default search action
Masahiro Mambo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Zi-Yuan Liu, Masahiro Mambo, Raylin Tso, Yi-Fan Tseng:
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems. Comput. Stand. Interfaces 89: 103817 (2024) - [j42]Hari Purnama, Masahiro Mambo:
IHIBE: A Hierarchical and Delegated Access Control Mechanism for IoT Environments. Sensors 24(3): 979 (2024) - [j41]Naing Win Tun, Masahiro Mambo:
Secure PUF-Based Authentication Systems. Sensors 24(16): 5295 (2024) - 2023
- [j40]Hendra Kurniawan, Masahiro Mambo:
A Reliable Application of MPC for Securing the Tri-Training Algorithm. IEEE Access 11: 34718-34735 (2023) - [j39]Mingmei Zheng, Zi-Yuan Liu, Masahiro Mambo:
A Provably Secure Lattice-Based Fuzzy Signature Scheme Using Linear Sketch. IEEE Access 11: 62510-62521 (2023) - 2022
- [j38]Danu Dwi Sanjoyo, Masahiro Mambo:
Accountable Bootstrapping Based on Attack Resilient Public Key Infrastructure and Secure Zero Touch Provisioning. IEEE Access 10: 134086-134112 (2022) - [j37]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation. Comput. J. 65(10): 2828-2844 (2022) - [j36]Hendra Kurniawan, Masahiro Mambo:
Homomorphic Encryption-Based Federated Privacy Preservation for Deep Active Learning. Entropy 24(11): 1545 (2022) - [j35]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Quantum-resistant anonymous identity-based encryption with trable identities. IET Inf. Secur. 16(2): 111-126 (2022) - [j34]Jan Wantoro, Masahiro Mambo:
Efficient and Privacy-Preserving Certificate Activation for V2X Pseudonym Certificate Revocation. J. Sens. Actuator Networks 11(3): 51 (2022) - [j33]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo:
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems. IEEE Syst. J. 16(3): 4629-4640 (2022) - [c43]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation. AsiaCCS 2022: 423-436 - [c42]Takuya Kato, Hiroto Shiba, Masahiro Mambo:
On the Identity Match Rate in Web Browsing History. CANDARW 2022: 384-387 - [c41]Zi-Yuan Liu, Chu-Chieh Chien, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Public Key Encryption with Hierarchical Authorized Keyword Search. ICISC 2022: 147-170 - [c40]Jing-Shiuan You, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo:
Quantum-Resistant 1-out-of-N Oblivious Signatures from Lattices. IWSEC 2022: 166-186 - 2021
- [j32]Favian Dewanta, Masahiro Mambo:
Corrections to "A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment". IEEE Access 9: 143592 (2021) - [j31]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Designated-ciphertext searchable encryption. J. Inf. Secur. Appl. 58: 102709 (2021) - [j30]Htet Htet Hlaing, Yuki Funamoto, Masahiro Mambo:
Secure Content Distribution with Access Control Enforcement in Named Data Networking. Sensors 21(13): 4477 (2021) - [j29]Favian Dewanta, Masahiro Mambo:
BPT Scheme: Establishing Trusted Vehicular Fog Computing Service for Rural Area Based on Blockchain Approach. IEEE Trans. Veh. Technol. 70(2): 1752-1769 (2021) - [c39]Htet Htet Hlaing, Yuki Funamoto, Masahiro Mambo:
Performance Comparison of Hybrid Encryption-based Access Control Schemes in NDN. MSN 2021: 622-627 - [i9]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Quantum-resistant Anonymous IBE with Traceable Identities. IACR Cryptol. ePrint Arch. 2021: 33 (2021) - [i8]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo:
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System. IACR Cryptol. ePrint Arch. 2021: 337 (2021) - [i7]Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo:
White-Box Encryption Scheme Using a Quantum Memory. IACR Cryptol. ePrint Arch. 2021: 589 (2021) - [i6]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation. IACR Cryptol. ePrint Arch. 2021: 1008 (2021) - 2020
- [j28]Kyi Thar Ko, Htet Htet Hlaing, Masahiro Mambo:
A PEKS-Based NDN Strategy for Name Privacy. Future Internet 12(8): 130 (2020) - [c38]Kyi Thar Ko, Masahiro Mambo:
Trapdoor Assignment of PEKS-based NDN Strategy in Two-Tier Networks. MSN 2020: 607-613 - [i5]Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo:
Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things. IACR Cryptol. ePrint Arch. 2020: 955 (2020)
2010 – 2019
- 2019
- [j27]Favian Dewanta, Masahiro Mambo:
A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment. IEEE Access 7: 103095-103114 (2019) - [j26]Dedi Gunawan, Masahiro Mambo:
Data Anonymization for Hiding Personal Tendency in Set-Valued Database Publication. Future Internet 11(6): 138 (2019) - [c37]Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng, Masahiro Mambo:
Signcryption from NTRU Lattices Without Random Oracles. AsiaJCIS 2019: 134-141 - [c36]Yuma Takeuchi, Shogo Kitajima, Kazuya Fukushima, Masahiro Mambo:
Privacy Risk Evaluation of Re-Identification of Pseudonyms. AsiaJCIS 2019: 165-172 - [c35]Favian Dewanta, Masahiro Mambo:
Bidding Price-Based Transaction: Trust Establishment for Vehicular Fog Computing Service in Rural Area. PerCom Workshops 2019: 882-887 - 2018
- [j25]Rodrigo Roman, Javier López, Masahiro Mambo:
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges. Future Gener. Comput. Syst. 78: 680-698 (2018) - [j24]So Higashikawa, Tomoaki Kosugi, Shogo Kitajima, Masahiro Mambo:
Shoulder-Surfing Resistant Authentication Using Pass Pattern of Pattern Lock. IEICE Trans. Inf. Syst. 101-D(1): 45-52 (2018) - [j23]Masahiro Mambo:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1323 (2018) - [c34]Dedi Gunawan, Masahiro Mambo:
Set-valued Data Anonymization Maintaining Data Utility and Data Property. IMCOM 2018: 88:1-88:8 - [c33]Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo:
Parallelizable Message Preprocessing for Merkle-Damgård Hash Functions. ISITA 2018: 457-461 - 2017
- [j22]Masahiro Mambo:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 1-2 (2017) - 2016
- [j21]Toshifumi Nishinaga, Masahiro Mambo:
Implementation of µNaCl on 32-bit ARM Cortex-M0. IEICE Trans. Inf. Syst. 99-D(8): 2056-2060 (2016) - [i4]Rodrigo Roman, Javier López, Masahiro Mambo:
Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges. CoRR abs/1602.00484 (2016) - 2015
- [j20]Masahiro Mambo:
Editor's Message to Special issue of Computer Security Technologies to be Indispensable to the Society. J. Inf. Process. 23(5): 553 (2015) - [j19]Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Masahiro Mambo, Mu-En Wu:
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks. J. Univers. Comput. Sci. 21(3): 406-418 (2015) - [j18]Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang, Gwoboa Horng:
Certificateless aggregate signature with efficient verification. Secur. Commun. Networks 8(13): 2232-2243 (2015) - [c32]Tomoaki Kosugi, Tomoki Hayafuji, Masahiro Mambo:
On the Traceability of the Accountable Anonymous Channel. AsiaJCIS 2015: 6-11 - [c31]Abdul Wahid, Yasushi Sengoku, Masahiro Mambo:
Toward constructing a secure online examination system. IMCOM 2015: 95:1-95:8 - [c30]Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto:
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs. INTRUST 2015: 32-48 - 2014
- [j17]Naoto Yanai, Eikoh Chida, Masahiro Mambo, Eiji Okamoto:
A CDH-based Ordered Multisignature Scheme Provably Secure without Random Oracles. J. Inf. Process. 22(2): 366-375 (2014) - [c29]Naoto Yanai, Masahiro Mambo, Eiji Okamoto:
A CDH-based ordered multisignature scheme in the standard model with better efficiency. ISITA 2014: 236-240 - 2013
- [j16]Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, Licheng Wang:
Certificate-based proxy decryption systems with revocability in the standard model. Inf. Sci. 247: 188-201 (2013) - [c28]Hiroya Takahashi, Kenji Yasunaga, Masahiro Mambo, Kwangjo Kim, Heung Youl Youm:
Preventing Abuse of Cookies Stolen by XSS. AsiaJCIS 2013: 85-89 - [c27]Naoto Yanai, Masahiro Mambo, Eiji Okamoto:
An Ordered Multisignature Scheme Under the CDH Assumption Without Random Oracles. ISC 2013: 367-377 - 2012
- [j15]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 70-88 (2012) - [j14]Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto:
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 30-54 (2012) - 2011
- [j13]Naoto Yanai, Eikoh Chida, Masahiro Mambo:
A Secure Structured Multisignature Scheme Based on a Non-commutative Ring Homomorphism. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1346-1355 (2011) - [c26]Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto:
Certificateless Ordered Sequential Aggregate Signature Scheme. INCoS 2011: 662-667 - 2010
- [j12]Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC implementations of the etaT pairing in characteristic three. Comput. Electr. Eng. 36(1): 73-87 (2010) - [j11]Yunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo Kim, Dongho Won:
Towards trustworthy e-voting using paper receipts. Comput. Stand. Interfaces 32(5-6): 305-311 (2010) - [c25]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities. ICICS 2010: 383-400 - [c24]Naoto Yanai, Eikoh Chida, Masahiro Mambo:
A structured aggregate signature scheme. ISITA 2010: 795-800 - [c23]Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks. Pairing 2010: 327-346
2000 – 2009
- 2009
- [e5]Tsuyoshi Takagi, Masahiro Mambo:
Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings. Lecture Notes in Computer Science 5824, Springer 2009, ISBN 978-3-642-04845-6 [contents] - 2008
- [j10]Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart:
Cryptography in Computer System Security. J. Univers. Comput. Sci. 14(3): 314-317 (2008) - [j9]Sk. Md. Mizanur Rahman, Nidal Nasser, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous authentication and secure communication protocol for wireless mobile ad hoc networks. Secur. Commun. Networks 1(2): 179-189 (2008) - [i3]Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC Implementations of the etaT Pairing in Characteristic Three. IACR Cryptol. ePrint Arch. 2008: 280 (2008) - 2007
- [j8]Shuji Isobe, Wataru Kumagai, Masahiro Mambo, Hiroki Shizuya:
Toward Separating Integer Factoring from Discrete Logarithm mod p. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 48-53 (2007) - [c22]Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura:
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. INDOCRYPT 2007: 297-311 - [e4]Jie Li, Minyi Guo, Qun Jin, Yongbing Zhang, Liang-Jie Zhang, Hai Jin, Masahiro Mambo, Jiro Tanaka, Hiromu Hayashi:
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007, December 11-14, 2007, Tsukuba Science City, Japan. IEEE Computer Society 2007, ISBN 0-7695-3051-6 [contents] - [e3]Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, René Peralta:
Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings. Lecture Notes in Computer Science 4779, Springer 2007, ISBN 978-3-540-75495-4 [contents] - 2006
- [j7]Sk. Md. Mizanur Rahman, Atsuo Inomata, Masahiro Mambo, Eiji Okamoto:
Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks. Inf. Media Technol. 1(2): 1191-1203 (2006) - [c21]Masahiro Mambo, Moisés Salinas-Rosales, Kazuo Ohta, Noboru Kunihiro:
Problems on the MR micropayment schemes. AsiaCCS 2006: 363 - [c20]Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. ICUCT 2006: 140-149 - [c19]Sk. Md. Mizanur Rahman, Masahiro Mambo, Atsuo Inomata, Eiji Okamoto:
An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks. SAINT 2006: 300-306 - [i2]Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks. IACR Cryptol. ePrint Arch. 2006: 328 (2006) - [i1]Lihua Wang, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto:
A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority. IACR Cryptol. ePrint Arch. 2006: 344 (2006) - 2005
- [j6]Chisato Konoma, Masahiro Mambo, Hiroki Shizuya:
The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 81-88 (2005) - [j5]Shuji Isobe, Tetsuo Kuriyama, Masahiro Mambo, Hiroki Shizuya:
On the Polynomial Time Computability of Abstract Ray-Tracing Problems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(5): 1209-1213 (2005) - 2003
- [j4]Shintaro Itagaki, Masahiro Mambo, Hiroki Shizuya:
On the Strength of the Strong RSA Assumption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(5): 1164-1170 (2003) - [j3]Soohyun Oh, Masahiro Mambo, Hiroki Shizuya, Dongho Won:
On the Security of Girault Key Agreement Protocols against Active Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(5): 1181-1189 (2003) - [c18]Seungjoo Kim, Masahiro Mambo, Yuliang Zheng:
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. CT-RSA 2003: 227-243 - 2002
- [c17]Masahiro Mambo, Eiji Okamoto, Yasushi Sengoku, Takashi Tanaka:
Simple and Secure Mobile Access under the Flexible Organization Management. DEXA Workshops 2002: 456-462 - [c16]Eikoh Chida, Yosuke Kasai, Masahiro Mambo, Hiroki Shizuya:
Spending Offline Divisible Coins with Combining Capability. INDOCRYPT 2002: 339-353 - 2001
- [c15]Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe:
Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. ACISP 2001: 145-158 - [c14]Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng:
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). IMACC 2001: 114-127 - 2000
- [c13]Hiroshi Doi, Masahiro Mambo, Eiji Okamoto:
On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. ACISP 2000: 352-367 - [c12]Hideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya:
An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software. ISW 2000: 82-96 - [c11]Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada, Yuko Yoshifuji:
A Structured ElGamal-Type Multisignature Scheme. Public Key Cryptography 2000: 466-483
1990 – 1999
- 1999
- [c10]Shigeki Kitazawa, Xun Yi, Eiji Okamoto, Masahiro Mambo:
Improvement of Secure Access Control Agent for Distributed Files. ICPP Workshops 1999: 185-191 - [c9]Seungjoo Kim, Insoo Lee, Masahiro Mambo, Sungjun Park:
On the Difficulty of Key Recovery Systems. ISW 1999: 207-224 - [e2]Masahiro Mambo, Yuliang Zheng:
Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings. Lecture Notes in Computer Science 1729, Springer 1999, ISBN 3-540-66695-8 [contents] - 1998
- [c8]Agus Fanar Syukri, Eiji Okamoto, Masahiro Mambo:
A User Identification System Using Signature Written with Mouse. ACISP 1998: 403-414 - [c7]Masahiro Mambo, Hiroki Shizuya:
A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme. Public Key Cryptography 1998: 258-262 - [e1]Eiji Okamoto, George I. Davida, Masahiro Mambo:
Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings. Lecture Notes in Computer Science 1396, Springer 1998, ISBN 3-540-64382-6 [contents] - 1997
- [c6]Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai:
Protection of Data and Delegated Keys in Digital Distribution. ACISP 1997: 271-282 - [c5]Kenichi Hayashi, Eiji Okamoto, Masahiro Mambo:
Proposal of user identification scheme using mouse. ICICS 1997: 144-148 - [c4]Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo:
The Application of ID-Based Key Distribution Systems to an Elliptic Curve. ISW 1997: 335-344 - [c3]Masahiro Mambo, Takanori Murayama, Eiji Okamoto:
A tentative approach to constructing tamper-resistant software. NSPW 1997: 23-33 - 1996
- [c2]Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto:
How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. ASIACRYPT 1996: 322-333 - [c1]Masahiro Mambo, Keisuke Usuda, Eiji Okamoto:
Proxy Signatures for Delegating Signing Operation. CCS 1996: 48-57 - 1995
- [j2]Eiji Okamoto, Tomohiko Uyematsu, Masahiro Mambo:
Permutation Cipher Scheme Using Polynomials over a Field. IEICE Trans. Inf. Syst. 78-D(2): 138-142 (1995) - 1992
- [j1]Masahiro Mambo, Hirotsugu Kinoshita, Shigeo Tsujii:
Communication protocols with untraceability of sender and receiver. Syst. Comput. Jpn. 23(9): 11-18 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint