default search action
Kent E. Seamons
Person information
- affiliation: Brigham Young University, Provo, Utah, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c74]Anamika Rajendran, Tarun Kumar Yadav, Malek Al-Jbour, Francisco Manuel Mares Solano, Kent E. Seamons, Joshua Reynolds:
Deniable Encrypted Messaging: User Understanding after Hands-on Social Experience. EuroUSEC 2024: 155-171 - [c73]Tarun Kumar Yadav, Kent E. Seamons:
A Security and Usability Analysis of Local Attacks Against FIDO2. NDSS 2024 - [i15]Anuj Gautam, Tarun Kumar Yadav, Kent E. Seamons, Scott Ruoti:
Passwords Are Meant to Be Secret: A Practical Secure Password Entry Channel for Web Browsers. CoRR abs/2402.06159 (2024) - 2023
- [c72]Garrett Smith, Tarun Kumar Yadav, Jonathan Dutson, Scott Ruoti, Kent E. Seamons:
"If I could do this, I feel anyone could: " The Design and Evaluation of a Secondary Authentication Factor Manager. USENIX Security Symposium 2023: 499-515 - [c71]Tarun Kumar Yadav, Devashish Gosain, Kent E. Seamons:
Cryptographic Deniability: A Multi-perspective Study of User Perceptions and Expectations. USENIX Security Symposium 2023: 3637-3654 - [i14]Tarun Kumar Yadav, Kent E. Seamons:
A Security and Usability Analysis of Local Attacks Against FIDO2. CoRR abs/2308.02973 (2023) - [i13]Tarun Kumar Yadav, Austin Cook, Justin Hales, Kent E. Seamons:
InfoGuard: A Design and Usability Study of User-Controlled Application-Independent Encryption for Privacy-Conscious Users. CoRR abs/2311.00812 (2023) - 2022
- [c70]Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons:
Automatic Detection of Fake Key Attacks in Secure Messaging. CCS 2022: 3019-3032 - [c69]Tarun Kumar Yadav, Justin Hales, Kent E. Seamons:
Poster: User-controlled System-level Encryption for all Applications. CCS 2022: 3499-3501 - [c68]Michael Clark, Kent E. Seamons:
Passwords and Cryptwords: The Final Limits on Lengths. NSPW 2022: 75-89 - [p2]Kent E. Seamons:
Privacy-Enhancing Technologies. Modern Socio-Technical Perspectives on Privacy 2022: 149-170 - [i12]Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons:
Automatic Detection of Fake Key Attacks in Secure Messaging. CoRR abs/2210.09940 (2022) - 2021
- [j13]Amir Herzberg, Hemi Leibowitz, Kent E. Seamons, Elham Vaziripour, Justin Wu, Daniel Zappala:
Secure Messaging Authentication Ceremonies Are Broken. IEEE Secur. Priv. 19(2): 29-37 (2021) - [c67]Jeremy Clark, Paul C. van Oorschot, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
SoK: Securing Email - A Stakeholder-Based Analysis. Financial Cryptography (1) 2021: 360-390 - 2020
- [c66]Trevor Smith, Luke Dickenson, Kent E. Seamons:
Let's Revoke: Scalable Global Certificate Revocation. NDSS 2020
2010 – 2019
- 2019
- [j12]Scott Ruoti, Kent E. Seamons:
Johnny's Journey Toward Usable Secure Email. IEEE Secur. Priv. 17(6): 72-76 (2019) - [j11]Hilarie Orman, Kent E. Seamons:
The Meaning of Identity on the Internet. IEEE Internet Comput. 23(5): 5-7 (2019) - [j10]Scott Ruoti, Jeff Andersen, Luke Dickinson, Scott Heidbrink, Tyler Monson, Mark O'Neill, Ken Reese, Brad Spendlove, Elham Vaziripour, Justin Wu, Daniel Zappala, Kent E. Seamons:
A Usability Study of Four Secure Email Tools Using Paired Participants. ACM Trans. Priv. Secur. 22(2): 13:1-13:33 (2019) - [c65]Luke Dickinson, Trevor Smith, Kent E. Seamons:
Leveraging locality of reference for certificate revocation. ACSAC 2019: 514-528 - [c64]Elham Vaziripour, Devon Howard, Jake Tyler, Mark O'Neill, Justin Wu, Kent E. Seamons, Daniel Zappala:
I Don't Even Have to Bother Them!: Using Social Media to Automate the Authentication Ceremony in Secure Messaging. CHI 2019: 93 - [c63]Jonathan Dutson, Danny Allen, Dennis Eggett, Kent E. Seamons:
Don't Punish all of us: Measuring User Attitudes about Two-Factor Authentication. EuroS&P Workshops 2019: 119-128 - [c62]Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, Kent E. Seamons:
A Usability Study of Five Two-Factor Authentication Methods. SOUPS @ USENIX Security Symposium 2019 - [c61]Justin Wu, Cyrus Gattrell, Devon Howard, Jake Tyler, Elham Vaziripour, Daniel Zappala, Kent E. Seamons:
"Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal. SOUPS @ USENIX Security Symposium 2019 - 2018
- [j9]Mark O'Neill, Kent E. Seamons, Daniel Zappala:
The Secure Socket API: TLS as an Operating System Service. login Usenix Mag. 43(4) (2018) - [c60]Elham Vaziripour, Justin Wu, Mark O'Neill, Daniel Metro, Josh Cockrell, Timothy Moffett, Jordan Whitehead, Nick Bonner, Kent E. Seamons, Daniel Zappala:
Action Needed! Helping Users Find and Complete the Authentication Ceremony in Signal. SOUPS @ USENIX Security Symposium 2018: 47-62 - [c59]Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, Kent E. Seamons:
A Comparative Usability Study of Key Management in Secure Email. SOUPS @ USENIX Security Symposium 2018: 375-394 - [c58]Joshua Reynolds, Trevor Smith, Ken Reese, Luke Dickinson, Scott Ruoti, Kent E. Seamons:
A Tale of Two Studies: The Best and Worst of YubiKey Usability. IEEE Symposium on Security and Privacy 2018: 872-888 - [c57]Mark O'Neill, Scott Heidbrink, Jordan Whitehead, Tanner Perdue, Luke Dickinson, Torstein Collett, Nick Bonner, Kent E. Seamons, Daniel Zappala:
The Secure Socket API: TLS as an Operating System Service. USENIX Security Symposium 2018: 799-816 - [i11]Jeremy Clark, Paul C. van Oorschot, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
Securing Email. CoRR abs/1804.07706 (2018) - 2017
- [j8]Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
TLS Inspection: How Often and Who Cares? IEEE Internet Comput. 21(3): 22-29 (2017) - [c56]Scott Ruoti, Kent E. Seamons:
End-to-End Passwords. NSPW 2017: 107-121 - [c55]Scott Ruoti, Kent E. Seamons, Daniel Zappala:
Layering Security at Global Control Points to Secure Unmodified Software. SecDev 2017: 42-49 - [c54]Elham Vaziripour, Justin Wu, Mark O'Neill, Jordan Whitehead, Scott Heidbrink, Kent E. Seamons, Daniel Zappala:
Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications. SOUPS 2017: 29-47 - [c53]Scott Ruoti, Tyler Monson, Justin Wu, Daniel Zappala, Kent E. Seamons:
Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture. SOUPS 2017: 211-228 - [c52]Trevor Smith, Scott Ruoti, Kent E. Seamons:
Augmenting Centralized Password Management with Application-Specific Passwords. SOUPS 2017 - [c51]Mark O'Neill, Scott Heidbrink, Scott Ruoti, Jordan Whitehead, Dan Bunker, Luke Dickinson, Travis Hendershot, Joshua Reynolds, Kent E. Seamons, Daniel Zappala:
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication. USENIX Security Symposium 2017: 609-624 - 2016
- [c50]Scott Ruoti, Jeff Andersen, Scott Heidbrink, Mark O'Neill, Elham Vaziripour, Justin Wu, Daniel Zappala, Kent E. Seamons:
"We're on the Same Page": A Usability Study of Secure Email Using Pairs of Novice Users. CHI 2016: 4298-4308 - [c49]Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
TLS Proxies: Friend or Foe? Internet Measurement Conference 2016: 551-557 - [c48]Alexander Afanasyev, J. Alex Halderman, Scott Ruoti, Kent E. Seamons, Yingdi Yu, Daniel Zappala, Lixia Zhang:
Content-based security for the web. NSPW 2016: 49-60 - [c47]Scott Ruoti, Jeff Andersen, Kent E. Seamons:
Strengthening Password-based Authentication. WAY@SOUPS 2016 - [c46]Scott Ruoti, Mark O'Neill, Daniel Zappala, Kent E. Seamons:
User Attitudes Toward the Inspection of Encrypted Traffic. SOUPS 2016: 131-146 - [c45]Scott Ruoti, Kent E. Seamons:
Standard Metrics and Scenarios for Usable Authentication. WAY@SOUPS 2016 - [c44]Elham Vaziripour, Mark O'Neill, Justin Wu, Scott Heidbrink, Kent E. Seamons, Daniel Zappala:
Social Authentication for End-to-End Encryption. WAY@SOUPS 2016 - [c43]Scott Ruoti, Jeff Andersen, Travis Hendershot, Daniel Zappala, Kent E. Seamons:
Private Webmail 2.0: Simple and Easy-to-Use Secure Email. UIST 2016: 461-472 - [i10]Mark O'Neill, Scott Heidbrink, Jordan Whitehead, Scott Ruoti, Dan Bunker, Kent E. Seamons, Daniel Zappala:
TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication. CoRR abs/1610.08570 (2016) - 2015
- [c42]Scott Ruoti, Brent Roberts, Kent E. Seamons:
Authentication Melee: A Usability Analysis of Seven Web Authentication Systems. WWW 2015: 916-926 - [i9]Scott Ruoti, Mark O'Neill, Daniel Zappala, Kent E. Seamons:
At Least Tell Me: User Attitudes Toward the Inspection of Encrypted Traffic. CoRR abs/1510.04921 (2015) - [i8]Scott Ruoti, Jeff Andersen, Travis Hendershot, Daniel Zappala, Kent E. Seamons:
Helping Johnny Understand and Avoid Mistakes: A Comparison of Automatic and Manual Encryption in Email. CoRR abs/1510.08435 (2015) - [i7]Scott Ruoti, Jeff Andersen, Scott Heidbrink, Mark O'Neill, Elham Vaziripour, Justin Wu, Daniel Zappala, Kent E. Seamons:
Johnny and Jane: Analyzing Secure Email Using Two Novice Users. CoRR abs/1510.08554 (2015) - [i6]Scott Ruoti, Jeff Andersen, Daniel Zappala, Kent E. Seamons:
Why Johnny Still, Still Can't Encrypt: Evaluating the Usability of a Modern PGP Client. CoRR abs/1510.08555 (2015) - [i5]Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, Kent E. Seamons:
MessageGuard: A Browser-based Platform for Usable, Content-Based Encryption Research. CoRR abs/1510.08943 (2015) - 2014
- [c41]Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
POSTER: TLS Proxies: Friend or Foe? CCS 2014: 1487-1489 - [i4]Mark O'Neill, Scott Ruoti, Kent E. Seamons, Daniel Zappala:
TLS Proxies: Friend or Foe? CoRR abs/1407.7146 (2014) - 2013
- [j7]Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:
A middleware approach for outsourcing data securely. Comput. Secur. 32: 252-266 (2013) - [c40]Scott Ruoti, Nathan Kim, Ben Burgon, Timothy W. van der Horst, Kent E. Seamons:
Confused Johnny: when automatic encryption leads to confusion and mistakes. SOUPS 2013: 5:1-5:12 - 2012
- [c39]Chris Robison, Scott Ruoti, Timothy W. van der Horst, Kent E. Seamons:
Private Facebook Chat. SocialCom/PASSAT 2012: 451-460 - 2011
- [j6]Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian, Kent E. Seamons:
DataVault: secure mobile access and data sharing. Netw. Secur. 2011(5): 16-19 (2011)
2000 – 2009
- 2009
- [e2]Kent E. Seamons, Neal McBurnett, Tim Polk:
IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA. ACM International Conference Proceeding Series, ACM 2009, ISBN 978-1-60558-474-4 [contents] - 2008
- [c38]Timothy W. van der Horst, Kent E. Seamons:
pwdArmor: Protecting Conventional Password-Based Authentications. ACSAC 2008: 443-452 - [c37]Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage. EDBT 2008: 710-714 - [c36]Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:
iDataGuard: an interoperable security middleware for untrusted internet data storage. Middleware (Companion) 2008: 36-41 - [c35]Daniel D. Walker, Eric G. Mercer, Kent E. Seamons:
Or Best Offer: A Privacy Policy Negotiation Protocol. POLICY 2008: 173-180 - [c34]Andrew Harding, Timothy W. van der Horst, Kent E. Seamons:
Wireless authentication using remote passwords. WISEC 2008: 24-29 - [c33]Reed S. Abbott, Timothy W. van der Horst, Kent E. Seamons:
CPG: closed pseudonymous groups. WPES 2008: 55-64 - [e1]Kent E. Seamons, Neal McBurnett, Tim Polk:
IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA. ACM International Conference Proceeding Series 283, ACM 2008, ISBN 978-1-60558-066-1 [contents] - 2007
- [c32]Phillip L. Hellewell, Kent E. Seamons:
Extensible Pre-authentication Kerberos. ACSAC 2007: 201-210 - [c31]Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:
gVault: A Gmail Based Cryptographic Network File System. DBSec 2007: 161-176 - [c30]Timothy W. van der Horst, Kent E. Seamons:
Simple Authentication for the Web. SecureComm 2007: 473-482 - [c29]Timothy W. van der Horst, Kent E. Seamons:
Simple authentication for the web. WWW 2007: 1217-1218 - [p1]Adam J. Lee, Kent E. Seamons, Marianne Winslett, Ting Yu:
Automated Trust Negotiation in Open Systems. Secure Data Management in Decentralized Systems 2007: 217-258 - 2006
- [c28]Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. ACSAC 2006: 57-66 - 2005
- [c27]Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria Foukia, Travis Leithead, Kent E. Seamons:
Adaptive trust negotiation and access control for grids. GRID 2005: 55-62 - [c26]Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons:
Adaptive trust negotiation and access control. SACMAT 2005: 139-146 - [c25]Timothy W. van der Horst, Kent E. Seamons:
Short Paper: Thor - The Hybrid Online Repository. SecureComm 2005: 412-414 - [i3]Jason E. Holt, Kent E. Seamons:
Logcrypt: Forward Security and Public Verification for Secure Audit Logs. IACR Cryptol. ePrint Arch. 2005: 2 (2005) - 2004
- [j5]Adam Hess, Jason E. Holt, Jared Jacobson, Kent E. Seamons:
Content-triggered trust negotiation. ACM Trans. Inf. Syst. Secur. 7(3): 428-456 (2004) - [c24]Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons:
Concealing complex policies with hidden credentials. CCS 2004: 146-157 - [c23]Timothy W. van der Horst, Tore Sundelin, Kent E. Seamons, Charles D. Knutson:
Mobile Trust Negotiation - Authentication and Authorization in Dynamic Mobile Networks. Communications and Multimedia Security 2004: 97-109 - [c22]Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett:
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web. ESWS 2004: 342-356 - [c21]Bryan Smith, Kent E. Seamons, Michael D. Jones:
Responding to Policies at Runtime in TrustBuilder. POLICY 2004: 149-158 - [c20]Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, Charles C. Zhang:
How to Exploit Ontologies for Trust Negotiation. Trust@ISWC 2004 - [i2]Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons:
Concealing Complex Policies with Hidden Credentials. IACR Cryptol. ePrint Arch. 2004: 109 (2004) - 2003
- [j4]Ting Yu, Marianne Winslett, Kent E. Seamons:
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1): 1-42 (2003) - [c19]Kent E. Seamons, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Aaron Patty, Bryan Smith, Tore Sundelin, Lina Yu:
TrustBuilder: Negotiating Trust in Dynamic Coalitions. DISCEX (2) 2003: 49-51 - [c18]Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu:
Trust Negotiation in Dynamic Coalitions. DISCEX (2) 2003: 240-245 - [c17]Adam Hess, Kent E. Seamons:
An access control model for dynamic client-side content. SACMAT 2003: 207-216 - [c16]Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons, Hilarie K. Orman:
Hidden Credentials. WPES 2003: 1-8 - 2002
- [j3]Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, Lina Yu:
Negotiating Trust on the Web. IEEE Internet Comput. 6(6): 30-37 (2002) - [c15]Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith:
Advanced Client/Server Authentication in TLS. NDSS 2002 - [c14]Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis:
Protecting Privacy during On-Line Trust Negotiation. Privacy Enhancing Technologies 2002: 129-143 - [c13]Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu:
Requirements for Policy Languages for Trust Negotiation. POLICY 2002: 68-79 - [i1]Jason E. Holt, Kent E. Seamons:
Selective disclosure credential sets. IACR Cryptol. ePrint Arch. 2002: 151 (2002) - 2001
- [c12]Ting Yu, Marianne Winslett, Kent E. Seamons:
Interoperable strategies in automated trust negotiation. CCS 2001: 146-155 - [c11]Kent E. Seamons, Marianne Winslett, Ting Yu:
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. NDSS 2001
1990 – 1999
- 1997
- [j2]Dik Lun Lee, Huei Chuang, Kent E. Seamons:
Document Ranking and the Vector-Space Model. IEEE Softw. 14(2): 67-75 (1997) - [c10]Kent E. Seamons, William H. Winsborough, Marianne Winslett:
Internet Credential Acceptance Policies. APPIA-GULP-PRODE 1997: 415-432 - [c9]Yong Cho, Marianne Winslett, Mahesh Subramaniam, Ying Chen, Szu-Wen Kuo, Kent E. Seamons:
Exploiting Local Data in Parallel Array I/O on a Practical Network of Workstations. IOPADS 1997: 1-13 - [c8]Szu-Wen Kuo, Marianne Winslett, Ying Chen, Yong Cho, Mahesh Subramaniam, Kent E. Seamons:
Application Experience with Parallel Input/Output: Panda and the H3expresso Black Hole Simulation on the SP2. PP 1997 - [c7]Szu-Wen Kuo, Marianne Winslett, Ying Chen, Yong Cho, Mahesh Subramaniam, Kent E. Seamons:
Parallel Input/Output with Heterogeneous Disks. SSDBM 1997: 79-90 - 1996
- [j1]Kent E. Seamons, Marianne Winslett:
Multidimensional array I/O in Panda 1.0. J. Supercomput. 10(2): 191-211 (1996) - [c6]Ying Chen, Marianne Winslett, Kent E. Seamons, Szu-Wen Kuo, Yong Cho, Mahesh Subramaniam:
Scalable Message Passing in Panda. IOPADS 1996: 109-121 - [c5]Ying Chen, Marianne Winslett, Szu-Wen Kuo, Yong Cho, Mahesh Subramaniam, Kent E. Seamons:
Performance Modeling for the Panda Array I/O Library. SC 1996: 45 - [c4]Kent E. Seamons, Ying Chen, Marianne Winslett, Yong Cho, Szu-Wen Kuo, Mahesh Subramaniam:
Persistent Array Access Using Server-Directed I/O. SSDBM 1996: 98-107 - 1995
- [c3]Kent E. Seamons, Ying Chen, P. Jones, J. Jozwiak, Marianne Winslett:
Server-Directed Collective I/O in Panda. SC 1995: 57 - 1994
- [c2]Kent E. Seamons, Marianne Winslett:
An efficient abstract interface for multidimensional array I/O. SC 1994: 650-659 - [c1]Kent E. Seamons, Marianne Winslett:
Physical Schemas for Large Multidimensional Arrays in Scientific Computing Applications. SSDBM 1994: 218-227
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint