Sign in
Comput. Stand. Interfaces
1996
2005
2015
2024
1996
2024
Keyphrases
Publications
volume 88, 2024
Manuel Paneque
,
María del Mar Roldán García
,
Carlos Blanco
,
Alejandro Maté
,
David Garcia Rosado
,
Juan Trujillo
An ontology-based secure design framework for graph-based databases.
Comput. Stand. Interfaces
88 (2024)
Yichao Lu
,
Huilin Li
,
Le Gao
,
Jiaxin Yu
,
Yong Yu
,
Hexing Su
Self-tallying e-voting with public traceability based on blockchain.
Comput. Stand. Interfaces
88 (2024)
Shuaining Gao
,
Xinjian Chen
,
Hongbo Li
,
Willy Susilo
,
Qiong Huang
Post-quantum secure group signature with verifier local revocation and backward unlinkability.
Comput. Stand. Interfaces
88 (2024)
Cheng-Jun Lin
,
Rui Xue
,
Xinyi Huang
,
Shao-Jun Yang
New tag-based signatures and their applications on linearly homomorphic signatures.
Comput. Stand. Interfaces
88 (2024)
Lisha Bai
,
Lei Yong
,
Zhixian Chen
,
Jun Shao
Pairing-free public-key authenticated encryption with keyword search.
Comput. Stand. Interfaces
88 (2024)
Shuqin Liu
,
Xialin Liu
,
Wanxuan Huang
,
Kai Du
Efficient dynamic multi-client searchable encryption supporting fuzzy search.
Comput. Stand. Interfaces
88 (2024)
Jinlu Liu
,
Jing Qin
,
Wenchao Wang
,
Lin Mei
,
Huaxiong Wang
Key-aggregate based access control encryption for flexible cloud data sharing.
Comput. Stand. Interfaces
88 (2024)
Kui Ma
,
Guoji Song
,
Yanwei Zhou
,
Ran Xu
,
Bo Yang
An efficient identity authentication protocol with revocation, tracking and fine-grained access control for electronic medical system.
Comput. Stand. Interfaces
88 (2024)
Qingqing Gan
,
Xiaoming Wang
,
Daxin Huang
,
Jianwei Li
,
Changji Wang
,
Zhen Liu
Online/offline remote data auditing with strong key-exposure resilience for cloud storage.
Comput. Stand. Interfaces
88 (2024)
Liju Ma
,
Hao Wang
,
Ziyu Niu
,
Zhi Li
,
Lei Wu
,
Xiaochao Wei
,
Ye Su
Over-threshold multi-party private set operation protocols for lightweight clients.
Comput. Stand. Interfaces
88 (2024)
Jose Luis de la Vara
,
Hector Bahamonde
,
Clara Ayora
Assessment of the quality of the text of safety standards with industrial semantic technologies.
Comput. Stand. Interfaces
88 (2024)
Saurabh Shukla
,
Shahid Hussain
,
Reyazur Rashid Irshad
,
Ahmed Abdu Alattab
,
Subhasis Thakur
,
John G. Breslin
,
Mohd Fadzil Hassan
,
Satheesh Abimannan
,
Moh. Shahid Husain
,
Syed Muslim Jameel
Network analysis in a peer-to-peer energy trading model using blockchain and machine learning.
Comput. Stand. Interfaces
88 (2024)
Ahmet Vedat Tokmak
,
Akhan Akbulut
,
Cagatay Catal
Web service discovery: Rationale, challenges, and solution directions.
Comput. Stand. Interfaces
88 (2024)
Pronaya Bhattacharya
,
Amod Kumar Tiwari
,
Ashwin Verma
,
Abdulatif Alabdulatif
,
Sudeep Tanwar
,
Ravi Sharma
: A trusted lightweight signcryption and consensus scheme for industrial IoT ecosystems.
Comput. Stand. Interfaces
88 (2024)
Yi-Fan Tseng
Attribute hiding subset predicate encryption: Quantum-resistant construction with efficient decryption.
Comput. Stand. Interfaces
88 (2024)
Saleha Saudagar
,
Rekha Ranawat
An Amalgamated Novel IDS Model for Misbehaviour Detection using VeReMiNet.
Comput. Stand. Interfaces
88 (2024)
Tao Xiang
,
Zhongming Wang
,
Biwen Chen
,
Xiaoguo Li
,
Peng Wang
,
Fei Chen
StopGuess: A framework for public-key authenticated encryption with keyword search.
Comput. Stand. Interfaces
88 (2024)
Jose M. Barrera
,
Alejandro Reina-Reina
,
Ana Lavalle
,
Alejandro Maté
,
Juan Trujillo
An extension of iStar for Machine Learning requirements by following the PRISE methodology.
Comput. Stand. Interfaces
88 (2024)
B. Meenakshi
,
D. Karunkuzhali
Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network.
Comput. Stand. Interfaces
88 (2024)
Gholamali Nejad Hajali Irani
,
Habib Izadkhah
Sahand 1.0: A new model for extracting information from source code in object-oriented projects.
Comput. Stand. Interfaces
88 (2024)
volume 87, 2024
Jifa Hu
,
Fuqun Wang
,
Kefei Chen
Faster matrix approximate homomorphic encryption.
Comput. Stand. Interfaces
87 (2024)
Abderrahmane Nitaj
,
Willy Susilo
,
Joseph Tonien
Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property.
Comput. Stand. Interfaces
87 (2024)
Niao Yang
,
Shaojun Yang
,
Yong Zhao
,
Wei Wu
,
Xuewei Wang
Inner product encryption from Middle-Product Learning With Errors.
Comput. Stand. Interfaces
87 (2024)
Qiming Yu
,
Shilei Liao
,
Lianhai Wang
,
Yong Yu
,
Lingyue Zhang
,
Yanqi Zhao
A regulated anonymous cryptocurrency with batch linkability.
Comput. Stand. Interfaces
87 (2024)
Vikas R. Palekar
,
L. Sathish Kumar
Adaptive optimized residual convolutional image annotation model with bionic feature selection model.
Comput. Stand. Interfaces
87 (2024)
Adam Rizvi Thahir
,
Mustafa Coskun
,
Sultan Kübra Kiliç
,
Vehbi Cagri Gungor
Intelligent traffic light systems using edge flow predictions.
Comput. Stand. Interfaces
87 (2024)
Mohammadpayam Almasian
,
Alireza Shafieinejad
Secure cloud file sharing scheme using blockchain and attribute-based encryption.
Comput. Stand. Interfaces
87 (2024)
Chang Xu
,
Zijian Chan
,
Liehuang Zhu
,
Rongxing Lu
,
Yunguo Guan
,
Kashif Sharif
Efficient and privacy-preserving similar electronic medical records query for large-scale ehealthcare systems.
Comput. Stand. Interfaces
87 (2024)
Haibo Tian
,
Yanchuan Wen
,
Fangguo Zhang
,
Yunfeng Shao
,
Bingshuai Li
Lattice based distributed threshold additive homomorphic encryption with application in federated learning.
Comput. Stand. Interfaces
87 (2024)
Wenchao Liu
,
Tanping Zhou
,
Long Chen
,
Hongjian Yang
,
Jiang Han
,
Xiaoyuan Yang
Round efficient privacy-preserving federated learning based on MKFHE.
Comput. Stand. Interfaces
87 (2024)
Leixiao Cheng
,
Jing Qin
,
Fei Meng
Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises.
Comput. Stand. Interfaces
87 (2024)
Xiaoyi Yang
,
Yanqi Zhao
,
Sufang Zhou
,
Lianhai Wang
A lightweight delegated private set intersection cardinality protocol.
Comput. Stand. Interfaces
87 (2024)
Mengqi Feng
,
Chao Lin
,
Wei Wu
,
Debiao He
SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size.
Comput. Stand. Interfaces
87 (2024)
Yanmei Cao
,
Jianghong Wei
,
Yang Xiang
,
Willy Susilo
,
Xiaofeng Chen
Abuse-resistant deniable encryption.
Comput. Stand. Interfaces
87 (2024)
Kaifeng Xiao
,
Xinjian Chen
,
Jianye Huang
,
Hongbo Li
,
Qiong Huang
A lattice-based public key encryption scheme with delegated equality test.
Comput. Stand. Interfaces
87 (2024)
Mari Seeba
,
Abasi-Amefon Obot Affia
,
Sten Mäses
,
Raimundas Matulevicius
Create your own MUSE: A method for updating security level evaluation instruments.
Comput. Stand. Interfaces
87 (2024)
Amjad Rehman
,
Ibrahim Abunadi
,
Khalid Haseeb
,
Tanzila Saba
,
Jaime Lloret
Intelligent and trusted metaheuristic optimization model for reliable agricultural network.
Comput. Stand. Interfaces
87 (2024)
Lifei Wei
,
Jihai Liu
,
Lei Zhang
,
Qin Wang
,
Wuji Zhang
,
Xiansong Qian
Efficient multi-party private set intersection protocols for large participants and small sets.
Comput. Stand. Interfaces
87 (2024)
Dun Li
,
Dezhi Han
,
Tien-Hsiung Weng
,
Zibin Zheng
,
Hongzhi Li
,
Kuan-Ching Li
On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method.
Comput. Stand. Interfaces
87 (2024)
Rubén Grande
,
Aurora Vizcaíno
,
Félix Oscar García
Is it worth adopting DevOps practices in Global Software Engineering? Possible challenges and benefits.
Comput. Stand. Interfaces
87 (2024)
Sara Nieves Matheu-García
,
Adrián Sánchez-Cabrera
,
Enrico Schiavone
,
Antonio F. Skarmeta
Integrating the manufacturer usage description standard in the modelling of cyber-physical systems.
Comput. Stand. Interfaces
87 (2024)
Yang Wang
,
Yanmin Zhao
,
Mingqiang Wang
Lattice-based key private PREs with HRA security and PCS security.
Comput. Stand. Interfaces
87 (2024)
Longfei Wu
,
John Du
Designing novel proxy-based access control scheme for implantable medical devices.
Comput. Stand. Interfaces
87 (2024)
Anjali Rajak
,
Rakesh Tripathi
FDF-HybridFS: Towards design of a failure detection framework using hybrid feature selection method for IP core networks that connect 5G core in NFV-based test environment.
Comput. Stand. Interfaces
87 (2024)
Jingwei Lu
,
Hongbo Li
,
Jianye Huang
,
Sha Ma
,
Man Ho Allen Au
,
Qiong Huang
An Identity-Based Encryption with Equality Test scheme for healthcare social apps.
Comput. Stand. Interfaces
87 (2024)
Burak Uzun
,
Bedir Tekinerdogan
Detecting deviations in the code using architecture view-based drift analysis.
Comput. Stand. Interfaces
87 (2024)
A. Noorian
A BERT-Based Sequential POI Recommender system in Social Media.
Comput. Stand. Interfaces
87 (2024)
volume 86, 2023
Akarsh K. Nair
,
Ebin Deni Raj
,
Jayakrushna Sahoo
A robust analysis of adversarial attacks on federated learning environments.
Comput. Stand. Interfaces
86 (2023)
Fucai Luo
,
Haiyan Wang
,
Saif M. Al-Kuwari
,
Weihong Han
Multi-key Fully Homomorphic Encryption without CRS from RLWE.
Comput. Stand. Interfaces
86 (2023)
Duong Thu May
,
Dmitriy Nikolaevich Moldovyan
,
Do Viet Binh
,
Minh Hieu Nguyen
Post-quantum signature algorithms on noncommutative algebras, using difficulty of solving systems of quadratic equations.
Comput. Stand. Interfaces
86 (2023)