Journal of Information Security and Applications

Papers
(The H4-Index of Journal of Information Security and Applications is 25. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
An authentication scheme for color images with grayscale invariance and recoverability using image demosaicing89
Profiled side channel attacks against the RSA cryptosystem using neural networks87
Authentication of rotogravure print-outs using a regular test pattern74
An efficient differential fault attack against SIMON key schedule53
Editorial Board50
Security analysis of menstruation cycle tracking applications using static, dynamic and machine learning techniques50
EO-PSI-CA: Efficient outsourced private set intersection cardinality44
Certificateless multi-source elliptic curve ring signcryption for cloud computing43
Editorial Board42
Two-party interactive secure deduplication with efficient data ownership management in cloud storage41
Editorial Board41
Distributed auditing protocol for untraceable transactions40
Anti-pruning multi-watermarking for ownership proof of steganographic autoencoders37
SNN-PPRL: A secure record matching scheme based on siamese neural network37
Two statistical traffic features for certain APT group identification37
Robust image watermarking algorithm using chaotic sequences34
A motional but temporally consistent physical video examples33
Robustness enhancement against adversarial steganography via steganalyzer outputs33
Impossible differential cryptanalysis of FBC-12831
A post-quantum signcryption scheme using isogeny based cryptography30
Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map30
Editorial Board28
Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM28
Understanding the effects of situational crime prevention and personality factors on insider compliance28
Describing correct UAVs cooperation architectures applied on an anti-terrorism scenario26
Image data security using Quasigroup combined with Fibonacci Q-transformation25
Secure encryption key management as a SecaaS based on Chinese wall security policy25
A new Private Mutual Authentication scheme with group discovery25
Introduction to the special issue on privacy and security for location-based services and devices25
The reality of backdoored S-Boxes—An eye opener25
PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage25
0.041775941848755