Остановите войну!
for scientists:
default search action
Rui Zhang 0002
- > Home > Persons > Rui Zhang 0002
Publications
- 2024
- [j39]Wenhan Xu, Hui Ma, Zishuai Song, Jianhao Li, Rui Zhang:
Gringotts: An Encrypted Version Control System With Less Trust on Servers. IEEE Trans. Dependable Secur. Comput. 21(2): 668-684 (2024) - [j38]Jianhao Li, Jiabei Wang, Rui Zhang, Yansen Xin, Wenhan Xu:
NEMO: Practical Distributed Boolean Queries With Minimal Leakage. IEEE Trans. Inf. Forensics Secur. 19: 2594-2608 (2024) - 2023
- [j37]Zishuai Song, Hui Ma, Shuzhou Sun, Yansen Xin, Rui Zhang:
Rainbow: reliable personally identifiable information retrieval across multi-cloud. Cybersecur. 6(1): 19 (2023) - [j36]Jianhao Li, Hui Ma, Jiabei Wang, Zishuai Song, Wenhan Xu, Rui Zhang:
Wolverine: A Scalable and Transaction-Consistent Redactable Permissionless Blockchain. IEEE Trans. Inf. Forensics Secur. 18: 1653-1666 (2023) - [j35]Zishuai Song, Hui Ma, Rui Zhang, Wenhan Xu, Jianhao Li:
Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing. IEEE Trans. Inf. Forensics Secur. 18: 2234-2249 (2023) - [c50]Yang Tao, Rui Zhang, Yunfeng Ji:
Forward Security of Fiat-Shamir Lattice Signatures. ACNS (1) 2023: 607-633 - 2022
- [j34]Yang Tao, Yunfeng Ji, Rui Zhang:
Generalizing Lyubashevsky-Wichs trapdoor sampler for NTRU lattices. Sci. China Inf. Sci. 65(5): 1-3 (2022) - [j33]Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao:
Generic, efficient and isochronous Gaussian sampling over the integers. Cybersecur. 5(1): 10 (2022) - [j32]Shuzhou Sun, Hui Ma, Zishuai Song, Rui Zhang:
WebCloud: Web-Based Cloud Storage for Secure Data Sharing Across Platforms. IEEE Trans. Dependable Secur. Comput. 19(3): 1871-1884 (2022) - [j31]Jiabei Wang, Rui Zhang, Jianhao Li, Yuting Xiao, Hui Ma:
SeUpdate: Secure Encrypted Data Update for Multi-User Environments. IEEE Trans. Dependable Secur. Comput. 19(6): 3592-3606 (2022) - [j30]Jiabei Wang, Rui Zhang, Jianhao Li, Yuting Xiao:
Owner-Enabled Secure Authorized Keyword Search Over Encrypted Data With Flexible Metadata. IEEE Trans. Inf. Forensics Secur. 17: 2746-2760 (2022) - [j29]Hui Ma, Rui Zhang, Shuzhou Sun, Zishuai Song, Gaosheng Tan:
Server-Aided Fine-Grained Access Control Mechanism with Robust Revocation in Cloud Computing. IEEE Trans. Serv. Comput. 15(1): 164-173 (2022) - [c49]Shuo Sun, Yongbin Zhou, Rui Zhang, Yang Tao, Zehua Qiao, Jingdian Ming:
Fast Fourier Orthogonalization over NTRU Lattices. ICICS 2022: 109-127 - 2021
- [j28]Shuzhou Sun, Rui Zhang, Hui Ma:
Hashing multiple messages with SM3 on GPU platforms. Sci. China Inf. Sci. 64(9) (2021) - [j27]Ti Wang, Hui Ma, Yongbin Zhou, Rui Zhang, Zishuai Song:
Fully Accountable Data Sharing for Pay-as-You-Go Cloud Scenes. IEEE Trans. Dependable Secur. Comput. 18(4): 2005-2016 (2021) - [j26]Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang, Jingdian Ming:
On the Security of Lattice-Based Fiat-Shamir Signatures in the Presence of Randomness Leakage. IEEE Trans. Inf. Forensics Secur. 16: 1868-1879 (2021) - [c48]Yuting Xiao, Rui Zhang, Hui Ma:
Modular Design of Role-Symmetric Authenticated Key Exchange Protocols. ASIACRYPT (4) 2021: 742-772 - [c47]Yunfeng Ji, Yang Tao, Rui Zhang:
More Efficient Construction of Anonymous Signatures. ICICS (2) 2021: 394-411 - [i11]Shuo Sun, Yongbin Zhou, Yunfeng Ji, Rui Zhang, Yang Tao:
Generic, Efficient and Isochronous Gaussian Sampling over the Integers. IACR Cryptol. ePrint Arch. 2021: 199 (2021) - 2020
- [j25]Rui Zhang, Jiabei Wang, Zishuai Song, Xi Wang:
An enhanced searchable encryption scheme for secure data outsourcing. Sci. China Inf. Sci. 63(3) (2020) - [j24]Yang Tao, Han Wang, Rui Zhang:
Rényi divergence on learning with errors. Sci. China Inf. Sci. 63(9): 1-13 (2020) - [j23]Shuzhou Sun, Hui Ma, Rui Zhang, Wenhan Xu:
Server-aided immediate and robust user revocation mechanism for SM9. Cybersecur. 3(1): 12 (2020) - [j22]Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Kai He, Yuting Xiao:
Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices. IEEE Trans. Dependable Secur. Comput. 17(5): 1026-1038 (2020) - [j21]Shuzhou Sun, Rui Zhang, Hui Ma:
Efficient Parallelism of Post-Quantum Signature Scheme SPHINCS. IEEE Trans. Parallel Distributed Syst. 31(11): 2542-2555 (2020) - [c46]Ti Wang, Yongbin Zhou, Hui Ma, Yuejun Liu, Rui Zhang:
Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext Attack. Inscrypt 2020: 83-103 - [c45]Gaosheng Tan, Rui Zhang, Hui Ma, Yang Tao:
An Efficient CCA-Secure Access Control Encryption for Any Policy. Inscrypt 2020: 104-112 - [c44]Rui Zhang, Huan Zou, Cong Zhang, Yuting Xiao, Yang Tao:
Distributed Key Generation for SM9-Based Systems. Inscrypt 2020: 113-129 - [c43]Yuting Xiao, Rui Zhang, Hui Ma:
Tightly Secure Two-Pass Authenticated Key Exchange Protocol in the CK Model. CT-RSA 2020: 171-198 - [c42]Yang Tao, Xi Wang, Rui Zhang:
Short Zero-Knowledge Proof of Knowledge for Lattice-Based Commitment. PQCrypto 2020: 268-283 - 2019
- [j20]Yuejun Liu, Rui Zhang, Yongbin Zhou:
Predicate encryption against master-key tampering attacks. Cybersecur. 2(1): 22 (2019) - [j19]Rui Zhang, Yuting Xiao, Shuzhou Sun, Hui Ma:
Efficient Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications. IEEE Trans. Dependable Secur. Comput. 16(4): 625-634 (2019) - [i10]Yuejun Liu, Yongbin Zhou, Shuo Sun, Tianyu Wang, Rui Zhang:
On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage. IACR Cryptol. ePrint Arch. 2019: 715 (2019) - 2018
- [c41]Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang, Lei Hu:
A Deterministic Algorithm for Computing Divisors in an Interval. ACISP 2018: 3-12 - [c40]Hui Ma, Rui Zhang, Guomin Yang, Zishuai Song, Shuzhou Sun, Yuting Xiao:
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls - Secure and Efficient Fine-Grained Access Control on Corrupted Machines. ESORICS (2) 2018: 507-526 - [c39]Qian Zhang, Yongbin Zhou, Shuang Qiu, Wei Cheng, Jingdian Ming, Rui Zhang:
A Compact AES Hardware Implementation Secure Against 1st-Order Side-Channel Attacks. ICCD 2018: 545-552 - [c38]Rui Zhang, Yang Tao:
Key Dependent Message Security for Revocable Identity-Based Encryption and Identity-Based Encryption. ICICS 2018: 426-441 - [c37]Yao Lu, Noboru Kunihiro, Rui Zhang, Liqiang Peng, Hui Ma:
Certifying Variant of RSA with Generalized Moduli. ICICS 2018: 598-608 - 2017
- [j18]Fei Tang, Rui Zhang, Hongda Li:
Attribute-based non-interactive key exchange. Sci. China Inf. Sci. 60(1): 19101:1-19101:3 (2017) - [j17]Rui Zhang, Hui Ma, Yao Lu, Yang Li:
Provably secure cloud storage for mobile networks with less computation and smaller overhead. Sci. China Inf. Sci. 60(12): 122104:1-122104:13 (2017) - [j16]Rui Zhang, Hui Ma, Yao Lu:
Fine-grained access control system based on fully outsourced attribute-based encryption. J. Syst. Softw. 125: 344-353 (2017) - [j15]Hui Ma, Rui Zhang, Zhiguo Wan, Yao Lu, Suqing Lin:
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Dependable Secur. Comput. 14(6): 679-692 (2017) - [j14]Rui Zhang, Shuang Qiu, Yongbin Zhou:
Further Improving Efficiency of Higher Order Masking Schemes by Decreasing Randomness Complexity. IEEE Trans. Inf. Forensics Secur. 12(11): 2590-2598 (2017) - [c36]Gaosheng Tan, Rui Zhang, Hui Ma, Yang Tao:
Access Control Encryption Based on LWE. APKC@AsiaCCS 2017: 43-50 - [c35]Shuang Qiu, Rui Zhang, Yongbin Zhou, Hailong Zhang:
Reducing Randomness Complexity of Mask Refreshing Algorithm. ICICS 2017: 88-101 - [c34]Rui Zhang, Kai He:
Multipurpose Public-Key Encryption. IWSEC 2017: 69-84 - [e2]Joonsang Baek, Rui Zhang:
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, APKC@AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2, 2017. ACM 2017, ISBN 978-1-4503-4973-4 [contents] - [i9]Shuang Qiu, Rui Zhang, Yongbin Zhou, Wei Cheng:
Corrections to "Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity". IACR Cryptol. ePrint Arch. 2017: 1244 (2017) - 2016
- [j13]Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:
Construction of MDS block diffusion matrices for block ciphers and hash functions. Sci. China Inf. Sci. 59(9): 99101 (2016) - [j12]Suqing Lin, Rui Zhang, Mingsheng Wang:
Verifiable attribute-based proxy re-encryption for secure public cloud data sharing. Secur. Commun. Networks 9(12): 1748-1758 (2016) - [j11]Shuang Qiu, Rui Zhang, Yuchen Cao, Wei Yang, Yongbin Zhou, Tian Ding:
A statistical model for DPA when algorithmic noise is dependent on target. Secur. Commun. Networks 9(18): 4882-4896 (2016) - [j10]Hui Ma, Rui Zhang, Wei Yuan:
Comments on "Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption". IEEE Trans. Inf. Forensics Secur. 11(4): 866-867 (2016) - [e1]Keita Emura, Goichiro Hanaoka, Rui Zhang:
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi'an, China, May 30 - June 03, 2016. ACM 2016, ISBN 978-1-4503-4286-5 [contents] - [i8]Ruoxin Zhao, Baofeng Wu, Rui Zhang, Qian Zhang:
Designing Optimal Implementations of Linear Layers (Full Version). IACR Cryptol. ePrint Arch. 2016: 1118 (2016) - 2015
- [j9]Suqing Lin, Rui Zhang, Hui Ma, Suqing Wang:
Revisiting Attribute-Based Encryption With Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 10(10): 2119-2130 (2015) - [c33]Yao Lu, Rui Zhang, Liqiang Peng, Dongdai Lin:
Solving Linear Equations Modulo Unknown Divisors: Revisited. ASIACRYPT (1) 2015: 189-213 - [c32]Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Rui Zhang, Chengyu Hu, Zuoxia Yu:
Updatable Hash Proof System and Its Applications. ESORICS (1) 2015: 266-285 - [c31]Hui Ma, Rui Zhang:
Secure Cloud Storage for Dynamic Group: How to Achieve Identity Privacy-Preserving and Privilege Control. NSS 2015: 254-267 - [c30]Yao Lu, Liqiang Peng, Rui Zhang, Lei Hu, Dongdai Lin:
Towards Optimal Bounds for Implicit Factorization Problem. SAC 2015: 462-476 - [i7]Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions. IACR Cryptol. ePrint Arch. 2015: 449 (2015) - 2014
- [c29]Yao Lu, Rui Zhang, Dongdai Lin:
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents. ACNS 2014: 151-162 - [i6]Yao Lu, Rui Zhang, Dongdai Lin:
New Results on Solving Linear Equations Modulo Unknown Divisors and its Applications. IACR Cryptol. ePrint Arch. 2014: 343 (2014) - 2013
- [j8]Yao Lu, Rui Zhang, Dongdai Lin:
Improved bounds for the implicit factorization problem. Adv. Math. Commun. 7(3): 243-251 (2013) - [j7]Ai-Jun Ge, Xinyi Huang, Cheng Chen, Chuangui Ma, Rui Zhang:
Forgeability of Wang-Zhu-Feng-Yau's Attribute-Based Signature with Policy-and-Endorsement Mechanism. J. Comput. Sci. Technol. 28(4): 743-748 (2013) - [j6]Zhiguo Wan, Jun-e Liu, Rui Zhang, Robert H. Deng:
A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting. IEEE Trans. Multim. 15(6): 1353-1364 (2013) - [j5]Aijun Ge, Jiang Zhang, Rui Zhang, Chuangui Ma, Zhenfeng Zhang:
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme. IEEE Trans. Parallel Distributed Syst. 24(11): 2319-2321 (2013) - [c28]Yao Lu, Rui Zhang, Dongdai Lin:
Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits. ACISP 2013: 57-71 - [c27]Yao Lu, Rui Zhang, Dongdai Lin:
Factoring RSA Modulus with Known Bits from Both p and q: A Lattice Method. NSS 2013: 393-404 - 2012
- [c26]Aijun Ge, Rui Zhang, Cheng Chen, Chuangui Ma, Zhenfeng Zhang:
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts. ACISP 2012: 336-349 - [c25]Xiang Xie, Rui Xue, Rui Zhang:
Inner-Product Lossy Trapdoor Functions and Applications. ACNS 2012: 188-205 - [c24]Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao:
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. CT-RSA 2012: 349-364 - [c23]Cheng Chen, Yanfei Guo, Rui Zhang:
Group Key Exchange Resilient to Leakage of Ephemeral Secret Keys with Strong Contributiveness. EuroPKI 2012: 17-36 - [c22]Yao Lu, Rui Zhang, Dongdai Lin:
Stronger Security Model for Public-Key Encryption with Equality Test. Pairing 2012: 65-82 - [c21]Xiang Xie, Rui Xue, Rui Zhang:
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting. SCN 2012: 1-18 - [i5]Xiang Xie, Rui Xue, Rui Zhang:
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting. IACR Cryptol. ePrint Arch. 2012: 463 (2012) - 2011
- [c20]Jiang Zhang, Xiang Xie, Rui Zhang, Zhenfeng Zhang:
A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening. Inscrypt 2011: 195-209 - [c19]Xiang Xie, Rui Xue, Rui Zhang:
Efficient Threshold Encryption from Lossy Trapdoor Functions. PQCrypto 2011: 163-178 - 2009
- [j4]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 53-66 (2009) - [j3]Rui Zhang, Hideki Imai:
Combining Public Key Encryption with Keyword Search and Public Key Encryption. IEICE Trans. Inf. Syst. 92-D(5): 888-896 (2009) - [j2]Rui Zhang, Hideki Imai:
Strong Anonymous Signature. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2487-2491 (2009) - [c17]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
A generic construction of useful client puzzles. AsiaCCS 2009: 70-79 - [c16]Rui Zhang, Hideki Imai:
Constructing Better KEMs with Partial Message Recovery. Inscrypt 2009: 303-312 - [c15]Peng Yang, Rui Zhang, Kanta Matsuura, Hideki Imai:
Generic Construction of Stateful Identity Based Encryption. ISC 2009: 338-346 - 2008
- [c14]Rui Zhang, Hideki Imai:
Strong Anonymous Signatures. Inscrypt 2008: 60-71 - 2007
- [j1]Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1803-1813 (2007) - [c12]Rui Zhang, Hideki Imai:
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. CANS 2007: 159-174 - [c11]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
Orthogonality between Key Privacy and Data Privacy, Revisited. Inscrypt 2007: 313-327 - [c10]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for Signatures from Identity-Based Encryption. ProvSec 2007: 218-227 - [i4]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. IACR Cryptol. ePrint Arch. 2007: 30 (2007) - 2006
- [c9]Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai:
Applying Fujisaki-Okamoto to Identity-Based Encryption. AAECC 2006: 183-192 - [c8]Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai:
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. ACISP 2006: 348-359 - [c7]Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. CANS 2006: 19-36 - [c6]Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes. LATIN 2006: 130-141 - 2005
- [c5]Rui Zhang, Jun Furukawa, Hideki Imai:
Short Signature and Universal Designated Verifier Signature Without Random Oracles. ACNS 2005: 483-498 - [c4]Rui Zhang, Hideki Imai:
Improvements on Security Proofs of Some Identity Based Encryption Schemes. CISC 2005: 28-41 - [i3]Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes. IACR Cryptol. ePrint Arch. 2005: 258 (2005) - [i2]Nuttapong Attrapadung, Benoît Chevallier-Mames, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. IACR Cryptol. ePrint Arch. 2005: 320 (2005) - 2004
- [c3]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
On the Security of Cryptosystems with All-or-Nothing Transform. ACNS 2004: 76-90 - [c2]Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Public Key Cryptography 2004: 360-374 - 2003
- [c1]Rui Zhang, Hideki Imai:
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. ACNS 2003: 96-110 - [i1]Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? IACR Cryptol. ePrint Arch. 2003: 181 (2003)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-10 18:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint