default search action
Christian Damsgaard Jensen
Person information
- affiliation: Technical University of Denmark, Lyngby, Denmark
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Rishikesh Sahay, Daniel A. Sepulveda Estay, Weizhi Meng, Christian Damsgaard Jensen, Michael Bruhn Barfod:
A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS. Comput. Secur. 128: 103179 (2023) - [c63]Sam Afzal-Houshmand, Dimitrios Papamartzivanos, Sajad Homayoun, Entso Veliou, Christian Damsgaard Jensen, Athanasios Voulodimos, Thanassis Giannetsos:
Explainable Artificial Intelligence to Enhance Data Trustworthiness in Crowd-Sensing Systems. DCOSS-IoT 2023: 568-576 - [e15]Weizhi Meng, Christian Damsgaard Jensen, Cas Cremers, Engin Kirda:
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023. ACM 2023 [contents] - 2022
- [j17]Weizhi Meng, Thanassis Giannetsos, Christian Damsgaard Jensen:
Information and Future Internet Security, Trust and Privacy. Future Internet 14(12): 372 (2022) - [c62]Sajad Homayoun, Kaspar Hageman, Sam Afzal-Houshmand, Christian Damsgaard Jensen, Jens Myrup Pedersen:
Detecting Ambiguous Phishing Certificates using Machine Learning. ICOIN 2022: 1-6 - [e14]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13554, Springer 2022, ISBN 978-3-031-17139-0 [contents] - [e13]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13555, Springer 2022, ISBN 978-3-031-17145-1 [contents] - [e12]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13556, Springer 2022, ISBN 978-3-031-17142-0 [contents] - [e11]Weizhi Meng, Simone Fischer-Hübner, Christian Damsgaard Jensen:
ICT Systems Security and Privacy Protection - 37th IFIP TC 11 International Conference, SEC 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings. IFIP Advances in Information and Communication Technology 648, Springer 2022, ISBN 978-3-031-06974-1 [contents] - [i2]Rishikesh Sahay, Daniel A. Sepulveda Estay, Weizhi Meng, Christian Damsgaard Jensen, Michael Bruhn Barfod:
A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS. CoRR abs/2212.10830 (2022) - 2021
- [j16]Shizra Sultan, Christian Damsgaard Jensen:
Metadata based need-to-know view in large-scale video surveillance systems. Comput. Secur. 111: 102452 (2021) - [j15]Rishikesh Sahay, Weizhi Meng, Daniel A. Sepulveda Estay, Christian Damsgaard Jensen, Michael Bruhn Barfod:
Corrigendum to "CyberShip-IoT: A Dynamic and Adaptive SDN-Based Security Policy Enforcement Framework for Ships" [Future Gener. Comput. Syst. 100 (2019) 736-750]. Future Gener. Comput. Syst. 118: 492-494 (2021) - [j14]Wei-Yang Chiu, Weizhi Meng, Christian Damsgaard Jensen:
My data, my control: A secure data sharing and access scheme over blockchain. J. Inf. Secur. Appl. 63: 103020 (2021) - [j13]Shizra Sultan, Christian Damsgaard Jensen:
Ensuring Purpose Limitation in Large-Scale Infrastructures with Provenance-Enabled Access Control. Sensors 21(9): 3041 (2021) - [c61]Wei-Yang Chiu, Weizhi Meng, Christian Damsgaard Jensen:
ChainPKI - Towards Ethash-based Decentralized PKI with Privacy Enhancement. DSC 2021: 1-8 - [c60]Marios Anagnostopoulos, Egon Kidmose, Amine Laghaout, Rasmus L. Olsen, Sajad Homayoun, Christian Damsgaard Jensen, Jens Myrup Pedersen:
An Architecture for Processing a Dynamic Heterogeneous Information Network of Security Intelligence. NSS 2021: 185-201 - [c59]Shizra Sultan, Christian Damsgaard Jensen:
Secondary Use Prevention in Large-Scale Data Lakes. SAI (3) 2021: 967-985 - [p1]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - 2020
- [j12]Daniel A. Sepulveda Estay, Rishikesh Sahay, Michael Bruhn Barfod, Christian Damsgaard Jensen:
A systematic review of cyber-resilience assessment frameworks. Comput. Secur. 97: 101996 (2020) - [c58]Wei-Yang Chiu, Weizhi Meng, Christian Damsgaard Jensen:
NoPKI - a Point-to-Point Trusted Third Party Service Based on Blockchain Consensus Algorithm. FCS 2020: 197-214 - [c57]Shizra Sultan, Christian Damsgaard Jensen:
Privacy-preserving Measures in Smart City Video Surveillance Systems. ICISSP 2020: 506-514 - [e10]Weizhi Meng, Dieter Gollmann, Christian Damsgaard Jensen, Jianying Zhou:
Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings. Lecture Notes in Computer Science 12282, Springer 2020, ISBN 978-3-030-61077-7 [contents]
2010 – 2019
- 2019
- [j11]Rishikesh Sahay, Weizhi Meng, Daniel A. Sepulveda Estay, Christian Damsgaard Jensen, Michael Bruhn Barfod:
CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships. Future Gener. Comput. Syst. 100: 736-750 (2019) - [j10]Rishikesh Sahay, Weizhi Meng, Christian Damsgaard Jensen:
The application of Software Defined Networking on securing computer networks: A survey. J. Netw. Comput. Appl. 131: 89-108 (2019) - [e9]Weizhi Meng, Piotr Cofta, Christian Damsgaard Jensen, Tyrone Grandison:
Trust Management XIII - 13th IFIP WG 11.11 International Conference, IFIPTM 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings. IFIP Advances in Information and Communication Technology 563, Springer 2019, ISBN 978-3-030-33715-5 [contents] - 2018
- [c56]Christian Damsgaard Jensen, Michael Bøndergaard Nielsen:
CodeTrust - Trusting Software Systems. IFIPTM 2018: 58-74 - [c55]Motalib Hossain Bhuyan, Nur A. Azad, Weizhi Meng, Christian Damsgaard Jensen:
Analyzing the Communication Security Between Smartphones and IoT Based on CORAS. NSS 2018: 251-265 - [c54]Rishikesh Sahay, D. A. Sepulveda, Weizhi Meng, Christian Damsgaard Jensen, Michael Bruhn Barfod:
CyberShip: An SDN-Based Autonomic Attack Mitigation Framework for Ship Systems. SciSec 2018: 191-198 - 2016
- [c53]Othoman Elaswad, Christian Damsgaard Jensen:
Identity management for e-government Libya as a case study. ISSA 2016: 106-113 - [c52]Jingjing Guo, Christian Damsgaard Jensen, Jianfeng Ma:
Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control. SAC 2016: 2202-2209 - 2015
- [c51]Qasim Mahmood Rajpoot, Christian Damsgaard Jensen, Ram Krishnan:
Integrating Attributes into Role-Based Access Control. DBSec 2015: 242-249 - [c50]Jingjing Guo, Christian Damsgaard Jensen, Jianfeng Ma:
Continuous Context-Aware Device Comfort Evaluation Method. IFIPTM 2015: 203-211 - [c49]Masahiro Fujita, Christian Damsgaard Jensen, Shiori Arimura, Yuki Ikeya, Masakatsu Nishigaki:
Physical trust-based persistent authentication. PST 2015: 186-190 - [c48]Qasim Mahmood Rajpoot, Christian Damsgaard Jensen, Ram Krishnan:
Attributes Enhanced Role-Based Access Control Model. TrustBus 2015: 3-17 - [e8]Zeinab Noorian, Jie Zhang, Stephen Marsh, Christian Damsgaard Jensen:
Incentive and Trust in E-Communities, Papers from the 2015 AAAI Workshop, Austin, Texas, USA, January 25, 2015. AAAI Technical Report WS-15-08, AAAI Press 2015, ISBN 978-1-57735-719-3 [contents] - [e7]Christian Damsgaard Jensen, Stephen Marsh, Theo Dimitrakos, Yuko Murayama:
Trust Management IX - 9th IFIP WG 11.11 International Conference, IFIPTM 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 454, Springer 2015, ISBN 978-3-319-18490-6 [contents] - 2014
- [c47]Christian Damsgaard Jensen:
The Importance of Trust in Computer Security. IFIPTM 2014: 1-12 - [c46]Glen Nielsen, Michael Vedel, Christian Damsgaard Jensen:
Improving usability of passphrase authentication. PST 2014: 189-198 - [c45]Qasim Mahmood Rajpoot, Christian Damsgaard Jensen:
Security and Privacy in Video Surveillance: Requirements and Challenges. SEC 2014: 169-184 - [e6]Sjouke Mauw, Christian Damsgaard Jensen:
Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings. Lecture Notes in Computer Science 8743, Springer 2014, ISBN 978-3-319-11850-5 [contents] - 2013
- [c44]Mads I. Ingwar, Christian Damsgaard Jensen:
Remote Biometrics for Robust Persistent Authentication. DPM/SETOP 2013: 250-267 - [c43]Christian Damsgaard Jensen, Kristine Geneser, Ida C. Willemoes-Wissing:
Sensor Enhanced Access Control: Extending Traditional Access Control Models with Context-Awareness. IFIPTM 2013: 177-192 - [c42]Mads I. Ingwar, Naveed Ahmed, Christian Damsgaard Jensen:
Error-rate-based fusion of biometric experts. PST 2013: 239-246 - [e5]Jordi Castellà-Roca, Josep Domingo-Ferrer, Joaquín García-Alfaro, Ali A. Ghorbani, Christian Damsgaard Jensen, Jesús A. Manjón, Iosif-Viorel Onut, Natalia Stakhanova, Vicenç Torra, Jie Zhang:
Eleventh Annual International Conference on Privacy, Security and Trust, PST 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-5839-2 [contents] - 2012
- [j9]Naveed Ahmed, Christian Damsgaard Jensen:
Structured intuition: a new methodology to analyse authentication protocols. Int. J. Crit. Comput. Based Syst. 3(4): 262-283 (2012) - [c41]Matija Stevanovic, Kasper Revsbech, Jens Myrup Pedersen, Robin Sharp, Christian Damsgaard Jensen:
A Collaborative Approach to Botnet Protection. CD-ARES 2012: 624-638 - [c40]Naveed Ahmed, Christian Damsgaard Jensen, Erik Zenner:
Towards Symbolic Encryption Schemes. ESORICS 2012: 557-572 - [c39]Naveed Ahmed, Christian Damsgaard Jensen:
Post-Session Authentication. IFIPTM 2012: 113-128 - [c38]Kasper Lindberg, Christian Damsgaard Jensen:
Document and Author Promotion Strategies in the Secure Wiki Model. IFIPTM 2012: 247-252 - [c37]Kasper Lindberg, Christian Damsgaard Jensen:
Collaborative trust evaluation for wiki security. PST 2012: 176-184 - 2011
- [j8]Christian Damsgaard Jensen, Povilas Pilkauskas, Thomas Lefévre:
Classification of Recommender Expertise in the Wikipedia Recommender System. Inf. Media Technol. 6(3): 884-902 (2011) - [j7]Christian Damsgaard Jensen, Povilas Pilkauskas, Thomas Lefévre:
Classification of Recommender Expertise in the Wikipedia Recommender System. J. Inf. Process. 19: 345-363 (2011) - [j6]Christian Damsgaard Jensen, Nicola Dragoni, Anirban Basu, Clara Mancini:
Frontiers in Trust Management. J. Internet Serv. Inf. Secur. 1(4): 1-4 (2011) - [c36]Naveed Ahmed, Christian Damsgaard Jensen:
Demarcation of Security in Authentication Protocols. SysSec@DIMVA 2011: 43-50 - [c35]Naveed Ahmed, Christian Damsgaard Jensen:
Adaptable Authentication Model: Exploring Security with Weaker Attacker Models. ESSoS 2011: 234-247 - [e4]Ian Wakeman, Ehud Gudes, Christian Damsgaard Jensen, Jason Crampton:
Trust Management V, 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29-July 1, 2011, Proceedings. IFIP Advances in Information and Communication Technology 358, Springer 2011, ISBN 978-3-642-22199-6 [contents] - [i1]Naveed Ahmed, Christian Damsgaard Jensen, Erik Zenner:
Private-key Symbolic Encryption. IACR Cryptol. ePrint Arch. 2011: 564 (2011) - 2010
- [j5]Christian Damsgaard Jensen:
Supporting multi-agent reputation calculation in the Wikipedia Recommender System. IET Inf. Secur. 4(4): 273-282 (2010) - [j4]Anand Nagarajan, Christian Damsgaard Jensen:
A Generic Role Based Access Control Model for Wind Power Systems. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 35-49 (2010)
2000 – 2009
- 2009
- [c34]Christian Damsgaard Jensen:
Security in Wiki-Style Authoring Systems. IFIPTM 2009: 81-98 - [c33]Thomas Lefévre, Christian Damsgaard Jensen, Thomas Rune Korsgaard:
WRS: The Wikipedia Recommender System. IFIPTM 2009: 298-301 - [c32]Naveed Ahmed, Christian Damsgaard Jensen:
A Mechanism for Identity Delegation at Authentication Level. NordSec 2009: 148-162 - 2008
- [c31]Christian Damsgaard Jensen, Thomas Rune Korsgaard:
Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics. SECRYPT 2008: 509-517 - [c30]Thomas Rune Korsgaard, Christian Damsgaard Jensen:
Reengineering the Wikipedia for Reputation. STM@IFIPTM 2008: 81-94 - [e3]Yücel Karabulut, John Mitchell, Peter Herrmann, Christian Damsgaard Jensen:
Trust Management II - Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway. IFIP Advances in Information and Communication Technology 263, Springer 2008, ISBN 978-0-387-09427-4 [contents] - 2007
- [c29]Stephen Farrell, Christian Damsgaard Jensen:
"End-by-Hop" Data Integrity. ESAS 2007: 142-155 - [c28]Christian Damsgaard Jensen, Fernando Meira, Jacob Nittegaard-Nielsen:
Resilia: a Safe and Secure Distributed Backup System for Small and Medium Enterprises. IFIPTM 2007: 383-398 - [c27]Christian Damsgaard Jensen:
Integrity in Open Collaborative Authoring Systems. IFIPTM 2007: 399-402 - 2006
- [c26]Dan Søndergaard, Christian W. Probst, Christian Damsgaard Jensen, René Rydhof Hansen:
Program Partitioning Using Dynamic Trust Models. Formal Aspects in Security and Trust 2006: 170-184 - [c25]Christian Damsgaard Jensen, Paul O'Connell:
Trust-Based Route Selection in Dynamic Source Routing. iTrust 2006: 150-163 - [c24]Jean-Marc Seigneur, Christian Damsgaard Jensen:
Editorial message: second special track on trust, recommendations, evidence and other collaboration know-how (TRECK'06). SAC 2006: 1854 - 2005
- [j3]Jean-Marc Seigneur, Christian Damsgaard Jensen:
The Claim Tool Kit for ad hoc recognition of peer entities. Sci. Comput. Program. 54(1): 49-71 (2005) - [c23]Jean-Marc Seigneur, Alan Gray, Christian Damsgaard Jensen:
Trust Transfer: Encouraging Self-recommendations Without Sybil Attack. iTrust 2005: 321-337 - [c22]Jean-Marc Seigneur, Christian Damsgaard Jensen:
Editorial message special track on trust, recommendations, evidence and other collaboration know-how (TRECK). SAC 2005: 1569 - [c21]Elizabeth Gray, Christian Damsgaard Jensen, Paul O'Connell, Stefan Weber, Jean-Marc Seigneur, Yong Chen:
Trust Evolution Policies for Security in Collaborative Ad Hoc Applications. STM 2005: 95-111 - 2004
- [c20]Jean-Marc Seigneur, Christian Damsgaard Jensen:
Trading Privacy for Trust. iTrust 2004: 93-107 - [c19]Jean-Marc Seigneur, Nathan Dimmock, Ciarán Bryce, Christian Damsgaard Jensen:
Combating Spam with TEA. PST 2004: 47-58 - [c18]Stephan J. Engberg, Morten Borup Harning, Christian Damsgaard Jensen:
Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience. PST 2004: 89-101 - [c17]Jean-Marc Seigneur, Christian Damsgaard Jensen:
Trust enhanced ubiquitous payment without too much privacy loss. SAC 2004: 1593-1599 - [e2]Christian Damsgaard Jensen, Stefan Poslad, Theodosis Dimitrakos:
Trust Management, Second International Conference, iTrust 2004, Oxford, UK, March 29 - April 1, 2004, Proceedings. Lecture Notes in Computer Science 2995, Springer 2004, ISBN 3-540-21312-0 [contents] - 2003
- [j2]Jean-Marc Seigneur, Christian Damsgaard Jensen:
Privacy Recovery with Disposable Email Addresses. IEEE Secur. Priv. 1(6): 35-39 (2003) - [j1]Vinny Cahill, Elizabeth Gray, Jean-Marc Seigneur, Christian Damsgaard Jensen, Yong Chen, Brian Shand, Nathan Dimmock, Andrew Twigg, Jean Bacon, Colin English, Waleed Wagealla, Sotirios Terzis, Paddy Nixon, Giovanna Di Marzo Serugendo, Ciarán Bryce, Marco Carbone, Karl Krukow, Mogens Nielsen:
Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive Comput. 2(3): 52-61 (2003) - [c16]Yong Chen, Christian Damsgaard Jensen, Jean-Marc Seigneur, Elizabeth Gray:
Risk Probability Estimating Based on Clustering. IAW 2003: 229-233 - [c15]Elizabeth Gray, Jean-Marc Seigneur, Yong Chen, Christian Damsgaard Jensen:
Trust Propagation in Small Worlds. iTrust 2003: 239-254 - [c14]Jean-Marc Seigneur, Gregory Biegel, Christian Damsgaard Jensen:
P2P with JXTA-Java pipes. PPPJ 2003: 207-212 - [c13]Joerg Abendroth, Christian Damsgaard Jensen:
A Unified Security Framework for Networked Applications. SAC 2003: 351-357 - [c12]Joerg Abendroth, Christian Damsgaard Jensen:
Partial outsourcing: a new paradigm for access control. SACMAT 2003: 134-141 - [c11]Anthony Harrington, Christian Damsgaard Jensen:
Cryptographic access control in a distributed file system. SACMAT 2003: 158-165 - [c10]Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, Yong Chen:
End-to-End Trust Starts with Recognition. SPC 2003: 130-142 - 2002
- [c9]Johan Andersson, Stefan Weber, Christian Damsgaard Jensen, Vinny Cahill:
PEM3 - The Policy Enhanced Memory Management Model. POLICY 2002: 194-197 - 2001
- [c8]Christian Damsgaard Jensen:
Fingerprinting Text in Logical Markup Languages. ISC 2001: 433-445 - [c7]Jude T. Regan, Christian Damsgaard Jensen:
Capability File Names: Separating Authorisation From User Management in an Internet File System. USENIX Security Symposium 2001 - 2000
- [c6]Benjamin Aziz, Christian Damsgaard Jensen:
Adaptability in CORBA: The Mobile Proxy Approach. DOA 2000: 295-304 - [c5]Christian Damsgaard Jensen:
CryptoCache: a secure sharable file cache for roaming users. ACM SIGOPS European Workshop 2000: 73-78
1990 – 1999
- 1999
- [b1]Christian Damsgaard Jensen:
Un modèle de contrôle d'accès générique et sa réalisation dans la mémoire virtuelle répartie unique Arias. (A generic access contro model and its implementation in the single address space operating system Arias). Joseph Fourier University, Grenoble, France, 1999 - [e1]Jan Vitek, Christian Damsgaard Jensen:
Secure Internet Programming, Security Issues for Mobile and Distributed Objects. Lecture Notes in Computer Science 1603, Springer 1999, ISBN 3-540-66130-1 [contents] - 1998
- [c4]Christian Damsgaard Jensen, Daniel Hagimont:
Protection Reconfiguration for Reusable Software. CSMR 1998: 74-81 - [c3]Christian Damsgaard Jensen, George Coulouris, Daniel Hagimont:
ECOOP Workshop on Distributed Object Security. ECOOP Workshops 1998: 273-276 - [c2]Christian Damsgaard Jensen, Daniel Hagimont:
Mutual Suspicion in a Generic Object-Support System. ECOOP Workshops 1998: 278 - [c1]Christian Damsgaard Jensen, Daniel Hagimont:
Protection wrappers: a simple and portable sandbox for untrusted applications. ACM SIGOPS European Workshop 1998: 104-110
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint