Journal of Information Security and Applications

Papers
(The H4-Index of Journal of Information Security and Applications is 27. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-05-01 to 2025-05-01.)
ArticleCitations
A novel 5-bit S-box design for lightweight cryptography algorithms92
Dynamic secure multi-keyword ranked search over encrypted cloud data91
Editorial Board78
SBRAC: Blockchain-based sealed-bid auction with bidding price privacy and public verifiability54
Maaker: A framework for detecting and defeating evasion techniques in Android malware52
The reality of backdoored S-Boxes—An eye opener51
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM46
Introduction to the special issue on privacy and security for location-based services and devices44
Impossible differential cryptanalysis of FBC-12844
Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures43
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi43
Statistical privacy protection for secure data access control in cloud40
A deep learning assisted personalized deception system for countering web application attacks40
Detection of Evasive Android Malware Using EigenGCN39
PVO-based reversible data hiding using bit plane segmentation and pixel expansion38
Refined statistical attacks against searchable symmetric encryption using non-indexed documents37
Bane or Boon: Measuring the effect of evasive malware on system call classifiers37
Incorporating deep learning into capacitive images for smartphone user authentication35
Lightweight privacy-preserving authenticated key agreements using physically unclonable functions for internet of drones35
Synergistic compensation for RGB-based blind color image watermarking to withstand JPEG compression35
Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage34
Robust zero-watermarking algorithm via multi-scale feature analysis for medical images33
PGAN framework for synthesizing sensor data privately32
Smart contracts vulnerability detection model based on adversarial multi-task learning28
Current approaches and future directions for Cyber Threat Intelligence sharing: A survey28
Image data security using Quasigroup combined with Fibonacci Q-transformation28
PUF enable lightweight key-exchange and mutual authentication protocol for multi-server based D2D communication27
Editorial Board27
A novel key and image concealing with static-dynamic pattern using modified periodic table27
0.10644316673279