default search action
Dheerendra Mishra
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j81]Girraj Kumar Verma, Vinay Chamola, Asheesh Tiwari, Neeraj Kumar, Dheerendra Mishra, Saurabh Rana, Ahmed Barnawi:
Escrow-free and efficient dynamic anonymous privacy-preserving batch verifiable authentication scheme for VANETs. Ad Hoc Networks 166: 103670 (2025) - [j80]Dheerendra Mishra, Komal Pursharthi, Mrityunjay Singh, Ankita Mishra:
Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems. Int. J. Inf. Sec. 24(1): 19 (2025) - 2024
- [j79]Girraj Kumar Verma, Vinay Chamola, Neeraj Kumar, Ashok Kumar Das, Dheerendra Mishra:
Efficient and secure signcryption-based data aggregation for Internet of Drone-based drone-to-ground station communication. Ad Hoc Networks 159: 103502 (2024) - [j78]Komal Pursharthi, Dheerendra Mishra:
A computationally efficient and randomized RLWE-based key exchange scheme. Clust. Comput. 27(2): 1599-1610 (2024) - [j77]Dharminder Chaudhary, M. S. P. Durgarao, Dheerendra Mishra, Saru Kumari:
A module lattice based construction of post quantum secure blockchain architecture. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j76]Dheerendra Mishra, Purva Rewal, Komal Pursharthi:
Efficient and quantum-secure authenticated key exchange scheme for mobile satellite communication networks. Int. J. Satell. Commun. Netw. 42(4): 313-328 (2024) - [j75]Komal Pursharthi, Dheerendra Mishra:
Towards post-quantum authenticated key agreement scheme for mobile devices. J. Inf. Secur. Appl. 82: 103754 (2024) - [j74]Purva Rewal, Komal Pursharthi, Dheerendra Mishra:
Quantum-secure content key delivery mechanism for DRM system. Multim. Tools Appl. 83(35): 82679-82697 (2024) - [j73]Ankita Mishra, Mohammad S. Obaidat, Dheerendra Mishra:
Privacy preserving content distribution framework for multidistributor DRM systems. Secur. Priv. 7(1) (2024) - [j72]Dheerendra Mishra, Komal Pursharthi:
Cryptanalysis with improvement on lattice-based authenticated key exchange protocol for mobile satellite communication networks. Secur. Priv. 7(5) (2024) - [j71]Komal Pursharthi, Dheerendra Mishra:
Post-quantum framework for authorized and secure communication in multi-server networking. Telecommun. Syst. 87(2): 403-418 (2024) - 2023
- [j70]Dheerendra Mishra, Saurabh Rana, Chirag Goyal, Gagandeep Singh:
FOESG: anonymous session key agreement protocol for fog assisted smart grid communication. Int. J. Ad Hoc Ubiquitous Comput. 42(3): 137-147 (2023) - [j69]Dharminder Dharminder, Dheerendra Mishra:
PSMECS: A provably secure ID-based communication in mobile edge computing. Int. J. Commun. Syst. 36(12) (2023) - [j68]Purva Rewal, Mrityunjay Singh, Dheerendra Mishra, Komal Pursharthi, Ankita Mishra:
Quantum-safe three-party lattice based authenticated key agreement protocol for mobile devices. J. Inf. Secur. Appl. 75: 103505 (2023) - [j67]Dharminder Dharminder, Pradeep Kumar Dadsena, Dheerendra Mishra:
Construction of system friendly attribute based fully distributed access control architecture for e-healthcare. Multim. Tools Appl. 82(17): 26937-26953 (2023) - [j66]Purva Rewal, Dheerendra Mishra, Ankita Mishra, Saurabh Rana:
Enhancing security of biometrics based authentication framework for DRM system. Multim. Tools Appl. 82(26): 40857-40871 (2023) - [j65]Bshisht Moony, Amit K. Barnwal, Mrityunjay Singh, Dheerendra Mishra:
Quantum secure two party authentication protocol for mobile devices. Peer Peer Netw. Appl. 16(5): 2548-2559 (2023) - [j64]Shanil Sharma, Dheerendra Mishra, Saurabh Rana:
A privacy oriented authorized key agreement framework for vehicular edge computing. Secur. Priv. 6(1) (2023) - [j63]Komal Pursharthi, Dheerendra Mishra:
On the security of ring learning with error-based key exchange protocol against signal leakage attack. Secur. Priv. 6(5) (2023) - [j62]Mrityunjay Singh, Dheerendra Mishra:
Post-quantum secure authenticated key agreement protocol for wireless sensor networks. Telecommun. Syst. 84(1): 101-113 (2023) - [j61]Dheerendra Mishra, Mrityunjay Singh, Purva Rewal, Komal Pursharthi, Neeraj Kumar, Ahmed Barnawi, Rajkumar Singh Rathore:
Quantum-Safe Secure and Authorized Communication Protocol for Internet of Drones. IEEE Trans. Veh. Technol. 72(12): 16499-16507 (2023) - [j60]Deepak Chhikara, Saurabh Rana, Gyaneshwar Singh, Dheerendra Mishra, Neeraj Kumar:
Blockchain-Based Partial Group Key Agreement Protocol for Intelligent Transportation Systems. IEEE Trans. Veh. Technol. 72(12): 16701-16710 (2023) - [j59]Dheerendra Mishra, Komal Pursharthi, Purva Rewal:
Development of quantum-enhanced authenticated key agreement protocol for autonomous vehicles. Veh. Commun. 44: 100688 (2023) - [j58]Saurabh Rana, Dheerendra Mishra, Chhagan Lal, Mauro Conti:
Authenticated Message-Exchange Protocol for Fog-Assisted Vehicular Cloud Computing. Wirel. Pers. Commun. 131(2): 1295-1312 (2023) - [j57]Purva Rewal, Dheerendra Mishra:
Comparative Analysis of Handover Authentication Techniques in VANETs. Wirel. Pers. Commun. 132(4): 2487-2506 (2023) - [c18]Komal Pursharthi, Dheerendra Mishra:
Cryptanalysis with Countermeasure on the SIS Based Signature Scheme. SPACE 2023: 92-100 - 2022
- [j56]Deepak Chhikara, Saurabh Rana, Ankita Mishra, Dheerendra Mishra:
Blockchain-driven authorized data access mechanism for digital healthcare. J. Syst. Archit. 131: 102714 (2022) - [j55]Deepak Chhikara, Saurabh Rana, Ankita Mishra, Dheerendra Mishra:
Construction of elliptic curve cryptography-based authentication protocol for internet of things. Secur. Priv. 5(4) (2022) - [j54]Dharminder Dharminder, Dheerendra Mishra, Joel J. P. C. Rodrigues, Ricardo de A. L. Rabelo, Kashif Saleem:
PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments. Softw. Pract. Exp. 52(3): 744-755 (2022) - [j53]Aman Ahmad Ansari, Bharavi Mishra, Poonam Gera, Muhammad Khurram Khan, Chinmay Chakraborty, Dheerendra Mishra:
Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry. IEEE Trans. Ind. Informatics 18(11): 8316-8325 (2022) - [j52]Saurabh Rana, Mohammad S. Obaidat, Dheerendra Mishra, Ankita Mishra, Y. Sreenivasa Rao:
Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems. J. Supercomput. 78(3): 3696-3714 (2022) - [c17]Abhijit Kasi, Mohammad S. Obaidat, Purva Rewal, Dheerendra Mishra, Kuei-Fang Hsiao:
On the security of authenticated key agreement schemes for e-healthcare. CCCI 2022: 1-6 - [c16]Purva Rewal, Abhijit Kasi, Mohammad S. Obaidat, Dheerendra Mishra, Ankita Mishra, Kuei-Fang Hsiao:
On the Security of Content key Distribution Framework for DRM systems. CCCI 2022: 1-7 - 2021
- [j51]Saurabh Rana, Dheerendra Mishra:
Provably secure authenticated content key distribution framework for IoT-enabled enterprise digital rights management systems. Int. J. Ad Hoc Ubiquitous Comput. 36(3): 131-140 (2021) - [j50]Nibedita Kundu, Sumit Kumar Debnath, Dheerendra Mishra:
A secure and efficient group signature scheme based on multivariate public key cryptography. J. Inf. Secur. Appl. 58: 102776 (2021) - [j49]Dheerendra Mishra, Saurabh Rana:
A provably secure content distribution framework for portable DRM systems. J. Inf. Secur. Appl. 61: 102928 (2021) - [j48]Dharminder Dharminder, Nibedita Kundu, Dheerendra Mishra:
Construction of a Chaotic Map-Based Authentication Protocol for TMIS. J. Medical Syst. 45(8): 77 (2021) - [j47]Saurabh Rana, Dheerendra Mishra:
An authenticated access control framework for digital right management system. Multim. Tools Appl. 80(16): 25255-25270 (2021) - [j46]Saurabh Rana, Dheerendra Mishra, Sourav Mukhopadhyay:
Blockchain-based multimedia content distribution with the assured system update mechanism. Multim. Tools Appl. 80(19): 29423-29436 (2021) - [j45]Saurabh Rana, Dheerendra Mishra:
Cryptanalysis and improvement of biometric based content distribution framework for digital rights management systems. Secur. Priv. 4(1) (2021) - [j44]Dheerendra Mishra, Mohammad S. Obaidat, Saurabh Rana, Dharminder Dharminder, Ankita Mishra, Balqies Sadoun:
Chaos-Based Content Distribution Framework for Digital Rights Management System. IEEE Syst. J. 15(1): 570-576 (2021) - [j43]Dharminder Dharminder, Mohammad S. Obaidat, Dheerendra Mishra, Ashok Kumar Das:
SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment. IEEE Syst. J. 15(1): 598-606 (2021) - [j42]Saurabh Rana, Mohammad S. Obaidat, Dheerendra Mishra, Sourav Mukhopadhyay, Balqies Sadoun:
Computational Efficient Authenticated Digital Content Distribution Frameworks for DRM Systems: Review and Outlook. IEEE Syst. J. 15(2): 1586-1593 (2021) - [j41]Saurabh Rana, Dheerendra Mishra, Riya Arora:
Privacy-Preserving Key Agreement Protocol for Fog Computing Supported Internet of Things Environment. Wirel. Pers. Commun. 119(1): 727-747 (2021) - [c15]Dheerendra Mishra, Mohammad S. Obaidat, Ankita Mishra:
Privacy Preserving Location-based Content Distribution Framework for Digital Rights Management Systems. CCCI 2021: 1-5 - 2020
- [j40]Dharminder Dharminder, Dheerendra Mishra:
LCPPA: Lattice-based conditional privacy preserving authentication in vehicular communication. Trans. Emerg. Telecommun. Technol. 31(2) (2020) - [j39]Dheerendra Mishra, Saurabh Rana:
Authenticated content distribution framework for digital rights management systems with smart card revocation. Int. J. Commun. Syst. 33(9) (2020) - [j38]Nibedita Kundu, Sumit Kumar Debnath, Dheerendra Mishra, Tanmay Choudhury:
Post-quantum digital signature scheme based on multivariate cubic problem. J. Inf. Secur. Appl. 53: 102512 (2020) - [j37]Dheerendra Mishra, Dharminder Dharminder, Preeti Yadav, Y. Sreenivasa Rao, Pandi Vijayakumar, Neeraj Kumar:
A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party. J. Inf. Secur. Appl. 55: 102648 (2020) - [j36]Dharminder Dharminder, Dheerendra Mishra, Xiong Li:
Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services - Authorized Access to Healthcare Services. J. Medical Syst. 44(1): 6:1-6:9 (2020) - [j35]Saurabh Rana, Dheerendra Mishra:
Efficient and Secure Attribute Based Access Control Architecture for Smart Healthcare. J. Medical Syst. 44(5): 97 (2020) - [j34]Saurabh Rana, Dheerendra Mishra:
Secure and ubiquitous authenticated content distribution framework for IoT enabled DRM system. Multim. Tools Appl. 79(27-28): 20319-20341 (2020) - [j33]Dharminder Dharminder, Dheerendra Mishra:
Understanding signcryption security in standard model. Secur. Priv. 3(3) (2020) - [j32]Vinod Kumar, Musheer Ahmad, Dheerendra Mishra, Saru Kumari, Muhammad Khurram Khan:
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Veh. Commun. 22: 100213 (2020) - [c14]Dharminder Dharminder, Dheerendra Mishra:
Construction of Identity Based Signcryption Using Learning with Rounding. MIND (2) 2020: 612-626
2010 – 2019
- 2019
- [j31]Jangirala Srinivas, Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Vandana Guleria:
An Authentication Framework for Roaming Service in Global Mobility Networks. Inf. Technol. Control. 48(1): 129-145 (2019) - 2018
- [j30]Dheerendra Mishra:
Efficient and secure two-factor dynamic ID-based password authentication scheme with provable security. Cryptologia 42(2): 146-175 (2018) - [j29]Jangirala Srinivas, Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari:
Provably secure biometric based authentication and key agreement protocol for wireless sensor networks. J. Ambient Intell. Humaniz. Comput. 9(4): 875-895 (2018) - [j28]Dheerendra Mishra, Pandi Vijayakumar, Venkatasamy Sureshkumar, Ruhul Amin, SK Hafizul Islam, Prosanta Gope:
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multim. Tools Appl. 77(14): 18295-18325 (2018) - [j27]Dheerendra Mishra, Subhasish Dhal:
Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card. Wirel. Pers. Commun. 99(1): 1-21 (2018) - 2017
- [j26]Jangirala Srinivas, Sourav Mukhopadhyay, Dheerendra Mishra:
Secure and efficient user authentication scheme for multi-gateway wireless sensor networks. Ad Hoc Networks 54: 147-169 (2017) - [j25]Dheerendra Mishra, Saru Kumari, Muhammad Khurram Khan, Sourav Mukhopadhyay:
An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems. Int. J. Commun. Syst. 30(1) (2017) - [j24]Ankita Chaturvedi, Dheerendra Mishra, Srinivas Jangirala, Sourav Mukhopadhyay:
A privacy preserving biometric-based three-factor remote user authenticated key agreement scheme. J. Inf. Secur. Appl. 32: 15-26 (2017) - [j23]Ankita Chaturvedi, Dheerendra Mishra, Sourav Mukhopadhyay:
An enhanced dynamic ID-based authentication scheme for telecare medical information systems. J. King Saud Univ. Comput. Inf. Sci. 29(1): 54-62 (2017) - [j22]Jangirala Srinivas, Dheerendra Mishra, Sourav Mukhopadhyay:
A Mutual Authentication Framework for Wireless Medical Sensor Networks. J. Medical Syst. 41(5): 80:1-80:19 (2017) - [j21]Nishant Doshi, Saru Kumari, Dheerendra Mishra, Xiong Li, Kim-Kwang Raymond Choo, Arun Kumar Sangaiah:
A password based authentication scheme for wireless multimedia systems. Multim. Tools Appl. 76(24): 25893-25918 (2017) - [j20]Chandra Sekhar Vorugunti, Bharavi Mishra, Ruhul Amin, Rakesh P. Badoni, Mrudula Sarvabhatla, Dheerendra Mishra:
Improving Security of Lightweight Authentication Technique for Heterogeneous Wireless Sensor Networks. Wirel. Pers. Commun. 95(3): 3141-3166 (2017) - [j19]Jangirala Srinivas, Sourav Mukhopadhyay, Dheerendra Mishra:
A Self-Verifiable Password Based Authentication Scheme for Multi-Server Architecture Using Smart Card. Wirel. Pers. Commun. 96(4): 6273-6297 (2017) - 2016
- [j18]Ankita Chaturvedi, Ashok Kumar Das, Dheerendra Mishra, Sourav Mukhopadhyay:
Design of a secure smart card-based multi-server authentication scheme. J. Inf. Secur. Appl. 30: 64-80 (2016) - [j17]Dheerendra Mishra:
Design of a password-based authenticated key exchange protocol for SIP. Multim. Tools Appl. 75(23): 16017-16038 (2016) - [j16]Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay:
A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card. Peer-to-Peer Netw. Appl. 9(1): 171-192 (2016) - [j15]Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay:
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment. Secur. Commun. Networks 9(16): 3762 (2016) - [j14]Dheerendra Mishra:
Design and Analysis of a Provably Secure Multi-server Authentication Scheme. Wirel. Pers. Commun. 86(3): 1095-1119 (2016) - [j13]Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay, Mohammad Wazid:
A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography. Wirel. Pers. Commun. 91(3): 1361-1391 (2016) - [c13]Srinivas Jangirala, Dheerendra Mishra, Sourav Mukhopadhyay:
Secure Lightweight User Authentication and Key Agreement Scheme for Wireless Sensor Networks Tailored for the Internet of Things Environment. ICISS 2016: 45-65 - 2015
- [j12]Muhammad Khurram Khan, Ankita Chaturvedi, Dheerendra Mishra, Saru Kumari:
On the security enhancement of integrated electronic patient records information systems. Comput. Sci. Inf. Syst. 12(2): 857-872 (2015) - [j11]Dheerendra Mishra, Ankita Chaturvedi, Sourav Mukhopadhyay:
An improved biometric-based remote user authentication scheme for connected healthcare. Int. J. Ad Hoc Ubiquitous Comput. 18(1/2): 75-84 (2015) - [j10]Dheerendra Mishra, Ashok Kumar Das, Ankita Chaturvedi, Sourav Mukhopadhyay:
A secure password-based authentication and key agreement scheme using smart cards. J. Inf. Secur. Appl. 23: 28-43 (2015) - [j9]Dheerendra Mishra, Ankita Chaturvedi, Sourav Mukhopadhyay:
Design of a lightweight two-factor authentication scheme with smart card revocation. J. Inf. Secur. Appl. 23: 44-53 (2015) - [j8]Dheerendra Mishra:
On the Security Flaws in ID-based Password Authentication Schemes for Telecare Medical Information Systems. J. Medical Syst. 39(1): 154 (2015) - [j7]Dheerendra Mishra:
Understanding Security Failures of Two Authentication and Key Agreement Schemes for Telecare Medicine Information Systems. J. Medical Syst. 39(3): 19 (2015) - [j6]Ashok Kumar Das, Dheerendra Mishra, Sourav Mukhopadhyay:
An anonymous and secure biometric-based enterprise digital rights management system for mobile environment. Secur. Commun. Networks 8(18): 3383-3404 (2015) - [c12]Dheerendra Mishra:
An Accountable Privacy Architecture for Digital Rights Management System. ICCCT 2015: 328-332 - 2014
- [j5]Dheerendra Mishra, Ashok Kumar Das, Sourav Mukhopadhyay:
A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Syst. Appl. 41(18): 8129-8143 (2014) - [j4]Dheerendra Mishra, Sourav Mukhopadhyay:
A privacy enabling content distribution framework for digital rights management. Int. J. Trust. Manag. Comput. Commun. 2(1): 22-39 (2014) - [j3]Dheerendra Mishra, Sourav Mukhopadhyay, Saru Kumari, Muhammad Khurram Khan, Ankita Chaturvedi:
Security Enhancement of a Biometric based Authentication Scheme for Telecare Medicine Information Systems with Nonce. J. Medical Syst. 38(5): 41 (2014) - [j2]Dheerendra Mishra, Sourav Mukhopadhyay, Ankita Chaturvedi, Saru Kumari, Muhammad Khurram Khan:
Cryptanalysis and Improvement of Yan et al.'s Biometric-Based Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 38(6): 24 (2014) - [j1]Dheerendra Mishra, Jangirala Srinivas, Sourav Mukhopadhyay:
A Secure and Efficient Chaotic Map-Based Authenticated Key Agreement Scheme for Telecare Medicine Information Systems. J. Medical Syst. 38(10): 120 (2014) - [c11]Dheerendra Mishra, Sourav Mukhopadhyay:
Cryptanalysis of Two Authentication Scheme for DRM System. SNDS 2014: 184-191 - [c10]Dheerendra Mishra, Sourav Mukhopadhyay:
Cryptanalysis of Yang et al.'s Digital Rights Management Authentication Scheme Based on Smart Card. SNDS 2014: 288-297 - [i6]Dheerendra Mishra:
Cryptanalysis of Multi-Server Authenticated Key Agreement Scheme Based on Trust Computing Using Smart Cards and Biometrics. CoRR abs/1401.4790 (2014) - 2013
- [c9]Ankita Chaturvedi, Dheerendra Mishra, Sourav Mukhopadhyay:
Improved Biometric-Based Three-factor Remote User Authentication Scheme with Key Agreement Using Smart Card. ICISS 2013: 63-77 - [c8]Dheerendra Mishra, Sourav Mukhopadhyay:
Cryptanalysis of Pairing-Free Identity-Based Authenticated Key Agreement Protocols. ICISS 2013: 247-254 - [c7]Dheerendra Mishra, Sourav Mukhopadhyay:
Secure Content Delivery in DRM System with Consumer Privacy. ISPEC 2013: 321-335 - [c6]Dheerendra Mishra, Vinod Kumar, Sourav Mukhopadhyay:
A Pairing-Free Identity Based Authentication Framework for Cloud Computing. NSS 2013: 721-727 - [c5]Dheerendra Mishra, Sourav Mukhopadhyay:
A Certificateless Authenticated Key Agreement Protocol for Digital Rights Management System. QSHINE 2013: 568-577 - [i5]Dheerendra Mishra, Sourav Mukhopadhyay:
Cryptanalysis of Wu and Xu's authentication scheme for Telecare Medicine Information Systems. CoRR abs/1309.5255 (2013) - [i4]Dheerendra Mishra:
The Cryptanalysis of Lee's Chaotic Maps-Based Authentication and Key Agreement Scheme using Smart card for Telecare Medicine Information Systems. CoRR abs/1310.5896 (2013) - [i3]Dheerendra Mishra:
Cryptanalysis of Sun and Cao's Remote Authentication Scheme with User Anonymity. CoRR abs/1310.6422 (2013) - [i2]Dheerendra Mishra:
A Study On ID-based Authentication Schemes for Telecare Medical Information System. CoRR abs/1311.0151 (2013) - [i1]Dheerendra Mishra, Ankita Chaturvedi, Sourav Mukhopadhyay:
Cryptanalysis and Improvement of Jiang et al.'s Smart Card Based Remote User Authentication Scheme. CoRR abs/1312.4793 (2013) - 2012
- [c4]Dheerendra Mishra, Sourav Mukhopadhyay:
Privacy rights management in multiparty multilevel DRM system. ICACCI 2012: 625-631 - [c3]Dheerendra Mishra, Sourav Mukhopadhyay:
Towards a Secure, Transparent and Privacy-Preserving DRM System. SNDS 2012: 304-313 - 2011
- [c2]Ratna Dutta, Dheerendra Mishra, Sourav Mukhopadhyay:
Vector Space Access Structure and ID Based Distributed DRM Key Management. ACC (4) 2011: 223-232 - [c1]Ratna Dutta, Dheerendra Mishra, Sourav Mukhopadhyay:
Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture. InfoSecHiComNet 2011: 57-71
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint