IEEE Transactions on Information Forensics and Security

IEEE Transactions on Information Forensics and Security

ISSNs: 1556-6013

Additional searchable ISSN (Electronic): 1556-6021

Institute of Electrical and Electronics Engineers, United States

Scopus rating (2016): CiteScore 6.01 SJR 1.359 SNIP 3.162

Journal

Research Output

  1. 2017
  2. Published

    Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data

    Fu, Z., Huang, F., Ren, K., Weng, J. & Wang, C. 1 Aug 2017 In : IEEE Transactions on Information Forensics and Security. 12, 8, p. 1874-1884 7895156

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

    Scopus citations: 3
  3. Published

    Privacy-Preserving Image Denoising from External Cloud Databases

    Zheng, Y., Cui, H., Wang, C. & Zhou, J. 1 Jun 2017 In : IEEE Transactions on Information Forensics and Security. 12, 6, p. 1285-1298 7833136

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

  4. Accepted/In press/Filed

    Privacy-preserving Similarity Joins Over Encrypted Data

    YUAN, X., WANG, X., WANG, C., YU, C. & NUTANONG, S. Jun 2017 In : IEEE Transactions on Information Forensics and Security.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journal

  5. 2016
  6. Published

    Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

    YU, J., REN, K. & WANG, C. 20 Jun 2016 In : IEEE Transactions on Information Forensics and Security. 11, 6, p. 1362-1375

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 12
  7. Published

    Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds

    Hu, P., Sung, C. W., Ho, S-W. & Chan, T. H. 2016 In : IEEE Transactions on Information Forensics and Security. 11, 2, p. 388-399

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

  8. 2015
  9. Published

    Enabling Cloud Storage Auditing With Key-Exposure Resistance

    Yu, J., Ren, K., Wang, C. & Varadharajan, V. 1 Jun 2015 In : IEEE Transactions on Information Forensics and Security. 10, 6, p. 1167-1179 7031921

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 36
  10. Published

    New algorithms for secure outsourcing of large-scale systems of linear equations

    Chen, X., Huang, X., Li, J., Ma, J., Lou, W. & Wong, D. S. 1 Jan 2015 In : IEEE Transactions on Information Forensics and Security. 10, 1, p. 69-78 6926792

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 24
  11. Published

    Traceable CP-ABE: How to trace decryption devices found in the wild

    Liu, Z., Cao, Z. & Wong, D. S. 1 Jan 2015 In : IEEE Transactions on Information Forensics and Security. 10, 1, p. 55-68 6926830

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 11
  12. 2014
  13. Published

    An effective method for detecting double JPEG compression with the same quantization matrix

    Yang, J., Xie, J., Zhu, G., Kwong, S. & Shi, Y-Q. 1 Nov 2014 In : IEEE Transactions on Information Forensics and Security. 9, 11, p. 1933-1942 6905821

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 11
  14. Published

    Proof-carrying cloud computation: The case of convex optimization

    Xu, Z., Wang, C., Ren, K., Wang, L. & Zhang, B. 1 Nov 2014 In : IEEE Transactions on Information Forensics and Security. 9, 11, p. 1790-1803 6884828

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 5
  15. Published

    A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

    Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Phuong, T. V. X. & Xie, Q. 1 Oct 2014 In : IEEE Transactions on Information Forensics and Security. 9, 10, p. 1667-1680 6873259

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 26
  16. Published

    CP-ABE with constant-size keys for lightweight devices

    Guo, F., Mu, Y., Susilo, W., Wong, D. S. & Varadharajan, V. May 2014 In : IEEE Transactions on Information Forensics and Security. 9, 5, p. 763-771 6757025

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 24
  17. 2013
  18. Published

    DAC-MACS: Effective data access control for multiauthority cloud storage systems

    Yang, K., Jia, X., Ren, K., Zhang, B. & Xie, R. 2013 In : IEEE Transactions on Information Forensics and Security. 8, 11, p. 1790-1801 6585778

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 78
  19. Published

    White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures

    Liu, Z., Cao, Z. & Wong, D. S. 2013 In : IEEE Transactions on Information Forensics and Security. 8, 1, p. 76-88 6327660

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 47
  20. 2011
  21. Published

    Efficient designated confirmer signature and DCS-based ambiguous optimistic fair exchange

    Huang, Q., Wong, D. S. & Susilo, W. Dec 2011 In : IEEE Transactions on Information Forensics and Security. 6, 4, p. 1233-1247 5940227

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 7
  22. 2010
  23. Published

    Fragility analysis of adaptive quantization-based image hashing

    Zhu, G., Huang, J., Kwong, S. & Yang, J. Mar 2010 In : IEEE Transactions on Information Forensics and Security. 5, 1, p. 133-147 5353741

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 14
  24. 2009
  25. Published

    A study on the randomness measure of image hashing

    Zhu, G., Huang, J., Kwong, S. & Yang, J. Dec 2009 In : IEEE Transactions on Information Forensics and Security. 4, 4, p. 928-932 5282541

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 11
  26. 2008
  27. Published

    Multipurpose watermarking based on multiscale curvelet transform

    Zhang, C., Cheng, L. L., Qiu, Z. & Cheng, L. M. Dec 2008 In : IEEE Transactions on Information Forensics and Security. 3, 4, p. 611-619 4668376

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)22_Publication in policy or professional journal

    Scopus citations: 34