IEEE Transactions on Dependable and Secure Computing

Papers
(The H4-Index of IEEE Transactions on Dependable and Secure Computing is 45. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment221
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks177
Cloud Centric Authentication for Wearable Healthcare Monitoring System173
SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities158
Adaptive Payload Distribution in Multiple Images Steganography Based on Image Texture Features124
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things123
Searchable Symmetric Encryption with Forward Search Privacy122
LVBS: Lightweight Vehicular Blockchain for Secure Data Sharing in Disaster Rescue122
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds112
Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting103
A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection102
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing98
Detecting Adversarial Image Examples in Deep Neural Networks with Adaptive Noise Reduction98
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services92
ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks82
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency81
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks80
Distributed Attack Detection in a Water Treatment Plant: Method and Case Study75
Robust and Universal Seamless Handover Authentication in 5G HetNets72
Efficient Cyber Attack Detection in Industrial Control Systems Using Lightweight Neural Networks and PCA68
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification67
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability66
A Game-Theoretical Approach for Mitigating Edge DDoS Attack65
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness62
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark (Web)61
EC2: Ensemble Clustering and Classification for Predicting Android Malware Families60
Revocable Attribute-Based Encryption With Data Integrity in Clouds59
Deep Learning and Visualization for Identifying Malware Families58
Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment57
Multi-authority Attribute-Based Keyword Search over Encrypted Cloud Data57
Quantum2FA: Efficient Quantum-Resistant Two-Factor Authentication Scheme for Mobile Devices56
Blockchain-Based Certificate Transparency and Revocation Transparency55
VulDeeLocator: A Deep Learning-Based Fine-Grained Vulnerability Detector54
Multi-User Verifiable Searchable Symmetric Encryption for Cloud Storage51
Software Vulnerability Discovery via Learning Multi-Domain Knowledge Bases51
Detecting Sybil Attacks Using Proofs of Work and Location in VANETs51
Privacy-Preserving Data Processing with Flexible Access Control50
A Blockchain-Based Self-Tallying Voting Protocol in Decentralized IoT50
Immersive Virtual Reality Attacks and the Human Joystick49
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds48
Lattice-Based Public Key Searchable Encryption from Experimental Perspectives48
Quantum-Safe Round-Optimal Password Authentication for Mobile Devices47
Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language46
An Efficient NIZK Scheme for Privacy-Preserving Transactions Over Account-Model Blockchain46
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs46
Locally Differentially Private Heavy Hitter Identification45
0.06383204460144