首页 > 最新文献

Computer Standards & Interfaces最新文献

英文 中文
An adaptive geometrical clustering routing protocol (AGCRP) for energy-efficient mobile wireless sensor networks in smart cities 面向智慧城市节能移动无线传感器网络的自适应几何聚类路由协议
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-08-16 DOI: 10.1016/j.csi.2025.104056
Mohamed Abdou , Hanan M. Amer , Abeer T. Khalil , Mohamed M. Abdelsalam
The use of wireless sensor networks (WSNs) has increased rapidly in recent years as almost everything around us is becoming smart. Many challenges are facing WSNs, and one of them is energy utilization. In most scenarios, sensor nodes (SNs) are battery-powered. Once the battery is exhausted, the SN is treated as a dead node and its coverage area is considered a blind region. Another problem is the mobility of SNs. In many applications, SNs are movable that creates a frequent change in the system’s topology, which may lead to a great reduction in the system’s performance. Building an appropriate routing protocol to handle these problems can significantly increase the system’s performance. An adaptive geometrical clustering routing protocol for mobile WSNs (AGCRP) is introduced. The protocol divides the network into grid cells, each cell has a forwarder cluster head (FCH), a collector cluster head (CCH), and a set of cluster members (CMs). The CCH collects the data from CMs in its cluster and sends it to the FCH. The FCH then sends the data to the main station (MS). The selection of FCHs and CCHs has been done considering parameters such as energy level, distance to the grid center, and average distance relative to CMs. The simulation results show that the suggested method increases the stabilization, lifetime, and throughput of the static environment by about 31%, 34%, and 41% respectively compared with EECRAIFA, and increases the stabilization, and lifetime for the dynamic environment by about 74% and 32% respectively compared with DTC-BR.
近年来,无线传感器网络(WSNs)的使用迅速增加,因为我们周围的几乎所有东西都变得智能。无线传感器网络面临着许多挑战,其中之一就是能量利用问题。在大多数场景下,传感器节点(SNs)由电池供电。一旦电池电量耗尽,SN被视为死节点,其覆盖区域被视为盲区。另一个问题是社交网站的移动性。在许多应用中,SNs是可移动的,这会导致系统拓扑结构的频繁变化,这可能会导致系统性能的大幅降低。构建适当的路由协议来处理这些问题可以显著提高系统的性能。介绍了一种用于移动wsn的自适应几何聚类路由协议(AGCRP)。该协议将网络划分为网格单元,每个网格单元有一个转发集群头(FCH)、一个收集器集群头(CCH)和一组集群成员(CMs)。CCH将集群内CMs的数据收集后发送给FCH。然后FCH将数据发送到主站(MS)。考虑了能量水平、到电网中心的距离以及相对于CMs的平均距离等参数,对FCHs和CCHs进行了选择。仿真结果表明,与EECRAIFA相比,该方法在静态环境下的稳定性、寿命和吞吐量分别提高了31%、34%和41%,在动态环境下的稳定性和寿命分别比DTC-BR提高了74%和32%。
{"title":"An adaptive geometrical clustering routing protocol (AGCRP) for energy-efficient mobile wireless sensor networks in smart cities","authors":"Mohamed Abdou ,&nbsp;Hanan M. Amer ,&nbsp;Abeer T. Khalil ,&nbsp;Mohamed M. Abdelsalam","doi":"10.1016/j.csi.2025.104056","DOIUrl":"10.1016/j.csi.2025.104056","url":null,"abstract":"<div><div>The use of wireless sensor networks (WSNs) has increased rapidly in recent years as almost everything around us is becoming smart. Many challenges are facing WSNs, and one of them is energy utilization. In most scenarios, sensor nodes (SNs) are battery-powered. Once the battery is exhausted, the SN is treated as a dead node and its coverage area is considered a blind region. Another problem is the mobility of SNs. In many applications, SNs are movable that creates a frequent change in the system’s topology, which may lead to a great reduction in the system’s performance. Building an appropriate routing protocol to handle these problems can significantly increase the system’s performance. An adaptive geometrical clustering routing protocol for mobile WSNs (AGCRP) is introduced. The protocol divides the network into grid cells, each cell has a forwarder cluster head (FCH), a collector cluster head (CCH), and a set of cluster members (CMs). The CCH collects the data from CMs in its cluster and sends it to the FCH. The FCH then sends the data to the main station (MS). The selection of FCHs and CCHs has been done considering parameters such as energy level, distance to the grid center, and average distance relative to CMs. The simulation results show that the suggested method increases the stabilization, lifetime, and throughput of the static environment by about 31%, 34%, and 41% respectively compared with EECRAIFA, and increases the stabilization, and lifetime for the dynamic environment by about 74% and 32% respectively compared with DTC-BR.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104056"},"PeriodicalIF":3.1,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144866521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Password Authentication Key Exchange protocol in universal composable framework for blockchain privacy protection b区块链隐私保护通用可组合框架中的模糊密码认证密钥交换协议
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-06-16 DOI: 10.1016/j.csi.2025.104032
Qihong Chen, Changgen Peng, Dequan Xu
In this paper, we construct a lattice-based fuzzy Password Authentication Key Exchange protocol in universal composable model. Through the known Password Authentication Key Exchange scheme, the Randomized Fuzzy Equality protocol and the Oblivious Transfer protocol are introduced to improve Password Authentication Key Exchange into fuzzy Password Authentication Key Exchange. First, the parties go through two rounds of Oblivious Transfer protocol, and then the key exchange is achieved based on the information exchanged. fuzzy Password Authentication Key Exchange satisfies that even if there is noise in the passwords between users, key exchange is still possible. Therefore, fuzzy Password Authentication Key Exchange is suitable for more application scenarios compared to Password Authentication Key Exchange, and the construction is universal composable security.
本文在通用可组合模型下构造了一个基于格的模糊密码认证密钥交换协议。通过已知的密码认证密钥交换方案,引入随机模糊等式协议和遗忘传输协议,将密码认证密钥交换改进为模糊密码认证密钥交换。首先,双方经过两轮的遗忘传输协议,然后根据交换的信息进行密钥交换。模糊密码认证密钥交换满足即使用户之间的密码存在噪声,密钥交换仍然是可能的。因此,相对于密码认证密钥交换,模糊密码认证密钥交换适用于更多的应用场景,并且构建了通用的组合安全。
{"title":"Fuzzy Password Authentication Key Exchange protocol in universal composable framework for blockchain privacy protection","authors":"Qihong Chen,&nbsp;Changgen Peng,&nbsp;Dequan Xu","doi":"10.1016/j.csi.2025.104032","DOIUrl":"10.1016/j.csi.2025.104032","url":null,"abstract":"<div><div>In this paper, we construct a lattice-based fuzzy Password Authentication Key Exchange protocol in universal composable model. Through the known Password Authentication Key Exchange scheme, the Randomized Fuzzy Equality protocol and the Oblivious Transfer protocol are introduced to improve Password Authentication Key Exchange into fuzzy Password Authentication Key Exchange. First, the parties go through two rounds of Oblivious Transfer protocol, and then the key exchange is achieved based on the information exchanged. fuzzy Password Authentication Key Exchange satisfies that even if there is noise in the passwords between users, key exchange is still possible. Therefore, fuzzy Password Authentication Key Exchange is suitable for more application scenarios compared to Password Authentication Key Exchange, and the construction is universal composable security.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104032"},"PeriodicalIF":4.1,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144331256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SecureMD5: A new stream cipher for secure file systems and encryption key generation with artificial intelligence SecureMD5:一种新的流密码,用于安全文件系统和人工智能加密密钥生成
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-07-11 DOI: 10.1016/j.csi.2025.104047
Isabel Herrera Montano , Juan Ramos Diaz , Sergio Molina-Cardín , Juan José Guerrero López , José Javier García Aranda , Isabel de la Torre Díez
The insider threat to sensitive information posed by employees or partners of an organisation remains a major cybersecurity challenge. In this regard, the measures taken by organisations and companies to protect information are often insufficient. Primarily, due to the legitimate access and knowledge of security holes that these individuals possess.
This study proposes SecureMD5, an encryption algorithm designed specifically for secure file systems (SFS). The algorithm is based on custom one-way functions integrated into an encryption scheme that operates at the byte level. It uses 11 dynamic variables generated from contextual parameters such as file position, access time, random values, and user-specific keys. This approach ensures that SecureMD5 does not inherit the known vulnerabilities of MD5 as a standard cryptographic algorithm. Consequently, SecureMD5 is presented as an adaptive and robust solution that addresses the challenges posed by insider threats in SFS.
In parallel, a modular contextual key generation scheme is proposed, which can incorporate various challenges such as user identity, access time and device location. Biometric key generation based on Artificial Intelligence (AI) methods is evaluated independently from the validation of the encryption algorithm. In the evaluated biometric key generation scheme, the AI models MediaPipe Hand Landmark and LBPHFaceRecognizer from OpenCV have been used. These methods are part of a sub-key generation scheme based on contextual challenges. This scheme eliminates the need for key storage for dynamic and secure access to sensitive information.
SecureMD5 was validated by diffusion, confusion, entropy and performance analysis. It achieved 31 % higher entropy than comparable algorithms. Performance improved by 0.32 % compared to RC4. It also passed 87 % of NIST 800–22 tests, demonstrating its robustness against cryptographic vulnerabilities. In addition, SecureMD5 balances security and performance, with encryption times 25 % faster than a modified AES algorithm for 10 MB files. Biometric key generation methods were evaluated using metrics such as precision, accuracy, false acceptance rate and specificity, achieving satisfactory values above 80 % on all metrics. This work addresses critical gaps in information security, providing significant advances in protecting SFS against insider threats. The design and adaptability of SecureMD5 make it particularly suitable for sectors with strict security requirements, such as healthcare, finance, and corporate data management. Its ability to enable dynamic and secure access control addresses the real challenges posed by protecting confidential information from internal threats.
企业员工或合作伙伴对敏感信息构成的内部威胁仍然是一个重大的网络安全挑战。在这方面,组织和公司为保护信息所采取的措施往往是不够的。主要是因为这些人拥有合法的访问权限和对安全漏洞的了解。本研究提出SecureMD5,一种专为安全文件系统(SFS)设计的加密算法。该算法基于集成到在字节级操作的加密方案中的自定义单向函数。它使用从上下文参数(如文件位置、访问时间、随机值和用户特定键)生成的11个动态变量。这种方法确保SecureMD5不会继承MD5作为标准加密算法的已知漏洞。因此,SecureMD5是一种自适应且强大的解决方案,可解决SFS内部威胁带来的挑战。同时,提出了一种模块化上下文密钥生成方案,该方案可以结合用户身份、访问时间和设备位置等各种挑战。基于人工智能(AI)方法的生物识别密钥生成的评估独立于加密算法的验证。在评估的生物识别密钥生成方案中,使用了OpenCV的人工智能模型MediaPipe Hand Landmark和LBPHFaceRecognizer。这些方法是基于上下文挑战的子键生成方案的一部分。该方案消除了对密钥存储的需求,以便对敏感信息进行动态和安全访问。通过扩散、混淆、熵和性能分析对SecureMD5进行验证。它的熵比同类算法高31%。性能比RC4提高了0.32%。它还通过了87%的NIST 800-22测试,证明了它对加密漏洞的稳健性。此外,SecureMD5平衡了安全性和性能,对于10mb文件,加密时间比修改后的AES算法快25%。使用精密度、准确度、错误接受率和特异性等指标对生物识别密钥生成方法进行评估,所有指标均达到80%以上的满意值。这项工作解决了信息安全方面的关键漏洞,在保护SFS免受内部威胁方面取得了重大进展。SecureMD5的设计和适应性使其特别适合具有严格安全要求的行业,例如医疗保健、金融和企业数据管理。它能够实现动态和安全的访问控制,解决了保护机密信息免受内部威胁所带来的真正挑战。
{"title":"SecureMD5: A new stream cipher for secure file systems and encryption key generation with artificial intelligence","authors":"Isabel Herrera Montano ,&nbsp;Juan Ramos Diaz ,&nbsp;Sergio Molina-Cardín ,&nbsp;Juan José Guerrero López ,&nbsp;José Javier García Aranda ,&nbsp;Isabel de la Torre Díez","doi":"10.1016/j.csi.2025.104047","DOIUrl":"10.1016/j.csi.2025.104047","url":null,"abstract":"<div><div>The insider threat to sensitive information posed by employees or partners of an organisation remains a major cybersecurity challenge. In this regard, the measures taken by organisations and companies to protect information are often insufficient. Primarily, due to the legitimate access and knowledge of security holes that these individuals possess.</div><div>This study proposes SecureMD5, an encryption algorithm designed specifically for secure file systems (SFS). The algorithm is based on custom one-way functions integrated into an encryption scheme that operates at the byte level. It uses 11 dynamic variables generated from contextual parameters such as file position, access time, random values, and user-specific keys. This approach ensures that SecureMD5 does not inherit the known vulnerabilities of MD5 as a standard cryptographic algorithm. Consequently, SecureMD5 is presented as an adaptive and robust solution that addresses the challenges posed by insider threats in SFS.</div><div>In parallel, a modular contextual key generation scheme is proposed, which can incorporate various challenges such as user identity, access time and device location. Biometric key generation based on Artificial Intelligence (AI) methods is evaluated independently from the validation of the encryption algorithm. In the evaluated biometric key generation scheme, the AI models MediaPipe Hand Landmark and LBPHFaceRecognizer from OpenCV have been used. These methods are part of a sub-key generation scheme based on contextual challenges. This scheme eliminates the need for key storage for dynamic and secure access to sensitive information.</div><div>SecureMD5 was validated by diffusion, confusion, entropy and performance analysis. It achieved 31 % higher entropy than comparable algorithms. Performance improved by 0.32 % compared to RC4. It also passed 87 % of NIST 800–22 tests, demonstrating its robustness against cryptographic vulnerabilities. In addition, SecureMD5 balances security and performance, with encryption times 25 % faster than a modified AES algorithm for 10 MB files. Biometric key generation methods were evaluated using metrics such as precision, accuracy, false acceptance rate and specificity, achieving satisfactory values above 80 % on all metrics. This work addresses critical gaps in information security, providing significant advances in protecting SFS against insider threats. The design and adaptability of SecureMD5 make it particularly suitable for sectors with strict security requirements, such as healthcare, finance, and corporate data management. Its ability to enable dynamic and secure access control addresses the real challenges posed by protecting confidential information from internal threats.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104047"},"PeriodicalIF":4.1,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144655383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Logarithmic identity-based ring signature over lattices and linkable variant 格上基于对数恒等的环签名及其可连接变分
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-06-30 DOI: 10.1016/j.csi.2025.104036
Wen Gao , Tianyou Fu , Baodong Qin , Xiaoli Dong , Zhen Zhao , Momeng Liu
The ring signature is extensively utilized in many fields, including e-voting, cryptocurrency, blockchain settings, etc. This paper proposes an effective identity-based ring signature (IBRS) from the lattice assumption by using logarithmic size OR proofs of group action to make the ring signature able to cope with the challenges of quantum attacks. Our construction has been proven anonymous and unforgeable in the random oracle model (ROM) under the hardness of Module Small Integer Solution (MSIS) assumption from lattices, a hot quantum-resistant cryptographic primitive. The anonymity makes it possible for a signer to sign the same message twice or more without being detected by the verifier. This would bring repeated e-voting or double spending of the same money in blockchain. Therefore, as an additional work, we give a linkable variant. Compared with existing IBRS schemes with linear sizes, the size of our scheme is relatively short and achieves logarithmic communication cost with its ring scale N. Our research data show that the signature size of our proposal has significant advantages over several existing schemes with an increase of N. When the ring scale N is set to be 32 (512, resp.), our scheme has a signature size of 177.13KiB (179.75KiB, resp.), while the previous scheme has a size of at least 154.06KiB (2695.74KiB, resp.).
环签名广泛应用于电子投票、加密货币、区块链设置等领域。本文从格假设出发,利用群作用的对数大小或证明,提出了一种有效的基于身份的环签名(IBRS),使环签名能够应对量子攻击的挑战。在模小整数解(MSIS)假设的硬度下,我们的构造在随机oracle模型(ROM)中被证明是匿名的和不可伪造的。匿名性使签名者可以在不被验证者检测到的情况下对同一消息签名两次或更多次。这将带来重复的电子投票或在b区块链中重复花费相同的钱。因此,作为一个额外的工作,我们给出了一个可链接的变体。与线性尺寸与现有IBRS方案相比,我们的计划是相对较短的大小和规模达到对数沟通成本及其环N我们的研究数据表明,我们的建议的签名大小显著的优势,超过了现有方案规模环时增加N . N将32(512年,职责。),我们计划有一个签名的大小177.13简约(179.75简约,职责。),而先前的计划规模至少154.06简约(2695.74简约,职责)。
{"title":"Logarithmic identity-based ring signature over lattices and linkable variant","authors":"Wen Gao ,&nbsp;Tianyou Fu ,&nbsp;Baodong Qin ,&nbsp;Xiaoli Dong ,&nbsp;Zhen Zhao ,&nbsp;Momeng Liu","doi":"10.1016/j.csi.2025.104036","DOIUrl":"10.1016/j.csi.2025.104036","url":null,"abstract":"<div><div>The ring signature is extensively utilized in many fields, including e-voting, cryptocurrency, blockchain settings, etc. This paper proposes an effective identity-based ring signature (IBRS) from the lattice assumption by using logarithmic size OR proofs of group action to make the ring signature able to cope with the challenges of quantum attacks. Our construction has been proven anonymous and unforgeable in the random oracle model (ROM) under the hardness of Module Small Integer Solution (MSIS) assumption from lattices, a hot quantum-resistant cryptographic primitive. The anonymity makes it possible for a signer to sign the same message twice or more without being detected by the verifier. This would bring repeated e-voting or double spending of the same money in blockchain. Therefore, as an additional work, we give a linkable variant. Compared with existing IBRS schemes with linear sizes, the size of our scheme is relatively short and achieves logarithmic communication cost with its ring scale <span><math><mi>N</mi></math></span>. Our research data show that the signature size of our proposal has significant advantages over several existing schemes with an increase of <span><math><mi>N</mi></math></span>. When the ring scale <span><math><mi>N</mi></math></span> is set to be 32 (512, resp.), our scheme has a signature size of 177.13KiB (179.75KiB, resp.), while the previous scheme has a size of at least 154.06KiB (2695.74KiB, resp.).</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104036"},"PeriodicalIF":4.1,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144557322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient structure-aware private set intersection with distributed interval function 具有分布区间函数的高效结构感知私有集交集
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-07-12 DOI: 10.1016/j.csi.2025.104044
Huimin Zhang , Wenmin Li , Yanjin Cheng , Sujuan Qin , Fei Gao , Tengfei Tu
Structure-aware PSI protocol (Sa-PSI) allows both parties to identify pairs of points within a predefined distance threshold across their respective datasets. However, in previous work, the cost of computation scales linearly with the number of prefixes in the structure, which may become excessively large, and additionally, this protocol risks disclosing sensitive elements. In this work, we present a lightweight and efficient Sa-PSI protocol (LESa-PSI), which aims at achieving the computational cost independent of the number of prefixes in the structure while simultaneously minimizing information leakage. We formally define an FSS based on the two-sided intervals function — compact DIF. This compact DIF is instantiated for a single-dimensional two-sided interval function and then extended to d-dimensional, which may be of independent interest. By combining compact DIF with a novel variant of DPF, we achieve key size compression for the set. Meanwhile, a structural decomposition strategy is proposed to divide the structure set, thereby enabling efficient function evaluation and computing the intersection. We prove that the LESa-PSI is secure in the semi-honest model. Furthermore, a comprehensive analysis of compact DIF and LESa-PSI is conducted through theory and experiments, with a comparison against some state-of-the-art works. The experimental results show that our compact DIF has a smaller key size, while the LESa-PSI has better performance in the intersection search and Bob’s elements evaluation.
结构感知PSI协议(Sa-PSI)允许双方在各自的数据集中识别预定义距离阈值内的点对。然而,在之前的工作中,计算成本与结构中前缀的数量呈线性增长,这可能会变得过大,此外,该协议有泄露敏感元素的风险。在这项工作中,我们提出了一种轻量级和高效的Sa-PSI协议(LESa-PSI),旨在实现与结构中前缀数量无关的计算成本,同时最大限度地减少信息泄漏。我们正式定义了一个基于双边区间函数的FSS - compact DIF。这个紧凑的DIF实例化为一个单维的双边区间函数,然后扩展到d维,这可能是独立的兴趣。通过将紧凑的DIF与DPF的一种新变体相结合,我们实现了对集合的密钥大小压缩。同时,提出了一种结构分解策略对结构集进行划分,从而实现高效的函数求值和交集计算。在半诚实模型下,我们证明了LESa-PSI是安全的。此外,通过理论和实验对紧凑型DIF和LESa-PSI进行了综合分析,并与一些最新的研究成果进行了比较。实验结果表明,我们的紧凑DIF具有更小的键大小,而LESa-PSI在交集搜索和Bob元素求值方面具有更好的性能。
{"title":"Efficient structure-aware private set intersection with distributed interval function","authors":"Huimin Zhang ,&nbsp;Wenmin Li ,&nbsp;Yanjin Cheng ,&nbsp;Sujuan Qin ,&nbsp;Fei Gao ,&nbsp;Tengfei Tu","doi":"10.1016/j.csi.2025.104044","DOIUrl":"10.1016/j.csi.2025.104044","url":null,"abstract":"<div><div>Structure-aware PSI protocol (Sa-PSI) allows both parties to identify pairs of points within a predefined distance threshold across their respective datasets. However, in previous work, the cost of computation scales linearly with the number of prefixes in the structure, which may become excessively large, and additionally, this protocol risks disclosing sensitive elements. In this work, we present a lightweight and efficient Sa-PSI protocol (LESa-PSI), which aims at achieving the computational cost independent of the number of prefixes in the structure while simultaneously minimizing information leakage. We formally define an FSS based on the two-sided intervals function — compact DIF. This compact DIF is instantiated for a single-dimensional two-sided interval function and then extended to <span><math><mi>d</mi></math></span>-dimensional, which may be of independent interest. By combining compact DIF with a novel variant of DPF, we achieve key size compression for the set. Meanwhile, a structural decomposition strategy is proposed to divide the structure set, thereby enabling efficient function evaluation and computing the intersection. We prove that the LESa-PSI is secure in the semi-honest model. Furthermore, a comprehensive analysis of compact DIF and LESa-PSI is conducted through theory and experiments, with a comparison against some state-of-the-art works. The experimental results show that our compact DIF has a smaller key size, while the LESa-PSI has better performance in the intersection search and Bob’s elements evaluation.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104044"},"PeriodicalIF":4.1,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144634018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain beyond immutability: Application firewalls on ethereum-based platforms 区块链超越不变性:基于以太坊平台的应用程序防火墙
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-06-23 DOI: 10.1016/j.csi.2025.104038
Christian Delgado-von-Eitzen, Manuel José Fernández-Iglesias, Luis Anido-Rifón, Fernando A. Mikic-Fonte
Blockchain is a technology that gained relevance in various fields due to its transparency and security in recording information in a reliable and immutable manner. In particular, the adoption of private blockchain platforms based on the Ethereum technology grew significantly in enterprise environments. However, there are certain issues concerning privacy and access control that may pose significant challenges in scenarios where private transactions occur between user agents instead of nodes, that is, between blockchain accounts that are not necessarily attached to specific nodes. The Blockchain Application Firewall (BAF) is introduced as a conceptual framework that can be applied in cases where control over data access is needed, including private transactions between accounts. More specifically, the BAF is intended to complement a blockchain endpoint acting as an intermediary between users and blockchain services and data, monitoring and controlling incoming and outgoing traffic, according to an applied access policy. This work investigates BAF’s feasibility and effectiveness in enhancing the capabilities of Ethereum-based blockchains in the described scenarios. A proof-of-concept was implemented with Besu to assess its feasibility, providing evidence that BAF can act as an additional layer of control over data stored, helping to solve key limitations in practical implementations and allowing exploration of new use cases that could not be addressed so far.
区块链是一种以可靠和不可变的方式记录信息的透明性和安全性而在各个领域获得相关性的技术。特别是在企业环境中,基于以太坊技术的私有区块链平台的采用显著增长。但是,在私有事务发生在用户代理而不是节点之间(即不一定附加到特定节点的区块链帐户之间)的场景中,存在一些与隐私和访问控制有关的问题,这些问题可能会带来重大挑战。区块链应用程序防火墙(BAF)是作为一个概念性框架引入的,它可以应用于需要控制数据访问的情况,包括帐户之间的私有事务。更具体地说,BAF旨在补充区块链端点,作为用户与区块链服务和数据之间的中介,根据应用的访问策略监视和控制传入和传出流量。这项工作调查了BAF在所描述的场景中增强基于以太坊的区块链功能的可行性和有效性。Besu实现了概念验证,以评估其可行性,提供了BAF可以作为存储数据的额外控制层的证据,有助于解决实际实现中的关键限制,并允许探索迄今为止无法解决的新用例。
{"title":"Blockchain beyond immutability: Application firewalls on ethereum-based platforms","authors":"Christian Delgado-von-Eitzen,&nbsp;Manuel José Fernández-Iglesias,&nbsp;Luis Anido-Rifón,&nbsp;Fernando A. Mikic-Fonte","doi":"10.1016/j.csi.2025.104038","DOIUrl":"10.1016/j.csi.2025.104038","url":null,"abstract":"<div><div>Blockchain is a technology that gained relevance in various fields due to its transparency and security in recording information in a reliable and immutable manner. In particular, the adoption of private blockchain platforms based on the Ethereum technology grew significantly in enterprise environments. However, there are certain issues concerning privacy and access control that may pose significant challenges in scenarios where private transactions occur between user agents instead of nodes, that is, between blockchain accounts that are not necessarily attached to specific nodes. The Blockchain Application Firewall (BAF) is introduced as a conceptual framework that can be applied in cases where control over data access is needed, including private transactions between accounts. More specifically, the BAF is intended to complement a blockchain endpoint acting as an intermediary between users and blockchain services and data, monitoring and controlling incoming and outgoing traffic, according to an applied access policy. This work investigates BAF’s feasibility and effectiveness in enhancing the capabilities of Ethereum-based blockchains in the described scenarios. A proof-of-concept was implemented with Besu to assess its feasibility, providing evidence that BAF can act as an additional layer of control over data stored, helping to solve key limitations in practical implementations and allowing exploration of new use cases that could not be addressed so far.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104038"},"PeriodicalIF":4.1,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144502422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software defect prediction using graph sample and aggregate-attention network optimized with nomadic people optimizer for enhancing the software reliability 利用图样本进行软件缺陷预测,利用游民优化器优化集中注意力网络,提高软件可靠性
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2026-01-01 Epub Date: 2025-06-03 DOI: 10.1016/j.csi.2025.104033
P. Dhavakumar , S. Vengadeswaran
The major objective of Software Defect Prediction (SDP) is to detect code location where errors are likely to occur to focus testing efforts on more suspect areas. Therefore, a high-quality software is developed that takes lesser time without effort. The dataset used for SDP usually contains more non-defective examples than defective examples. SDP is an important activity in software engineering that detect potential defects in software systems before they occur. For that, this paper proposes a Software Defect Prediction using Graph Sample and Aggregate-Attention Network optimized with Nomadic people Optimizer for enhancing the Software Reliability (graphSAGE-NPO-SDP). Here, the data are taken from Promise Repository dataset and given to the pre-processing. The pre-processing is done by normalization techniques of Min-Max Scaling. After preprocessing, the features are selected under Univariate Ensemble Feature Selection technique (UEFST). The classification process is performed by graphSAGE. The classification results are classified as defect class and non-defective class. The performance metrics, like Accuracy, Execution time, F-measure, Precision, Root Mean Square Error, Sensitivity, and Specificity is examined. The proposed graphSAGE-NPO-SDP method attains higher accuracy 32.45 %, 36.48 % and 28.34 % when compared to the existing models: Complexity-based over sampling technique in SDP (COT-ACI-SDP), Classification Method for SDP utilizing multiple filter feature selection approach (MLP-SDP), Boosted WOA-SDP and hybrid model depending on deep neural network based for SDP under Software Metrics (DNN-GA-SDP) respectively.
软件缺陷预测(SDP)的主要目标是检测可能发生错误的代码位置,从而将测试工作集中在更可疑的区域。因此,开发一个高质量的软件需要更少的时间和精力。用于SDP的数据集通常包含比缺陷样本更多的非缺陷样本。SDP是软件工程中的一项重要活动,它可以在软件系统中潜在的缺陷发生之前检测出来。为此,本文提出了一种基于图样本和游牧民族优化器优化的聚集注意网络的软件缺陷预测方法,以提高软件可靠性(graphSAGE-NPO-SDP)。在这里,数据取自Promise Repository数据集并交给预处理。预处理采用最小-最大缩放归一化技术。预处理后,采用单变量集成特征选择技术(Univariate Ensemble Feature Selection technique, UEFST)选择特征。分类过程由graphSAGE执行。分类结果分为缺陷类和非缺陷类。性能指标,如准确性,执行时间,f测量,精度,均方根误差,灵敏度和特异性进行检查。本文提出的graphsag - npo -SDP方法与现有的基于复杂度的SDP过采样技术(cots - aci -SDP)、基于多滤波器特征选择方法的SDP分类方法(MLP-SDP)、基于深度神经网络的基于软件度量的SDP混合模型(DNN-GA-SDP)相比,准确率分别达到了32.45%、36.48%和28.34%。
{"title":"Software defect prediction using graph sample and aggregate-attention network optimized with nomadic people optimizer for enhancing the software reliability","authors":"P. Dhavakumar ,&nbsp;S. Vengadeswaran","doi":"10.1016/j.csi.2025.104033","DOIUrl":"10.1016/j.csi.2025.104033","url":null,"abstract":"<div><div>The major objective of Software Defect Prediction (SDP) is to detect code location where errors are likely to occur to focus testing efforts on more suspect areas. Therefore, a high-quality software is developed that takes lesser time without effort. The dataset used for SDP usually contains more non-defective examples than defective examples. SDP is an important activity in software engineering that detect potential defects in software systems before they occur. For that, this paper proposes a Software Defect Prediction using Graph Sample and Aggregate-Attention Network optimized with Nomadic people Optimizer for enhancing the Software Reliability (graphSAGE-NPO-SDP). Here, the data are taken from Promise Repository dataset and given to the pre-processing. The pre-processing is done by normalization techniques of Min-Max Scaling. After preprocessing, the features are selected under Univariate Ensemble Feature Selection technique (UEFST). The classification process is performed by graphSAGE. The classification results are classified as defect class and non-defective class. The performance metrics, like Accuracy, Execution time, F-measure, Precision, Root Mean Square Error, Sensitivity, and Specificity is examined. The proposed graphSAGE-NPO-SDP method attains higher accuracy 32.45 %, 36.48 % and 28.34 % when compared to the existing models: Complexity-based over sampling technique in SDP (COT-ACI-SDP), Classification Method for SDP utilizing multiple filter feature selection approach (MLP-SDP), Boosted WOA-SDP and hybrid model depending on deep neural network based for SDP under Software Metrics (DNN-GA-SDP) respectively.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104033"},"PeriodicalIF":4.1,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144262586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient rejection-free threshold ring signature from lattices and its application in receipt-free cloud e-voting 一种有效的栅格无拒绝阈值环签名及其在无收据云电子投票中的应用
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-08-01 Epub Date: 2025-04-05 DOI: 10.1016/j.csi.2025.104008
Chunhui Wu , Youkang Zhou , Fangguo Zhang , Yusong Du , Qiping Lin
The threshold ring signature is a generalization of the ring signature. It confirms that t-out-of-N members are signing anonymously in a set of N users, and thus it can be well applied to e-voting. In this paper, we present a more efficient lattice-based threshold ring signature, using Lagrange polynomial interpolation to express the threshold. The scheme eliminates the dependence on Stern-like identification protocols with large soundness error, and achieves much shorter signature sizes. It also uses the technique of Gaussian convolution (G+G) proposed by Devevey et al. in Asiacrypt 2023 to remove the rejection sampling in BLISS signature. Compared with previous distributed FSwA (Fiat-Shamir with Aborts) signatures where the number of repetitions increases exponentially with that of signers, our scheme has much higher computation efficiency. We prove the unforgeability and strong anonymity, i.e., fellow-signer anonymity, unclaimability and anonymity against the untrusted leader of our proposed threshold ring signature scheme. Leveraging the security and efficiency advantages of our signature scheme, we propose a post-quantum receipt-free and verifiable e-voting protocol for large-scale elections with untrusted cloud servers.
阈值环签名是对环签名的一种推广。它确认了N个用户中有t / N个成员是匿名签名的,因此可以很好地应用于电子投票。在本文中,我们提出了一种更有效的基于格子的阈值环签名,使用拉格朗日多项式插值来表示阈值。该方案消除了对具有较大可靠性误差的类斯特恩识别协议的依赖,实现了更短的签名大小。它还使用Devevey等人在Asiacrypt 2023中提出的高斯卷积(G+G)技术来去除BLISS签名中的拒绝采样。先前的分布式FSwA (Fiat-Shamir with Aborts)签名的重复次数随着签名者的数量呈指数增长,与之相比,我们的方案具有更高的计算效率。我们对所提出的阈值环签名方案的不可伪造性和强匿名性,即同签名者匿名性、不可声明性和不可信领导者匿名性进行了证明。利用签名方案的安全性和效率优势,我们提出了一种后量子无收据和可验证的电子投票协议,用于不受信任的云服务器的大规模选举。
{"title":"An efficient rejection-free threshold ring signature from lattices and its application in receipt-free cloud e-voting","authors":"Chunhui Wu ,&nbsp;Youkang Zhou ,&nbsp;Fangguo Zhang ,&nbsp;Yusong Du ,&nbsp;Qiping Lin","doi":"10.1016/j.csi.2025.104008","DOIUrl":"10.1016/j.csi.2025.104008","url":null,"abstract":"<div><div>The threshold ring signature is a generalization of the ring signature. It confirms that <span><math><mi>t</mi></math></span>-out-of-<span><math><mi>N</mi></math></span> members are signing anonymously in a set of <span><math><mi>N</mi></math></span> users, and thus it can be well applied to e-voting. In this paper, we present a more efficient lattice-based threshold ring signature, using Lagrange polynomial interpolation to express the threshold. The scheme eliminates the dependence on Stern-like identification protocols with large soundness error, and achieves much shorter signature sizes. It also uses the technique of Gaussian convolution (<span>G</span>+<span>G</span>) proposed by Devevey et al.<!--> <!-->in Asiacrypt 2023 to remove the rejection sampling in BLISS signature. Compared with previous distributed FSwA (Fiat-Shamir with Aborts) signatures where the number of repetitions increases exponentially with that of signers, our scheme has much higher computation efficiency. We prove the unforgeability and strong anonymity, i.e., fellow-signer anonymity, unclaimability and anonymity against the untrusted leader of our proposed threshold ring signature scheme. Leveraging the security and efficiency advantages of our signature scheme, we propose a post-quantum receipt-free and verifiable e-voting protocol for large-scale elections with untrusted cloud servers.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104008"},"PeriodicalIF":4.1,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143806843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of reversible data hiding: Statistics, current trends, and future outlook 可逆数据隐藏的调查:统计、当前趋势和未来展望
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-08-01 Epub Date: 2025-03-25 DOI: 10.1016/j.csi.2025.104003
Sonal Gandhi, Rajeev Kumar
In the era of increasing digital media storage and transmission over networks, reversible data hiding (RDH) has evolved as a prominent area of research mitigating information security risk. To study the evolution of research, highlight its achievements over the years, and provide future prospects, this paper presents an extensive review of RDH utilizing the dataset extracted from one of the most popular and exhaustive databases, Web of Science. The study aims to first perform quantitative analysis that includes trend analysis, citation analysis, prominent authors and organizations, and geographical coverage, along with qualitative analysis focusing on key research areas and future prospects within RDH. The study further provides a structured view of sub-technologies within RDH, along with the key contributors and their proposed techniques that have led to the evolution of RDH over the years. Next, we provide a comprehensive review of some of the prominent works in each of the sub-technologies of RDH. Finally, several key research directions, identified based on current research trends and early-stage problems and motivations, are discussed. Overall, the proposed study provides valuable insights into the evolution, key milestones, current state, and future prospects of RDH, serving as a guide for the research community.
在数字媒体存储和网络传输日益增长的时代,可逆数据隐藏(RDH)已成为降低信息安全风险的一个重要研究领域。为了研究研究的演变,突出其多年来的成就,并展望未来,本文利用从最流行和详尽的数据库之一Web of Science提取的数据集,对RDH进行了广泛的回顾。该研究旨在首先进行定量分析,包括趋势分析、引文分析、著名作者和组织、地理覆盖范围,以及定性分析,重点研究领域和RDH的未来前景。该研究进一步提供了RDH内部子技术的结构化视图,以及多年来导致RDH发展的关键贡献者及其提出的技术。接下来,我们将全面回顾RDH每个子技术中的一些突出工作。最后,根据当前的研究趋势和早期存在的问题和动机,对几个重点研究方向进行了讨论。总的来说,拟议的研究为RDH的演变、关键里程碑、现状和未来前景提供了有价值的见解,为研究界提供了指导。
{"title":"Survey of reversible data hiding: Statistics, current trends, and future outlook","authors":"Sonal Gandhi,&nbsp;Rajeev Kumar","doi":"10.1016/j.csi.2025.104003","DOIUrl":"10.1016/j.csi.2025.104003","url":null,"abstract":"<div><div>In the era of increasing digital media storage and transmission over networks, reversible data hiding (RDH) has evolved as a prominent area of research mitigating information security risk. To study the evolution of research, highlight its achievements over the years, and provide future prospects, this paper presents an extensive review of RDH utilizing the dataset extracted from one of the most popular and exhaustive databases, Web of Science. The study aims to first perform quantitative analysis that includes trend analysis, citation analysis, prominent authors and organizations, and geographical coverage, along with qualitative analysis focusing on key research areas and future prospects within RDH. The study further provides a structured view of sub-technologies within RDH, along with the key contributors and their proposed techniques that have led to the evolution of RDH over the years. Next, we provide a comprehensive review of some of the prominent works in each of the sub-technologies of RDH. Finally, several key research directions, identified based on current research trends and early-stage problems and motivations, are discussed. Overall, the proposed study provides valuable insights into the evolution, key milestones, current state, and future prospects of RDH, serving as a guide for the research community.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 104003"},"PeriodicalIF":4.1,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143725098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revealing the mobile UX horizon: Exploring user experience aspects, attributes, and measurement methods - A systematic mapping study 揭示移动用户体验地平线:探索用户体验方面,属性和测量方法-一个系统的映射研究
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-08-01 Epub Date: 2025-03-16 DOI: 10.1016/j.csi.2025.103999
Haifa Alshammare , Mohammad Alshayeb , Malak Baslyman

Context

The exponential growth of mobile internet usage underscores the critical importance of investigating mobile app enhancements across various domains. User Experience (UX) emerges as a pivotal quality factor, encompassing emotional, sensory, and contextual dimensions, significantly influencing user behavior and retention.

Objective

This systematic mapping study investigates research efforts on mobile application UX to discern domains where UX has been explored, identifying UX aspects, attributes, and assessment methods.

Method

Through a standard systematic mapping procedure, 189 primary studies were identified from 9107 reviewed articles across five digital libraries.

Results

100 distinct UX aspects and 166 attributes were identified and categorized into App, User, and Context aspects. These aspects were distributed among 14 domains, with healthcare being extensively researched. The usability aspect is prominent in 54.5 % of studies. Efficiency, satisfaction, effectiveness, learnability, memorability, attractiveness, errors, and ease of use emerged as the most commonly utilized attributes—notably, these attributes are considered usability attributes among several standards. Additionally, 38 and 22 evaluation methods were identified for aspects and attributes, grouped into self-reported, physiological, observational, and expert evaluation categories. Questionnaires were predominantly utilized.

Conclusion

This review summarizes the mobile application UX landscape, highlighting key aspects, attributes, and evaluation methods across domains. Future research should leverage these insights to advance UX design and evaluation practices, fostering innovation in software engineering and human-computer interaction.
移动互联网使用的指数级增长强调了在各个领域调查移动应用程序增强的重要性。用户体验(UX)是一个关键的质量因素,包含情感、感官和情境维度,显著影响用户行为和留存率。这个系统的映射研究调查了移动应用程序用户体验的研究成果,以辨别用户体验已经探索的领域,识别用户体验方面,属性和评估方法。方法通过标准的系统制图程序,从五个数字图书馆的9107篇综述文章中确定了189项主要研究。结果确定了100个不同的用户体验方面和166个属性,并将其分类为应用程序、用户和上下文方面。这些方面分布在14个领域中,其中对医疗保健进行了广泛研究。在54.5%的研究中,可用性方面表现突出。效率、满意度、有效性、可学习性、可记忆性、吸引力、错误和易用性成为最常用的属性——值得注意的是,这些属性在几个标准中被认为是可用性属性。此外,确定了38和22种评估方法的方面和属性,分为自我报告,生理,观察和专家评估类别。主要采用问卷调查。这篇综述总结了移动应用的用户体验格局,突出了跨领域的关键方面、属性和评估方法。未来的研究应该利用这些见解来推进UX设计和评估实践,促进软件工程和人机交互的创新。
{"title":"Revealing the mobile UX horizon: Exploring user experience aspects, attributes, and measurement methods - A systematic mapping study","authors":"Haifa Alshammare ,&nbsp;Mohammad Alshayeb ,&nbsp;Malak Baslyman","doi":"10.1016/j.csi.2025.103999","DOIUrl":"10.1016/j.csi.2025.103999","url":null,"abstract":"<div><h3>Context</h3><div>The exponential growth of mobile internet usage underscores the critical importance of investigating mobile app enhancements across various domains. User Experience (UX) emerges as a pivotal quality factor, encompassing emotional, sensory, and contextual dimensions, significantly influencing user behavior and retention.</div></div><div><h3>Objective</h3><div>This systematic mapping study investigates research efforts on mobile application UX to discern domains where UX has been explored, identifying UX aspects, attributes, and assessment methods.</div></div><div><h3>Method</h3><div>Through a standard systematic mapping procedure, 189 primary studies were identified from 9107 reviewed articles across five digital libraries.</div></div><div><h3>Results</h3><div>100 distinct UX aspects and 166 attributes were identified and categorized into App, User, and Context aspects. These aspects were distributed among 14 domains, with healthcare being extensively researched. The usability aspect is prominent in 54.5 % of studies. Efficiency, satisfaction, effectiveness, learnability, memorability, attractiveness, errors, and ease of use emerged as the most commonly utilized attributes—notably, these attributes are considered usability attributes among several standards. Additionally, 38 and 22 evaluation methods were identified for aspects and attributes, grouped into self-reported, physiological, observational, and expert evaluation categories. Questionnaires were predominantly utilized.</div></div><div><h3>Conclusion</h3><div>This review summarizes the mobile application UX landscape, highlighting key aspects, attributes, and evaluation methods across domains. Future research should leverage these insights to advance UX design and evaluation practices, fostering innovation in software engineering and human-computer interaction.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"94 ","pages":"Article 103999"},"PeriodicalIF":4.1,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143684750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Standards & Interfaces
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1