default search action
Chen-Mou Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i21]Bo-Yin Yang, Wei-Jeng Wang, Shang-Yi Yang, Char-Shin Miou, Chen-Mou Cheng:
Fast Exhaustive Search for Polynomial Systems over F3. IACR Cryptol. ePrint Arch. 2023: 731 (2023) - 2022
- [j13]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
A Survey on Group Signatures and Ring Signatures: Traceability vs. Anonymity. Cryptogr. 6(1): 3 (2022) - [j12]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Certificate Management Scheme for VANETs Using Blockchain Structure. Cryptogr. 6(2): 20 (2022) - [j11]Po-Chun Kuo, Yu-Wei Chen, Yuan-Che Hsu, Chen-Mou Cheng, Wen-Ding Li, Bo-Yin Yang:
High Performance Post-Quantum Key Exchange on FPGAs. J. Inf. Sci. Eng. 38(4): 1211-1229 (2022) - [c49]Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama, Chen-Mou Cheng, Kouichi Sakurai:
Decentralized and Collaborative Tracing for Group Signatures. AsiaCCS 2022: 1258-1260 - [e3]Chen-Mou Cheng, Mitsuaki Akiyama:
Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings. Lecture Notes in Computer Science 13504, Springer 2022, ISBN 978-3-031-15254-2 [contents] - 2021
- [j10]Kenta Kodera, Chen-Mou Cheng, Atsuko Miyaji:
Efficient Algorithm to Compute Odd-Degree Isogenies Between Montgomery Curves for CSIDH. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1245-1254 (2021) - [j9]Po-Chun Kuo, Chen-Mou Cheng, Wen-Ding Li, Bo-Yin Yang:
Parallelization on Gauss Sieve Algorithm over Ideal Lattice. J. Inf. Sci. Eng. 37(5): 1187-1209 (2021) - [j8]Po-Chun Kuo, Yu-Wei Chen, Yuan-Che Hsu, Chen-Mou Cheng, Wen-Ding Li, Bo-Yin Yang:
High Performance Post-Quantum Key Exchange on FPGAs. J. Inf. Sci. Eng. 37(5): 1211-1229 (2021) - [c48]Wei-Chieh Chao, Chung-Kuan Chen, Chen-Mou Cheng:
Cryfind: Using Static Analysis to Identify Cryptographic Algorithms in Binary Executables. DSC 2021: 1-2 - 2020
- [j7]Po-Chun Kuo, Hao Chung, Tzu-Wei Chao, Chen-Mou Cheng:
Fair Byzantine Agreements for Blockchains. IEEE Access 8: 70746-70761 (2020) - [c47]Kenta Kodera, Chen-Mou Cheng, Atsuko Miyaji:
Efficient Algorithm for Computing Odd-Degree Isogenies on Montgomery Curves. WISA 2020: 258-275 - [p1]Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji, Shinya Okumura:
Cryptography Core Technology. Security Infrastructure Technology for Integrated Utilization of Big Data 2020: 5-33
2010 – 2019
- 2019
- [j6]Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji:
Differences among Summation Polynomials over Various Forms of Elliptic Curves. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1061-1071 (2019) - 2018
- [j5]Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, Chen-Mou Cheng:
Implementing 128-Bit Secure MPKC Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(3): 553-569 (2018) - [c46]Chen-Mou Cheng, Ruey-Lin Hsu, Shin-Cheng Mu:
Functional Pearl: Folding Polynomials of Polynomials. FLOPS 2018: 68-83 - [c45]Wen-Ding Li, Ming-Shing Chen, Po-Chun Kuo, Chen-Mou Cheng, Bo-Yin Yang:
Frobenius Additive Fast Fourier Transform. ISSAC 2018: 263-270 - [i20]Wen-Ding Li, Ming-Shing Chen, Po-Chun Kuo, Chen-Mou Cheng, Bo-Yin Yang:
Frobenius Additive Fast Fourier Transform. CoRR abs/1802.03932 (2018) - [i19]Ming-Shing Chen, Chen-Mou Cheng, Po-Chun Kuo, Wen-Ding Li, Bo-Yin Yang:
Multiplying boolean Polynomials with Frobenius Partitions in Additive Fast Fourier Transform. CoRR abs/1803.11301 (2018) - 2017
- [c44]Shang-Yi Yang, Po-Chun Kuo, Bo-Yin Yang, Chen-Mou Cheng:
Gauss Sieve Algorithm on GPUs. CT-RSA 2017: 39-57 - [c43]Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji:
On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus. ICISC 2017: 245-263 - [i18]Ming-Shing Chen, Chen-Mou Cheng, Po-Chun Kuo, Wen-Ding Li, Bo-Yin Yang:
Faster Multiplication for Long Binary Polynomials. CoRR abs/1708.09746 (2017) - [i17]Ming-Shing Chen, Wen-Ding Li, Bo-Yuan Peng, Bo-Yin Yang, Chen-Mou Cheng:
Implementing 128-bit Secure MPKC Signatures. IACR Cryptol. ePrint Arch. 2017: 636 (2017) - [i16]Po-Chun Kuo, Wen-Ding Li, Yu-Wei Chen, Yuan-Che Hsu, Bo-Yuan Peng, Chen-Mou Cheng, Bo-Yin Yang:
Post-Quantum Key Exchange on FPGAs. IACR Cryptol. ePrint Arch. 2017: 690 (2017) - 2016
- [j4]Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Portable Implementation of Lattice-based Cryptography using JavaScript. Int. J. Netw. Comput. 6(2): 309-327 (2016) - [c42]Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang:
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation. CANS 2016: 637-647 - [e2]Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang:
Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9614, Springer 2016, ISBN 978-3-662-49383-0 [contents] - [e1]Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang:
Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9615, Springer 2016, ISBN 978-3-662-49386-1 [contents] - [i15]Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Solving Quadratic Equations with XL on Parallel Architectures - extended version. IACR Cryptol. ePrint Arch. 2016: 412 (2016) - [i14]Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang:
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation. IACR Cryptol. ePrint Arch. 2016: 909 (2016) - 2015
- [c41]Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Portable Implementation of Lattice-Based Cryptography Using JavaScript. CANDAR 2015: 58-67 - [c40]Cheng-Rung Tsai, Ming-Chun Hsiao, Wen-Chung Shen, An-Yeu Andy Wu, Chen-Mou Cheng:
A 1.96mm2 low-latency multi-mode crypto-coprocessor for PKC-based IoT security protocols. ISCAS 2015: 834-837 - 2014
- [c39]Satoshi Tanaka, Chen-Mou Cheng, Takanori Yasuda, Kouichi Sakurai:
Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units. CANDAR 2014: 543-548 - [c38]Po-Chun Kuo, Chen-Mou Cheng:
Lattice-based cryptanalysis - How to estimate the security parameter of lattice-based cryptosystem. ICCE-TW 2014: 53-54 - [c37]Yun-Ju Huang, Wei-Chih Hong, Chen-Mou Cheng, Jiun-Ming Chen, Bo-Yin Yang:
A Memory Efficient Variant of an Implementation of the F _4 Algorithm for Computing Gröbner Bases. INTRUST 2014: 374-393 - [c36]Yun-An Chang, Wei-Chih Hong, Ming-Chun Hsiao, Bo-Yin Yang, An-Yeu Wu, Chen-Mou Cheng:
Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics. IWSEC 2014: 174-186 - [c35]Chen-Mou Cheng, Yasufumi Hashimoto, Hiroyuki Miura, Tsuyoshi Takagi:
A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics. PQCrypto 2014: 40-58 - [c34]Haw Lee, Wei-Chih Hong, Chia-Hung Kao, Chen-Mou Cheng:
A User-Friendly Authentication Solution Using NFC Card Emulation on Android. SOCA 2014: 271-278 - 2013
- [j3]Jie-Ren Shih, Yongbo Hu, Ming-Chun Hsiao, Ming-Shing Chen, Wen-Chung Shen, Bo-Yin Yang, An-Yeu Wu, Chen-Mou Cheng:
Securing M2M With Post-Quantum Public-Key Cryptography. IEEE J. Emerg. Sel. Topics Circuits Syst. 3(1): 106-116 (2013) - [j2]Chih-Yao Wu, Pang-Chang Lan, Ping-Cheng Yeh, Chia-Han Lee, Chen-Mou Cheng:
Practical Physical Layer Security Schemes for MIMO-OFDM Systems Using Precoding Matrix Indices. IEEE J. Sel. Areas Commun. 31(9): 1687-1700 (2013) - [c33]Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren:
Factoring RSA Keys from Certified Smart Cards: Coppersmith in the Wild. ASIACRYPT (2) 2013: 341-360 - [c32]Jenny Yuan-Chun Yeh, Chen-Mou Cheng, Bo-Yin Yang:
Operating Degrees for XL vs. F4/F5 for Generic $\mathcal{M}Q$ with Number of Equations Linear in That of Variables. Number Theory and Cryptography 2013: 19-33 - [c31]Yi-Hao Chiu, Wei-Chih Hong, Li-Ping Chou, Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng:
A Practical Attack on Patched MIFARE Classic. Inscrypt 2013: 150-164 - [c30]Ming-Shing Chen, Bo-Yin Yang, Chen-Mou Cheng:
RAIDq: A Software-friendly, Multiple-parity RAID. HotStorage 2013 - [c29]Satoshi Tanaka, Takanori Yasuda, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai:
Efficient Computing over GF(2^16) Using Graphics Processing Unit. IMIS 2013: 843-846 - [c28]Jung-Wei Chou, Min-Huang Chu, Yi-Lin Tsai, Yun Jin, Chen-Mou Cheng, Shou-De Lin:
An Unsupervised Learning Model to Perform Side Channel Attack. PAKDD (1) 2013: 414-425 - [c27]Mao-Pang Pang Lin, Wei-Chih Hong, Chih-Hung Chen, Chen-Mou Cheng:
Design and implementation of multi-user secure indices for encrypted cloud storage. PST 2013: 177-184 - [c26]Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Fast Exhaustive Search for Quadratic Systems in $$\mathbb {F}_{2}$$ on FPGAs. Selected Areas in Cryptography 2013: 205-222 - [i13]Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Fast Exhaustive Search for Quadratic Systems in 𝔽2 on FPGAs - Extended Version. IACR Cryptol. ePrint Arch. 2013: 436 (2013) - [i12]Daniel J. Bernstein, Yun-An Chang, Chen-Mou Cheng, Li-Ping Chou, Nadia Heninger, Tanja Lange, Nicko van Someren:
Factoring RSA keys from certified smart cards: Coppersmith in the wild. IACR Cryptol. ePrint Arch. 2013: 599 (2013) - 2012
- [c25]Hsing-Yu Chen, Yue-Hsun Lin, Chen-Mou Cheng:
COCA: Computation Offload to Clouds Using AOP. CCGRID 2012: 466-473 - [c24]Jung-Wei Chou, Shou-De Lin, Chen-Mou Cheng:
On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks. AISec 2012: 105-110 - [c23]Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:
Solving Quadratic Equations with XL on Parallel Architectures. CHES 2012: 356-373 - [c22]Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai:
Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs. WISA 2012: 28-42 - [i11]Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang:
ECC2K-130 on NVIDIA GPUs. IACR Cryptol. ePrint Arch. 2012: 2 (2012) - [i10]Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang:
Usable assembly language for GPUs: a success story. IACR Cryptol. ePrint Arch. 2012: 137 (2012) - 2011
- [c21]Po-Chun Kuo, Michael Schneider, Özgür Dagdelen, Jan Reichelt, Johannes Buchmann, Chen-Mou Cheng, Bo-Yin Yang:
Extreme Enumeration on GPU and in Clouds - - How Many Dollars You Need to Break SVP Challenges -. CHES 2011: 176-191 - [c20]Feng Seng Chu, Kwang-Cheng Chen, Chen-Mou Cheng:
Toward green cloud computing. ICUIMC 2011: 31 - [r1]Chen-Mou Cheng:
Multi-Threaded Implementation for Cryptography and Cryptanalysis. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 823-824 - [i9]Pang-Chang Lan, Chih-Yao Wu, Chia-han Lee, Ping-Cheng Yeh, Chen-Mou Cheng:
PMI-based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme. CoRR abs/1101.4075 (2011) - [i8]Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi:
Efficient Implementation of the etaT Pairing on GPU. IACR Cryptol. ePrint Arch. 2011: 540 (2011) - 2010
- [j1]Chang-Ching Yang, Chen-Mou Cheng, Sheng-De Wang:
Two-phase Pattern Matching for Regular Expressions in Intrusion Detection Systems. J. Inf. Sci. Eng. 26(5): 1563-1582 (2010) - [c19]Charles Bouillaguet, Hsieh-Chung Chen, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang:
Fast Exhaustive Search for Polynomial Systems in F2. CHES 2010: 203-218 - [c18]Hsieh-Chung Chen, Chen-Mou Cheng, Shih-Hao Hung, Zong-Cing Lin:
Integer Number Crunching on the Cell Processor. ICPP 2010: 508-515 - [c17]Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang:
ECC2K-130 on NVIDIA GPUs. INDOCRYPT 2010: 328-346 - [c16]Jen-Po Cheng, Yen-Huan Li, Ping-Cheng Yeh, Chen-Mou Cheng:
MIMO-OFDM PHY Integrated (MOPI) Scheme for Confidential Wireless Transmission. WCNC 2010: 1-6 - [i7]Charles Bouillaguet, Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Adi Shamir, Bo-Yin Yang:
Fast Exhaustive Search for Polynomial Systems in F2. IACR Cryptol. ePrint Arch. 2010: 313 (2010)
2000 – 2009
- 2009
- [c15]Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Yu-Shuang Lee, Bo-Yin Yang:
SSE Implementation of Multivariate PKCs on Modern x86 CPUs. CHES 2009: 33-48 - [c14]Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang:
ECM on Graphics Cards. EUROCRYPT 2009: 483-501 - [c13]Chun-Chieh Chen, Anna Inn-Tung Chen, Chen-Mou Cheng, Ming-Yang Chih, Jie-Ren Shih:
A Practical Experience with RFID Security. Mobile Data Management 2009: 395-396 - [i6]Daniel V. Bailey, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Hsieh-Chung Chen, Chen-Mou Cheng, Gauthier Van Damme, Giacomo de Meulenaer, Luis J. Dominguez Perez, Junfeng Fan, Tim Güneysu, Frank K. Gürkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Ruben Niederhagen, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel, Anthony Van Herrewege, Bo-Yin Yang:
Breaking ECC2K-130. IACR Cryptol. ePrint Arch. 2009: 541 (2009) - [i5]Jintai Ding, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng:
Could SFLASH be repaired? IACR Cryptol. ePrint Arch. 2009: 596 (2009) - 2008
- [c12]Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng:
New Differential-Algebraic Attacks and Reparametrization of Rainbow. ACNS 2008: 242-257 - [c11]Jintai Ding, Vivien Dubois, Bo-Yin Yang, Chia-Hsin Owen Chen, Chen-Mou Cheng:
Could SFLASH be Repaired?. ICALP (2) 2008: 691-701 - [c10]Anna Inn-Tung Chen, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng, Bo-Yin Yang:
Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and lIC-Derivatives. PQCrypto 2008: 95-108 - [i4]Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng:
New Differential-Algebraic Attacks and Reparametrization of Rainbow. IACR Cryptol. ePrint Arch. 2008: 108 (2008) - [i3]Daniel J. Bernstein, Tien-Ren Chen, Chen-Mou Cheng, Tanja Lange, Bo-Yin Yang:
ECM on Graphics Cards. IACR Cryptol. ePrint Arch. 2008: 480 (2008) - [i2]Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo, Frost Li, Bo-Yin Yang:
Small Odd Prime Field Multivariate PKCs. IACR Cryptol. ePrint Arch. 2008: 498 (2008) - 2007
- [c9]Chen-Mou Cheng, Pai-Hsiang Hsiao, H. T. Kung, Dario Vlah:
Maximizing Throughput of UAV-Relaying Networks with the Load-Carry-and-Deliver Paradigm. WCNC 2007: 4417-4424 - [c8]Chen-Mou Cheng, Pai-Hsiang Hsiao, H. T. Kung, Dario Vlah:
Transmit Antenna Selection Based on Link-layer Channel Probing. WOWMOM 2007: 1-6 - [i1]Jintai Ding, Bo-Yin Yang, Chen-Mou Cheng, Chia-Hsin Owen Chen, Vivien Dubois:
Breaking the Symmetry: a Way to Resist the New Differential Attack. IACR Cryptol. ePrint Arch. 2007: 366 (2007) - 2006
- [c7]Chen-Mou Cheng, Pai-Hsiang Hsiao, H. T. Kung, Dario Vlah:
Adjacent Channel Interference in Dual-radio 802.11a Nodes and Its Impact on Multi-hop Networking. GLOBECOM 2006 - [c6]Chen-Mou Cheng, Pai-Hsiang Hsiao, H. T. Kung, Dario Vlah:
Performance Measurement of 802.11a Wireless Links from UAV to Ground Nodes with Various Antenna Orientations. ICCCN 2006: 303-308 - [c5]Bo-Yin Yang, Chen-Mou Cheng, Bor-rong Chen, Jiun-Ming Chen:
Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems. SPC 2006: 73-88 - 2004
- [c4]Chen-Mou Cheng, Yu-Sheng Huan, H. T. Kung, Chun-Hsin Wu:
Path probing relay routing for achieving high end-to-end performance. GLOBECOM 2004: 1359-1365 - 2003
- [c3]H. T. Kung, Chen-Mou Cheng, Koan-Sin Tan, Scott O. Bradner:
Design and Analysis of an IP-Layer Anonymizing Infrastructure. DISCEX (1) 2003: 62- - [c2]Chen-Mou Cheng, H. T. Kung, Koan-Sin Tan, Scott O. Bradner:
ANON: An IP-Layer Anonymizing Infrastructure. DISCEX (2) 2003: 78-80 - 2002
- [c1]Chen-Mou Cheng, H. T. Kung, Koan-Sin Tan:
Use of spectral analysis in defense against DoS attacks. GLOBECOM 2002: 2143-2148
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint