default search action
Fan Wu 0003
Person information
- affiliation: Xiamen Institute of Technology, Department of Computer Science and Engineering, China
Other persons with the same name
- Fan Wu — disambiguation page
- Fan Wu 0001 — Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Beijing, China
- Fan Wu 0002 — Novartis Institutes for BioMedical Research, San Diego, CA, USA (and 2 more)
- Fan Wu 0004 — Monash University, Clayton, VIC, Australia
- Fan Wu 0005 — Chinese Academy of Sciences, Institute of Electronics, Beijing, China
- Fan Wu 0006 — Shanghai Jiao Tong University, Shanghai Key Laboratory of Scalable Computing and Systems, China (and 2 more)
- Fan Wu 0007 — Beijing University of Posts and Telecommunications, School of Electronic Engineering / Beijing Key Laboratory of Work Safety Intelligent Monitoring, China
- Fan Wu 0008 — CloudWalk Technology, Guangzhou, China
- Fan Wu 0009 — University College London, UK
- Fan Wu 0010 — University of Oxford, Department of Statistics, UK
- Fan Wu 0011 — University of Illinois at Urbana-Champaign, Urbana, IL, USA
- Fan Wu 0012 — University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China
- Fan Wu 0013 — Tuskegee University, Department of Computer Science, AL, USA (and 1 more)
- Fan Wu 0014 — Tsinghua University, BNRist, Department of Computer Science and Technology, Beijing, China (and 2 more)
- Fan Wu 0015 — Technical University of Munich, School of Computation, Information and Technology, Germany (and 1 more)
- Fan Wu 0016 — Hunan University, College of Computer Science and Electronic Engineering, National Supercomputing Center in Changsha, China
- Fan Wu 0017 — Southeast University, State Key Laboratory of Millimeter Waves, School of Information Science and Engineering, Nanjing, China
- Fan Wu 0018 — China Academy of Space Technology, Qian Xuesen Laboratory of Space Technology, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j73]Rifaqat Ali, Arup Kumar Pal, Saru Kumari, Arun Kumar Sangaiah, Xiong Li, Fan Wu:
An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring. J. Ambient Intell. Humaniz. Comput. 15(1): 1165-1186 (2024) - [j72]Fan Wu, Xiong Li, Jingwei Li, Pandi Vijayakumar, Brij B. Gupta, Varsha Arya:
HSADR: A New Highly Secure Aggregation and Dropout-Resilient Federated Learning Scheme for Radio Access Networks With Edge Computing Systems. IEEE Trans. Green Commun. Netw. 8(3): 1141-1155 (2024) - 2023
- [j71]Fan Wu, Xiong Li:
Cloud-assisted authentication scheme supporting dynamic pseudo-identity for autonomous vehicles. Trans. Emerg. Telecommun. Technol. 34(5) (2023) - [j70]Muhammad Asad Saleem, Xiong Li, Muhammad Faizan Ayub, Salman Shamshad, Fan Wu, Haider Abbas:
An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network. IEEE Trans. Intell. Transp. Syst. 24(9): 9940-9951 (2023) - 2022
- [j69]Ouyang Zhao, Xuchong Liu, Xiong Li, Pitam Singh, Fan Wu:
Privacy-preserving data aggregation scheme for edge computing supported vehicular ad hoc networks. Trans. Emerg. Telecommun. Technol. 33(5) (2022) - [j68]Fan Wu, Xiong Li, Xiangyang Luo, Ke Gu:
A novel authentication scheme for edge computing-enabled Internet of Vehicles providing anonymity and identity tracing with drone-assistance. J. Syst. Archit. 132: 102737 (2022) - [j67]Jiabei He, Xuchong Liu, Fan Wu, Chaoyang Chen, Xiong Li:
A mutual authentication scheme in VANET providing vehicular anonymity and tracking. Telecommun. Syst. 81(2): 175-190 (2022) - 2021
- [j66]Fan Wu, Xiong Li, Lili Xu, Pandi Vijayakumar, Neeraj Kumar:
A Novel Three-Factor Authentication Protocol for Wireless Sensor Networks With IoT Notion. IEEE Syst. J. 15(1): 1120-1129 (2021) - [j65]Tian Liu, Fan Wu, Xiong Li, Chaoyang Chen:
A new authentication and key agreement protocol for 5G wireless networks. Telecommun. Syst. 78(3): 317-329 (2021) - 2020
- [j64]Fan Wu, Xiong Li, Lili Xu, Saru Kumari, Dingbao Lin, Joel J. P. C. Rodrigues:
An anonymous and identity-trackable data transmission scheme for smart grid under smart city notion. Ann. des Télécommunications 75(7-8): 307-317 (2020) - [j63]Fan Wu, Xiong Li, Lili Xu, Saru Kumari:
A privacy-preserving scheme with identity traceable property for smart grid. Comput. Commun. 157: 38-44 (2020) - [j62]Sravani Challa, Ashok Kumar Das, Prosanta Gope, Neeraj Kumar, Fan Wu, Athanasios V. Vasilakos:
Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems. Future Gener. Comput. Syst. 108: 1267-1286 (2020) - [j61]Khalid Mahmood, Aniqa Rehman, Pradeep Chaudhary, Xiong Li, Fan Wu, Saru Kumari:
Revised anonymous authentication protocol for adaptive client-server infrastructure. Int. J. Commun. Syst. 33(4) (2020) - [j60]Xiong Li, Jieyao Peng, Mohammad S. Obaidat, Fan Wu, Muhammad Khurram Khan, Chaoyang Chen:
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems. IEEE Syst. J. 14(1): 39-50 (2020) - [j59]Xiong Li, Tian Liu, Mohammad S. Obaidat, Fan Wu, Pandi Vijayakumar, Neeraj Kumar:
A Lightweight Privacy-Preserving Authentication Protocol for VANETs. IEEE Syst. J. 14(3): 3547-3557 (2020)
2010 – 2019
- 2019
- [j58]Xiong Li, Shanpeng Liu, Fan Wu, Saru Kumari, Joel J. P. C. Rodrigues:
Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications. IEEE Internet Things J. 6(3): 4755-4763 (2019) - [j57]Xiong Li, Fan Wu, Saru Kumari, Lili Xu, Arun Kumar Sangaiah, Kim-Kwang Raymond Choo:
A provably secure and anonymous message authentication scheme for smart grids. J. Parallel Distributed Comput. 132: 242-249 (2019) - [j56]Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Saru Kumari, Fan Wu, Shehzad Ashraf Chaudhry, Niranchana Radhakrishnan:
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment. Mob. Networks Appl. 24(3): 1046-1062 (2019) - [j55]Azeem Irshad, Shehzad Ashraf Chaudhry, Muhammad Sher, Bander A. Alzahrani, Saru Kumari, Xiong Li, Fan Wu:
An Anonymous and Efficient Multiserver Authenticated Key Agreement With Offline Registration Centre. IEEE Syst. J. 13(1): 436-446 (2019) - [j54]Fan Wu, Lili Xu, Xiong Li, Saru Kumari, Marimuthu Karuppiah, Mohammad S. Obaidat:
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography. IEEE Syst. J. 13(3): 2830-2838 (2019) - 2018
- [j53]Fan Wu, Xiong Li, Lili Xu, Saru Kumari, Arun Kumar Sangaiah:
A novel mutual authentication scheme with formal proof for smart healthcare systems under global mobility networks notion. Comput. Electr. Eng. 68: 107-118 (2018) - [j52]Fan Wu, Xiong Li, Lili Xu, Arun Kumar Sangaiah, Joel J. P. C. Rodrigues:
Authentication Protocol for Distributed Cloud Computing: An Explanation of the Security Situations for Internet-of-Things-Enabled Devices. IEEE Consumer Electron. Mag. 7(6): 38-44 (2018) - [j51]Fan Wu, Xiong Li, Arun Kumar Sangaiah, Lili Xu, Saru Kumari, Liuxi Wu, Jian Shen:
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Future Gener. Comput. Syst. 82: 727-737 (2018) - [j50]Xiong Li, Jianwei Niu, Saru Kumari, Fan Wu, Kim-Kwang Raymond Choo:
A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city. Future Gener. Comput. Syst. 83: 607-618 (2018) - [j49]Xiong Li, Fan Wu, Muhammad Khurram Khan, Lili Xu, Jian Shen, Minho Jo:
A secure chaotic map-based remote authentication scheme for telecare medicine information systems. Future Gener. Comput. Syst. 84: 149-159 (2018) - [j48]Xiong Li, Jieyao Peng, Jianwei Niu, Fan Wu, Junguo Liao, Kim-Kwang Raymond Choo:
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things. IEEE Internet Things J. 5(3): 1606-1615 (2018) - [j47]Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, Vidushi Gupta:
Design of a secure anonymity-preserving authentication scheme for session initiation protocol using elliptic curve cryptography. J. Ambient Intell. Humaniz. Comput. 9(3): 643-653 (2018) - [j46]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Jian Shen:
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications. J. Ambient Intell. Humaniz. Comput. 9(4): 919-930 (2018) - [j45]Xiong Li, Jianwei Niu, Saru Kumari, Fan Wu, Arun Kumar Sangaiah, Kim-Kwang Raymond Choo:
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J. Netw. Comput. Appl. 103: 194-204 (2018) - [j44]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Qi Xie, Saru Kumari, Fan Wu:
An improved and secure chaotic map based authenticated key agreement in multi-server architecture. Multim. Tools Appl. 77(1): 1167-1204 (2018) - [j43]Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Muhammad Khurram Khan, Qi Jiang, SK Hafizul Islam:
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multim. Tools Appl. 77(2): 2359-2389 (2018) - [j42]Azeem Irshad, Muhammad Sher, Shehzad Ashraf Chaudhry, Saru Kumari, Arun Kumar Sangaiah, Xiong Li, Fan Wu:
A secure mutual authenticated key agreement of user with multiple servers for critical systems. Multim. Tools Appl. 77(9): 11067-11099 (2018) - [j41]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
An improved and provably secure three-factor user authentication scheme for wireless sensor networks. Peer-to-Peer Netw. Appl. 11(1): 1-20 (2018) - [j40]Xiong Li, Jianwei Niu, Md. Zakirul Alam Bhuiyan, Fan Wu, Marimuthu Karuppiah, Saru Kumari:
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(8): 3599-3609 (2018) - [j39]Saru Kumari, Marimuthu Karuppiah, Ashok Kumar Das, Xiong Li, Fan Wu, Neeraj Kumar:
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J. Supercomput. 74(12): 6428-6453 (2018) - 2017
- [j38]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Muhammad Khurram Khan, Ashok Kumar Das:
An enhanced mutual authentication and key agreement scheme for mobile user roaming service in global mobility networks. Ann. des Télécommunications 72(3-4): 131-144 (2017) - [j37]Xiong Li, Jieyao Peng, Saru Kumari, Fan Wu, Marimuthu Karuppiah, Kim-Kwang Raymond Choo:
An enhanced 1-round authentication protocol for wireless body area networks with user anonymity. Comput. Electr. Eng. 61: 238-249 (2017) - [j36]Fan Wu, Xiong Li, Lili Xu, Saru Kumari, Marimuthu Karuppiah, Jian Shen:
A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server. Comput. Electr. Eng. 63: 168-181 (2017) - [j35]Saru Kumari, Ashok Kumar Das, Mohammad Wazid, Xiong Li, Fan Wu, Kim-Kwang Raymond Choo, Muhammad Khurram Khan:
On the design of a secure user authentication and key agreement scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j34]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Kim-Kwang Raymond Choo, Jian Shen:
Design of a provably secure biometrics-based multi-cloud-server authentication scheme. Future Gener. Comput. Syst. 68: 320-330 (2017) - [j33]Rajkumar Soundrapandiyan, Marimuthu Karuppiah, Saru Kumari, Sanjay Kumar Tyagi, Fan Wu, Ki-Hyun Jung:
An Efficient DWT and Intuitionistic Fuzzy Based Multimodality Medical Image Fusion. Int. J. Imaging Syst. Technol. 27(2): 118-132 (2017) - [j32]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
A privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security. J. Ambient Intell. Humaniz. Comput. 8(1): 101-116 (2017) - [j31]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Jian Shen, Kim-Kwang Raymond Choo, Mohammad Wazid, Ashok Kumar Das:
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment. J. Netw. Comput. Appl. 89: 72-85 (2017) - [j30]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
An improved and anonymous two-factor authentication protocol for health-care applications with wireless medical sensor networks. Multim. Syst. 23(2): 195-205 (2017) - [j29]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
A new and secure authentication scheme for wireless sensor networks with formal proof. Peer-to-Peer Netw. Appl. 10(1): 16-30 (2017) - [j28]Saru Kumari, Shehzad Ashraf Chaudhry, Fan Wu, Xiong Li, Mohammad Sabzinejad Farash, Muhammad Khurram Khan:
An improved smart card based authentication scheme for session initiation protocol. Peer-to-Peer Netw. Appl. 10(1): 92-105 (2017) - [j27]Xiong Li, Arun Kumar Sangaiah, Saru Kumari, Fan Wu, Jian Shen, Muhammad Khurram Khan:
An efficient authentication and key agreement scheme with user anonymity for roaming service in smart city. Pers. Ubiquitous Comput. 21(5): 791-805 (2017) - [j26]Marimuthu Karuppiah, Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Muhammad Khurram Khan, R. Saravanan, Sayantani Basu:
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 93(2): 383-407 (2017) - [j25]Azeem Irshad, Muhammad Sher, Muhammad Usman Ashraf, Bander A. Alzahrani, Fan Wu, Qi Xie, Saru Kumari:
An Improved and Secure Chaotic-Map Based Multi-server Authentication Protocol Based on Lu et al. and Tsai and Lo's Scheme. Wirel. Pers. Commun. 95(3): 3185-3208 (2017) - [j24]Xiong Li, Saru Kumari, Jian Shen, Fan Wu, Cai-Sen Chen, SK Hafizul Islam:
Secure Data Access and Sharing Scheme for Cloud Storage. Wirel. Pers. Commun. 96(4): 5295-5314 (2017) - [j23]Azeem Irshad, Saru Kumari, Xiong Li, Fan Wu, Shehzad Ashraf Chaudhry, Hamed Arshad:
An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification. Wirel. Pers. Commun. 97(2): 2145-2166 (2017) - [c1]Fan Wu, Lili Xu:
A Chaotic Map-Based Authentication and Key Agreement Scheme with User Anonymity for Cloud Computing. ICCCS (2) 2017: 189-200 - 2016
- [j22]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Hamed Arshad, Muhammad Khurram Khan:
A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps. Future Gener. Comput. Syst. 63: 56-75 (2016) - [j21]Saru Kumari, Muhammad Khurram Khan, Xiong Li, Fan Wu:
Design of a user anonymous password authentication scheme without smart card. Int. J. Commun. Syst. 29(3): 441-458 (2016) - [j20]Saru Kumari, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu, Muhammad Khurram Khan:
A User Anonymous Mutual Authentication Protocol. KSII Trans. Internet Inf. Syst. 10(9): 4508-4528 (2016) - [j19]Xiong Li, Kaihui Wang, Jian Shen, Saru Kumari, Fan Wu, Yonghua Hu:
An enhanced biometrics-based user authentication scheme for multi-server environments in critical systems. J. Ambient Intell. Humaniz. Comput. 7(3): 427-443 (2016) - [j18]Xiong Li, Jianwei Niu, Marimuthu Karuppiah, Saru Kumari, Fan Wu:
Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications. J. Medical Syst. 40(12): 268:1-268:12 (2016) - [j17]Saru Kumari, Fan Wu, Xiong Li, Mohammad Sabzinejad Farash, Qi Jiang, Muhammad Khurram Khan, Ashok Kumar Das:
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card. Multim. Tools Appl. 75(24): 17215-17245 (2016) - [j16]Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li, Fan Wu:
Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for TMIS. Secur. Commun. Networks 9(13): 1983-2001 (2016) - [j15]Lili Xu, Fan Wu:
A novel three-factor authentication and key agreement scheme providing anonymity in global mobility networks. Secur. Commun. Networks 9(16): 3428-3443 (2016) - [j14]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Ashok Kumar Das, Muhammad Khurram Khan, Marimuthu Karuppiah, Renuka Baliyan:
A novel and provably secure authentication and key agreement scheme with user anonymity for global mobility networks. Secur. Commun. Networks 9(16): 3527-3542 (2016) - [j13]Ashok Kumar Das, Saru Kumari, Vanga Odelu, Xiong Li, Fan Wu, Xinyi Huang:
Provably secure user authentication and key agreement scheme for wireless sensor networks. Secur. Commun. Networks 9(16): 3670-3687 (2016) - [j12]Mohammad Wazid, Ashok Kumar Das, Saru Kumari, Xiong Li, Fan Wu:
Provably secure biometric-based user authentication and key agreement scheme in cloud computing. Secur. Commun. Networks 9(17): 4103-4119 (2016) - [j11]Marimuthu Karuppiah, Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Sayantani Basu:
A secure lightweight authentication scheme with user anonymity for roaming service in ubiquitous networks. Secur. Commun. Networks 9(17): 4192-4209 (2016) - [j10]Saru Kumari, Marimuthu Karuppiah, Xiong Li, Fan Wu, Ashok Kumar Das, Vanga Odelu:
An enhanced and secure trust-extended authentication mechanism for vehicular ad-hoc networks. Secur. Commun. Networks 9(17): 4255-4271 (2016) - [j9]Sravani Challa, Ashok Kumar Das, Saru Kumari, Vanga Odelu, Fan Wu, Xiong Li:
Provably secure three-factor authentication and key agreement scheme for session initiation protocol. Secur. Commun. Networks 9(18): 5412-5431 (2016) - [j8]Xiong Li, Jianwei Niu, Saru Kumari, SK Hafizul Islam, Fan Wu, Muhammad Khurram Khan, Ashok Kumar Das:
A Novel Chaotic Maps-Based User Authentication and Key Agreement Protocol for Multi-server Environments with Provable Security. Wirel. Pers. Commun. 89(2): 569-597 (2016) - 2015
- [j7]Fan Wu, Lili Xu, Saru Kumari, Xiong Li:
A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client-server networks. Comput. Electr. Eng. 45: 274-285 (2015) - [j6]Fan Wu, Lili Xu:
An improved and provable self-certified digital signature scheme with message recovery. Int. J. Commun. Syst. 28(2): 344-357 (2015) - [j5]Lili Xu, Fan Wu:
Cryptanalysis and Improvement of a User Authentication Scheme Preserving Uniqueness and Anonymity for Connected Health Care. J. Medical Syst. 39(2): 10 (2015) - [j4]Lili Xu, Fan Wu:
An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity. Secur. Commun. Networks 8(2): 245-260 (2015) - [j3]Fan Wu, Lili Xu, Saru Kumari, Xiong Li, Abdulhameed Alelaiwi:
A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof. Secur. Commun. Networks 8(18): 3847-3863 (2015) - [j2]Xiong Li, Junguo Liao, Saru Kumari, Wei Liang, Fan Wu, Muhammad Khurram Khan:
A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design. Wirel. Pers. Commun. 85(1): 263-288 (2015) - 2012
- [j1]Fan Wu, Lili Xu:
Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems. J. Medical Syst. 37(4): 9958 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint