default search action
Xavier Boyen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Qinyi Li, Xavier Boyen:
Public-Key Authenticated Encryption with Keyword Search Made Easy. IACR Commun. Cryptol. 1(2): 16 (2024) - [j21]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles. IEEE Trans. Dependable Secur. Comput. 21(4): 4066-4083 (2024) - 2023
- [j20]Thomas Miller, Shoufeng Cao, Marcus Foth, Xavier Boyen, Warwick Powell:
An asset-backed decentralised finance instrument for food supply chains - A case study from the livestock export industry. Comput. Ind. 147: 103863 (2023) - [j19]Jayamine Alupotha, Xavier Boyen, Matthew McKague:
LACT+: Practical Post-Quantum Scalable Confidential Transactions. Cryptogr. 7(2): 24 (2023) - [j18]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption. IEEE Trans. Dependable Secur. Comput. 20(3): 1799-1817 (2023) - [c68]Xavier Boyen, Qinyi Li:
Identity-Based Matchmaking Encryption with Enhanced Privacy - A Generic Construction with Practical Instantiations. ESORICS (2) 2023: 425-445 - 2022
- [j17]Jayamine Alupotha, Xavier Boyen, Matthew McKague:
Aggregable Confidential Transactions for Efficient Quantum-Safe Cryptocurrencies. IEEE Access 10: 17722-17747 (2022) - [c67]Jayamine Alupotha, Xavier Boyen, Matthew McKague:
Zero-History Confidential Chains with Zero-Knowledge Contracts: A New Normal for Decentralized Ledgers? ESORICS (1) 2022: 67-88 - [i33]Jayamine Alupotha, Xavier Boyen:
Practical UC-Secure Zero-Knowledge Smart Contracts. IACR Cryptol. ePrint Arch. 2022: 670 (2022) - 2021
- [j16]Jayamine Alupotha, Xavier Boyen:
Origami Store: UC-Secure Foldable Datachains for the Quantum Era. IEEE Access 9: 81454-81484 (2021) - [j15]Warwick Powell, Shoufeng Cao, Thomas Miller, Marcus Foth, Xavier Boyen, Barry Earsman, Santiago del Valle, Charles Turner-Morris:
From premise to practice of social consensus: How to agree on common knowledge in blockchain-enabled supply chains. Comput. Networks 200: 108536 (2021) - [j14]Niluka Amarasinghe, Xavier Boyen, Matthew McKague:
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration. Cryptogr. 5(1): 10 (2021) - [j13]Xavier Boyen, Udyani Herath, Matthew McKague, Douglas Stebila:
Associative Blockchain for Decentralized PKI Transparency. Cryptogr. 5(2): 14 (2021) - [j12]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
Authentication strategies in vehicular communications: a taxonomy and framework. EURASIP J. Wirel. Commun. Netw. 2021(1): 129 (2021) - [j11]Qinyi Li, Xavier Boyen, Ernest Foo:
CCA-security from adaptive all-but-one lossy trapdoor functions. Theor. Comput. Sci. 883: 99-121 (2021) - [j10]Qinyi Li, Xavier Boyen:
Efficient public-key encryption with equality test from lattices. Theor. Comput. Sci. 892: 85-107 (2021) - [j9]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side! IEEE Trans. Inf. Forensics Secur. 16: 3678-3693 (2021) - [j8]Mir Ali Rezazadeh Baee, Leonie Simpson, Xavier Boyen, Ernest Foo, Josef Pieprzyk:
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications. IEEE Trans. Veh. Technol. 70(9): 9306-9319 (2021) - [c66]Xavier Boyen, Ernest Foo, Qinyi Li:
Anonymous Lattice Identity-Based Encryption with Traceable Identities. ACISP 2021: 630-649 - [c65]Xavier Boyen, Thomas Haines, Johannes Müller:
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting. EuroS&P 2021: 272-291 - [c64]Niluka Amarasinghe, Xavier Boyen, Matthew McKague:
The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach. Financial Cryptography (1) 2021: 205-225 - [c63]Xavier Boyen, Malika Izabachène, Qinyi Li:
Secure Hybrid Encryption in the Standard Model from Hard Learning Problems. PQCrypto 2021: 399-418 - [i32]Eleanor McMurtry, Xavier Boyen, Chris Culnane, Kristian Gjøsteen, Thomas Haines, Vanessa Teague:
Towards Verifiable Remote Voting with Paper Assurance. CoRR abs/2111.04210 (2021) - [i31]Shoufeng Cao, Thomas Miller, Marcus Foth, Warwick Powell, Xavier Boyen, Charles Turner-Morris:
Integrating On-chain and Off-chain Governance for Supply Chain Transparency and Integrity. CoRR abs/2111.08455 (2021) - [i30]Niluka Amarasinghe, Xavier Boyen, Matthew McKague:
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration. IACR Cryptol. ePrint Arch. 2021: 36 (2021) - [i29]Xavier Boyen, Thomas Haines, Johannes Müller:
Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting. IACR Cryptol. ePrint Arch. 2021: 304 (2021) - 2020
- [c62]Jayamine Alupotha, Xavier Boyen, Ernest Foo:
Compact Multi-Party Confidential Transactions. CANS 2020: 430-452 - [c61]Xavier Boyen, Thomas Haines, Johannes Müller:
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing. ESORICS (2) 2020: 336-356 - [c60]Xavier Boyen, Malika Izabachène, Qinyi Li:
A Simple and Efficient CCA-Secure Lattice KEM in the Standard Model. SCN 2020: 321-337 - [i28]Xavier Boyen, Thomas Haines, Johannes Müller:
A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing. IACR Cryptol. ePrint Arch. 2020: 115 (2020)
2010 – 2019
- 2019
- [j7]Tarun Kumar Bansal, Xavier Boyen, Josef Pieprzyk:
Signcryption schemes with insider security in an ideal permutation model. J. Math. Cryptol. 13(2): 117-150 (2019) - [c59]Niluka Amarasinghe, Xavier Boyen, Matthew McKague:
A Survey of Anonymity of Cryptocurrencies. ACSW 2019: 2:1-2:10 - [c58]Xavier Boyen, Qinyi Li:
Direct CCA-Secure KEM and Deterministic PKE from Plain LWE. PQCrypto 2019: 116-130 - 2018
- [j6]Xavier Boyen, Thomas Haines:
Forward-Secure Linkable Ring Signatures from Bilinear Maps. Cryptogr. 2(4): 35 (2018) - [c57]Xavier Boyen, Thomas Haines:
Forward-Secure Linkable Ring Signatures. ACISP 2018: 245-264 - [c56]Xavier Boyen, Qinyi Li:
Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices. ACNS 2018: 535-553 - [c55]Xavier Boyen, Christopher Carr, Thomas Haines:
Graphchain: a Blockchain-Free Scalable Decentralised Ledger. BCC@AsiaCCS 2018: 21-33 - 2017
- [c54]Xavier Boyen, Qinyi Li:
All-But-Many Lossy Trapdoor Functions from Lattices and Applications. CRYPTO (3) 2017: 298-331 - [i27]Christopher Carr, Colin Boyd, Xavier Boyen, Thomas Haines:
Bitcoin Unchained. ERCIM News 2017(110) (2017) - [i26]Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines:
Key Recovery: Inert and Public. IACR Cryptol. ePrint Arch. 2017: 243 (2017) - [i25]Xavier Boyen, Qinyi Li:
All-But-Many Lossy Trapdoor Functions from Lattices and Applications. IACR Cryptol. ePrint Arch. 2017: 532 (2017) - 2016
- [j5]Xavier Boyen:
Unconditionally Anonymous Ring and Mesh Signatures. J. Cryptol. 29(4): 729-774 (2016) - [c53]Xavier Boyen, Qinyi Li:
Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions. ACNS 2016: 267-284 - [c52]Thomas Haines, Xavier Boyen:
VOTOR: conceptually simple remote voting against tiny tyrants. ACSW 2016: 32 - [c51]Xavier Boyen, Qinyi Li:
Towards Tightly Secure Lattice Short Signature and Id-Based Encryption. ASIACRYPT (2) 2016: 404-434 - [c50]Xavier Boyen:
The Case For Human Primacy in Cryptography - (Summary from the Keynote Lecture). Mycrypt 2016: 3-10 - [c49]Colin Boyd, Xavier Boyen, Christopher Carr, Thomas Haines:
Key Recovery: Inert and Public. Mycrypt 2016: 111-126 - [c48]Thomas Haines, Xavier Boyen:
Truly Multi-authority 'Prêt-à-Voter'. E-VOTE-ID 2016: 56-72 - [i24]Le Trieu Phong, Lihua Wang, Yoshinori Aono, Manh Ha Nguyen, Xavier Boyen:
Proxy Re-Encryption Schemes with Key Privacy from LWE. IACR Cryptol. ePrint Arch. 2016: 327 (2016) - [i23]Xavier Boyen, Qinyi Li:
Towards Tightly Secure Short Signature and IBE. IACR Cryptol. ePrint Arch. 2016: 498 (2016) - [i22]Xavier Boyen, Christopher Carr, Thomas Haines:
Blockchain-Free Cryptocurrencies. A Rational Framework for Truly Decentralised Fast Transactions. IACR Cryptol. ePrint Arch. 2016: 871 (2016) - 2015
- [c47]Dhaval Vyas, Stephen Snow, Margot Brereton, Uwe Dulleck, Xavier Boyen:
Being Thrifty on a $100K Wage: Austerity in Family Finances. CSCW Companion 2015: 167-170 - [c46]Xavier Boyen, Qinyi Li:
Attribute-Based Encryption for Finite Automata from LWE. ProvSec 2015: 247-267 - 2014
- [c45]Carlos Aguilar Melchor, Xavier Boyen, Jean-Christophe Deneuville, Philippe Gaborit:
Sealing the Leak on Classical NTRU Signatures. PQCrypto 2014: 1-21 - [i21]Carlos Aguilar Melchor, Xavier Boyen, Jean-Christophe Deneuville, Philippe Gaborit:
Sealing the Leak on Classical NTRU signatures. IACR Cryptol. ePrint Arch. 2014: 484 (2014) - [i20]Xavier Boyen, Xiong Fan, Elaine Shi:
Adaptively Secure Fully Homomorphic Signatures Based on Lattices. IACR Cryptol. ePrint Arch. 2014: 916 (2014) - 2013
- [c44]Xavier Boyen:
Expressive Cryptography: Lattice Perspectives. ACISP 2013: 267 - [c43]Carlos Aguilar Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit:
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting. AFRICACRYPT 2013: 1-25 - [c42]Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang:
Key-Private Proxy Re-encryption under LWE. INDOCRYPT 2013: 1-18 - [c41]Xavier Boyen:
Attribute-Based Functional Encryption on Lattices. TCC 2013: 122-142 - [i19]Xavier Boyen, Nir Friedman, Daphne Koller:
Discovering the Hidden Structure of Complex Dynamic Systems. CoRR abs/1301.6683 (2013) - [i18]Xavier Boyen, Daphne Koller:
Tractable Inference for Complex Stochastic Processes. CoRR abs/1301.7362 (2013) - [i17]Carlos Aguilar Melchor, Slim Bettaieb, Xavier Boyen, Laurent Fousse, Philippe Gaborit:
Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting. IACR Cryptol. ePrint Arch. 2013: 281 (2013) - 2012
- [c40]Simon Barber, Xavier Boyen, Elaine Shi, Ersin Uzun:
Bitter to Better - How to Make Bitcoin a Better Currency. Financial Cryptography 2012: 399-414 - [c39]Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee:
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices. Public Key Cryptography 2012: 280-297 - [i16]Xavier Boyen:
Attribute-Based Functional Encryption on Lattices. IACR Cryptol. ePrint Arch. 2012: 716 (2012) - 2011
- [j4]Dan Boneh, Xavier Boyen:
Efficient Selective Identity-Based Encryption Without Random Oracles. J. Cryptol. 24(4): 659-693 (2011) - [c38]Xavier Boyen:
Expressive Encryption Systems from Lattices - (Abstract from the Invited Lecture). CANS 2011: 1-12 - [e1]Xavier Boyen, Xiaofeng Chen:
Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings. Lecture Notes in Computer Science 6980, Springer 2011, ISBN 978-3-642-24315-8 [contents] - [i15]Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee:
Fuzzy Identity Based Encryption from Lattices. IACR Cryptol. ePrint Arch. 2011: 414 (2011) - 2010
- [c37]Xavier Boyen, Brent Waters:
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions. ACNS 2010: 35-52 - [c36]Xavier Boyen, Céline Chevalier, Georg Fuchsbauer, David Pointcheval:
Strong Cryptography from Weak Secrets. AFRICACRYPT 2010: 297-315 - [c35]Shweta Agrawal, Dan Boneh, Xavier Boyen:
Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE. CRYPTO 2010: 98-115 - [c34]Hristo Bojinov, Elie Bursztein, Xavier Boyen, Dan Boneh:
Kamouflage: Loss-Resistant Password Management. ESORICS 2010: 286-302 - [c33]Shweta Agrawal, Dan Boneh, Xavier Boyen:
Efficient Lattice (H)IBE in the Standard Model. EUROCRYPT 2010: 553-572 - [c32]Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman:
Preventing Pollution Attacks in Multi-source Network Coding. Public Key Cryptography 2010: 161-176 - [c31]Xavier Boyen:
Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More. Public Key Cryptography 2010: 499-517 - [p3]Xavier Boyen:
Identity-Based Signcryption. Practical Signcryption 2010: 195-216 - [i14]Shweta Agrawal, Dan Boneh, Xavier Boyen, David Mandell Freeman:
Preventing Pollution Attacks in Multi-Source Network Coding. IACR Cryptol. ePrint Arch. 2010: 183 (2010)
2000 – 2009
- 2009
- [c30]Xavier Boyen:
HPAKE : Password Authentication Secure against Cross-Site User Impersonation. CANS 2009: 279-298 - [c29]Xavier Boyen:
Hidden credential retrieval from a reusable password. AsiaCCS 2009: 228-238 - [c28]Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval:
Distributed Public-Key Cryptography from Weak Secrets. Public Key Cryptography 2009: 139-159 - [p2]Xavier Boyen:
Flexible IBE and Beyond in the Commutative-Blinding Framework. Identity-Based Cryptography 2009: 65-82 - [p1]Xavier Boyen:
Generalized IBE in the Exponent-Inversion Framework. Identity-Based Cryptography 2009: 83-99 - 2008
- [j3]Xavier Boyen:
A tapestry of identity-based encryption: practical frameworks compared. Int. J. Appl. Cryptogr. 1(1): 3-21 (2008) - [j2]Dan Boneh, Xavier Boyen:
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. J. Cryptol. 21(2): 149-177 (2008) - [c27]Xavier Boyen:
New Paradigms for Password Security. ACISP 2008: 1-5 - [c26]Xavier Boyen:
The Uber-Assumption Family. Pairing 2008: 39-56 - [c25]Xavier Boyen, Cécile Delerablée:
Expressive Subgroup Signatures. SCN 2008: 185-200 - 2007
- [c24]Xavier Boyen:
Miniature CCA2 PK Encryption: Tight Security Without Redundancy. ASIACRYPT 2007: 485-501 - [c23]Xavier Boyen:
Mesh Signatures. EUROCRYPT 2007: 210-227 - [c22]Xavier Boyen:
General Ad Hoc Encryption from Exponent Inversion IBE. EUROCRYPT 2007: 394-411 - [c21]Xavier Boyen, Brent Waters:
Full-Domain Subgroup Hiding and Constant-Size Group Signatures. Public Key Cryptography 2007: 1-15 - [c20]Xavier Boyen:
Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys. USENIX Security Symposium 2007 - [i13]Xavier Boyen:
Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants. IACR Cryptol. ePrint Arch. 2007: 94 (2007) - [i12]Xavier Boyen, Luther Martin:
Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems. RFC 5091: 1-63 (2007) - 2006
- [c19]Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters:
Forward-secure signatures with untrusted update. CCS 2006: 191-200 - [c18]Xavier Boyen, Brent Waters:
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). CRYPTO 2006: 290-307 - [c17]Dan Boneh, Xavier Boyen:
On the Impossibility of Efficiently Combining Collision Resistant Hash Functions. CRYPTO 2006: 570-583 - [c16]Dan Boneh, Xavier Boyen, Shai Halevi:
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. CT-RSA 2006: 226-243 - [c15]Xavier Boyen, Brent Waters:
Compact Group Signatures Without Random Oracles. EUROCRYPT 2006: 427-444 - [c14]Xavier Boyen:
A Promenade through the New Cryptography of Bilinear Pairings. ITW 2006: 19-23 - [i11]Xavier Boyen, Brent Waters:
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). IACR Cryptol. ePrint Arch. 2006: 85 (2006) - [i10]Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters:
Forward-Secure Signatures with Untrusted Update. IACR Cryptol. ePrint Arch. 2006: 297 (2006) - 2005
- [c13]Xavier Boyen, Qixiang Mei, Brent Waters:
Direct chosen ciphertext security from identity-based techniques. CCS 2005: 320-329 - [c12]Xavier Boyen, Yevgeniy Dodis, Jonathan Katz, Rafail Ostrovsky, Adam D. Smith:
Secure Remote Authentication Using Biometric Data. EUROCRYPT 2005: 147-163 - [c11]Dan Boneh, Xavier Boyen, Eu-Jin Goh:
Hierarchical Identity Based Encryption with Constant Size Ciphertext. EUROCRYPT 2005: 440-456 - [i9]Dan Boneh, Xavier Boyen, Eu-Jin Goh:
Hierarchical Identity Based Encryption with Constant Size Ciphertext. IACR Cryptol. ePrint Arch. 2005: 15 (2005) - [i8]Xavier Boyen, Qixiang Mei, Brent Waters:
Direct Chosen Ciphertext Security from Identity-Based Techniques. IACR Cryptol. ePrint Arch. 2005: 288 (2005) - [i7]Xavier Boyen, Brent Waters:
Compact Group Signatures Without Random Oracles. IACR Cryptol. ePrint Arch. 2005: 381 (2005) - 2004
- [c10]Xavier Boyen:
Reusable cryptographic fuzzy extractors. CCS 2004: 82-91 - [c9]Dan Boneh, Xavier Boyen, Hovav Shacham:
Short Group Signatures. CRYPTO 2004: 41-55 - [c8]Dan Boneh, Xavier Boyen:
Secure Identity Based Encryption Without Random Oracles. CRYPTO 2004: 443-459 - [c7]Dan Boneh, Xavier Boyen:
Short Signatures Without Random Oracles. EUROCRYPT 2004: 56-73 - [c6]Dan Boneh, Xavier Boyen:
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles. EUROCRYPT 2004: 223-238 - [i6]Dan Boneh, Xavier Boyen:
Short Signatures Without Random Oracles. IACR Cryptol. ePrint Arch. 2004: 171 (2004) - [i5]Dan Boneh, Xavier Boyen:
Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles. IACR Cryptol. ePrint Arch. 2004: 172 (2004) - [i4]Dan Boneh, Xavier Boyen:
Secure Identity Based Encryption Without Random Oracles. IACR Cryptol. ePrint Arch. 2004: 173 (2004) - [i3]Dan Boneh, Xavier Boyen, Hovav Shacham:
Short Group Signatures. IACR Cryptol. ePrint Arch. 2004: 174 (2004) - [i2]Xavier Boyen:
Reusable Cryptographic Fuzzy Extractors. IACR Cryptol. ePrint Arch. 2004: 358 (2004) - 2003
- [c5]Xavier Boyen:
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). CRYPTO 2003: 383-399 - [i1]Xavier Boyen:
Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography. IACR Cryptol. ePrint Arch. 2003: 163 (2003) - 2002
- [b1]Xavier Boyen:
Inference and learning in complex stochastic processes. Stanford University, USA, 2002
1990 – 1999
- 1999
- [j1]Xavier Boyen, Louis Wehenkel:
Automatic induction of fuzzy decision trees and its application to power system security assessment. Fuzzy Sets Syst. 102(1): 3-19 (1999) - [c4]Xavier Boyen, Daphne Koller:
Exploiting the Architecture of Dynamic Systems. AAAI/IAAI 1999: 313-320 - [c3]Xavier Boyen, Nir Friedman, Daphne Koller:
Discovering the Hidden Structure of Complex Dynamic Systems. UAI 1999: 91-100 - 1998
- [c2]Xavier Boyen, Daphne Koller:
Approximate Learning of Dynamic Models. NIPS 1998: 396-402 - [c1]Xavier Boyen, Daphne Koller:
Tractable Inference for Complex Stochastic Processes. UAI 1998: 33-42
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint