default search action
Vladimir Shpilrain
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i68]Vladimir Shpilrain:
Complexity of some algorithmic problems in groups: a survey. CoRR abs/2401.09218 (2024) - [i67]Vladimir Shpilrain, Bianca Sosnovski:
Cayley hashing with cookies. CoRR abs/2402.04943 (2024) - [i66]Vladimir Shpilrain:
Growth in products of matrices: fastest, average, and generic. CoRR abs/2405.00610 (2024) - [i65]Lucy Hyde, Siobhán O'Connor, Vladimir Shpilrain:
Orbit-blocking words and the average-case complexity of Whitehead's problem in the free group of rank 2. CoRR abs/2406.12322 (2024) - [i64]Vladimir Shpilrain, Bianca Sosnovski:
Cayley hashing with cookies. IACR Cryptol. ePrint Arch. 2024: 233 (2024) - 2023
- [c25]Dima Grigoriev, Ilia Ilmer, Alexey Ovchinnikov, Vladimir Shpilrain:
BASS: Boolean Automorphisms Signature Scheme. SecITC 2023: 1-12 - [i63]Jiale Chen, Dima Grigoriev, Vladimir Shpilrain:
Digital signature schemes using non-square matrices or scrap automorphisms. CoRR abs/2306.08927 (2023) - [i62]Dima Grigoriev, Ilia Ilmer, Alexey Ovchinnikov, Vladimir Shpilrain:
BASS: Boolean Automorphisms Signature Scheme. CoRR abs/2306.11303 (2023) - [i61]Jiale Chen, Dima Grigoriev, Vladimir Shpilrain:
Tropical cryptography III: digital signatures. CoRR abs/2309.11256 (2023) - [i60]Jiale Chen, Dima Grigoriev, Vladimir Shpilrain:
Digital signature schemes using non-square matrices or scrap automorphisms. IACR Cryptol. ePrint Arch. 2023: 873 (2023) - [i59]Dima Grigoriev, Ilia Ilmer, Alexey Ovchinnikov, Vladimir Shpilrain:
BASS: Boolean Automorphisms Signature Scheme. IACR Cryptol. ePrint Arch. 2023: 957 (2023) - [i58]Jiale Chen, Dima Grigoriev, Vladimir Shpilrain:
Tropical cryptography III: digital signatures. IACR Cryptol. ePrint Arch. 2023: 1475 (2023) - 2022
- [j29]Nael Rahman, Vladimir Shpilrain:
MAKE: A matrix action key exchange. J. Math. Cryptol. 16(1): 64-72 (2022) - [c24]Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain:
A Survey on Delegated Computation. DLT 2022: 33-53 - [c23]Giovanni Di Crescenzo, Matluba Khodjaeva, Ta Chen, Rajesh Krishnan, David Shur, Delaram Kahrobaei, Vladimir Shpilrain:
On Single-Server Delegation of RSA. SecITC 2022: 81-101 - [i57]Alexander Yu. Olshanskii, Vladimir Shpilrain:
Linear average-case complexity of algorithmic problems in groups. CoRR abs/2205.05232 (2022) - 2021
- [j28]Dima Grigoriev, Vladimir Shpilrain:
RSA and redactable blockchains. Int. J. Comput. Math. Comput. Syst. Theory 6(1): 1-6 (2021) - [j27]Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain:
Probability theory and public-key cryptography. Int. J. Comput. Math. Comput. Syst. Theory 6(4): 285-290 (2021) - [j26]Delaram Kahrobaei, Vladimir Shpilrain:
A note on fully homomorphic encryption of real-life data. Int. J. Comput. Math. Comput. Syst. Theory 6(4): 381-385 (2021) - [c22]Giovanni Di Crescenzo, Matluba Khodjaeva, Vladimir Shpilrain, Delaram Kahrobaei, Rajesh Krishnan:
Single-Server Delegation of Ring Multiplications from Quasilinear-time Clients. SIN 2021: 1-8 - [i56]Nael Rahman, Vladimir Shpilrain:
MOBS (Matrices Over Bit Strings) public key exchange. CoRR abs/2106.01116 (2021) - [i55]Nael Rahman, Vladimir Shpilrain:
MAKE: a Matrix Action Key Exchange. IACR Cryptol. ePrint Arch. 2021: 116 (2021) - [i54]Nael Rahman, Vladimir Shpilrain:
MOBS (Matrices Over Bit Strings) public key exchange. IACR Cryptol. ePrint Arch. 2021: 560 (2021) - 2020
- [j25]Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain:
Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC). J. Math. Cryptol. 14(1): 438-459 (2020) - [j24]Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain:
Efficient and Secure Delegation of Exponentiation in General Groups to a Single Malicious Server. Math. Comput. Sci. 14(3): 641-656 (2020) - [c21]Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain:
Secure and Efficient Delegation of Elliptic-Curve Pairing. ACNS (1) 2020: 45-66 - [c20]Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain:
Secure and Efficient Delegation of Pairings with Online Inputs. CARDIS 2020: 84-99 - [i53]Dima Grigoriev, Vladimir Shpilrain:
RSA and redactable blockchains. CoRR abs/2001.10783 (2020) - [i52]Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain:
Probability theory and public-key cryptography. CoRR abs/2006.01607 (2020) - [i51]Nael Rahman, Vladimir Shpilrain:
MAKE: a Matrix Action Key Exchange. CoRR abs/2009.00716 (2020) - [i50]Dima Grigoriev, Vladimir Shpilrain:
RSA and redactable blockchains. IACR Cryptol. ePrint Arch. 2020: 69 (2020) - [i49]Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain:
Probability theory and public-key cryptography. IACR Cryptol. ePrint Arch. 2020: 625 (2020)
2010 – 2019
- 2019
- [j23]Alexander Wood, Vladimir Shpilrain, Kayvan Najarian, Delaram Kahrobaei:
Private naive bayes classification of personal biomedical data: Application in cancer data analysis. Comput. Biol. Medicine 105: 144-150 (2019) - [c19]Alexey Gribov, Kelsey Horan, Jonathan Gryak, Kayvan Najarian, Vladimir Shpilrain, S. M. Reza Soroushmehr, Delaram Kahrobaei:
Medical Diagnostics Based on Encrypted Medical Data. BICT 2019: 98-111 - [c18]Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain:
Secure Delegation to a Single Malicious Server: Exponentiation in RSA-type Groups. CNS 2019: 1-9 - 2018
- [j22]Alexey Gribov, Delaram Kahrobaei, Vladimir Shpilrain:
Practical private-key fully homomorphic encryption in rings. Groups Complex. Cryptol. 10(1): 17-27 (2018) - [c17]Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain:
A Framework for Unconditionally Secure Public-Key Encryption (with Possible Decryption Errors). ICMS 2018: 45-54 - [c16]Giovanni Di Crescenzo, Delaram Kahrobaei, Matluba Khodjaeva, Vladimir Shpilrain:
Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups. ICMS 2018: 137-146 - [c15]Alexander Wood, Vladimir Shpilrain, Kayvan Najarian, Ali Mostashari, Delaram Kahrobaei:
Private-Key Fully Homomorphic Encryption for Private Classification. ICMS 2018: 475-481 - [i48]Vladimir Shpilrain:
Problems in group theory motivated by cryptography. CoRR abs/1802.07300 (2018) - [i47]Dima Grigoriev, Vladimir Shpilrain:
Tropical cryptography II: extensions by homomorphisms. CoRR abs/1811.06386 (2018) - [i46]Dima Grigoriev, Vladimir Shpilrain:
Tropical cryptography II: extensions by homomorphisms. IACR Cryptol. ePrint Arch. 2018: 1104 (2018) - 2017
- [j21]Dima Grigoriev, Vladimir Shpilrain:
Secure Multiparty Computation without One-way Functions. FLAP 4(4) (2017) - [j20]Dima Grigoriev, Laszlo B. Kish, Vladimir Shpilrain:
Yao's Millionaires' Problem and Public-Key Encryption Without Computational Assumptions. Int. J. Found. Comput. Sci. 28(4): 379-390 (2017) - [c14]Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain:
Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server. CCSW 2017: 17-28 - [c13]Giovanni Di Crescenzo, Matluba Khodjaeva, Delaram Kahrobaei, Vladimir Shpilrain:
Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation. CNS 2017: 531-539 - [i45]Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain:
Probabilistic solution of Yao's millionaires' problem. CoRR abs/1711.09675 (2017) - [i44]Mariya Bessonov, Dima Grigoriev, Vladimir Shpilrain:
Probabilistic solution of Yao's millionaires' problem. IACR Cryptol. ePrint Arch. 2017: 1129 (2017) - 2016
- [j19]Vladimir Shpilrain, Bianca Sosnovski:
Compositions of linear functions and applications to hashing. Groups Complex. Cryptol. 8(2): 155-161 (2016) - [c12]Delaram Kahrobaei, Vladimir Shpilrain:
Using Semidirect Product of (Semi)groups in Public Key Cryptography. CiE 2016: 132-141 - [i43]Delaram Kahrobaei, Vladimir Shpilrain:
Using semidirect product of (semi)groups in public key cryptography. CoRR abs/1604.05542 (2016) - [i42]Vladimir Shpilrain, Bianca Sosnovski:
Compositions of linear functions and applications to hashing. IACR Cryptol. ePrint Arch. 2016: 189 (2016) - [i41]Delaram Kahrobaei, Vladimir Shpilrain:
Using semidirect product of (semi)groups in public key cryptography. IACR Cryptol. ePrint Arch. 2016: 378 (2016) - 2015
- [c11]Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain:
Efficient and Secure Delegation of Group Exponentiation to a Single Server. RFIDSec 2015: 156-173 - [i40]Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain:
Efficient and Secure Delegation of Group Exponentiation to a Single Server. IACR Cryptol. ePrint Arch. 2015: 206 (2015) - [i39]Vladimir Shpilrain, Bianca Sosnovski:
Compositions of linear functions and applications to hashing. IACR Cryptol. ePrint Arch. 2015: 726 (2015) - 2014
- [j18]Vladimir Shpilrain:
Editorial. Groups Complex. Cryptol. 6(2): 71 (2014) - [j17]Vladimir Shpilrain:
Decoy-based information security. Groups Complex. Cryptol. 6(2): 149-155 (2014) - [j16]Dima Grigoriev, Vladimir Shpilrain:
Yao's Millionaires' Problem and Decoy-Based Public Key Encryption by Classical Physics. Int. J. Found. Comput. Sci. 25(4): 409-418 (2014) - [i38]Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain:
A CCA secure cryptosystem using matrices over group rings. CoRR abs/1403.3660 (2014) - [i37]Lisa Bromberg, Vladimir Shpilrain, Alina Vdovina:
Navigating in the Cayley graph of SL2(Fp) and applications to hashing. CoRR abs/1409.4478 (2014) - [i36]Dima Grigoriev, Vladimir Shpilrain:
Yao's millionaires' problem and decoy-based public key encryption by classical physics. IACR Cryptol. ePrint Arch. 2014: 384 (2014) - [i35]Vladimir Shpilrain:
Decoy-based information security. IACR Cryptol. ePrint Arch. 2014: 746 (2014) - [i34]Lisa Bromberg, Vladimir Shpilrain, Alina Vdovina:
Navigating in the Cayley graph of SL2(Fp) and applications to hashing. IACR Cryptol. ePrint Arch. 2014: 814 (2014) - 2013
- [j15]Dima Grigoriev, Vladimir Shpilrain:
Secrecy without one-way functions. Groups Complex. Cryptol. 5(1): 31-52 (2013) - [j14]Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain:
Public key exchange using matrices over group rings. Groups Complex. Cryptol. 5(1): 97-115 (2013) - [c10]Maggie E. Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain:
Public Key Exchange Using Semidirect Product of (Semi)Groups. ACNS 2013: 475-486 - [c9]Dima Grigoriev, Vladimir Shpilrain:
Secure Information Transmission Based on Physical Principles. UCNC 2013: 113-124 - [i33]Dima Grigoriev, Vladimir Shpilrain:
Tropical cryptography. CoRR abs/1301.1195 (2013) - [i32]Dima Grigoriev, Vladimir Shpilrain:
Secrecy without one-way functions. CoRR abs/1301.5069 (2013) - [i31]Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain:
Public Key Exchange Using Matrices Over Group Rings. CoRR abs/1302.1625 (2013) - [i30]Maggie E. Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain:
Public key exchange using semidirect product of (semi)groups. CoRR abs/1304.6572 (2013) - [i29]Dima Grigoriev, Vladimir Shpilrain:
Yao's millionaires' problem and decoy-based public key encryption by classical physics. CoRR abs/1312.1160 (2013) - [i28]Dima Grigoriev, Vladimir Shpilrain:
Tropical cryptography. IACR Cryptol. ePrint Arch. 2013: 12 (2013) - [i27]Dima Grigoriev, Vladimir Shpilrain:
Secrecy without one-way functions. IACR Cryptol. ePrint Arch. 2013: 55 (2013) - [i26]Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain:
Public Key Exchange Using Matrices Over Group Rings. IACR Cryptol. ePrint Arch. 2013: 114 (2013) - [i25]Maggie E. Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain:
Public key exchange using semidirect product of (semi)groups. IACR Cryptol. ePrint Arch. 2013: 226 (2013) - [i24]Dima Grigoriev, Vladimir Shpilrain:
Secure information transmission based on physical principles. IACR Cryptol. ePrint Arch. 2013: 261 (2013) - 2012
- [j13]Dima Grigoriev, Vladimir Shpilrain:
No-leak authentication by the Sherlock Holmes method. Groups Complex. Cryptol. 4(1): 177-189 (2012) - [i23]Maggie E. Habeeb, Delaram Kahrobaei, Vladimir Shpilrain:
A Secret Sharing Scheme Based on Group Presentations and the Word Problem. CoRR abs/1205.0157 (2012) - [i22]Maggie E. Habeeb, Delaram Kahrobaei, Vladimir Shpilrain:
A Secret Sharing Scheme Based on Group Presentations and the Word Problem. IACR Cryptol. ePrint Arch. 2012: 246 (2012) - 2011
- [c8]Gilbert Baumslag, Nelly Fazio, Antonio Nicolosi, Vladimir Shpilrain, William E. Skeith III:
Generalized Learning Problems and Applications to Non-commutative Cryptography. ProvSec 2011: 324-339 - [i21]Vladimir Shpilrain:
Sublinear time algorithms in the theory of groups and semigroups. CoRR abs/1105.3252 (2011) - [i20]Gilbert Baumslag, Nelly Fazio, Antonio Nicolosi, Vladimir Shpilrain, William E. Skeith III:
Generalized Learning Problems and Applications to Non-Commutative Cryptography. IACR Cryptol. ePrint Arch. 2011: 357 (2011) - 2010
- [j12]Dima Grigoriev, Vladimir Shpilrain:
Authentication schemes from actions on graphs, groups, or rings. Ann. Pure Appl. Log. 162(3): 194-200 (2010) - [j11]Vladimir Shpilrain:
Search and witness problems in group theory. Groups Complex. Cryptol. 2(2): 231-246 (2010) - [i19]Dima Grigoriev, Vladimir Shpilrain:
Authentication from matrix conjugation. CoRR abs/1010.5034 (2010) - [i18]Dima Grigoriev, Vladimir Shpilrain:
Authentication schemes from actions on graphs, groups, or rings. IACR Cryptol. ePrint Arch. 2010: 24 (2010) - [i17]Dima Grigoriev, Vladimir Shpilrain:
No-leak authentication by the Sherlock Holmes method. IACR Cryptol. ePrint Arch. 2010: 624 (2010)
2000 – 2009
- 2009
- [j10]Vladimir Shpilrain, Gabriel Zapata:
Using Decision Problems in Public Key Cryptography. Groups Complex. Cryptol. 1(1): 33-49 (2009) - [j9]Dima Grigoriev, Vladimir Shpilrain:
Authentication from Matrix Conjugation. Groups Complex. Cryptol. 1(2): 199-205 (2009) - 2008
- [c7]Vladimir Shpilrain, Alexander Ushakov:
An Authentication Scheme Based on the Twisted Conjugacy Problem. ACNS 2008: 366-372 - [c6]Denis Osin, Vladimir Shpilrain:
Public Key Encryption and Encryption Emulation Attacks. CSR 2008: 252-260 - [c5]Vladimir Shpilrain:
Cryptanalysis of Stickel's Key Exchange Scheme. CSR 2008: 283-288 - [i16]Dima Grigoriev, Vladimir Shpilrain:
Zero-knowledge authentication schemes from actions on graphs, groups, or rings. CoRR abs/0802.1661 (2008) - [i15]Vladimir Shpilrain, Alexander Ushakov:
An authentication scheme based on the twisted conjugacy problem. CoRR abs/0805.2701 (2008) - [i14]Denis Osin, Vladimir Shpilrain:
Public key encryption and encryption emulation attacks. IACR Cryptol. ePrint Arch. 2008: 120 (2008) - 2007
- [j8]Chi-Ming Lam, Vladimir Shpilrain, Jie-Tai Yu:
Recognizing and parametrizing curves isomorphic to a line. J. Symb. Comput. 42(7): 751-756 (2007) - [i13]Vladimir Shpilrain, Gabriel Zapata:
Using decision problems in public key cryptography. CoRR abs/math/0703656 (2007) - [i12]Vladimir Shpilrain, Gabriel Zapata:
Using decision problems in public key cryptography. IACR Cryptol. ePrint Arch. 2007: 147 (2007) - 2006
- [j7]Vladimir Shpilrain, Alexander Ushakov:
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient. Appl. Algebra Eng. Commun. Comput. 17(3-4): 285-289 (2006) - [j6]Vladimir Shpilrain, Gabriel Zapata:
Combinatorial Group Theory and Public Key Cryptography. Appl. Algebra Eng. Commun. Comput. 17(3-4): 291-302 (2006) - [c4]Vladimir Shpilrain:
Hashing with Polynomials. ICISC 2006: 22-28 - [c3]Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov:
Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol. Public Key Cryptography 2006: 302-314 - 2005
- [c2]Vladimir Shpilrain, Alexander Ushakov:
Thompson's Group and Public Key Cryptography. ACNS 2005: 151-163 - [c1]Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov:
A Practical Attack on a Braid Group Based Cryptographic Protocol. CRYPTO 2005: 86-96 - [i11]Vladimir Shpilrain, Alexander Ushakov:
Thompson's group and public key cryptography. CoRR abs/math/0505487 (2005) - [i10]Vladimir Shpilrain, Alexander Ushakov:
A new key exchange protocol based on the decomposition problem. CoRR abs/math/0512140 (2005) - [i9]Vladimir Shpilrain, Alexander Ushakov:
A new key exchange protocol based on the decomposition problem. IACR Cryptol. ePrint Arch. 2005: 447 (2005) - 2004
- [j5]Alexander A. Mikhalev, Vladimir Shpilrain, Ualbai U. Umirbaev:
On Isomorphism of Lie Algebras with One Defining Relation. Int. J. Algebra Comput. 14(3): 389-393 (2004) - [i8]Vladimir Shpilrain, Gabriel Zapata:
Combinatorial group theory and public key cryptography. CoRR math.GR/0410068 (2004) - [i7]Vladimir Shpilrain, Gabriel Zapata:
Combinatorial group theory and public key cryptography. IACR Cryptol. ePrint Arch. 2004: 242 (2004) - [i6]Vladimir Shpilrain, Alexander Ushakov:
The conjugacy search problem in public key cryptography: unnecessary and insufficient. IACR Cryptol. ePrint Arch. 2004: 321 (2004) - 2003
- [i5]Ilya Kapovich, Paul E. Schupp, Vladimir Shpilrain:
Generic properties of Whitehead's Algorithm, stabilizers in Aut(Fk) and one-relator groups. CoRR math.GR/0303386 (2003) - [i4]Vladimir Shpilrain:
Assessing security of some group based cryptosystems. CoRR math.GR/0311047 (2003) - [i3]Vladimir Shpilrain:
Assessing security of some group based cryptosystems. IACR Cryptol. ePrint Arch. 2003: 123 (2003) - 2002
- [i2]Ilya Kapovich, Alexei G. Myasnikov, Paul E. Schupp, Vladimir Shpilrain:
Generic-case complexity, decision problems in group theory and random walks. CoRR math.GR/0203239 (2002) - [i1]Ilya Kapovich, Alexei G. Myasnikov, Paul E. Schupp, Vladimir Shpilrain:
Average-case complexity and decision problems in group theory. CoRR math.GR/0206273 (2002) - 2001
- [j4]Vladimir Shpilrain:
Representing Braids by Automorphisms. Int. J. Algebra Comput. 11(6): 773-778 (2001)
1990 – 1999
- 1996
- [j3]Vladimir Shpilrain:
Magnus Embeddings for Semigroups. Int. J. Algebra Comput. 6(2): 155-164 (1996) - 1993
- [j2]C. Kanta Gupta, Vladimir Shpilrain:
The Centre of a One-Relator Solvable Group. Int. J. Algebra Comput. 3(1): 51-56 (1993) - 1991
- [j1]Vladimir Shpilrain:
Automorphisms of F/R′ Groups. Int. J. Algebra Comput. 1(2): 177-184 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint