsourcing based on Goppa codes12
Leveraging complex event processing for monitoring and automatically detecting anomalies in Ethereum-based blockchain networks11
Inner product encryption from Middle-Product Learning With Errors11
A process assessment model for big data analytics11
COBLAH: A chaotic OBL initialized hybrid algebraic-heuristic algorithm for optimal S-box construction11
Cryptanalysis of an additively homomorphic public key encryption scheme11
A parallel programming assessment for stream processing applications on multi-core systems11
A hybrid search and model-based approach for testing the self-adaptive unmanned aircraft system software10
Collaboration with Generative AI to improve Requirements Change10
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics10
A secure and efficient certificateless authenticated key agreement protocol for smart healthcare10
Abuse-resistant deniable encryption10
Research on the standardization model of data semantics in the knowledge graph construction of Oil&Gas industry10
DOA tracking for seamless connectivity in beamformed IoT-based drones9
Editorial Board9
New tag-based signatures and their applications on linearly homomorphic signatures9
Efficient dynamic multi-client searchable encryption supporting fuzzy search9
A robust analysis of adversarial attacks on federated learning environments9
FDF-HybridFS: Towards design of a failure detection framework using hybrid feature selection method for IP core networks that connect 5G core in NFV-based test environment9
Blockchain-based verifiable privacy-preserving data classification protocol for medical data9
An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient9
MRAN: Multimodal relationship-aware attention network for fake news detection9
A critical analysis of Zero Trust Architecture (ZTA)9
0.16039204597473