


default search action
Toshiaki Tanaka
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Itaru Kurihara
, Jun Kurihara
, Toshiaki Tanaka
:
A New Security Measure in Secret Sharing Schemes and Secure Network Coding. IEEE Access 12: 69163-69171 (2024) - [c49]Emiko Uchiyama, Wataru Takano, Yoshihiko Nakamura, Takahiro Miura, Shujirou Imaeda, Toshiaki Tanaka:
Head Shaking Test and Its Validity Considering from the Point of View of Muscle Activities. EMBC 2024: 1-4 - [c48]Tomoaki Mimoto, Yuta Gempei, Kentaro Kita, Takamasa Isohara, Shinsaku Kiyomoto, Toshiaki Tanaka:
Linkage Between CVE and ATT&CK with Public Information. SECRYPT 2024: 655-660 - 2023
- [j41]Jun Kurihara
, Toshiaki Tanaka, Takeshi Kubo:
μODNS: A distributed approach to DNS anonymization with collusion resistance. Comput. Networks 237: 110078 (2023) - [c47]Takahiro Miura, Emiko Uchiyama, Shujirou Imaeda, Wataru Takano, Yuka Sumikawa, Toshiaki Tanaka, Toshio Otsuki:
Augmented Reality (AR) Application Superimposing the Falling Risks of Older Adults in Residential Settings and Coping Strategies: Building an Image-Based Scene Detection Model. HCI (49) 2023: 117-124
2010 – 2019
- 2016
- [c46]Norio Kato, Toshiaki Tanaka
, Shunichi Sugihara, Koichi Shimizu
, Nobuki Kudo:
Trial operation of a cloud service-based three-dimensional virtual reality tele-rehabilitation system for stroke patients. ICCSE 2016: 285-290 - 2015
- [j40]Yoshiyuki Sakamaki, Toshiaki Tanaka, Hisashi Yamada, Toshio Sugihara:
Design of Elevator-Group Control System to Save Energy Consumption by Dynamically Controlling the Number of Running Cars. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(2): 612-617 (2015) - 2014
- [j39]Yuto Nakano, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai:
Fast Implementation of KCipher-2 for Software and Hardware. IEICE Trans. Inf. Syst. 97-D(1): 43-52 (2014) - [j38]Toshiaki Tanaka:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 117 (2014) - 2013
- [j37]Atsushi Imai, Naoyuki Tazawa, Tohru Takagi, Toshiaki Tanaka
, Tohru Ifukube:
A new touchscreen application to retrieve speech information efficiently. IEEE Trans. Consumer Electron. 59(1): 200-206 (2013) - [c45]Shunichi Sugihara, Toshiaki Tanaka
, Tomoya Miyasaka, Takashi Izumi, Koichi Shimizu
:
Assessment of visual space recognition in patients with visual field defects using head mounted display (HMD) system: Case study with severe visual field defect. EMBC 2013: 6929-6932 - [c44]Shunichi Sugihara, Toshiaki Tanaka
, Tomoya Miyasaka, Takashi Izumi, Koichi Shimizu
:
Assessment of visual space recognition in patients with unilateral spatial neglect using head mounted display (HMD) system: Case study with left unilateral spatial neglect. SII 2013: 712-716 - 2012
- [c43]Kunihiko Hiraishi, Sunseong Choe, Kentaro Torii, Naoshi Uchihira
, Toshiaki Tanaka:
Modeling of complex processes in nursing and caregiving services. SMC 2012: 1449-1454 - [c42]Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka:
On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters. TrustCom 2012: 1755-1762 - 2011
- [j36]Tomoshi Otsuki, Hideyuki Aisu, Toshiaki Tanaka:
A Search-Based Approach to Railway Rolling Stock Allocation Problems. Discret. Math. Algorithms Appl. 3(4): 443-456 (2011) - [c41]Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka:
Privacy Frost: A User-Oriented Data Anonymization Tool. ARES 2011: 442-447 - [c40]Masaki Inamura, Keiichi Iwamura, Ryu Watanabe, Makoto Nishikawa, Toshiaki Tanaka:
A New Tree-structure-specified Multisignature Scheme for a Document Circulation System. SECRYPT 2011: 362-369 - 2010
- [j35]Kazuhide Fukushima
, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Improved Subset Difference Method with Ternary Tree. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 2034-2044 (2010) - [j34]Ryu Watanabe, Toshiaki Tanaka:
A secure coverage area expansion scheme for public wireless LAN services. Int. J. Inf. Technol. Manag. 9(4): 389-403 (2010) - [c39]Matthew Henricksen, Wun-She Yap
, Chee Hoo Yian, Shinsaku Kiyomoto, Toshiaki Tanaka:
Side-Channel Analysis of the K2 Stream Cipher. ACISP 2010: 53-73 - [c38]Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka:
Security Verification for Authentication and Key Exchange Protocols, Revisited. AINA Workshops 2010: 226-233 - [c37]Tomoshi Otsuki, Hideyuki Aisu, Toshiaki Tanaka:
A Search-Based Approach to the Railway Rolling Stock Allocation Problem. COCOA (2) 2010: 131-143 - [c36]Ryu Watanabe, Yuto Nakano, Toshiaki Tanaka:
Single Sign-on Techniques with PKI-based Authentication for Mobile Phones. Security and Management 2010: 152-156 - [c35]Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework. Security and Management 2010: 323-329 - [c34]Shinsaku Kiyomoto, Toshiaki Tanaka:
A User-Oriented Anonymization Mechanism for Public Data. DPM/SETOP 2010: 22-35 - [c33]Yuto Nakano, Jun Kurihara
, Shinsaku Kiyomoto, Toshiaki Tanaka:
Stream Cipher-Based Hash Function and Its Security. ICETE (Selected Papers) 2010: 188-202 - [c32]Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima
, Toshiaki Tanaka, Tsuyoshi Takagi:
Efficient Implementation of Pairing on BREW Mobile Phones. IWSEC 2010: 326-336 - [c31]Haruki Ota, Ryu Watanabe, Koichi Ito, Toshiaki Tanaka, Takafumi Aoki:
Implementation of remote system using touchless palmprint recognition algorithm. MoMM 2010: 33-41 - [c30]Wook Shin, Sanghoon Kwak, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Small But Non-negligible Flaw in the Android Permission Scheme. POLICY 2010: 107-110 - [c29]Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka:
On a Construction of Stream-cipher-based Hash Functions. SECRYPT 2010: 334-343 - [c28]Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima
, Toshiaki Tanaka:
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework. SocialCom/PASSAT 2010: 944-951
2000 – 2009
- 2009
- [j33]Shinsaku Kiyomoto, Kazuhide Fukushima
, Toshiaki Tanaka:
Design of Anonymous Attribute Authentication Mechanism. IEICE Trans. Commun. 92-B(4): 1112-1118 (2009) - [j32]Jun Kurihara
, Shinsaku Kiyomoto, Kazuhide Fukushima
, Toshiaki Tanaka:
A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1808-1821 (2009) - [c27]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
Obfuscation Mechanism in Conjunction with Tamper-Proof Module. CSE (2) 2009: 665-670 - [c26]Ryu Watanabe, Toshiaki Tanaka:
Denial of Service Attack Resilience on Area Expanded WLAN Services. Security and Management 2009: 258-264 - [c25]Ryu Watanabe, Toshiaki Tanaka:
Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenID. ITNG 2009: 435-442 - [c24]Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima
, Toshiaki Tanaka:
How to Bootstrap Security for Ad-Hoc Network: Revisited. SEC 2009: 119-131 - [c23]Toshiyuki Fujisawa, Masaki Inamura, Toshiaki Tanaka:
Anonymous handover mechanism for service mobility in heterogeneous wireless networks. WCNC 2009: 2726-2731 - 2008
- [j31]Jun Kurihara
, Shinsaku Kiyomoto, Kazuhide Fukushima
, Toshiaki Tanaka:
A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 127-138 (2008) - [j30]Kazuhide Fukushima
, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Analysis of Program Obfuscation Schemes with Variable Encoding Technique. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 316-329 (2008) - [j29]Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW. IEICE Trans. Inf. Syst. 91-D(5): 1330-1337 (2008) - [j28]Jun Kurihara
, Shinsaku Kiyomoto, Kazuhide Fukushima
, Toshiaki Tanaka:
On a Fast (k, n)-Threshold Secret Sharing Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2365-2378 (2008) - [j27]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism. Inf. Media Technol. 3(4): 788-799 (2008) - [j26]Kazuhide Fukushima
, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism. J. Inf. Process. 16: 130-141 (2008) - [c22]Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka:
On-the-Fly Automatic Generation of Security Protocols. ICEIS (3-2) 2008: 97-104 - [c21]Shinsaku Kiyomoto, Toshiaki Tanaka:
Anonymous attribute authentication scheme using self-blindable certificates. ISI 2008: 215-217 - [c20]Jun Kurihara
, Shinsaku Kiyomoto, Kazuhide Fukushima
, Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. ISC 2008: 455-470 - [c19]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
FPGA-Targeted Hardware Implementations of K2. SECRYPT 2008: 270-277 - [c18]Kazuhide Fukushima
, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Ternary Subset Difference Method and Its Quantitative Analysis. WISA 2008: 225-239 - [i4]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. IACR Cryptol. ePrint Arch. 2008: 409 (2008) - 2007
- [j25]Younes Noorollahi
, Ryuichi Itoi, Hikari Fujii
, Toshiaki Tanaka:
GIS model for geothermal resource exploration in Akita and Iwate prefectures, northern Japan. Comput. Geosci. 33(8): 1008-1021 (2007) - [j24]Haruki Ota, Kazuki Yoneyama, Shinsaku Kiyomoto, Toshiaki Tanaka, Kazuo Ohta:
Universally Composable Hierarchical Hybrid Authenticated Key Exchange. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 139-151 (2007) - [j23]Shinsaku Kiyomoto, Kazuhide Fukushima
, Toshiaki Tanaka, Kouichi Sakurai:
On Effectiveness of Clock Control in Stream Ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1780-1787 (2007) - [j22]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
Design of τ-Gradual Key-Management Schemes for Mobile Content Distribution. Inf. Media Technol. 2(1): 356-367 (2007) - [j21]Haruki Ota, Kazuki Yoneyama, Shinsaku Kiyomoto, Toshiaki Tanaka, Kazuo Ohta:
Universally Composable Client-to-Client General Authenticated Key Exchange. Inf. Media Technol. 2(4): 1022-1037 (2007) - [j20]Shinsaku Kiyomoto, Toshiaki Tanaka, Yutaka Miyake, Yoshinori Mitamura:
Development of security functions for a medical information sharing platform. Syst. Comput. Jpn. 38(11): 49-63 (2007) - [c17]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
K2 Stream Cipher. ICETE (Selected Papers) 2007: 214-226 - [c16]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
K2: A Stream Cipher Algorithm using Dynamic Feedback Control. SECRYPT 2007: 204-213 - [c15]Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura, Masaki Inamura, Toshiaki Tanaka:
Anonymous Prepaid Content Viewing System with Mobile Terminal. SECRYPT 2007: 281-288 - [c14]Masaki Inamura, Toshiaki Tanaka:
Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy. SECRYPT 2007: 427-432 - [c13]Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW. WISA 2007: 203-214 - [i3]Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones using BREW. IACR Cryptol. ePrint Arch. 2007: 340 (2007) - 2006
- [j19]Shinsaku Kiyomoto, Toshiaki Tanaka:
Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 222-226 (2006) - [j18]Ayumu Kubota, Yutaka Miyake, Toshiaki Tanaka:
Secure Host Name Resolution Infrastructure for Overlay Networks. IEICE Trans. Commun. 89-B(9): 2434-2439 (2006) - [j17]Satoshi Hada, Toshiaki Tanaka:
Zero-Knowledge and Correlation Intractability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(10): 2894-2905 (2006) - [j16]Shinsaku Kiyomoto, Toshiaki Tanaka, Mariko Yoshida, Masahiro Kuroda:
Design of Self-Delegation for Mobile Terminals. Inf. Media Technol. 1(1): 594-605 (2006) - [j15]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
An Obfuscation Scheme Using Affine Transformation and Its Implementation. Inf. Media Technol. 1(2): 1094-1108 (2006) - [c12]Kazuhide Fukushima
, Shinsaku Kiyomoto, Toshiaki Tanaka:
Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services. MDM 2006: 17 - [c11]Masaki Inamura, Toshiaki Tanaka, Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura:
Flexible License Transfer System Using Mobile Terminal. SECRYPT 2006: 397-404 - 2005
- [j14]Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka:
Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 287-295 (2005) - [j13]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(10): 2778-2791 (2005) - [c10]Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka:
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. ITCC (1) 2005: 650-655 - 2004
- [j12]Akira Yamada, Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao:
New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 182-189 (2004) - [j11]Masahiro Kuroda, Mariko Yoshida, Ryoji Ono, Shinsaku Kiyomoto, Toshiaki Tanaka:
Secure Service and Network Framework for Mobile Ethernet. Wirel. Pers. Commun. 29(3-4): 161-190 (2004) - [c9]Kenji Rikitake, Hiroki Nogawa, Toshiaki Tanaka, Koji Nakao, Shinji Shimojo:
DNS Transport Size Issues in IPv6 Environment. SAINT Workshops 2004: 141-145 - 2003
- [j10]Shinsuke Tamura, Toshibumi Seki, Tetsuo Hasegawa, Toshiaki Tanaka:
Toward the Practical Uses of Holonic Manufacturing Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(11): 2722-2730 (2003) - [j9]Naoki Imasaki, Ambalavanar Tharumarajah, Shinsuke Tamura, Toshiaki Tanaka:
Distributed Self-Simulation Framework for Holonic Manufacturing Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(11): 2767-2774 (2003) - [j8]Tokio Taga, Toshiaki Tanaka:
Delay spread reduction effect of beam antenna and adaptively controlled beam facing access system in urban line-of-sight street microcells. IEEE Trans. Veh. Technol. 52(4): 761-771 (2003) - 2001
- [j7]Takeshi Tsuruga, Shuichi Ino, Tohru Ifukube, Mitsuru Sato, Toshiaki Tanaka
, Takashi Izumi, Masahiko Muro:
A basic study for a robotic transfer aid system based on human motion analysis. Adv. Robotics 14(7): 579-595 (2001) - [j6]Naoto Matoba, Yasushi Kondo, Hiroyuki Ohtsuka, Toshiaki Tanaka:
Performance evaluation of 32 kbits/s real-time and dual-direction video communication system for wireless channels. IEEE Trans. Circuits Syst. Video Technol. 11(5): 664-672 (2001)
1990 – 1999
- 1999
- [j5]Hitoshi Takanashi, Toshiaki Tanaka, Tomoyoshi Oono, Hideo Matsuki, Takeshi Hattori:
High-Quality and High-Speed Wireless Multimedia Transmission Technology for Personal Handy Phone System. Wirel. Pers. Commun. 9(3): 255-270 (1999) - [c8]Hiroyuki Ohtsuka, Tomoyoshi Oono, Yasushi Kondo, Osamu Nakamura, Toshiaki Tanaka:
Potential wireless technologies in mobile communications. ICC 1999: 1121-1125 - [c7]Satoshi Hada, Toshiaki Tanaka:
A Relationship between One-Wayness and Correlation Intractability. Public Key Cryptography 1999: 82-96 - [i2]Satoshi Hada, Toshiaki Tanaka:
On the Existence of 3-Round Zero-Knowledge Protocols. IACR Cryptol. ePrint Arch. 1999: 9 (1999) - [i1]Satoshi Hada, Toshiaki Tanaka:
A Relationship between One-Wayness and Correlation Intractability. IACR Cryptol. ePrint Arch. 1999: 10 (1999) - 1998
- [c6]Satoshi Hada, Toshiaki Tanaka:
On the Existence of 3-Round Zero-Knowledge Protocols. CRYPTO 1998: 408-423 - [c5]Naoto Matoba, Yasushi Kondo, Toshiaki Tanaka:
Performance of real-time video transmission using error control over Rayleigh and Rician fading channels. PIMRC 1998: 1061-1065 - 1997
- [c4]Yasushi Kondo, Toshiaki Tanaka:
Video transmission performance with adaptive time diversity over PHS channels. PIMRC 1997: 1054-1058 - 1996
- [c3]Masaki Yamashina, Takeshi Tanda, Toshiaki Tanaka:
Image transmission control over fading channel using SR-ARQ based on DCT frequency and image frame structure. PIMRC 1996: 948-952 - 1995
- [c2]Hitoshi Takanashi, Toshiaki Tanaka:
Dynamic micro-cell assignment technique with distributed control scheme. PIMRC 1995: 567-571 - 1994
- [j4]Koji Nakao, Toshiaki Tanaka, Kenji Suzuki, Yoshiyori Urano:
Implementation and evaluation of SCSE for OSI secure communications. Syst. Comput. Jpn. 25(9): 17-31 (1994) - 1993
- [j3]Toshiaki Tanaka, Miki Yamada:
The Characteristics of the Convergence Time of Associative Neural Networks. Neural Comput. 5(3): 463-472 (1993) - [c1]Toshiaki Tanaka, Miki Yamada:
A new associative memory which inhibits a meaningless output. ICNN 1993: 1057-1062 - 1990
- [j2]Koji Nakao, Sadao Obana, Satoshi Nishiyama, Toshiaki Tanaka:
Feasibility Study for Worldwide Videotex Interworking. IEEE J. Sel. Areas Commun. 8(1): 80-92 (1990)
1980 – 1989
- 1989
- [j1]Toshiaki Tanaka, Tsutomu Kobayashi, Osamu Karatsu:
HARP: FORTRAN to silicon [compilation system]. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 8(6): 649-660 (1989)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 20:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint