default search action
Carlisle M. Adams
Person information
- affiliation: University of Ottawa, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c50]Fabian Willems, Carlisle Adams:
GhostBuy : An All-Steps Anonymous Purchase Platform (ASAPP) based on Separation of Data. PST 2023: 1-12 - [e4]Guy-Vincent Jourdan, Laurent Mounier, Carlisle M. Adams, Florence Sèdes, Joaquín García-Alfaro:
Foundations and Practice of Security - 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12-14, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13877, Springer 2023, ISBN 978-3-031-30121-6 [contents] - 2022
- [j20]Carlisle Adams:
Improving User Privacy in Identity-Based Encryption Environments. Cryptogr. 6(4): 55 (2022) - [i19]Thaís Bardini Idalino, Lucia Moura, Carlisle Adams:
Modification tolerant signature schemes: location and correction. CoRR abs/2208.00373 (2022) - 2021
- [b1]Carlisle Adams:
Introduction to Privacy Enhancing Technologies - A Classification-Based Approach to Understanding PETs. Springer 2021, ISBN 978-3-030-81042-9, pp. 1-324 - [j19]Jinnan Fan, Fabian Willems, Jafar Zahed, John Gray, Serge Mister, Mike Ounsworth, Carlisle Adams:
Impact of post-quantum hybrid certificates on PKI, common libraries, and protocols. Int. J. Secur. Networks 16(3): 200-211 (2021) - [c49]Sherry Wang, Carlisle Adams, Anne Broadbent:
Password authentication schemes on a quantum computer. QCE 2021: 346-350 - 2020
- [j18]Carlisle Adams, Yu Dai, Catherine DesOrmeaux, Sean McAvoy, NamChi Nguyen, Francisco Trindade:
Strengthening Enforcement in a Comprehensive Architecture for Privacy Enforcement at Internet Websites. Frontiers Comput. Sci. 2: 2 (2020) - [j17]Carlisle Adams:
A privacy-preserving Blockchain with fine-grained access control. Secur. Priv. 3(2) (2020) - [c48]Jinxin Liu, Burak Kantarci, Carlisle Adams:
Machine learning-driven intrusion detection for Contiki-NG-based IoT networks exposed to NSL-KDD dataset. WiseML@WiSec 2020: 25-30
2010 – 2019
- 2019
- [c47]Thaís Bardini Idalino, Lucia Moura, Carlisle Adams:
Modification Tolerant Signature Schemes: Location and Correction. INDOCRYPT 2019: 23-44 - [i18]Fabian Willems, Mohammad Raahemi, Prasadith Buddhitha, Carlisle Adams, Thomas Tran:
On the security and privacy of Interac e-Transfers. CoRR abs/1910.01587 (2019) - 2018
- [c46]Maryam Hezaveh, Carlisle Adams:
A PIR Scheme to Improve the Computation Cost on the Client-Side of Smartphone Applications. CCECE 2018: 1-4 - [c45]David Bissessar, Maryam Hezaveh, Fayzah Alshammari, Carlisle Adams:
Mobile Travel Credentials. FPS 2018: 46-58 - [e3]Carlisle Adams, Jan Camenisch:
Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10719, Springer 2018, ISBN 978-3-319-72564-2 [contents] - 2017
- [c44]Maryam Hezaveh, Carlisle M. Adams:
An efficient solution to the socialist millionaires' problem. CCECE 2017: 1-4 - [c43]Maryam Hezaveh, Carlisle Adams:
Privacy Preserving Discovery of Nearby-Friends. MCETECH 2017: 41-55 - 2016
- [j16]Hamidreza Ghafghazi, Amr El Mougy, Hussein T. Mouftah, Carlisle Adams:
Location-Aware Authorization Scheme for Emergency Response. IEEE Access 4: 4590-4608 (2016) - [j15]Brent Carrara, Carlisle Adams:
Out-of-Band Covert Channels - A Survey. ACM Comput. Surv. 49(2): 23:1-23:36 (2016) - [c42]Brent Carrara, Carlisle Adams:
Estimating the steganographic capacity of band-limited channels. CCECE 2016: 1-5 - [c41]Brent Carrara, Carlisle Adams:
A Survey and Taxonomy Aimed at the Detection and Measurement of Covert Channels. IH&MMSec 2016: 115-126 - [c40]Hamidreza Ghafghazi, Amr El Mougy, Hussein T. Mouftah, Carlisle Adams:
Secure data storage structure and privacy-preserving mobile search scheme for public safety networks. WCNC 2016: 1-7 - [p1]David Bissessar, Carlisle Adams, Alex Stoianov:
Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents. Recent Advances in Computational Intelligence in Defense and Security 2016: 339-366 - [i17]Hamidreza Ghafghazi, Amr El Mougy, Hussein T. Mouftah, Carlisle Adams:
Secure Data Storage Structure and Privacy-Preserving Mobile Search Scheme for Public Safety Networks. CoRR abs/1602.04493 (2016) - 2015
- [c39]Brent C. Carrara, Carlisle M. Adams:
On Characterizing and Measuring Out-of-Band Covert Channels. IH&MMSec 2015: 43-54 - 2014
- [c38]Carlisle M. Adams, Guy-Vincent Jourdan:
Digital signatures for mobile users. CCECE 2014: 1-5 - [c37]Fida Kamal Dankar, Renaud Brien, Carlisle Adams, Stan Matwin:
Secure Multi-Party linear Regression. EDBT/ICDT Workshops 2014: 406-414 - [c36]Brent Carrara, Carlisle Adams:
On Acoustic Covert Channels Between Air-Gapped Systems. FPS 2014: 3-16 - [c35]Wen Wen, Binod Vaidya, Dimitrios Makrakis, Carlisle Adams:
Decentralized CRT-Based Efficient Verifiable (n, t, n) Multi-secret Sharing Scheme. FPS 2014: 279-293 - [c34]Hamidreza Ghafghazi, Amr El Mougy, Hussein T. Mouftah, Carlisle M. Adams:
Classification of technological privacy techniques for LTE-based public safety networks. Q2SWinet 2014: 41-50 - [c33]David Bissessar, Carlisle Adams, Dong Liu:
Using biometric key commitments to prevent unauthorized lending of cryptographic credentials. PST 2014: 75-83 - 2013
- [j14]Ali Nur Mohammad Noman, Carlisle M. Adams:
Providing A Data Location Assurance Service for Cloud Storage Environments. J. Mobile Multimedia 8(4): 265-286 (2013) - [i16]Stefan Santesson, Michael Myers, Rich Ankney, Ambarish Malpani, Slava Galperin, Carlisle Adams:
X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 6960: 1-41 (2013) - 2012
- [c32]Muyiwa Olurin, Carlisle Adams, Luigi Logrippo:
Platform for privacy preferences (P3P): Current status and future directions. PST 2012: 217-220 - [c31]Ali Nur Mohammad Noman, Carlisle M. Adams:
DLAS: Data Location Assurance Service for cloud computing environments. PST 2012: 225-228 - [i15]Aleksander Essex, Jeremy Clark, Urs Hengartner, Carlisle Adams:
Eperio: Mitigating Technical Complexity in Cryptographic Election Verification. IACR Cryptol. ePrint Arch. 2012: 178 (2012) - 2011
- [j13]Carlisle Adams:
Achieving non-transferability in credential systems using hidden biometrics. Secur. Commun. Networks 4(2): 195-206 (2011) - [c30]Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Hussein T. Mouftah, Atsuo Inomata:
Session-wise private data exchange in eHealth peer-to-peer database management systems. ISI 2011: 204-206 - [c29]Abbas Javadtalab, Laith Abbadi, Mona Omidyeganeh, Shervin Shirmohammadi, Carlisle M. Adams, Abdulmotaleb El-Saddik:
Transparent non-intrusive multimodal biometric system for video conference using the fusion of face and ear recognition. PST 2011: 87-92 - [c28]Ali Nur Mohammad Noman, Sk. Md. Mizanur Rahman, Carlisle Adams:
Improving security and usability of low cost RFID tags. PST 2011: 134-141 - [c27]Sk. Md. Mizanur Rahman, Md. Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto:
Cryptographic security models for eHealth P2P database management systems network. PST 2011: 164-173 - [r41]Carlisle Adams:
Certificate. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 188-189 - [r40]Carlisle Adams:
Certificate Management. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 189 - [r39]Carlisle Adams:
Certificate Revocation. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 190-192 - [r38]Carlisle Adams, Russ Housley, Sean Turner:
Certification Authority. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 193-195 - [r37]Carlisle Adams:
Dictionary Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 332 - [r36]Carlisle Adams:
Identification. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 584-585 - [r35]Carlisle Adams:
Impersonation Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 596 - [r34]Carlisle Adams:
Kerberos Authentication Protocol. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 674-675 - [r33]Steve Lloyd, Carlisle Adams:
Key Management. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 683-688 - [r32]Carlisle Adams:
Master Key. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 762 - [r31]Carlisle Adams:
One Time Password, from a Key Management Perspective. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 885 - [r30]Carlisle Adams:
Personal Identification Number (PIN). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 927 - [r29]Carlisle Adams:
Replay Attack. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1042 - [r28]Carlisle Adams:
Response. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1042 - [r27]Carlisle Adams:
Salt. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1075 - [r26]Carlisle Adams:
Trusted Third Party. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1335 - [r25]Carlisle Adams:
User Authentication. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1352 - 2010
- [c26]Brent Carrara, Carlisle Adams:
On achieving a digital identity management system with support for non-transferability. PST 2010: 150-159 - [c25]Carlisle Adams, Guy-Vincent Jourdan, Jean-Pierre Levac, François Prevost:
Lightweight protection against brute force login attacks on Web applications. PST 2010: 181-188 - [c24]Brent Carrara, Carlisle Adams:
You are the key: Generating cryptographic keys from voice biometrics. PST 2010: 213-222 - [c23]Aleksander Essex, Carlisle Adams:
Eperio: Mitigating Technical Complexity in Cryptographic Election Verification. EVT/WOTE 2010 - [c22]Aleksander Essex, Jeremy Clark, Carlisle Adams:
Aperio: High Integrity Elections for Developing Countries. Towards Trustworthy Elections 2010: 388-401 - [i14]Sk. Md. Mizanur Rahman, Mehedi Masud, Carlisle Adams, Khalil El-Khatib, Hussein T. Mouftah, Eiji Okamoto:
Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems. IACR Cryptol. ePrint Arch. 2010: 85 (2010)
2000 – 2009
- 2009
- [c21]Fang Tian, Carlisle Adams:
An E-Hospital Security Architecture. ADHOCNETS 2009: 639-651 - 2008
- [j12]Hai Tao, Carlisle Adams:
Pass-Go: A Proposal to Improve the Usability of Graphical Passwords. Int. J. Netw. Secur. 7(2): 273-292 (2008) - [c20]Kathryn Garson, Carlisle Adams:
Security and privacy system architecture for an e-hospital environment. IDtrust 2008: 122-130 - 2007
- [c19]Jeremy Clark, Paul C. van Oorschot, Carlisle Adams:
Usability of anonymous web browsing: an examination of Tor interfaces and deployability. SOUPS 2007: 41-51 - [e2]Carlisle M. Adams, Ali Miri, Michael J. Wiener:
Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4876, Springer 2007, ISBN 978-3-540-77359-7 [contents] - 2006
- [j11]Carlisle M. Adams:
Designing against a class of algebraic attacks on symmetric block ciphers. Appl. Algebra Eng. Commun. Comput. 17(1): 17-27 (2006) - [j10]Deholo Nali, Carlisle M. Adams, Ali Miri:
Hierarchical time-based information release. Int. J. Inf. Sec. 5(2): 92-104 (2006) - [j9]Deholo Nali, Ali Miri, Carlisle M. Adams:
Traffic Filtering and Routing in Partially-Hidden Networks. Int. J. Netw. Secur. 2(2): 91-104 (2006) - [c18]Yogesh Kalyani, Carlisle Adams:
Privacy Negotiation using a Mobile Agent. CCECE 2006: 628-633 - [c17]Xuebing Qing, Carlisle Adams:
KEAML - Key Exchange and Authentication Markup Language. CCECE 2006: 634-638 - [c16]Xuebing Qing, Carlisle Adams:
XACML-Based Policy-Driven Access Control for Mobile Environments. CCECE 2006: 643-646 - [c15]Mansour Alsaleh, Carlisle Adams:
Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks. Privacy Enhancing Technologies 2006: 59-77 - 2005
- [j8]Carlisle M. Adams:
Building Secure Web-Based Environments: Understanding Research Interrelationships through a Construction Metaphor. IEEE Secur. Priv. 3(1): 74-77 (2005) - [j7]Deholo Nali, Carlisle M. Adams, Ali Miri:
Using Threshold Attribute-based Encryption for Practical Biometric-based Access Control. Int. J. Netw. Secur. 1(3): 173-182 (2005) - [c14]Deholo Nali, Carlisle M. Adams, Ali Miri:
Time-Based Release of Confidential Information in Hierarchical Settings. ISC 2005: 29-43 - [c13]Deholo Nali, Carlisle Adams, Ali Miri:
An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control. IWAP 2005: 139-154 - [r24]Carlisle Adams:
Attributes management. Encyclopedia of Cryptography and Security 2005 - [r23]Carlisle Adams:
Authorization architecture. Encyclopedia of Cryptography and Security 2005 - [r22]Carlisle Adams:
Authorization Policy. Encyclopedia of Cryptography and Security 2005 - [r21]Carlisle Adams:
Authorizations management. Encyclopedia of Cryptography and Security 2005 - [r20]Carlisle Adams:
Certificate. Encyclopedia of Cryptography and Security 2005 - [r19]Carlisle Adams:
Certificate Management. Encyclopedia of Cryptography and Security 2005 - [r18]Carlisle Adams:
Certificate Revocation. Encyclopedia of Cryptography and Security 2005 - [r17]Carlisle Adams:
Certification Authority. Encyclopedia of Cryptography and Security 2005 - [r16]Carlisle Adams:
Dictionary Attack (II). Encyclopedia of Cryptography and Security 2005 - [r15]Carlisle Adams:
Entitlements Management. Encyclopedia of Cryptography and Security 2005 - [r14]Carlisle Adams:
Identification. Encyclopedia of Cryptography and Security 2005 - [r13]Carlisle Adams:
Impersonation Attack. Encyclopedia of Cryptography and Security 2005 - [r12]Carlisle Adams:
Kerberos Authentication Protocol. Encyclopedia of Cryptography and Security 2005 - [r11]Carlisle Adams:
Master Key. Encyclopedia of Cryptography and Security 2005 - [r10]Carlisle Adams:
One-Time Password. Encyclopedia of Cryptography and Security 2005 - [r9]Carlisle Adams:
Personal Identification Number (PIN). Encyclopedia of Cryptography and Security 2005 - [r8]Carlisle Adams:
Privacy. Encyclopedia of Cryptography and Security 2005 - [r7]Carlisle Adams:
Privilege Management. Encyclopedia of Cryptography and Security 2005 - [r6]Carlisle Adams:
Replay Attack. Encyclopedia of Cryptography and Security 2005 - [r5]Carlisle Adams:
Response. Encyclopedia of Cryptography and Security 2005 - [r4]Carlisle Adams:
Rights Management. Encyclopedia of Cryptography and Security 2005 - [r3]Carlisle Adams:
Salt. Encyclopedia of Cryptography and Security 2005 - [r2]Carlisle Adams:
Trusted Third Party. Encyclopedia of Cryptography and Security 2005 - [r1]Carlisle Adams:
User Authentication. Encyclopedia of Cryptography and Security 2005 - [i13]Carlisle Adams, Stephen Farrell, Tomi Kause, Tero Mononen:
Internet X.509 Public Key Infrastructure Certificate Management Protocol (CMP). RFC 4210: 1-95 (2005) - [i12]Mikhail Blinov, Carlisle Adams:
Alternative Certificate Formats for the Public-Key Infrastructure Using X.509 (PKIX) Certificate Management Protocols. RFC 4212: 1-19 (2005) - 2004
- [c12]Jianqiang Shi, Gregor von Bochmann, Carlisle M. Adams:
A Trust Model with Statistical Foundation. Formal Aspects in Security and Trust 2004: 145-158 - [c11]Carlisle M. Adams, Guenther Kramer, Serge Mister, Robert J. Zuccherato:
On The Security of Key Derivation Functions. ISC 2004: 134-145 - [c10]Deholo Nali, Carlisle M. Adams, Ali Miri:
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. ISC 2004: 245-256 - [c9]Deholo Nali, Ali Miri, Carlisle M. Adams:
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. PST 2004: 219-223 - [i11]Carlisle Adams:
Designing Against the 'Overdefined System of Equations' Attack. IACR Cryptol. ePrint Arch. 2004: 110 (2004) - 2002
- [c8]Carlisle Adams, Sharon Boeyen:
UDDI and WSDL extensions for Web service: a security framework. XML Security 2002: 30-35 - 2001
- [i10]Carlisle Adams, Peter Sylvester, Michael Zolotarev, Robert J. Zuccherato:
Internet X.509 Public Key Infrastructure Data Validation and Certification Server Protocols. RFC 3029: 1-51 (2001) - [i9]Carlisle Adams, Pat Cain, Denis Pinkas, Robert J. Zuccherato:
Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP). RFC 3161: 1-26 (2001) - 2000
- [c7]Carlisle M. Adams, Mike Burmester, Yvo Desmedt, Michael K. Reiter, Philip R. Zimmermann:
Which PKI (public key infrastructure) is the right one? (panel session). CCS 2000: 98-101 - [c6]Carlisle M. Adams, Robert J. Zuccherato:
A Global PMI for Electronic Content Distribution. Selected Areas in Cryptography 2000: 158-168 - [e1]Howard M. Heys, Carlisle M. Adams:
Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings. Lecture Notes in Computer Science 1758, Springer 2000, ISBN 3-540-67185-4 [contents] - [i8]Carlisle Adams:
Use of the CAST-128 Encryption Algorithm in CMS. RFC 2984: 1-6 (2000)
1990 – 1999
- 1999
- [i7]Carlisle Adams, Stephen Farrell:
Internet X.509 Public Key Infrastructure Certificate Management Protocols. RFC 2510: 1-72 (1999) - [i6]Michael Myers, Carlisle Adams, David Solo, David Kemp:
Internet X.509 Certificate Request Message Format. RFC 2511: 1-25 (1999) - [i5]Michael Myers, Rich Ankney, Ambarish Malpani, Slava Galperin, Carlisle Adams:
X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 2560: 1-23 (1999) - [i4]Carlisle Adams, Jeff Gilchrist:
The CAST-256 Encryption Algorithm. RFC 2612: 1-19 (1999) - 1998
- [c5]Sandy Harris, Carlisle M. Adams:
Key-Dependent S-Box Manipulations. Selected Areas in Cryptography 1998: 15-26 - [i3]Carlisle Adams:
Independent Data Unit Protection Generic Security Service Application Program Interface (IDUP-GSS-API). RFC 2479: 1-70 (1998) - 1997
- [j6]Carlisle M. Adams:
Constructing Symmetric Ciphers Using the CAST Design Procedure. Des. Codes Cryptogr. 12(3): 283-316 (1997) - [c4]Carlisle Adams, Steve Lloyd:
Profiles and protocols for the Internet Public-Key Infrastructure. FTDCS 1997: 220-224 - [i2]Carlisle Adams:
The CAST-128 Encryption Algorithm. RFC 2144: 1-15 (1997) - 1996
- [c3]Carlisle Adams:
IDUP and SPKM: Developing Public-Key-Based APIs and Mechanisms for Communication Security Services. NDSS 1996: 128-136 - [i1]Carlisle Adams:
The Simple Public-Key GSS-API Mechanism (SPKM). RFC 2025: 1-45 (1996) - 1992
- [j5]Carlisle M. Adams, Stafford E. Tavares:
Generating Bent Sequences. Discret. Appl. Math. 39(2): 155-159 (1992) - [j4]Carlisle M. Adams:
On Immunity Against Biham and Shamir's "Differential Cryptanalysis". Inf. Process. Lett. 41(2): 77-80 (1992) - 1990
- [j3]Carlisle M. Adams, Stafford E. Tavares:
The Structured Design of Cryptographically Good S-Boxes. J. Cryptol. 3(1): 27-41 (1990) - [j2]Carlisle M. Adams, Stafford E. Tavares:
Generating and counting binary bent sequences. IEEE Trans. Inf. Theory 36(5): 1170-1173 (1990)
1980 – 1989
- 1989
- [j1]Carlisle M. Adams, Henk Meijer:
Security-related comments regarding McEliece's public-key cryptosystem. IEEE Trans. Inf. Theory 35(2): 454-455 (1989) - [c2]Carlisle M. Adams, Stafford E. Tavares:
Good S-Boxes Are Easy To Find. CRYPTO 1989: 612-615 - 1987
- [c1]Carlisle M. Adams, Henk Meijer:
Security-Related Comments Regarding McEliece's Public-Key Cryptosystem. CRYPTO 1987: 224-228
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-18 00:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint