default search action
Juan Manuel González Nieto
Person information
- affiliation: Queensland University of Technology, Brisbane, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [j15]Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Harry Bartlett:
CHURNs: Freshness Assurance for Humans. Comput. J. 58(10): 2404-2425 (2015) - 2014
- [j14]Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Forward-Secure Hierarchical Predicate Encryption. Comput. J. 57(4): 510-536 (2014) - [j13]Long Ngo, Colin Boyd, Juan Manuel González Nieto:
Automated Proofs for Computational Indistinguishability. Comput. J. 57(10): 1513-1536 (2014) - [j12]Aiiad Albeshri, Colin Boyd, Juan Manuel González Nieto:
Enhanced GeoProof: improved geographic assurance for data in the cloud. Int. J. Inf. Sec. 13(2): 191-198 (2014) - [c75]Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila:
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. AISC 2014: 37-45 - 2013
- [j11]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly verifiable ciphertexts. J. Comput. Secur. 21(5): 749-778 (2013) - [j10]Dongdong Sun, Colin Boyd, Juan Manuel González Nieto:
Predicate encryption for multi-inner-products. Secur. Commun. Networks 6(3): 325-339 (2013) - [c74]Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Laurie Buys:
"Who decides?": security and privacy in the wild. OZCHI 2013: 27-36 - 2012
- [j9]Hani Alzaid, Ernest Foo, Juan Manuel González Nieto, DongGook Park:
A taxonomy of secure data aggregation in wireless sensor networks. Int. J. Commun. Networks Distributed Syst. 8(1/2): 101-148 (2012) - [j8]Hani Alzaid, Ernest Foo, Juan Manuel González Nieto, Ejaz Ahmed:
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks. Secur. Commun. Networks 5(2): 125-144 (2012) - [c73]Ibrahim Mohammed Alseadoon, Taizan Chan, Ernest Foo, Juan Manuel González Nieto:
Who is more susceptible to phishing emails?: A Saudi Arabian study. ACIS 2012 - [c72]Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy:
Effort-Release Public-Key Encryption from Cryptographic Puzzles. ACISP 2012: 194-207 - [c71]Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Fully Private Revocable Predicate Encryption. ACISP 2012: 350-363 - [c70]Kaleb Lee, Colin Boyd, Juan Manuel González Nieto:
Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking. ACISP 2012: 434-441 - [c69]Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton:
Towards a Secure Human-and-Computer Mutual Authentication Protocol. AISC 2012: 39-46 - [c68]Kaleb Lee, Juan Manuel González Nieto, Colin Boyd:
Improving the Efficiency of RFID Authentication with Pre-Computation. AISC 2012: 91-100 - [c67]Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto:
Practical client puzzles in the standard model. AsiaCCS 2012: 42-43 - [c66]Kaleb Lee, Juan Manuel González Nieto, Colin Boyd:
A State-Aware RFID Privacy Model with Reader Corruption. CSS 2012: 324-338 - [c65]Aiiad Albeshri, Colin Boyd, Juan Manuel González Nieto:
GeoProof: Proofs of Geographic Location for Cloud Computing Environment. ICDCS Workshops 2012: 506-514 - [c64]Chuah Chai Wen, Ed Dawson, Juan Manuel González Nieto, Leonie Simpson:
A Framework for Security Analysis of Key Derivation Functions. ISPEC 2012: 199-216 - [c63]Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Forward-Secure Hierarchical Predicate Encryption. Pairing 2012: 83-101 - [c62]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. SCN 2012: 393-410 - [i20]Juan Manuel González Nieto, Mark Manulis, Bertram Poettering, Jothi Rangasamy, Douglas Stebila:
Publicly Verifiable Ciphertexts. IACR Cryptol. ePrint Arch. 2012: 357 (2012) - [i19]Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Forward-Secure Hierarchical Predicate Encryption. IACR Cryptol. ePrint Arch. 2012: 402 (2012) - [i18]Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Fully Private Revocable Predicate Encryption. IACR Cryptol. ePrint Arch. 2012: 403 (2012) - 2011
- [j7]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis:
Modeling key compromise impersonation attacks on group key exchange protocols. ACM Trans. Inf. Syst. Secur. 14(4): 28:1-28:24 (2011) - [c61]Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto:
An integrated approach to cryptographic mitigation of denial-of-service attacks. AsiaCCS 2011: 114-123 - [c60]Long Ngo, Colin Boyd, Juanma González Nieto:
Automated Proofs for Diffie-Hellman-Based Key Exchanges. CSF 2011: 51-65 - [c59]Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Manuel González Nieto:
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols. CT-RSA 2011: 284-301 - [c58]Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto:
Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection. ICISC 2011: 319-331 - [c57]Colin Boyd, Juanma González Nieto:
On Forward Secrecy in One-Round Key Exchange. IMACC 2011: 451-468 - [c56]Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto:
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy. INDOCRYPT 2011: 379-398 - [c55]Kenneth Radke, Margot Brereton, Seyed Hadi Mirisaee, Sunil Ghelawat, Colin Boyd, Juan Manuel González Nieto:
Tensions in Developing a Secure Collective Information Practice - The Case of Agile Ridesharing. INTERACT (2) 2011: 524-532 - [c54]Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton:
Ceremony Analysis: Strengths and Weaknesses. SEC 2011: 104-115 - [i17]Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto:
Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection. IACR Cryptol. ePrint Arch. 2011: 665 (2011) - 2010
- [c53]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Attribute-Based Authenticated Key Exchange. ACISP 2010: 300-317 - [c52]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Avoiding Full Extension Field Arithmetic in Pairing Computations. AFRICACRYPT 2010: 203-224 - [c51]Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Ernest Foo:
Mitigating Sandwich Attacks Against a Secure Key Management Scheme in Wireless Sensor Networks for PCS/SCADA. AINA 2010: 859-865 - [c50]Georg Lippold, Juanma González Nieto:
Certificateless Key Agreement in the Standard Model. AISC 2010: 75-85 - [c49]Kenneth Radke, Colin Boyd, Margot Brereton, Juan Manuel González Nieto:
How HCI design influences web security decisions. OZCHI 2010: 252-255 - [c48]Long Ngo, Colin Boyd, Juan Manuel González Nieto:
Automating Computational Proofs for Public-Key-Based Key Exchange. ProvSec 2010: 53-69 - [c47]Dongdong Sun, Colin Boyd, Juan Manuel González Nieto:
Delegation in Predicate Encryption Supporting Disjunctive Queries. SEC 2010: 229-240 - [c46]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Delaying Mismatched Field Multiplications in Pairing Computations. WAIFI 2010: 196-214 - [i16]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
One Round Group Key Exchange with Forward Security in the Standard Model. IACR Cryptol. ePrint Arch. 2010: 83 (2010) - [i15]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Attribute-based Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2010: 84 (2010) - [i14]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Avoiding Full Extension Field Arithmetic in Pairing Computations. IACR Cryptol. ePrint Arch. 2010: 104 (2010) - [i13]Craig Costello, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Delaying Mismatched Field Multiplications in Pairing Computations. IACR Cryptol. ePrint Arch. 2010: 123 (2010) - [i12]Douglas Stebila, Lakshmi Kuppusamy, Jothi Rangasamy, Colin Boyd, Juan Manuel González Nieto:
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. IACR Cryptol. ePrint Arch. 2010: 649 (2010)
2000 – 2009
- 2009
- [j6]Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:
One-round key exchange in the standard model. Int. J. Appl. Cryptogr. 1(3): 181-199 (2009) - [c45]Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto:
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. ACNS 2009: 53-70 - [c44]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Strong Designated Verifier Signature in a Multi-user Setting. AISC 2009: 21-31 - [c43]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Universally composable contributory group key exchange. AsiaCCS 2009: 146-156 - [c42]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis:
Generic One Round Group Key Exchange in the Standard Model. ICISC 2009: 1-15 - [c41]Georg Lippold, Colin Boyd, Juan Manuel González Nieto:
Efficient Certificateless KEM in the Standard Model. ICISC 2009: 34-46 - [c40]Craig Costello, Hüseyin Hisil, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Faster Pairings on Special Weierstrass Curves. Pairing 2009: 89-101 - [c39]Georg Lippold, Colin Boyd, Juan Manuel González Nieto:
Strongly Secure Certificateless Key Agreement. Pairing 2009: 206-230 - [c38]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Public Key Cryptography 2009: 105-123 - [c37]Hani Alzaid, DongGook Park, Juan Manuel González Nieto, Colin Boyd, Ernest Foo:
A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA. S-CUBE 2009: 66-82 - [e2]Colin Boyd, Juan Manuel González Nieto:
Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. Lecture Notes in Computer Science 5594, Springer 2009, ISBN 978-3-642-02619-5 [contents] - [i11]Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto:
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. IACR Cryptol. ePrint Arch. 2009: 136 (2009) - [i10]Georg Lippold, Colin Boyd, Juan Manuel González Nieto:
Strongly Secure Certificateless Key Agreement. IACR Cryptol. ePrint Arch. 2009: 219 (2009) - [i9]Craig Costello, Hüseyin Hisil, Colin Boyd, Juan Manuel González Nieto, Kenneth Koon-Ho Wong:
Faster Pairings on Special Weierstrass Curves. IACR Cryptol. ePrint Arch. 2009: 243 (2009) - [i8]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. IACR Cryptol. ePrint Arch. 2009: 291 (2009) - [i7]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Universally Composable Contributory Group Key Exchange. IACR Cryptol. ePrint Arch. 2009: 300 (2009) - [i6]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
On the Connection between Signcryption and One-pass Key Establishment. IACR Cryptol. ePrint Arch. 2009: 436 (2009) - [i5]Georg Lippold, Colin Boyd, Juan Manuel González Nieto:
Efficient Certificateless KEM in the Standard Model. IACR Cryptol. ePrint Arch. 2009: 451 (2009) - [i4]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis:
Generic One Round Group Key Exchange in the Standard Model. IACR Cryptol. ePrint Arch. 2009: 514 (2009) - 2008
- [c36]Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:
Efficient One-Round Key Exchange in the Standard Model. ACISP 2008: 69-83 - [c35]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
ID-based One-pass Authenticated Key Establishment. AISC 2008: 39-46 - [c34]Hani Alzaid, Ernest Foo, Juan Manuel González Nieto:
Secure Data Aggregation in Wireless Sensor Network: a survey. AISC 2008: 93-105 - [c33]Hani Alzaid, Ernest Foo, Juan Manuel González Nieto:
RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks. PDCAT 2008: 419-424 - [i3]Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:
Efficient One-round Key Exchange in the Standard Model. IACR Cryptol. ePrint Arch. 2008: 7 (2008) - 2007
- [j5]Jason Smith, Suratose Tritilanunt, Colin Boyd, Juan Manuel González Nieto, Ernest Foo:
Denial-of-service resistance in key establishment. Int. J. Wirel. Mob. Comput. 2(1): 59-71 (2007) - [c32]Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto:
Cost-Based Framework and Simulation of DoS-Resistant Protocols Using Coloured Petri Nets. ACSC 2007: 191-200 - [c31]Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto:
Toward Non-parallelizable Client Puzzles. CANS 2007: 247-264 - [c30]Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji:
Detecting relay attacks with timing-based protocols. AsiaCCS 2007: 204-213 - [c29]Mark Burdon, Juan Manuel González Nieto, Sharon Christensen, Ed Dawson, William D. Duncan, Bill Lane:
Access Control in Federated Databases: How Legal Issues Shape Security. EGOV 2007: 228-239 - [c28]JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd:
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. EUC Workshops 2007: 557-567 - [c27]JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd:
Low-Cost and Strong-Security RFID Authentication Protocol. EUC Workshops 2007: 795-807 - [c26]M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
On the Connection Between Signcryption and One-Pass Key Establishment. IMACC 2007: 277-301 - [c25]Raylin Tso, Juan Manuel González Nieto, Takeshi Okamoto, Colin Boyd, Eiji Okamoto:
Verifier-Key-Flexible Universal Designated-Verifier Signatures. IMACC 2007: 403-421 - [c24]JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd:
Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). PAKDD Workshops 2007: 574-583 - 2006
- [j4]Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto:
Modular proofs for key exchange: rigorous optimizations in the Canetti-Krawczyk model. Appl. Algebra Eng. Commun. Comput. 16(6): 405-438 (2006) - [j3]Martin P. Betts, Peter Black, Sharon Christensen, Ed Dawson, Rong Du, William D. Duncan, Ernest Foo, Juan Manuel González Nieto:
Towards Secure and Legal E-Tendering. J. Inf. Technol. Constr. 11: 89-102 (2006) - [c23]Jason Smith, Juan Manuel González Nieto, Colin Boyd:
Modelling denial of service attacks on JFK with Meadows's cost-based framework. ACSW 2006: 125-134 - [c22]Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel González Nieto:
SKMA: a key management architecture for SCADA systems. ACSW 2006: 183-192 - [c21]Jaimee Brown, Juan Manuel González Nieto, Colin Boyd:
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. CANS 2006: 1-18 - [c20]Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson:
Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. ICISC 2006: 296-309 - [c19]Jaimee Brown, Juan Manuel González Nieto, Colin Boyd:
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. INDOCRYPT 2006: 176-190 - [c18]Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto:
Examining the DoS Resistance of HIP. OTM Workshops (1) 2006: 616-625 - [c17]Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto:
Security-Mediated Certificateless Cryptography. Public Key Cryptography 2006: 508-524 - 2005
- [j2]Juan Manuel González Nieto, Colin Boyd, Ed Dawson:
A Public Key Cryptosystem Based On A Subgroup Membership Problem. Des. Codes Cryptogr. 36(3): 301-316 (2005) - [c16]Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague:
GBD Threshold Cryptography with an Application to RSA Key Recovery. ACISP 2005: 394-405 - [c15]Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier López:
A Novel Method to Maintain Privacy in Mobile Agent Applications. CANS 2005: 247-260 - [c14]Rong Du, Ernest Foo, Juan Manuel González Nieto, Colin Boyd:
Designing Secure E-Tendering Systems. TrustBus 2005: 70-79 - [e1]Colin Boyd, Juan Manuel González Nieto:
Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Lecture Notes in Computer Science 3574, Springer 2005, ISBN 3-540-26547-3 [contents] - [i2]Praveen Gauravaram, William Millan, Juanma González Nieto, Ed Dawson:
3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function. IACR Cryptol. ePrint Arch. 2005: 390 (2005) - [i1]Praveen Gauravaram, William Millan, Juanma González Nieto:
Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1. IACR Cryptol. ePrint Arch. 2005: 391 (2005) - 2004
- [c13]Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto:
Protocols with Security Proofs for Mobile Applications. ACISP 2004: 358-369 - [c12]Jaimee Brown, Ed Dawson, Juan Manuel González Nieto:
Implementation of the GBD Cryptosystem. Cryptographic Algorithms and their Uses 2004: 94-109 - [c11]Jason Reid, Andrew J. Clark, Juan Manuel González Nieto, Jason Smith, Kapali Viswanathan:
Denial of Service Issues in Voice Over IP Networks. ICETE (2) 2004: 230-237 - [c10]Yvonne Hitchcock, Colin Boyd, Juan Manuel González Nieto:
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model. INDOCRYPT 2004: 17-32 - [c9]Harikrishna Vasanta, Yiu Shing Terry Tin, Colin Boyd, Mark Looi, Juan Manuel González Nieto:
A Secure Framework for User Privacy in Heterogeneous Location Networks. MATA 2004: 264-274 - 2003
- [c8]Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto:
Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. ACISP 2003: 166-179 - [c7]Yiu Shing Terry Tin, Colin Boyd, Juanma González Nieto:
Provably Secure Key Exchange: An Engineering Approach. ACSW 2003: 97-104 - [c6]Juan Manuel González Nieto, Ed Dawson, Eiji Okamoto:
Privacy and Trusted Computing. DEXA Workshops 2003: 383-388 - [c5]Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel González Nieto, Colin Boyd, Paul Montague:
A Password-Based Authenticator: Security Proof and Applications. INDOCRYPT 2003: 388-401 - [c4]Colin Boyd, Juan Manuel González Nieto:
Round-Optimal Contributory Conference Key Agreement. Public Key Cryptography 2003: 161-174 - 2002
- [j1]Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson:
Key recovery for the commercial environment. Int. J. Inf. Sec. 1(3): 161-174 (2002) - 2001
- [c3]Juan Manuel González Nieto, Colin Boyd, Ed Dawson:
A Public Key Cryptosystem Based on the Subgroup Membership Problem. ICICS 2001: 352-363 - 2000
- [c2]Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson:
Key Recovery System for the Commercial Environment. ACISP 2000: 149-162 - [c1]Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson:
Key Recovery in Third Generation Wireless Communication Systems. Public Key Cryptography 2000: 223-237
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-19 00:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint