default search action
Ning Zhang 0001
Person information
- affiliation: The University of Manchester, UK
Other persons with the same name
- Ning Zhang — disambiguation page
- Ning Zhang 0002 — Facebook
- Ning Zhang 0003 — Peking University, Beijing, China
- Ning Zhang 0004 — University of Electronic Science & Technology of China, Chengdu, China
- Ning Zhang 0005 — Tianjin University, Department of Biomedical Engineering, Tianjin, China
- Ning Zhang 0006 — Stowers Institute for Medical Research, Kansas City, MO, USA (and 1 more)
- Ning Zhang 0007 — University of Windsor, Canada (and 2 more)
- Ning Zhang 0008 — Tsinghua University, State Key Laboratory of Power Systems, Beijing, China (and 1 more)
- Ning Zhang 0009 — Nanjing Marine Radar Institute, China (and 1 more)
- Ning Zhang 0010 — National Huaqiao University, School of Computer Science and Technology, Xiamen, China
- Ning Zhang 0011 — Beijing Jiaotong University, School of Electrical Engineering, China
- Ning Zhang 0012 — Dalian University of Technology, School of Control Science and Engineering, China
- Ning Zhang 0013 — University of Wisconsin-Madison, Computer Sciences Department, USA
- Ning Zhang 0014 — Snapchat Inc., Venice, CA, USA (and 1 more)
- Ning Zhang 0015 — Chinese Academy of Sciences, Institute of Automation, Beijing, China
- Ning Zhang 0016 — Qingdao University, School of Business, China (and 1 more)
- Ning Zhang 0017 — Washington University in St. Louis, St. Louis, MO, USA (and 1 more)
- Ning Zhang 0018 — National University of Singapore, Department of Mathematics, Singapore
- Ning Zhang 0019 — Minzu University of China, Beijing, China
- Ning Zhang 0020 — Yanshan University, School of Economics and Management, Qinhuangdao, China
- Ning Zhang 0021 — Rutgers University, New Brunswick, NJ, USA
- Ning Zhang 0022 — Central University of Finance and Economics, School of Information, Beijing, China
- Ning Zhang 0023 — Ryerson University, Department of Electrical and Computer Engineering, Toronto, ON, Canada (and 1 more)
- Ning Zhang 0024 — Zhejiang Lab, Research Center for Quantum Sensing, Intelligent Perception Research Institute, Hangzhou, China (and 1 more)
- Ning Zhang 0025 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Ning Zhang 0026 — Beijing Normal University, Faculty of Arts and Sciences, Research Center for Digital Publishing and Digital Humanities, Zhuhai, China (and 1 more)
- Ning Zhang 0027 — PLA Communication Network Technology Management Center, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Siok Wah Tay, Ning Zhang, Salem Aljanah:
A Problem Analysis of Smart Home Automation: Toward Secure and Usable Communication-Based Authorization. IEEE Access 12: 18103-18121 (2024) - [j41]Khlood Jastaniah, Ning Zhang, Mustafa A. Mustafa:
Efficient Privacy-Friendly and Flexible Wearable Data Processing With User-Centric Access Control. IEEE Access 12: 37012-37029 (2024) - [j40]Hanin Almutairi, Salem Aljanah, Ning Zhang:
A Swarm Intelligence-Based Path Selection for Low-Power and Lossy Networks. IEEE Access 12: 117218-117255 (2024) - [j39]Hanin Almutairi, Ning Zhang:
A Survey on Routing Solutions for Low-Power and Lossy Networks: Toward a Reliable Path-Finding Approach. Network 4(1): 1-32 (2024) - 2023
- [j38]Tahani Aljohani, Ning Zhang:
Secure, ID Privacy and Inference Threat Prevention Mechanisms for Distributed Systems. IEEE Access 11: 3766-3780 (2023) - [j37]Ismail Al Salti, Ning Zhang:
An Effective, Efficient and Scalable Link Discovery (EESLD) Framework for Hybrid Multi-Controller SDN Networks. IEEE Access 11: 140660-140686 (2023) - 2022
- [j36]Salem Aljanah, Ning Zhang, Siok Wah Tay:
A Multifactor Multilevel and Interaction Based (M2I) Authentication Framework for Internet of Things (IoT) Applications. IEEE Access 10: 47965-47996 (2022) - [j35]Mengya Li, Ning Zhang:
Trajectory-Based Authenticated Key Establishment for Dynamic Internet of Things. IEEE Access 10: 111419-111448 (2022) - [j34]Ismail Al Salti, Ning Zhang:
LINK-GUARD: An Effective and Scalable Security Framework for Link Discovery in SDN Networks. IEEE Access 10: 130233-130252 (2022) - [d1]Tolijan Trajanovski, Ning Zhang:
IoT-BDA Botnet Analysis Dataset. IEEE DataPort, 2022 - [i2]Salem Aljanah, Ning Zhang, Siok Wah Tay:
A Multi-factor Multi-level and Interaction based (M2I) Authentication Framework for Internet of Things (IoT) Applications. CoRR abs/2201.07323 (2022) - [i1]Khlood Jastaniah, Ning Zhang, Mustafa A. Mustafa:
Privacy-Friendly Flexible IoT Health Data Processing with User-Centric Access Control. CoRR abs/2203.00465 (2022) - 2021
- [j33]Salem Aljanah, Ning Zhang, Siok Wah Tay:
A Survey on Smart Home Authentication: Toward Secure, Multi-Level and Interaction-Based Identification. IEEE Access 9: 130914-130927 (2021) - 2020
- [j32]Ayesha Naureen, Ning Zhang, Steve B. Furber, Qi Shi:
A GPS-Less Localization and Mobility Modelling (LMM) System for Wildlife Tracking. IEEE Access 8: 102709-102732 (2020) - [j31]Soontorn Sirapaisan, Ning Zhang, Qian He:
Communication Pattern Based Data Authentication (CPDA) Designed for Big Data Processing in a Multiple Public Cloud Environment. IEEE Access 8: 107716-107748 (2020) - [j30]Pin Shen Teh, Ning Zhang, Syh-Yuan Tan, Qi Shi, Wee-How Khoh, Raheel Nawaz:
Strengthen user authentication on mobile devices by using user's touch dynamics pattern. J. Ambient Intell. Humaniz. Comput. 11(10): 4019-4039 (2020) - [c67]Tahani Aljohani, Ning Zhang:
A Secure and Privacy-Preserving Data Collection (SPDC) Framework for IoT Applications. CRITIS 2020: 83-97
2010 – 2019
- 2019
- [c66]Ayesha Naureen, Ning Zhang:
Competition: Alternating Multicast with Aggregated Data Collection in Wireless Sensor Networks. EWSN 2019: 296-297 - [c65]Ayesha Naureen, Ning Zhang:
Competition: Adaptive Software Defined Scheduling of Low Power Wireless Networks. EWSN 2019: 298-299 - [c64]Pin Shen Teh, Ning Zhang, Syh-Yuan Tan, Qi Shi, Raheel Nawaz, Wee-How Khoh:
Sensing Your Touch: Strengthen User Authentication via Touch Dynamic Biometrics. ICTC 2019: 289-294 - 2017
- [j29]Ayesha Naureen, Ning Zhang, Steve B. Furber:
Identifying Energy Holes in Randomly Deployed Hierarchical Wireless Sensor Networks. IEEE Access 5: 21395-21418 (2017) - [c63]Amina H. Gamlo, Ning Zhang, Omaimah Bamasag:
Mobile Cloud Computing: Security Analysis. MobileCloud 2017: 191-198 - 2016
- [j28]Ibrahim Lahmer, Ning Zhang:
Towards a Virtual Domain Based Authentication on MapReduce. IEEE Access 4: 1658-1675 (2016) - [j27]Ahmed Al-Riyami, Ning Zhang, John Keane:
An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNs. IEEE Access 4: 4183-4206 (2016) - [j26]Ahmed Al-Riyami, Ning Zhang, John Keane:
Impact of hash value truncation on ID anonymity in Wireless Sensor Networks. Ad Hoc Networks 45: 80-103 (2016) - [j25]Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh, Ke Chen:
A survey on touch dynamics authentication in mobile devices. Comput. Secur. 59: 210-235 (2016) - [j24]Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh, Ke Chen:
TDAS: a touch dynamics based multi-factor authentication solution for mobile devices. Int. J. Pervasive Comput. Commun. 12(1): 127-153 (2016) - [c62]Ayesha Naureen, Ning Zhang:
A Comparative Study of Data Aggregation Approaches for Wireless Sensor Networks. Q2SWinet@MSWiM 2016: 125-128 - 2015
- [j23]Mustafa A. Mustafa, Ning Zhang, Georgios Kalogridis, Zhong Fan:
DEP2SA: A Decentralized Efficient Privacy-Preserving and Selective Aggregation Scheme in Advanced Metering Infrastructure. IEEE Access 3: 2828-2846 (2015) - [j22]Helen Bakhsh, Ning Zhang, Andy Carpenter:
TADL-V2: An Improved Trust-Aware Dynamic Location-based Adaptation Protocol For Discovering Multiple Paths in MANETs. EAI Endorsed Trans. Ambient Syst. 2(6): e1 (2015) - [j21]Qi Shi, Ning Zhang, Madjid Merabti:
Fair signature exchange via delegation on ubiquitous networks. J. Comput. Syst. Sci. 81(4): 615-631 (2015) - [c61]Walaa Elsayed, Tarek Gaber, Ning Zhang, Mahmoud Ibrahim Moussa:
Access Control Models for Pervasive Environments: A Survey. AISI 2015: 511-522 - [c60]Mustafa A. Mustafa, Ning Zhang, Georgios Kalogridis, Zhong Fan:
MUSP: Multi-service, User Self-controllable and Privacy-preserving system for smart metering. ICC 2015: 788-794 - [c59]Helen Bakhsh, Ning Zhang, Andy Carpenter:
TADL: A Trust-Aware Dynamic Location-Based Protocol Suite For Discovering Multiple Paths in MANETs. ICDCN 2015: 2:1-2:10 - [c58]Ibrahim Lahmer, Ning Zhang:
MapReduce: A critical analysis of existing authentication methods. ICITST 2015: 302-313 - [c57]Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh, Ke Chen:
Recognizing Your Touch: Towards Strengthening Mobile Device Authentication via Touch Dynamics Integration. MoMM 2015: 108-116 - 2014
- [c56]Rima Addas, Ning Zhang:
An Enhanced Linkable Anonymous Access Protocol of the Distributed Electronic Patient Records. ARES 2014: 146-151 - [c55]Rima Addas, Ning Zhang:
Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol. ICT-EurAsia 2014: 500-510 - [c54]Mustafa A. Mustafa, Ning Zhang, Georgios Kalogridis, Zhong Fan:
DESA: A decentralized, efficient and selective aggregation scheme in AMI. ISGT 2014: 1-5 - [c53]Abdullah A. I. Alnajem, Ning Zhang:
A copula-based risk evaluation method (C-REM) in a corporate mobile banking context. SAC 2014: 1455-1462 - [c52]Ibrahim Lahmer, Ning Zhang:
MapReduce: MR Model Abstraction for Future Security Study. SIN 2014: 392 - [c51]Mustafa A. Mustafa, Ning Zhang, Georgios Kalogridis, Zhong Fan:
Roaming electric vehicle charging and billing: An anonymous multi-user protocol. SmartGridComm 2014: 939-945 - 2013
- [j20]Qi Shi, Ning Zhang, Madjid Merabti, Kashif Kifayat:
Resource-efficient authentic key establishment in heterogeneous wireless sensor networks. J. Parallel Distributed Comput. 73(2): 235-249 (2013) - [c50]Abdullah A. I. Alnajem, Ning Zhang:
A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context. ICITCS 2013: 1-4 - [c49]James Dyer, Ning Zhang:
Security issues relating to inadequate authentication in MapReduce applications. HPCS 2013: 281-288 - [c48]Mustafa A. Mustafa, Ning Zhang, Georgios Kalogridis, Zhong Fan:
Smart electric vehicle charging: Security analysis. ISGT 2013: 1-6 - 2012
- [j19]Tarek Gaber, Ning Zhang:
A License Revocation Protocol Supporting Digital License Reselling in a Consumer-to-Consumer Model. Int. J. Online Mark. 2(1): 38-49 (2012) - [j18]Qi Shi, Ning Zhang, David Llewellyn-Jones:
Efficient autonomous signature exchange on ubiquitous networks. J. Netw. Comput. Appl. 35(6): 1793-1806 (2012) - [c47]Peter J. J. McNerney, Ning Zhang:
A study on reservation-based adaptation for QoS in adversarial MANET environments. IWCMC 2012: 677-682 - [c46]Peter J. J. McNerney, Ning Zhang:
A 2-dimensional approach to QoS provisioning in adversarial mobile ad hoc network environments. MSWiM 2012: 143-150 - [c45]Sadia Saleem, Ning Zhang:
A Risk-Aware Workload scheduler to support secure and efficient collaborative data transfer in mobile communities. WONS 2012: 31-34 - 2011
- [j17]Qi Shi, Ning Zhang, Madjid Merabti:
Fair exchange of valuable information: A generalised framework. J. Comput. Syst. Sci. 77(2): 348-371 (2011) - [j16]Qi Shi, Ning Zhang, Madjid Merabti, Robert Askwith:
Achieving autonomous fair exchange in ubiquitous network settings. J. Netw. Comput. Appl. 34(2): 653-667 (2011) - [c44]Rima Addas, Ning Zhang:
Support Access to Distributed EPRs with Three Levels of Identity Privacy Preservation. ARES 2011: 9-16 - [c43]Peter J. J. McNerney, Ning Zhang:
Towards an Integration of Security and Quality of Service in IP-Based Mobile Ad Hoc Networks. GLOBECOM 2011: 1-6 - [c42]Kitisak Osathanunkul, Ning Zhang:
A countermeasure to black hole attacks in mobile ad hoc networks. ICNSC 2011: 508-513 - [c41]Tarek Gaber, Ning Zhang:
Fair and Abuse-Free Contract Signing Protocol Supporting Fair License Reselling. NTMS 2011: 1-7 - [c40]Rima Addas, Ning Zhang:
An Enhanced Approach to Supporting Controlled Access to EPRs with Three Levels of Identity Privacy Preservations. USAB 2011: 547-561 - 2010
- [j15]Ali Ahmed, Ning Zhang:
Towards the realisation of context-risk-aware access control in pervasive computing. Telecommun. Syst. 45(2-3): 127-137 (2010) - [j14]Jay Chin, Ning Zhang, Aleksandra Nenadic, Omaima Bamasak:
A context-constrained authorisation (CoCoA) framework for pervasive grid computing. Wirel. Networks 16(6): 1541-1556 (2010) - [c39]Li Yao, Ning Zhang:
Quantifying authentication Levels of Assurance in grid environments. IAS 2010: 298-303 - [c38]Osama A. Elshakankiry, Andy Carpenter, Ning Zhang:
A Novel Scheme for Supporting Location Authentication of Mobile Nodes. MobiSec 2010: 91-102 - [c37]Ali Ahmed, Ning Zhang:
An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation. SECURWARE 2010: 251-260
2000 – 2009
- 2009
- [c36]Kitisak Osathanunkul, Ning Zhang:
A Flexible Routing Decision Framework to Support Diversified Application-Level Data Types in MANETs. NTMS 2009: 1-5 - [c35]Li Yao, Ning Zhang:
A Generic Authentication LoA Derivation Model. SEC 2009: 98-108 - 2008
- [c34]Osama A. Elshakankiry, Andy Carpenter, Ning Zhang:
A New Secure Binding Management Protocol for Mobile IPv6 Networks. IAS 2008: 281-286 - [c33]Ali Ahmed, Ning Zhang:
A Context-Risk-Aware Access Control model for Ubiquitous environments. IMCSIT 2008: 775-782 - 2007
- [j13]Ning Zhang, Li Yao, Aleksandra Nenadic, Jay Chin, Carole A. Goble, Alan L. Rector, David W. Chadwick, Sassa Otenko, Qi Shi:
Achieving fine-grained access control in virtual organizations. Concurr. Comput. Pract. Exp. 19(9): 1333-1352 (2007) - [c32]Li-Sha He, Ning Zhang, Li-Rong He, Ian Rogers:
Secure M-commerce Transactions: A Third Party Based Signature Protocol. IAS 2007: 3-8 - [c31]Naikuo Yang, Howard Barringer, Ning Zhang:
A Purpose-Based Access Control Model. IAS 2007: 143-148 - [c30]Aleksandra Nenadic, Ning Zhang, Li Yao, Terry Morrow:
Levels of Authentication Assurance: an Investigation. IAS 2007: 155-160 - [c29]Jay Chin, Ning Zhang, Aleksandra Nenadic, Li Yao, J. M. Brooke:
Towards Context Constrained Authorisation for Pervasive Grid Computing. COMSWARE 2007 - 2006
- [j12]Omaima Bamasak, Ning Zhang:
Reputation management and signature delegation: A distributed approach. Electron. Commer. Res. 6(3-4): 227-263 (2006) - [j11]Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith:
Practical and efficient fair document exchange over networks. J. Netw. Comput. Appl. 29(1): 46-61 (2006) - [c28]Aleksandra Nenadic, Ning Zhang, Jay Chin, Carole A. Goble:
FAME: Adding Multi-Level Authentication to Shibboleth. e-Science 2006: 157 - [c27]C. Corzo, F. Corzo S., Ning Zhang, Andy Carpenter:
Using Automated Banking Certificates to Detect Unauthorised Financial Transactions. Financial Cryptography 2006: 36-51 - [c26]Ian Featherstone, Ning Zhang:
A mobility monitoring based advance reservation protocol. Q2SWinet 2006: 111-118 - 2005
- [j10]Aleksandra Nenadic, Ning Zhang, Qi Shi:
RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery. J. Comput. Secur. 13(5): 757-777 (2005) - [j9]Ning Zhang, Qi Shi, Madjid Merabti:
Revocation of privacy-enhanced public-key certificates. J. Syst. Softw. 75(1-2): 205-214 (2005) - [j8]Aleksandra Nenadic, Ning Zhang, Barry M. G. Cheetham, Carole A. Goble:
RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption. J. Univers. Comput. Sci. 11(1): 175-192 (2005) - [c25]Aleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble:
DSA-Based Verifiable and Recoverable Encryption of Signatures and Its Application in Certified E-Goods Delivery. EEE 2005: 94-99 - [c24]Omaima Bamasak, Ning Zhang:
A Distributed Reputation Management Scheme for Mobile Agent-Based E-Commerce Applications . EEE 2005: 270-275 - [c23]Ning Zhang, Alan L. Rector, Iain E. Buchan, Qi Shi, Dipak Kalra, Jeremy Rogers, Carole A. Goble, Steve Walker, David Ingram, Peter D. Singleton:
A Linkable Identity Privacy Algorithm for HealthGrid. HealthGrid 2005: 234-245 - [c22]Omaima Bamasak, Ning Zhang, Doug Edwards:
DiSigncryption: An Integration of Agent-Based Signature Delegation with Distributed Reputation Management Schem. IPDPS 2005 - [c21]Aleksandra Nenadic, Ning Zhang, Qi Shi, Carole A. Goble:
Certified E-Mail Delivery with DSA Receipts. IPDPS 2005 - [c20]Ning Zhang, Li Yao, Jay Chin, Aleksandra Nenadic, A. McNab, Alan L. Rector, Carole A. Goble, Qi Shi:
Plugging a Scalable Authentication Framework into Shibboleth. WETICE 2005: 271-276 - 2004
- [j7]Delia Critchlow, Ning Zhang:
Security enhanced accountable anonymous PKI certificates for mobile e-commerce. Comput. Networks 45(4): 483-503 (2004) - [j6]Ning Zhang, Qi Shi, Madjid Merabti, Robert Askwith:
Autonomous mobile agent based fair exchange. Comput. Networks 46(6): 751-770 (2004) - [j5]Ning Zhang, Qi Shi, Madjid Merabti:
A unified approach to a fair document exchange system. J. Syst. Softw. 72(1): 83-96 (2004) - [c19]Ning Zhang, Jay Chin, Alan L. Rector, Carole A. Goble, Y. Li:
Towards an Authentication Middleware to Support Ubiquitous Web Access. COMPSAC Workshops 2004: 36-38 - [c18]Delia Critchlow, Ning Zhang:
Revocation invocation for accountable anonymous PKI certificate trees. ISCC 2004: 386-392 - [c17]Omaima Bamasak, Ning Zhang:
A secure proxy signature protocol for agent-based M-commerce applications. ISCC 2004: 399-406 - [c16]Aleksandra Nenadic, Ning Zhang, Stephen K. Barton:
A secure and fair DSA-based signature exchange protocol. ISCC 2004: 412-417 - [c15]Aleksandra Nenadic, Ning Zhang, Stephen K. Barton:
A Security Protocol for Certified E-Goods Delivery. ITCC (1) 2004: 22- - [c14]Omaima Bamasak, Ning Zhang:
Achieving Distributed Trusted Services. ITCC (1) 2004: 56-61 - [c13]Aleksandra Nenadic, Ning Zhang, Stephen K. Barton:
Fair certified e-mail delivery. SAC 2004: 391-396 - [c12]Li-Sha He, Ning Zhang:
A new signature scheme: joint-signature. SAC 2004: 807-812 - [c11]Omaima Bamasak, Ning Zhang:
A secure method for signature delegation to mobile agents. SAC 2004: 813-818 - 2003
- [j4]Ning Zhang, Qi Shi, Madjid Merabti:
An efficient protocol for anonymous and fair document exchange. Comput. Networks 41(1): 19-28 (2003) - [c10]Aleksandra Nenadic, Ning Zhang:
Non-Repudiation and Fairness in Electronic Data Exchange. ICEIS (4) 2003: 55-62 - [c9]Omaima Bamasak, Ning Zhang:
Towards a Secure Mobile Agent Based M-Commerce System. ICEIS (4) 2003: 408-412 - [c8]Li-Sha He, Ning Zhang:
An Asymmetric Authentication Protocol for M-Commerce Applications. ISCC 2003: 244-250 - 2002
- [c7]Li-Sha He, Ning Zhang, Li-Rong He:
A New End-to-End Authentication Protocol for Mobile Users to Access Internet Services. SEC 2002: 239-250 - [c6]Delia Critchlow, Ning Zhang:
An Insight Into User Privacy and Accountable Anonymity for Mobile E-Commerce Transactions. SEC 2002: 411-422
1990 – 1999
- 1999
- [j3]Ning Zhang, Qi Shi, Madjid Merabti:
A Flexible Approach to Secure and Fair Document Exchange. Comput. J. 42(7): 569-581 (1999) - 1998
- [j2]Qi Shi, Ning Zhang:
An effective model for composition of secure systems. J. Syst. Softw. 43(3): 233-244 (1998) - 1996
- [j1]Ning Zhang, Qi Shi:
Achieving Non-Repudiation of Receipt. Comput. J. 39(10): 844-853 (1996) - [c5]Ning Zhang, Qi Shi:
Security Issues in an EDI Environment. ACSAC 1996: 129-136 - [c4]Qi Shi, Ning Zhang:
Applying Composable Security Properties to Assessment of Information Systems. COMPSAC 1996: 118-123 - [c3]Qi Shi, Ning Zhang:
A general approach to secure components composition. HASE 1996: 263-286 - 1995
- [c2]Qi Shi, Ning Zhang:
A General Approach to Evaluation of Secure Systems. COMPSAC 1995: 396-401 - 1994
- [c1]Qi Shi, John A. McDermid, Ning Zhang:
On analysis of secure information systems: a case study. COMPSAC 1994: 364-369
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 20:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint