IEEE Transactions on Information Forensics and Security

IEEE Transactions on Information Forensics and Security

ISSNs: 1556-6013

Additional searchable ISSN (Electronic): 1556-6021

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, United States

Scopus rating (2022): CiteScore 14.7 SJR 2.652 SNIP 2.664

Journal

Journal Metrics

Research Output

  1. 2015
  2. Published

    New algorithms for secure outsourcing of large-scale systems of linear equations

    Chen, X., Huang, X., Li, J., Ma, J., Lou, W. & Wong, D. S., Jan 2015, In: IEEE Transactions on Information Forensics and Security. 10, 1, p. 69-78 6926792.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 208
    Check@CityULib
  3. Published

    Traceable CP-ABE: How to trace decryption devices found in the wild

    Liu, Z., Cao, Z. & Wong, D. S., Jan 2015, In: IEEE Transactions on Information Forensics and Security. 10, 1, p. 55-68 6926830.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 64
    Check@CityULib
  4. 2014
  5. Published

    An effective method for detecting double JPEG compression with the same quantization matrix

    Yang, J., Xie, J., Zhu, G., Kwong, S. & Shi, Y., Nov 2014, In: IEEE Transactions on Information Forensics and Security. 9, 11, p. 1933-1942 6905821.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 96
    Check@CityULib
  6. Published

    Proof-Carrying Cloud Computation: The Case of Convex Optimization

    Xu, Z., Wang, C., Ren, K., Wang, L. & Zhang, B., Nov 2014, In: IEEE Transactions on Information Forensics and Security. 9, 11, p. 1790-1803

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 16
    Check@CityULib
  7. Published

    A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

    Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Phuong, T. V. X., & 1 othersXie, Q., Oct 2014, In: IEEE Transactions on Information Forensics and Security. 9, 10, p. 1667-1680 6873259.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 94
    Check@CityULib
  8. Published

    CP-ABE with constant-size keys for lightweight devices

    Guo, F., Mu, Y., Susilo, W., Wong, D. S. & Varadharajan, V., May 2014, In: IEEE Transactions on Information Forensics and Security. 9, 5, p. 763-771

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 139
    Check@CityULib
  9. 2013
  10. Published

    DAC-MACS: Effective data access control for multiauthority cloud storage systems

    Yang, K., Jia, X., Ren, K., Zhang, B. & Xie, R., Nov 2013, In: IEEE Transactions on Information Forensics and Security. 8, 11, p. 1790-1801 6585778.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 237
    Check@CityULib
  11. Reversible data hiding in encrypted images by reserving room before encryption

    Ma, K., Zhang, W., Zhao, X., Yu, N. & Li, F., Mar 2013, In: IEEE Transactions on Information Forensics and Security. 8, 3, p. 553-562 6470679.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 454
    Check@CityULib
  12. Published

    White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures

    Liu, Z., Cao, Z. & Wong, D. S., Jan 2013, In: IEEE Transactions on Information Forensics and Security. 8, 1, p. 76-88 6327660.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 187
    Check@CityULib
  13. CAM: Cloud-assisted privacy preserving mobile health monitoring

    Lin, H., Shao, J., Zhang, C. & Fang, Y., 2013, In: IEEE Transactions on Information Forensics and Security. 8, 6, p. 985-997 6490390.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 82
    Check@CityULib
  14. 2011
  15. Published

    Efficient designated confirmer signature and DCS-based ambiguous optimistic fair exchange

    Huang, Q., Wong, D. S. & Susilo, W., Dec 2011, In: IEEE Transactions on Information Forensics and Security. 6, 4, p. 1233-1247 5940227.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 11
    Check@CityULib
  16. 2010
  17. Published

    Fragility analysis of adaptive quantization-based image hashing

    Zhu, G., Huang, J., Kwong, S. & Yang, J., Mar 2010, In: IEEE Transactions on Information Forensics and Security. 5, 1, p. 133-147 5353741.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 23
    Check@CityULib
  18. 2009
  19. Published

    A study on the randomness measure of image hashing

    Zhu, G., Huang, J., Kwong, S. & Yang, J., Dec 2009, In: IEEE Transactions on Information Forensics and Security. 4, 4, p. 928-932 5282541.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 12
    Check@CityULib
  20. 2008
  21. Published

    Multipurpose watermarking based on multiscale curvelet transform

    Zhang, C., Cheng, L. L., Qiu, Z. & Cheng, L. M., Dec 2008, In: IEEE Transactions on Information Forensics and Security. 3, 4, p. 611-619 4668376.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 63
    Check@CityULib
Previous 1 2 3 Next