![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Jaap-Henk Hoepman
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Frank Pallas
, Katharina Koerner, Isabel Barberá
, Jaap-Henk Hoepman
, Meiko Jensen
, Nandita Rao Narla, Nikita Samarin
, Max-Robert Ulbricht
, Isabel Wagner
, Kim Wuyts
, Christian Zimmermann
:
Privacy Engineering From Principles to Practice: A Roadmap. IEEE Secur. Priv. 22(2): 86-92 (2024) - [c59]Mahdi Akil, Leonardo A. Martucci, Jaap-Henk Hoepman:
A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs. SECRYPT 2024: 114-127 - [i36]Frank Pallas, Katharina Koerner, Isabel Barberá, Jaap-Henk Hoepman, Meiko Jensen, Nandita Rao Narla, Nikita Samarin, Max-Robert Ulbricht, Isabel Wagner
, Kim Wuyts, Christian Zimmermann:
Privacy Engineering From Principles to Practice: A Roadmap. CoRR abs/2404.03442 (2024) - [i35]Frederik J. Zuiderveen Borgesius, Hadi Asghari, Noël Bangma, Jaap-Henk Hoepman:
The GDPR's Rules on Data Breaches: Analysing Their Rationales and Effects. CoRR abs/2410.06086 (2024) - 2023
- [j15]Marloes Venema
, Greg Alpár, Jaap-Henk Hoepman:
Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice. Des. Codes Cryptogr. 91(1): 165-220 (2023) - [j14]Jaap-Henk Hoepman:
Two faces of blindness. Des. Codes Cryptogr. 91(8): 2705-2721 (2023) - [c58]Mahdi Akil, Sujash Naskar, Leonardo A. Martucci, Jaap-Henk Hoepman:
A Privacy-Preserving Approach to Vehicle Renting and Driver Accountability in VANETs. Privacy and Identity Management 2023: 192-210 - 2022
- [j13]Aslí Bay
, Zekeriya Erkin
, Jaap-Henk Hoepman, Simona Samardjiska, Jelle Vos
:
Practical Multi-Party Private Set Intersection Protocols. IEEE Trans. Inf. Forensics Secur. 17: 1-15 (2022) - [c57]Simone Fischer-Hübner, Marit Hansen, Jaap-Henk Hoepman, Meiko Jensen:
Privacy-Enhancing Technologies and Anonymisation in Light of GDPR and Machine Learning. Privacy and Identity Management 2022: 11-20 - [i34]Jaap-Henk Hoepman:
Mutual Contact Discovery. CoRR abs/2209.12003 (2022) - 2021
- [j12]Balázs Bodó
, Jaya Klara Brekke, Jaap-Henk Hoepman:
Decentralisation in the blockchain space. Internet Policy Rev. 10(2) (2021) - [j11]Balázs Bodó
, Jaya Klara Brekke, Jaap-Henk Hoepman:
Decentralisation: a multidisciplinary perspective. Internet Policy Rev. 10(2) (2021) - [i33]Jaap-Henk Hoepman:
Hansel and Gretel and the Virus: Privacy Conscious Contact Tracing. CoRR abs/2101.03241 (2021) - [i32]Jaap-Henk Hoepman:
Privacy Friendly E-Ticketing For Public Transport. CoRR abs/2101.09085 (2021) - [i31]Marloes Venema, Greg Alpár, Jaap-Henk Hoepman:
Systematizing Core Properties of Pairing-Based Attribute-Based Encryption to Uncover Remaining Challenges in Enforcing Access Control in Practice. IACR Cryptol. ePrint Arch. 2021: 1172 (2021) - 2020
- [i30]Jaap-Henk Hoepman:
A Critique of the Google Apple Exposure Notification (GAEN) Framework. CoRR abs/2012.05097 (2020)
2010 – 2019
- 2019
- [i29]Rowel Gündlach, Jaap-Henk Hoepman, Remco van der Hofstad, Tommy Koens, Stijn Meijer:
Hydra: A Multiple Blockchain Protocol for Improving Transaction Throughput. CoRR abs/1910.06682 (2019) - 2018
- [c56]Michael Colesky, Julio C. Caiza
, José M. del Álamo, Jaap-Henk Hoepman, Yod Samuel Martín:
A system of privacy patterns for user control. SAC 2018: 1150-1156 - 2017
- [j10]Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:
Fast revocation of attribute-based credentials for both users and verifiers. Comput. Secur. 67: 308-323 (2017) - [c55]Jaap-Henk Hoepman:
