default search action
Miguel Soriano
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [e5]Joaquín García-Alfaro, Jose Luis Muñoz-Tapia, Guillermo Navarro-Arribas, Miguel Soriano:
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2021 International Workshops, DPM 2021 and CBT 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13140, Springer 2022, ISBN 978-3-030-93943-4 [contents]
2010 – 2019
- 2019
- [j37]David Rebollo-Monedero, Ahmad Mohamad Mezher, Xavier Casanova Colomé, Jordi Forné, Miguel Soriano:
Efficient k-anonymous microaggregation of multivariate numerical data via principal component analysis. Inf. Sci. 503: 417-443 (2019) - 2018
- [j36]David Rebollo-Monedero, Cesar Hernandez-Baigorri, Jordi Forné, Miguel Soriano:
Incremental k-Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling. IEEE Access 6: 60016-60044 (2018) - [e4]Javier López, Jianying Zhou, Miguel Soriano:
Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I. Lecture Notes in Computer Science 11098, Springer 2018, ISBN 978-3-319-99072-9 [contents] - [e3]Javier López, Jianying Zhou, Miguel Soriano:
Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11099, Springer 2018, ISBN 978-3-319-98988-4 [contents] - 2017
- [j35]David Rebollo-Monedero, Jordi Forné, Miguel Soriano, Jordi Puiggalí Allepuz:
p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation. Inf. Sci. 382-383: 388-414 (2017) - 2016
- [j34]Cándido Caballero-Gil, Jezabel Molina-Gil, Juan Hernández-Serrano, Olga León, Miguel Soriano-Ibañez:
Providing k-anonymity and revocation in ubiquitous VANETs. Ad Hoc Networks 36: 482-494 (2016) - [j33]David Rebollo-Monedero, Jordi Forné, Miguel Soriano, Jordi Puiggalí Allepuz:
k-Anonymous microaggregation with preservation of statistical dependence. Inf. Sci. 342: 1-23 (2016) - 2015
- [j32]Juan Vera del Campo, Sandra Guasch, Josep Pegueroles, Miguel Soriano:
Private surveys on VoIP. Comput. Commun. 68: 25-32 (2015) - [j31]Diego Suarez Touceda, José María Sierra Camara, Sherali Zeadally, Miguel Soriano:
Attribute-based authorization for structured Peer-to-Peer (P2P) networks. Comput. Stand. Interfaces 42: 71-83 (2015) - [p1]Juan Vera del Campo, Josep Pegueroles, Juan Hernández-Serrano, Miguel Soriano:
Managing Privacy in the Internet of Things: DocCloud, a Use Case. Advanced Research in Data Privacy 2015: 443-463 - 2014
- [j30]David Rebollo-Monedero, Andrea Bartoli, Juan Hernández-Serrano, Jordi Forné, Miguel Soriano:
Reconciling privacy and efficient utility management in smart cities. Trans. Emerg. Telecommun. Technol. 25(1): 94-108 (2014) - [j29]Juan Vera del Campo, Josep Pegueroles, Juan Hernández-Serrano, Miguel Soriano:
DocCloud: A document recommender system on cloud computing with plausible deniability. Inf. Sci. 258: 387-402 (2014) - 2013
- [j28]Juan Hernández-Serrano, Olga León, Miguel Soriano:
WiMAX-based robust localization in the presence of misbehaving and/or malicious base stations. Comput. Electr. Eng. 39(7): 2318-2329 (2013) - [c61]Juan Caubet, Oscar Esparza, Juanjo Alins, Jorge Mata-Díaz, Miguel Soriano:
Securing Identity Assignment Using Implicit Certificates in P2P Overlays. IFIPTM 2013: 151-165 - 2012
- [j27]José Moreira, Marcel Fernandez, Miguel Soriano:
On the relationship between the traceability properties of Reed-Solomon codes. Adv. Math. Commun. 6(4): 467-478 (2012) - [j26]Olga León, Juan Hernández-Serrano, Miguel Soriano:
Cooperative detection of primary user emulation attacks in CRNs. Comput. Networks 56(14): 3374-3384 (2012) - [j25]Juan Vera del Campo, Josep Pegueroles, Juan Hernández-Serrano, Miguel Soriano:
Design of a P2P content recommendation system using affinity networks. Comput. Commun. 36(1): 90-104 (2012) - [j24]Diego Suarez Touceda, José Sierra Camara, Miguel Soriano:
Decentralized certification scheme for secure admission in on-the-fly peer-to-peer systems. Peer-to-Peer Netw. Appl. 5(2): 105-124 (2012) - [c60]Andrea Bartoli, Juan Hernández-Serrano, Miguel Soriano, Mischa Dohler, Apostolos A. Kountouris, Dominique Barthel:
Optimizing energy-efficiency of PHY-Layer authentication in machine-to-machine networks. GLOBECOM Workshops 2012: 1663-1668 - 2011
- [j23]David Rebollo-Monedero, Jordi Forné, Miguel Soriano:
An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers. Data Knowl. Eng. 70(10): 892-921 (2011) - [j22]Juan Hernández-Serrano, Olga León, Miguel Soriano:
Modeling the Lion Attack in Cognitive Radio Networks. EURASIP J. Wirel. Commun. Netw. 2011 (2011) - [j21]Marcel Fernandez, José Moreira, Miguel Soriano:
Identifying Traitors Using the Koetter-Vardy Algorithm. IEEE Trans. Inf. Theory 57(2): 692-704 (2011) - [j20]Andrea Bartoli, Juan Hernández-Serrano, Miguel Soriano, Mischa Dohler, Apostolos A. Kountouris, Dominique Barthel:
Secure Lossless Aggregation Over Fading and Shadowing Channels for Smart Grid M2M Networks. IEEE Trans. Smart Grid 2(4): 844-864 (2011) - [j19]Oscar Esparza, Jose L. Muñoz, Joan Tomàs-Buliart, Miguel Soriano:
An infrastructure for detecting and punishing malicious hosts using mobile agent watermarking. Wirel. Commun. Mob. Comput. 11(11): 1446-1462 (2011) - [c59]Juan Vera del Campo, Ana Gomez-Muro, Miguel Soriano:
Private Audio Streaming for an Automated Phone Assistance System. 3PGCIC 2011: 128-133 - [c58]Olga León, Juan Hernández-Serrano, Miguel Soriano:
Robust detection of primary user emulation attacks in IEEE 802.22 networks. CogART 2011: 51 - [c57]Joan Tomàs-Buliart, Ana Gomez-Muro, Marcel Fernandez, Miguel Soriano:
Use of turbo codes with low-rate convolutional constituent codes in fingerprinting scenarios. WIFS 2011: 1-6 - 2010
- [j18]Marcel Fernandez, Josep Cotrina, Miguel Soriano, Neus Domingo:
A note about the identifier parent property in Reed-Solomon codes. Comput. Secur. 29(5): 628-635 (2010) - [j17]Olga León, Juan Hernández-Serrano, Miguel Soriano:
Securing cognitive radio networks. Int. J. Commun. Syst. 23(5): 633-652 (2010) - [j16]Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano:
Traitor tracing over YouTube video service - proof of concept. Telecommun. Syst. 45(1): 47-60 (2010) - [e2]Miguel Soriano, Sihan Qing, Javier López:
Information and Communications Security - 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings. Lecture Notes in Computer Science 6476, Springer 2010, ISBN 978-3-642-17649-4 [contents] - [e1]Sokratis K. Katsikas, Javier López, Miguel Soriano:
Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings. Lecture Notes in Computer Science 6264, Springer 2010, ISBN 978-3-642-15151-4 [contents]
2000 – 2009
- 2009
- [j15]Victor Morales-Rocha, Miguel Soriano, Jordi Puiggali:
New voter verification scheme using pre-encrypted ballots. Comput. Commun. 32(7-10): 1219-1227 (2009) - [c56]Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo:
On the IPP Properties of Reed-Solomon Codes. SEC 2009: 87-97 - [c55]José Moreira, Marcel Fernandez, Miguel Soriano:
A note on the equivalence of the traceability properties of Reed-Solomon codes for certain coalition sizes. WIFS 2009: 36-40 - 2008
- [j14]Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano:
Shared Self-Organized GKM Protocol for MANETs. J. Inf. Sci. Eng. 24(6): 1629-1646 (2008) - [c54]Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano:
Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel. CRITIS 2008: 287-294 - [c53]Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano:
New Considerations about the Correct Design of Turbo Fingerprinting Codes. ESORICS 2008: 501-516 - [c52]Victor Morales-Rocha, Jordi Puiggali, Miguel Soriano:
Secure Remote Voter Registration. Electronic Voting 2008: 95-108 - 2007
- [j13]Marcel Fernandez, Miguel Soriano, Josep Cotrina:
Tracing illegal redistribution using errors-anderasures and side information decoding algorithms. IET Inf. Secur. 1(2): 83-90 (2007) - [j12]Juan Vera del Campo, Josep Pegueroles, Miguel Soriano:
Providing Security Services in a Resource Discovery System. J. Networks 2(1): 48-59 (2007) - [j11]Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano:
?-error.">A class of non-linear asymptotic fingerprinting codes with ?-error. Online Inf. Rev. 31(1): 22-37 (2007) - [c51]Luis Zarza, Josep Pegueroles, Miguel Soriano:
Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. ARES 2007: 1207-1213 - [c50]Rafael Páez, Joan Tomàs-Buliart, Jordi Forné, Miguel Soriano:
Securing Agents against Malicious Host in an Intrusion Detection System. CRITIS 2007: 94-105 - [c49]Luis Zarza, Josep Pegueroles, Miguel Soriano:
Interpretation of Binary Strings as Security Protocols for their Evolution by means of Genetic Algorithms. DEXA Workshops 2007: 708-712 - [c48]Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano:
Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous Algorithm. ICCSA (2) 2007: 526-539 - [c47]Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo:
A Note About the Traceability Properties of Linear Codes. ICISC 2007: 251-258 - [c46]Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano:
Improvement of Collusion Secure Convolutional Fingerprinting Information Codes. ICITS 2007: 76-88 - [c45]Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano:
Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems. KES (3) 2007: 992-999 - [c44]Rafael Páez, Joan Tomàs, Jordi Forné, Miguel Soriano:
MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous Agents. SECRYPT 2007: 41-47 - 2006
- [j10]Oscar Esparza, Jose L. Muñoz, Miguel Soriano, Jordi Forné:
Secure brokerage mechanisms for mobile electronic commerce. Comput. Commun. 29(12): 2308-2321 (2006) - [j9]Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:
Obtaining Traceability Codes from Chinese Reminder Theorem Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 227-230 (2006) - [j8]Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano:
Multicast Copyright Protection System Based on a Trusted Soft-Engine. Int. J. Bus. Data Commun. Netw. 2(2): 55-67 (2006) - [j7]Oscar Esparza, Jose L. Muñoz, Miguel Soriano, Jordi Forné:
Punishing Malicious Hosts with the Cryptographic Traces Approach. New Gener. Comput. 24(4): 351-376 (2006) - [c43]Juan Vera del Campo, Josep Pegueroles, Miguel Soriano:
Providing Security Services in a Multiprotocol Service Discovery System for Ubiquitous Networks. ARES 2006: 148-155 - [c42]Josep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano:
A Practical Solution for Distribution Rights Protection in Multicast Environments. ICCSA (3) 2006: 527-536 - [c41]Luis Zarza, Josep Pegueroles, Miguel Soriano, Rafael Martínez:
Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques. SECRYPT 2006: 316-319 - 2005
- [c40]Miguel Soriano, Stephan Flake, Jürgen Tacken, Frank Bormann, Joan Tomàs:
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms. DEXA Workshops 2005: 251-256 - [c39]Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:
Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms. ICCSA (2) 2005: 527-536 - [c38]Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:
Practical Scenarios for the Van Trung-Martirosyan Codes. ICCSA (2) 2005: 624-633 - [c37]Josep Cotrina Navau, Marcel Fernandez, Miguel Soriano:
A Family of Collusion 2-Secure Codes. Information Hiding 2005: 387-397 - [c36]Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:
Tracing Traitors by Guessing Secrets. The q-Ary Case. ISPEC 2005: 61-73 - [c35]Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:
A New Class of Codes for Fingerprinting Schemes. ISPEC 2005: 398-409 - [c34]Miguel Soriano, Marcel Fernandez, Elisa Sayrol, Joan Tomàs, Joan Casanellas, Josep Pegueroles, Juan Hernández-Serrano:
Multimedia Copyright Protection Platform Demonstrator. iTrust 2005: 411-414 - [c33]Miguel Soriano, Marcel Fernandez, Josep Cotrina Navau:
Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. IWDW 2005: 231-243 - [c32]Juan Hernández-Serrano, Josep Pegueroles, Miguel Soriano:
Energy Efficiency of Load Balancing in MANET Routing Protocols. SNPD 2005: 476-483 - [c31]Elisa Sayrol, Miguel Soriano, Marcel Fernandez, Joan Casanellas, Joan Tomàs:
Development of a platform offering video copyright protection and security against illegal distribution. Security, Steganography, and Watermarking of Multimedia Contents 2005: 76-83 - 2004
- [j6]Marcel Fernandez, Miguel Soriano:
Soft-Decision Tracing in Fingerprinted Multimedia Content. IEEE Multim. 11(2): 38-46 (2004) - [j5]Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano:
Certificate revocation system implementation based on the Merkle hash tree. Int. J. Inf. Sec. 2(2): 110-124 (2004) - [j4]Marcel Fernandez, Miguel Soriano:
Identification of traitors in algebraic-geometric traceability codes. IEEE Trans. Signal Process. 52(10): 3073-3077 (2004) - [c30]Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano:
CERVANTES - A Certificate Validation Test-Bed. EuroPKI 2004: 28-42 - [c29]Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné:
Punishing manipulation attacks in mobile agent systems. GLOBECOM 2004: 2235-2239 - [c28]Jose L. Muñoz, Josep Pegueroles, Jordi Forné, Oscar Esparza, Miguel Soriano:
Security Issues in Virtual Grid Environments. International Conference on Computational Science 2004: 174-178 - [c27]Marcel Fernandez, Miguel Soriano:
Identification of Traitors Using a Trellis. ICICS 2004: 211-222 - [c26]Marcel Fernandez, Miguel Soriano:
Identification Algorithms for Sequential Traitor Tracing. INDOCRYPT 2004: 414-430 - [c25]Marcel Fernandez, Miguel Soriano:
Efficient Recovery of Secrets. ITCC (2) 2004: 763-767 - [c24]Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné:
Detecting and Proving Manipulation Attacks in Mobile Agent Systems. MATA 2004: 224-233 - 2003
- [c23]Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano:
Using OCSP to Secure Certificate-Using Transactions in M-commerce. ACNS 2003: 280-292 - [c22]Oscar Esparza, Marcel Fernandez, Miguel Soriano, Jose L. Muñoz, Jordi Forné:
Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts. DEXA 2003: 927-936 - [c21]Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer, Miguel Soriano:
Practical Asymmetric Fingerprinting with a TTP. DEXA Workshops 2003: 352-356 - [c20]Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano, David Jodra:
Evaluation of Revocation Systems with a JAVA Test-bed. DEXA Workshops 2003: 450-454 - [c19]Marcel Fernandez, Miguel Soriano:
Protecting Intellectual Property by Guessing Secrets. EC-Web 2003: 196-205 - [c18]Josep Pegueroles, Wang Bin, Miguel Soriano, Francisco Rico-Novella:
Group Rekeying Algorithm Using Pseudo-random Functions and Modular Reduction. GCC (1) 2003: 875-882 - [c17]Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné:
Protocols for Malicious Host Revocation. ICICS 2003: 191-201 - [c16]Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné:
Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts. ICWE 2003: 289-292 - [c15]Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano:
Implementation of an Efficient Authenticated Dictionary for Certificate Revocation. ISCC 2003: 238-243 - [c14]Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné:
A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. ISCC 2003: 251-256 - [c13]Marcel Fernandez, Miguel Soriano:
A generalization of traceability codes using ideal-based codes. ITW 2003: 66-69 - [c12]Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné:
Implementation and Performance Evaluation of a Protocol for Detecting Suspicious Hosts. MATA 2003: 286-295 - [c11]Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano:
Efficient Offline Certificate Revocation. MIPS 2003: 319-330 - [c10]Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano:
A Certificate Status Checking Protocol for the Authenticated Dictionary. MMM-ACNS 2003: 255-266 - [c9]Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano:
E-MHT. An Efficient Protocol for Certificate Status Checking. WISA 2003: 410-424 - 2002
- [j3]Miguel Soriano, Diego Ponce:
A security and usability proposal for mobile electronic commerce. IEEE Commun. Mag. 40(8): 62-67 (2002) - [c8]Manuel Sánchez-Marañón, Miguel Soriano, Isabel Miralles, Raúl Ortega, Manuel Melgosa:
Testing Color-Mixing Laws In Soil Mineral Mixtures. CGIV 2002: 202-205 - [c7]Marcel Fernandez, Miguel Soriano:
Efficient Identification of Traitors in Fingerprinted Multimedia Contents. DEXA Workshops 2002: 463-467 - [c6]Marcel Fernandez, Miguel Soriano:
Soft-decision decoding of traceability codes. ICME (1) 2002: 605-608 - [c5]Marcel Fernandez, Miguel Soriano:
Decoding codes with the identifiable parent property. ISCC 2002: 1028-1033 - [c4]Marcel Fernandez, Miguel Soriano:
Fingerprinting Concatenated Codes with Efficient Identification. ISC 2002: 459-470
1990 – 1999
- 1998
- [j2]Ernesto J. Cruselles, Miguel Soriano, José Luis Melús-Moreno:
Spreading Codes Generator for Wireless CDMA Networks. Wirel. Pers. Commun. 7(1): 69-88 (1998) - 1995
- [c3]Ernesto J. Cruselles, Miguel Soriano, José Luis Melús-Moreno:
Uncorrelated PN sequences generator for spreading codes in CDMA systems. PIMRC 1995: 1335 - 1993
- [j1]Francisco Recacha, José L. Melús, X. Simón, Miguel Soriano, Jordi Forné:
Secure Data Transmission in Extended Ethernet Environments. IEEE J. Sel. Areas Commun. 11(5): 794-803 (1993) - [c2]Miguel Soriano, Jordi Forné, Francisco Recacha, José L. Melús:
A Particular Solution to Provide Secure Communications in an Ethernet Environment. CCS 1993: 17-25 - [c1]Miguel Soriano, Jordi Forné, José L. Melús, Francisco Recacha:
Implementation of a security system in a local area network environment. LCN 1993: 230-236
Coauthor Index
aka: Jose Luis Muñoz-Tapia
aka: Josep Cotrina
aka: Joan Tomàs
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint