IEEE Transactions on Information Forensics and Security

IEEE Transactions on Information Forensics and Security

ISSNs: 1556-6013

Additional searchable ISSN (Electronic): 1556-6021

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, United States

Scopus rating (2022): CiteScore 14.7 SJR 2.652 SNIP 2.664

Journal

Journal Metrics

Research Output

  1. 2017
  2. Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables

    Revadigar, G., Javali, C., Xu, W., Vasilakos, A. V., Hu, W. & Jha, S., Oct 2017, In: IEEE Transactions on Information Forensics and Security. 12, 10, p. 2467-2482 16 p., 7934407.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 37
    Check@CityULib
  3. Published

    Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs over Encrypted Outsourced Data

    Fu, Z., Huang, F., Ren, K., Weng, J. & Wang, C., 1 Aug 2017, In: IEEE Transactions on Information Forensics and Security. 12, 8, p. 1874-1884 7895156.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 152
    Check@CityULib
  4. Published

    Privacy-Preserving Image Denoising from External Cloud Databases

    Zheng, Y., Cui, H., Wang, C. & Zhou, J., Jun 2017, In: IEEE Transactions on Information Forensics and Security. 12, 6, p. 1285-1298 7833136.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 37
    Check@CityULib
  5. 2016
  6. Published

    Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates

    Yu, J., Ren, K. & Wang, C., Jun 2016, In: IEEE Transactions on Information Forensics and Security. 11, 6, p. 1362-1375

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 138
    Check@CityULib
  7. Published

    Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds

    Hu, P., Sung, C. W., Ho, S. & Chan, T. H., Feb 2016, In: IEEE Transactions on Information Forensics and Security. 11, 2, p. 388-399

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 10
    Check@CityULib
  8. 2015
  9. Published

    Enabling Cloud Storage Auditing With Key-Exposure Resistance

    Yu, J., Ren, K., Wang, C. & Varadharajan, V., Jun 2015, In: IEEE Transactions on Information Forensics and Security. 10, 6, p. 1167-1179 7031921.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 175
    Check@CityULib
  10. Blurred image splicing localization by exposing blur type inconsistency

    Bahrami, K., Kot, A. C., Li, L. & Li, H., 1 May 2015, In: IEEE Transactions on Information Forensics and Security. 10, 5, p. 999-1009 7015579.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 104
    Check@CityULib
  11. Published

    New algorithms for secure outsourcing of large-scale systems of linear equations

    Chen, X., Huang, X., Li, J., Ma, J., Lou, W. & Wong, D. S., Jan 2015, In: IEEE Transactions on Information Forensics and Security. 10, 1, p. 69-78 6926792.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 212
    Check@CityULib
  12. Published

    Traceable CP-ABE: How to trace decryption devices found in the wild

    Liu, Z., Cao, Z. & Wong, D. S., Jan 2015, In: IEEE Transactions on Information Forensics and Security. 10, 1, p. 55-68 6926830.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 66
    Check@CityULib
  13. 2014
  14. Published

    An effective method for detecting double JPEG compression with the same quantization matrix

    Yang, J., Xie, J., Zhu, G., Kwong, S. & Shi, Y., Nov 2014, In: IEEE Transactions on Information Forensics and Security. 9, 11, p. 1933-1942 6905821.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 103
    Check@CityULib
  15. Published

    Proof-Carrying Cloud Computation: The Case of Convex Optimization

    Xu, Z., Wang, C., Ren, K., Wang, L. & Zhang, B., Nov 2014, In: IEEE Transactions on Information Forensics and Security. 9, 11, p. 1790-1803

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 16
    Check@CityULib
  16. Published

    A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

    Liang, K., Au, M. H., Liu, J. K., Susilo, W., Wong, D. S., Yang, G., Phuong, T. V. X., & 1 othersXie, Q., Oct 2014, In: IEEE Transactions on Information Forensics and Security. 9, 10, p. 1667-1680 6873259.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 94
    Check@CityULib
  17. Published

    CP-ABE with constant-size keys for lightweight devices

    Guo, F., Mu, Y., Susilo, W., Wong, D. S. & Varadharajan, V., May 2014, In: IEEE Transactions on Information Forensics and Security. 9, 5, p. 763-771

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 147
    Check@CityULib
  18. 2013
  19. Published

    DAC-MACS: Effective data access control for multiauthority cloud storage systems

    Yang, K., Jia, X., Ren, K., Zhang, B. & Xie, R., Nov 2013, In: IEEE Transactions on Information Forensics and Security. 8, 11, p. 1790-1801 6585778.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 245
    Check@CityULib
  20. Reversible data hiding in encrypted images by reserving room before encryption

    Ma, K., Zhang, W., Zhao, X., Yu, N. & Li, F., Mar 2013, In: IEEE Transactions on Information Forensics and Security. 8, 3, p. 553-562 6470679.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 593
    Check@CityULib
  21. Published

    White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures

    Liu, Z., Cao, Z. & Wong, D. S., Jan 2013, In: IEEE Transactions on Information Forensics and Security. 8, 1, p. 76-88 6327660.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 194
    Check@CityULib
  22. CAM: Cloud-assisted privacy preserving mobile health monitoring

    Lin, H., Shao, J., Zhang, C. & Fang, Y., 2013, In: IEEE Transactions on Information Forensics and Security. 8, 6, p. 985-997 6490390.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 106
    Check@CityULib
  23. 2011
  24. Published

    Efficient designated confirmer signature and DCS-based ambiguous optimistic fair exchange

    Huang, Q., Wong, D. S. & Susilo, W., Dec 2011, In: IEEE Transactions on Information Forensics and Security. 6, 4, p. 1233-1247 5940227.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 11
    Check@CityULib
  25. 2010
  26. Published

    Fragility analysis of adaptive quantization-based image hashing

    Zhu, G., Huang, J., Kwong, S. & Yang, J., Mar 2010, In: IEEE Transactions on Information Forensics and Security. 5, 1, p. 133-147 5353741.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 24
    Check@CityULib
  27. 2009
  28. Published

    A study on the randomness measure of image hashing

    Zhu, G., Huang, J., Kwong, S. & Yang, J., Dec 2009, In: IEEE Transactions on Information Forensics and Security. 4, 4, p. 928-932 5282541.

    Research output: Journal Publications and Reviews (RGC: 21, 22, 62)21_Publication in refereed journalpeer-review

    Scopus citations: 12
    Check@CityULib