Privacy Friendly Aggregation of Smart Meter Readings, Even When Meters Crash. SPSR-SG@CPSWeek 2017: 3-7 - [c54]Sietse Ringers, Eric R. Verheul, Jaap-Henk Hoepman:
An Efficient Self-blindable Attribute-Based Credential Scheme. Financial Cryptography 2017: 3-20 - [c53]Jeroen van Puijenbroek, Jaap-Henk Hoepman:
Privacy Impact Assessments in Practice: Outcome of a Descriptive Field Research in the Netherlands. IWPE@SP 2017: 1-8 - [i28]Sietse Ringers, Eric R. Verheul, Jaap-Henk Hoepman:
An efficient self-blindable attribute-based credential scheme. IACR Cryptol. ePrint Arch. 2017: 115 (2017) - 2016
- [c52]Eric R. Verheul, Sietse Ringers, Jaap-Henk Hoepman:
The Self-blindable U-Prove Scheme from FC'14 Is Forgeable (Short Paper). Financial Cryptography 2016: 339-345 - [c51]Michael Colesky, Jaap-Henk Hoepman, Christiaan Hillen:
A Critical Analysis of Privacy Design Strategies. IEEE Symposium on Security and Privacy Workshops 2016: 33-40 - [c50]Wouter Lueks, Maarten H. Everts, Jaap-Henk Hoepman:
Vote to Link: Recovering from Misbehaving Anonymous Users. WPES@CCS 2016: 111-122 - [e5]Jaap-Henk Hoepman, Stefan Katzenbeisser:
ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings. IFIP Advances in Information and Communication Technology 471, Springer 2016, ISBN 978-3-319-33629-9 [contents] - 2015
- [c49]Marit Hansen, Jaap-Henk Hoepman, Meiko Jensen:
Towards Measuring Maturity of Privacy-Enhancing Technologies. APF 2015: 3-20 - [c48]Wouter Lueks, Maarten H. Everts, Jaap-Henk Hoepman:
Revocable Privacy: Principles, Use Cases, and Technologies. APF 2015: 124-143 - [c47]Marit Hansen, Jaap-Henk Hoepman, Meiko Jensen, Stefan Schiffner:
Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies. Privacy and Identity Management 2015: 97-110 - [c46]Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. SEC 2015: 463-478 - [c45]Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers:
On Linkability and Malleability in Self-blindable Credentials. WISTP 2015: 203-218 - [c44]Jaap-Henk Hoepman:
Privately (and Unlinkably) Exchanging Messages Using a Public Bulletin Board. WPES@CCS 2015: 85-94 - [i27]George Danezis, Josep Domingo-Ferrer, Marit Hansen, Jaap-Henk Hoepman, Daniel Le Métayer, Rodica Tirtea, Stefan Schiffner:
Privacy and Data Protection by Design - from policy to engineering. CoRR abs/1501.03726 (2015) - [i26]Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. IACR Cryptol. ePrint Arch. 2015: 237 (2015) - [i25]Eric R. Verheul, Sietse Ringers, Jaap-Henk Hoepman:
The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable. IACR Cryptol. ePrint Arch. 2015: 725 (2015) - [i24]Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers:
On Linkability and Malleability in Self-blindable Credentials. IACR Cryptol. ePrint Arch. 2015: 842 (2015) - 2014
- [c43]Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers:
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards. CANS 2014: 270-289 - [c42]Wouter Lueks, Jaap-Henk Hoepman, Klaus Kursawe:
Forward-Secure Distributed Encryption. Privacy Enhancing Technologies 2014: 123-142 - [c41]Lejla Batina, Jens Hermans, Jaap-Henk Hoepman, Anna Krasnova:
High-Speed Dating Privacy-Preserving Attribute Matching for RFID. RFIDSec 2014: 19-35 - [c40]Jaap-Henk Hoepman:
Privacy Design Strategies - (Extended Abstract). SEC 2014: 446-459 - [e4]Marit Hansen, Jaap-Henk Hoepman, Ronald E. Leenes, Diane Whitehouse:
Privacy and Identity Management for Emerging Services and Technologies - 8th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected Papers. IFIP Advances in Information and Communication Technology 421, Springer 2014, ISBN 978-3-642-55136-9 [contents] - [i23]Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers:
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards. IACR Cryptol. ePrint Arch. 2014: 684 (2014) - 2013
- [j9]Bert-Jaap Koops, Jaap-Henk Hoepman, Ronald Leenes:
Open-source intelligence and privacy by design. Comput. Law Secur. Rev. 29(6): 676-688 (2013) - [c39]Gergely Alpár, Jaap-Henk Hoepman:
A secure channel for attribute-based credentials: [short paper]. Digital Identity Management 2013: 13-18 - [c38]Maarten H. Everts, Jaap-Henk Hoepman, Johanneke Siljee:
UbiKiMa: ubiquitous authentication using a smartphone, migrating from passwords to strong cryptography. Digital Identity Management 2013: 19-24 - [e3]Jaap-Henk Hoepman, Ingrid Verbauwhede
:
Radio Frequency Identification. Security and Privacy Issues - 8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7739, Springer 2013, ISBN 978-3-642-36139-5 [contents] - [i22]Gergely Alpár, Jaap-Henk Hoepman, Wouter Lueks:
An Attack Against Fixed Value Discrete Logarithm Representations. IACR Cryptol. ePrint Arch. 2013: 120 (2013) - 2012
- [i21]Jaap-Henk Hoepman:
Privacy Design Strategies. CoRR abs/1210.6621 (2012) - 2011
- [j8]Jaap-Henk Hoepman, Andreas Larsson, Elad Michael Schiller, Philippas Tsigas
:
Secure and self-stabilizing clock synchronization in sensor networks. Theor. Comput. Sci. 412(40): 5631-5647 (2011) - [c37]Jaap-Henk Hoepman:
In Things We Trust? Towards Trustability in the Internet of Things - (Extended Abstract). AmI Workshops 2011: 287-295 - [c36]Jaap-Henk Hoepman:
Mobile Identity Management. Communications and Multimedia Security 2011: 253 - [c35]Gergely Alpár, Jaap-Henk Hoepman:
Avoiding Man-in-the-Middle Attacks When Verifying Public Terminals. PrimeLife 2011: 261-273 - [c34]Jaap-Henk Hoepman, David Galindo
:
Non-interactive distributed encryption: a new primitive for revocable privacy. WPES 2011: 81-92 - [i20]Gergely Alpár, Jaap-Henk Hoepman, Johanneke Siljee:
The Identity Crisis. Security, Privacy and Usability Issues in Identity Management. CoRR abs/1101.0427 (2011) - [i19]Jaap-Henk Hoepman:
In Things We Trust? Towards trustability in the Internet of Things. CoRR abs/1109.2637 (2011) - 2010
- [c33]Lejla Batina, Jaap-Henk Hoepman, Bart Jacobs, Wojciech Mostowski, Pim Vullers:
Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings. CARDIS 2010: 209-222 - [c32]Jaap-Henk Hoepman, George B. Huitema:
Privacy Enhanced Fraud Resistant Road Pricing. HCC 2010: 202-213 - [c31]Jaap-Henk Hoepman, Rieks Joosten:
Practical Schemes for Privacy and Security Enhanced RFID. WISTP 2010: 138-153 - [i18]Gerben Broenink, Jaap-Henk Hoepman, Christian van 't Hof, Rob Van Kranenburg, David Smits, Tijmen Wisman:
The Privacy Coach: Supporting customer privacy in the Internet of Things. CoRR abs/1001.4459 (2010)
2000 – 2009
- 2009
- [c30]Lukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum:
Client-Server Password Recovery. OTM Conferences (2) 2009: 861-878 - [e2]Olivier Markowitch, Angelos Bilas
, Jaap-Henk Hoepman, Chris J. Mitchell
, Jean-Jacques Quisquater:
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings. Lecture Notes in Computer Science 5746, Springer 2009, ISBN 978-3-642-03943-0 [contents] - [i17]Lukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum:
Client-Server Password Recovery (Extended Abstract). CoRR abs/0906.4668 (2009) - [i16]Jaap-Henk Hoepman, Rieks Joosten:
Practical Schemes For Privacy & Security Enhanced RFID. CoRR abs/0909.1257 (2009) - 2008
- [c29]Lukasz Chmielewski, Jaap-Henk Hoepman:
Fuzzy Private Matching (Extended Abstract). ARES 2008: 327-334 - [c28]Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia:
A Practical Attack on the MIFARE Classic. CARDIS 2008: 267-282 - [c27]Jaap-Henk Hoepman, Rieks Joosten, Johanneke Siljee:
Comparing Identity Management Frameworks in a Business Context. FIDIS 2008: 184-196 - [c26]Lukasz Chmielewski, Richard Brinkman, Jaap-Henk Hoepman, Bert Bos:
Using JASON to secure SOA. Middleware Security 2008: 13-18 - [i15]Jaap-Henk Hoepman, Bart Jacobs:
Increased security through open source. CoRR abs/0801.3924 (2008) - [i14]Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur:
Crossing Borders: Security and Privacy Issues of the European e-Passport. CoRR abs/0801.3930 (2008) - [i13]Jaap-Henk Hoepman:
Distributed Double Spending Prevention. CoRR abs/0802.0832 (2008) - [i12]Jaap-Henk Hoepman:
The Ephemeral Pairing Problem. CoRR abs/0802.0834 (2008) - [i11]Gerhard de Koning Gans, Jaap-Henk Hoepman, Flavio D. Garcia:
A Practical Attack on the MIFARE Classic. CoRR abs/0803.2285 (2008) - [i10]Jaap-Henk Hoepman:
Private Handshakes. CoRR abs/0804.0074 (2008) - 2007
- [j7]Jaap-Henk Hoepman, Bart Jacobs:
Increased security through open source. Commun. ACM 50(1): 79-83 (2007) - [c25]Jaap-Henk Hoepman:
Private Handshakes. ESAS 2007: 31-42 - [c24]Jaap-Henk Hoepman, Geert Kleinhuis:
Two Worlds, One Smart Card: An Integrated Solution for Physical Access and Logical Security Using PKI on a Single Smart Card. EuroPKI 2007: 236-247 - [c23]Bert Bos, Lukasz Chmielewski, Jaap-Henk Hoepman, Thanh Son Nguyen:
Remote Management and Secure Application Development for Pervasive Home Systems Using JASON. SECPerU 2007: 7-12 - [c22]Jaap-Henk Hoepman:
Distributed Double Spending Prevention. Security Protocols Workshop 2007: 152-165 - [c21]Jaap-Henk Hoepman:
Distributed Double Spending Prevention (Transcript of Discussion). Security Protocols Workshop 2007: 166-170 - [c20]Jaap-Henk Hoepman, Andreas Larsson, Elad Michael Schiller, Philippas Tsigas:
Secure and Self-stabilizing Clock Synchronization in Sensor Networks. SSS 2007: 340-356 - [e1]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman:
From Security to Dependability, 10.09. - 15.09.2006. Dagstuhl Seminar Proceedings 06371, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany 2007 [contents] - [i9]Lukasz Chmielewski, Jaap-Henk Hoepman:
Fuzzy Private Matching (Extended Abstract). CoRR abs/0710.5425 (2007) - [i8]Lukasz Chmielewski, Jaap-Henk Hoepman:
Fuzzy Private Matching (Extended Abstract). IACR Cryptol. ePrint Arch. 2007: 363 (2007) - 2006
- [c19]Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur:
Crossing Borders: Security and Privacy Issues of the European e-Passport. IWSEC 2006: 152-167 - [c18]Ricardo Corin, David Galindo, Jaap-Henk Hoepman:
Securing Data Accountability in Decentralized Systems. OTM Workshops (1) 2006: 626-635 - [c17]Jaap-Henk Hoepman, Shay Kutten, Zvi Lotker:
Efficient Distributed Weighted Matchings on Trees. SIROCCO 2006: 115-129 - [i7]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman:
06371 Executive Summary -- From Security to Dependability. From Security to Dependability 2006 - [i6]Christian Cachin, Felix C. Freiling, Jaap-Henk Hoepman:
06371 Abstracts Collection -- From Security to Dependability. From Security to Dependability 2006 - 2005
- [j6]Wan J. Fokkink, Jaap-Henk Hoepman, Jun Pang:
A Note on K-State Self-stabilization in a Ring with K=N. Nord. J. Comput. 12(1): 18-26 (2005) - [c16]Flavio D. Garcia, Jaap-Henk Hoepman:
Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. ACNS 2005: 364-377 - [c15]Jaap-Henk Hoepman:
Ephemeral Pairing on Anonymous Networks. SPC 2005: 101-116 - 2004
- [c14]Jaap-Henk Hoepman:
The Ephemeral Pairing Problem. Financial Cryptography 2004: 212-226 - [c13]Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Nieuwenhuizen:
Spam Filter Analysis. SEC 2004: 395-410 - [i5]Flavio D. Garcia, Jaap-Henk Hoepman:
Spam filter analysis. CoRR cs.CR/0402046 (2004) - [i4]Jaap-Henk Hoepman:
Simple Distributed Weighted Matchings. CoRR cs.DC/0410047 (2004) - 2003
- [c12]Jaap-Henk Hoepman:
Splitters: Objects for Online Partitioning. OPODIS 2003: 47-57 - [c11]Jaap-Henk Hoepman:
Security, Fault-Tolerance and their Verification for Ambient Systems. SEC 2003: 441-446 - 2002
- [j5]Jaap-Henk Hoepman, Marina Papatriantafilou
, Philippas Tsigas
:
Self-Stabilization of Wait-Free Shared Memory Objects. J. Parallel Distributed Comput. 62(5): 818-842 (2002) - [c10]Richard Brinkman, Jaap-Henk Hoepman:
Secure Method Invocation in JASON. CARDIS 2002: 29-40 - 2001
- [j4]Jaap-Henk Hoepman:
Can an operation both update the state and return a meaningful value in the asynchronous PRAM model? Inf. Process. Lett. 79(4): 161-166 (2001) - [c9]Jaap-Henk Hoepman:
Randomised Mutual Search for k>2 Agents. DISC 2001: 180-193 - 2000
- [c8]Jaap-Henk Hoepman:
Secret Key Authentication with Software-Only Verification. Financial Cryptography 2000: 313-326
1990 – 1999
- 1999
- [j3]Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp
, Paul M. B. Vitányi:
Mutual Search. J. ACM 46(4): 517-536 (1999) - [j2]Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi:
Space-efficient Routing Tables for Almost All Networks and the Incompressibility Method. SIAM J. Comput. 28(4): 1414-1432 (1999) - [i3]Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi:
Space-Efficient Routing Tables for Almost All Networks and the Incompressibility Method. CoRR cs.DC/9903009 (1999) - [i2]Jaap-Henk Hoepman:
Self-stabilizing mutual exclusion on a ring, even if K=N. CoRR cs.DC/9909013 (1999) - [i1]Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi:
Mutual Search. CoRR cs.DS/9902005 (1999) - 1998
- [j1]Jaap-Henk Hoepman:
Self-Stabilizing Ring-Orientation Using Constant Space. Inf. Comput. 144(1): 18-39 (1998) - [c7]Harry Buhrman, Matthew K. Franklin, Juan A. Garay, Jaap-Henk Hoepman, John Tromp, Paul M. B. Vitányi:
Mutual Search (Extended Abstract). SODA 1998: 481-489 - 1996
- [c6]Harry Buhrman, Jaap-Henk Hoepman, Paul M. B. Vitányi:
Optimal Routing Tables. PODC 1996: 134-142 - 1995
- [c5]Harry Buhrman, Juan A. Garay, Jaap-Henk Hoepman:
Optimal Resiliency against Mobile Faults. FTCS 1995: 83-88 - [c4]Harry Buhrman, Juan A. Garay, Jaap-Henk Hoepman, Mark Moir:
Long-Lived Renaming Made Fast. PODC 1995: 194-203 - [c3]Jaap-Henk Hoepman, Marina Papatriantafilou, Philippas Tsigas:
Self-Stabilization of Wait-Free Shared Memory Objects. WDAG 1995: 273-287 - 1994
- [c2]Jaap-Henk Hoepman:
Uniform Deterministic Self-Stabilizing Ring-Orientation on Odd-Length Rings. WDAG 1994: 265-279 - 1993
- [c1]Jaap-Henk Hoepman, John Tromp:
Binary Snapshots. WDAG 1993: 18-25
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint