IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
ISSNs: 1556-6013
Additional searchable ISSN (Electronic): 1556-6021
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, United States
Scopus rating (2022): CiteScore 14.7 SJR 2.652 SNIP 2.664
Journal
Research Output
- 2015
- Published
New algorithms for secure outsourcing of large-scale systems of linear equations
Chen, X., Huang, X., Li, J., Ma, J., Lou, W. & Wong, D. S., Jan 2015, In: IEEE Transactions on Information Forensics and Security. 10, 1, p. 69-78 6926792.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 208 - Published
Traceable CP-ABE: How to trace decryption devices found in the wild
Liu, Z., Cao, Z. & Wong, D. S., Jan 2015, In: IEEE Transactions on Information Forensics and Security. 10, 1, p. 55-68 6926830.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 64 - 2014
- Published
An effective method for detecting double JPEG compression with the same quantization matrix
Yang, J., Xie, J., Zhu, G., Kwong, S. & Shi, Y., Nov 2014, In: IEEE Transactions on Information Forensics and Security. 9, 11, p. 1933-1942 6905821.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 96 - Published
Proof-Carrying Cloud Computation: The Case of Convex Optimization
Xu, Z., Wang, C., Ren, K., Wang, L. & Zhang, B., Nov 2014, In: IEEE Transactions on Information Forensics and Security. 9, 11, p. 1790-1803Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 16 - Published
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Phuong, T. V. X., & 1 others , Oct 2014, In: IEEE Transactions on Information Forensics and Security. 9, 10, p. 1667-1680 6873259.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 94 - Published
CP-ABE with constant-size keys for lightweight devices
Guo, F., Mu, Y., Susilo, W., Wong, D. S. & Varadharajan, V., May 2014, In: IEEE Transactions on Information Forensics and Security. 9, 5, p. 763-771Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 139 - 2013
- Published
DAC-MACS: Effective data access control for multiauthority cloud storage systems
Yang, K., Jia, X., Ren, K., Zhang, B. & Xie, R., Nov 2013, In: IEEE Transactions on Information Forensics and Security. 8, 11, p. 1790-1801 6585778.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 237 Reversible data hiding in encrypted images by reserving room before encryption
Ma, K., Zhang, W., Zhao, X., Yu, N. & Li, F., Mar 2013, In: IEEE Transactions on Information Forensics and Security. 8, 3, p. 553-562 6470679.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 454- Published
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
Liu, Z., Cao, Z. & Wong, D. S., Jan 2013, In: IEEE Transactions on Information Forensics and Security. 8, 1, p. 76-88 6327660.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 187 CAM: Cloud-assisted privacy preserving mobile health monitoring
Lin, H., Shao, J., Zhang, C. & Fang, Y., 2013, In: IEEE Transactions on Information Forensics and Security. 8, 6, p. 985-997 6490390.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 82- 2011
- Published
Efficient designated confirmer signature and DCS-based ambiguous optimistic fair exchange
Huang, Q., Wong, D. S. & Susilo, W., Dec 2011, In: IEEE Transactions on Information Forensics and Security. 6, 4, p. 1233-1247 5940227.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 11 - 2010
- Published
Fragility analysis of adaptive quantization-based image hashing
Zhu, G., Huang, J., Kwong, S. & Yang, J., Mar 2010, In: IEEE Transactions on Information Forensics and Security. 5, 1, p. 133-147 5353741.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 23 - 2009
- Published
A study on the randomness measure of image hashing
Zhu, G., Huang, J., Kwong, S. & Yang, J., Dec 2009, In: IEEE Transactions on Information Forensics and Security. 4, 4, p. 928-932 5282541.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 12 - 2008
- Published
Multipurpose watermarking based on multiscale curvelet transform
Zhang, C., Cheng, L. L., Qiu, Z. & Cheng, L. M., Dec 2008, In: IEEE Transactions on Information Forensics and Security. 3, 4, p. 611-619 4668376.Research output: Journal Publications and Reviews (RGC: 21, 22, 62) › 21_Publication in refereed journal › peer-review
Scopus citations: 63