[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Articles

Page 1 of 6

  1. The development of quantum computation enables exponential time complexity problems on classical computers to be solved in polynomial time on quantum computers. However, it also poses a threat to the security ...

    Authors: Anyi Li, Qiqing Xia, Qianru Zhu and Li Yang
    Citation: Cybersecurity 2024 7:63
  2. Voting plays a vital role in democratic societies. Adopting electronic voting can effectively increase voter participation and significantly reduce the financial burden on the organizers. In recent years, with...

    Authors: Baowei Wang, Fengxiao Guo, Yuting Liu, Bin Li and Yi Yuan
    Citation: Cybersecurity 2024 7:62
  3. Cryptography plays consistently an essential role in securing any sort of communications or data broadcast over the network. Since the security of any designed block cipher algorithm is related to its Substitu...

    Authors: Ismail El Gaabouri, Mohamed Senhadji, Mostafa Belkasmi and Brahim El Bhiri
    Citation: Cybersecurity 2024 7:59
  4. Financial institutions and businesses face an ongoing challenge from fraudulent transactions, prompting the need for effective detection methods. Detecting credit card fraud is crucial for identifying and prev...

    Authors: Md. Alamin Talukder, Rakib Hossen, Md Ashraf Uddin, Mohammed Nasir Uddin and Uzzal Kumar Acharjee
    Citation: Cybersecurity 2024 7:32
  5. It may be difficult for existing methods to make full use of the correlation and complementarity of various kinds of information when processing multi-source information. In order to accurately perceive the se...

    Authors: Jingzhi Liu, Hongyi Yang, Quanlei Qu, Zhidong Liu and Yang Cao
    Citation: Cybersecurity 2024 7:57
  6. Smart contracts have significant losses due to various types of vulnerabilities. However, traditional vulnerability detection methods rely extensively on expert rules, resulting in low detection accuracy and p...

    Authors: Jingjie Xu, Ting Wang, Mingqi Lv, Tieming Chen, Tiantian Zhu and Baiyang Ji
    Citation: Cybersecurity 2024 7:55
  7. SM9 was established in 2016 as a Chinese official identity-based cryptographic (IBC) standard, and became an ISO standard in 2021. It is well-known that IBC is suitable for Internet of Things (IoT) application...

    Authors: Wenhan Xu, Hui Ma and Rui Zhang
    Citation: Cybersecurity 2024 7:29
  8. The differential privacy (DP) literature often centers on meeting privacy constraints by introducing noise to the query, typically using a pre-specified parametric distribution model with one or two degrees of...

    Authors: Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino and Aram Shumavon
    Citation: Cybersecurity 2024 7:54
  9. The processing of personal data gives a rise to many privacy concerns, and one of them is to ensure the transparency of data processing to end users. Usually this information is communicated to them using priv...

    Authors: Mikhail Kuznetsov, Evgenia Novikova and Igor Kotenko
    Citation: Cybersecurity 2024 7:41
  10. The Internet of Things (IoT) has gained popularity and is widely used in modern society. The growth in the sizes of IoT networks with more internet-connected devices has led to concerns regarding privacy and s...

    Authors: Chenset Kim, Chakchai So-In, Yanika Kongsorot and Phet Aimtongkham
    Citation: Cybersecurity 2024 7:27
  11. The group fuzzy extractor allows group users to extract and reproduce group cryptographic keys from their individual non-uniform random sources. It can be easily used in group-oriented cryptographic applicatio...

    Authors: Kaini Chen, Peisong Shen, Kewei Lv, Xue Tian and Chi Chen
    Citation: Cybersecurity 2024 7:25
  12. Text-to-image (TTI) models provide huge innovation ability for many industries, while the content security triggered by them has also attracted wide attention. Considerable research has focused on content secu...

    Authors: Juntao He, Haoran Dai, Runqi Sui, Xuejing Yuan, Dun Liu, Hao Feng, Xinyue Liu, Wenchuan Yang, Baojiang Cui and Kedan Li
    Citation: Cybersecurity 2024 7:70
  13. Advanced Persistent Threats (APTs) achieves internal networks penetration through multiple methods, making it difficult to detect attack clues solely through boundary defense measures. To address this challeng...

    Authors: Boyuan Xu, Yiru Gong, Xiaoyu Geng, Yun Li, Cong Dong, Song Liu, Yuling Liu, Bo Jiang and Zhigang Lu
    Citation: Cybersecurity 2024 7:51
  14. As mobile internet and Internet of Things technologies continue to advance, the application scenarios of peer-to-peer Internet of Drones (IoD) are becoming increasingly diverse. However, the development of IoD...

    Authors: Zhuo Zhao, Chingfang Hsu, Lein Harn, Zhe Xia, Xinyu Jiang and Liu Liu
    Citation: Cybersecurity 2024 7:50
  15. Since the advent of Bitcoin, cryptocurrencies have gained substantial popularity, and crypto wallets have evolved into the predominant tool for safeguarding and managing cryptographic keys to access cryptocurrenc...

    Authors: Mingxing Hu, Zhen Liu and Yunhong Zhou
    Citation: Cybersecurity 2024 7:24
  16. Unprotected gradient exchange in federated learning (FL) systems may lead to gradient leakage-related attacks. CKKS is a promising approximate homomorphic encryption scheme to protect gradients, owing to its u...

    Authors: Yao Pan, Zheng Chao, Wang He, Yang Jing, Li Hongjia and Wang Liming
    Citation: Cybersecurity 2024 7:40
  17. With the popularity of the media cloud computing industry, individuals and organizations outsource image computation and storage to the media cloud server to reduce the storage burden. Media images usually con...

    Authors: Miao Tian, Yushu Zhang, Yongming Zhang, Xiangli Xiao and Wenying Wen
    Citation: Cybersecurity 2024 7:22
  18. The Internet of Things (IoT) integrates more than billions of intelligent devices over the globe with the capability of communicating with other connected devices with little to no human intervention. IoT enab...

    Authors: Tin Lai, Farnaz Farid, Abubakar Bello and Fariza Sabrina
    Citation: Cybersecurity 2024 7:44
  19. Within the thriving e-commerce landscape, some unscrupulous merchants hire spammer groups to post misleading reviews or ratings, aiming to manipulate public perception and disrupt fair market competition. This...

    Authors: Chaoqun Wang, Ning Li, Shujuan Ji, Xianwen Fang and Zhen Wang
    Citation: Cybersecurity 2024 7:37
  20. Atomic Cross-Chain Swap (ACCS) is one important topic in cryptocurrency, where users can securely and trustlessly exchange assets between two different blockchains. However, most known ACCS schemes assume spec...

    Authors: Zeshuo Zhu, Rui Zhang and Yang Tao
    Citation: Cybersecurity 2024 7:12

Affiliated with

  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • DBLP
  • DOAJ
  • SCOPUS
  • EBSCO Discovery Service
  • Gale
  • INSPEC
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Dimensions
  • CNKI
  • Naver
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

  • Citation Impact 2023
    Journal Impact Factor: 4.0
    5-year Journal Impact Factor: 4.9
    Source Normalized Impact per Paper (SNIP): 1.587
    SCImago Journal Rank (SJR): 1.136

    Speed 2023
    Submission to first editorial decision (median days): 8
    Submission to acceptance (median days): 95

    Usage 2023
    Downloads: 408,523
    Altmetric mentions: 15