default search action
Joseph Bonneau
Person information
- affiliation: New York University, NY, USA
- affiliation (former): Stanford University, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Faxing Wang, Shaanan Cohney, Riad Wahby, Joseph Bonneau:
NOTRY: Deniable messaging with retroactive avowal. Proc. Priv. Enhancing Technol. 2024(2): 391-411 (2024) - [c70]Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh:
Powers-of-Tau to the People: Decentralizing Setup Ceremonies. ACNS (3) 2024: 105-134 - [c69]Miranda Christ, Kevin Choi, Walter McKelvie, Joseph Bonneau, Tal Malkin:
Accountable Secret Leader Election. AFT 2024: 1:1-1:21 - [c68]Miranda Christ, Kevin Choi, Joseph Bonneau:
Cornucopia: Distributed Randomness at Scale. AFT 2024: 17:1-17:23 - [c67]Collin Zhang, Zachary DeStefano, Arasu Arun, Joseph Bonneau, Paul Grubbs, Michael Walfish:
Zombie: Middleboxes that Don't Snoop. NSDI 2024 - [c66]Zachary DeStefano, Jeff J. Ma, Joseph Bonneau, Michael Walfish:
NOPE: Strengthening domain authentication with succinct proofs. SOSP 2024: 673-692 - [i29]Ertem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, Valeria Nikolaenko:
Atomic and Fair Data Exchange via Blockchain. IACR Cryptol. ePrint Arch. 2024: 418 (2024) - [i28]Joseph Bonneau, Benedikt Bünz, Miranda Christ, Yuval Efron:
Good things come to those who wait: Dishonest-Majority Coin-Flipping Requires Delay Functions. IACR Cryptol. ePrint Arch. 2024: 1711 (2024) - [i27]Joseph Bonneau, Benedikt Bünz, Miranda Christ, Yuval Efron:
How Much Public Randomness Do Modern Consensus Protocols Need? IACR Cryptol. ePrint Arch. 2024: 1794 (2024) - 2023
- [j4]Dennis Shasha, Taegyun Kim, Joseph Bonneau, Yan Michalevsky, Gil Shotan, Yonatan Winetraub:
High Performance, Low Energy, and Trustworthy Blockchains Using Satellites. Found. Trends Netw. 13(4): 252-325 (2023) - [j3]Errol Francis II, Ayana Monroe, Emily Sidnam-Mauch, Bernat Ivancsics, Eve Washington, Susan E. McGregor, Joseph Bonneau, Kelly Caine:
Transparency, Trust, and Security Needs for the Design of Digital News Authentication Tools. Proc. ACM Hum. Comput. Interact. 7(CSCW1): 1-44 (2023) - [c65]Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad Wahby, Joseph Bonneau, David Mazières:
Riggs: Decentralized Sealed-Bid Auctions. CCS 2023: 1227-1241 - [c64]Assimakis Kattis, Joseph Bonneau:
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees. FC 2023: 18-35 - [c63]Miranda Christ, Joseph Bonneau:
Limits on Revocable Proof Systems, With Implications for Stateless Blockchains. FC 2023: 54-71 - [c62]Kevin Choi, Arasu Arun, Nirvan Tyagi, Joseph Bonneau:
Bicorn: An Optimistically Efficient Distributed Randomness Beacon. FC (1) 2023: 235-251 - [c61]Kevin Choi, Aathira Manoj, Joseph Bonneau:
SoK: Distributed Randomness Beacons. SP 2023: 75-92 - [e4]Joseph Bonneau, S. Matthew Weinberg:
5th Conference on Advances in Financial Technologies, AFT 2023, October 23-25, 2023, Princeton, NJ, USA. LIPIcs 282, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2023, ISBN 978-3-95977-303-4 [contents] - [i26]Kevin Choi, Arasu Arun, Nirvan Tyagi, Joseph Bonneau:
Bicorn: An optimistically efficient distributed randomness beacon. IACR Cryptol. ePrint Arch. 2023: 221 (2023) - [i25]Kevin Choi, Aathira Manoj, Joseph Bonneau:
SoK: Distributed Randomness Beacons. IACR Cryptol. ePrint Arch. 2023: 728 (2023) - [i24]Collin Zhang, Zachary DeStefano, Arasu Arun, Joseph Bonneau, Paul Grubbs, Michael Walfish:
Zombie: Middleboxes that Don't Snoop. IACR Cryptol. ePrint Arch. 2023: 1022 (2023) - [i23]Nirvan Tyagi, Arasu Arun, Cody Freitag, Riad Wahby, Joseph Bonneau, David Mazières:
Riggs: Decentralized Sealed-Bid Auctions. IACR Cryptol. ePrint Arch. 2023: 1336 (2023) - [i22]István András Seres, Noemi Glaeser, Joseph Bonneau:
Naysayer proofs. IACR Cryptol. ePrint Arch. 2023: 1472 (2023) - [i21]Noemi Glaeser, István András Seres, Michael Zhu, Joseph Bonneau:
Cicada: A framework for private non-interactive on-chain auctions and voting. IACR Cryptol. ePrint Arch. 2023: 1473 (2023) - [i20]Miranda Christ, Kevin Choi, Joseph Bonneau:
Cornucopia: Distributed randomness beacons at scale. IACR Cryptol. ePrint Arch. 2023: 1554 (2023) - [i19]Faxing Wang, Shaanan Cohney, Riad Wahby, Joseph Bonneau:
NOTRY: deniable messaging with retroactive avowal. IACR Cryptol. ePrint Arch. 2023: 1926 (2023) - 2022
- [c60]Arasu Arun, Joseph Bonneau, Jeremy Clark:
Short-lived Zero-Knowledge Proofs and Signatures. ASIACRYPT (3) 2022: 487-516 - [c59]Nirvan Tyagi, Ben Fisch, Andrew Zitek, Joseph Bonneau, Stefano Tessaro:
VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries. CCS 2022: 2793-2807 - [c58]Emily Sidnam-Mauch, Bernat Ivancsics, Ayana Monroe, Eve Washington, Errol Francis II, Kelly Caine, Joseph Bonneau, Susan E. McGregor:
Usable Cryptographic Provenance: A Proactive Complement to Fact-Checking for Mitigating Misinformation. ICWSM Workshops 2022 - [c57]Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish:
Zero-Knowledge Middleboxes. USENIX Security Symposium 2022: 4255-4272 - [i18]Arasu Arun, Joseph Bonneau, Jeremy Clark:
Short-lived zero-knowledge proofs and signatures. IACR Cryptol. ePrint Arch. 2022: 190 (2022) - [i17]Miranda Christ, Joseph Bonneau:
Limits on revocable proof systems, with applications to stateless blockchains. IACR Cryptol. ePrint Arch. 2022: 1478 (2022) - [i16]Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh:
Powers-of-Tau to the People: Decentralizing Setup Ceremonies. IACR Cryptol. ePrint Arch. 2022: 1592 (2022) - 2021
- [i15]Nirvan Tyagi, Ben Fisch, Joseph Bonneau, Stefano Tessaro:
Client-Auditable Verifiable Registries. IACR Cryptol. ePrint Arch. 2021: 627 (2021) - [i14]Paul Grubbs, Arasu Arun, Ye Zhang, Joseph Bonneau, Michael Walfish:
Zero-Knowledge Middleboxes. IACR Cryptol. ePrint Arch. 2021: 1022 (2021) - 2020
- [e3]Joseph Bonneau, Nadia Heninger:
Financial Cryptography and Data Security - 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers. Lecture Notes in Computer Science 12059, Springer 2020, ISBN 978-3-030-51279-8 [contents] - [i13]Assimakis Kattis, Joseph Bonneau:
Proof of Necessary Work: Succinct State Verification with Fairness Guarantees. IACR Cryptol. ePrint Arch. 2020: 190 (2020) - [i12]Joseph Bonneau, Izaak Meckler, Vanishree Rao, Evan Shapiro:
Coda: Decentralized Cryptocurrency at Scale. IACR Cryptol. ePrint Arch. 2020: 352 (2020)
2010 – 2019
- 2019
- [c56]Camelia Simoiu, Joseph Bonneau, Christopher Gates, Sharad Goel:
"I was told to buy a software or lose my computer. I ignored it": A study of ransomware. SOUPS @ USENIX Security Symposium 2019 - 2018
- [c55]Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch:
Verifiable Delay Functions. CRYPTO (1) 2018: 757-788 - [c54]Joseph Bonneau:
Hostile Blockchain Takeovers (Short Paper). Financial Cryptography Workshops 2018: 92-100 - [i11]Rainer Böhme, Joseph Bonneau, Ittay Eyal:
Blockchain Security at Scale (Dagstuhl Seminar 18461). Dagstuhl Reports 8(11): 21-34 (2018) - [i10]Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch:
Verifiable Delay Functions. IACR Cryptol. ePrint Arch. 2018: 601 (2018) - 2017
- [j2]Saba Eskandarian, Eran Messeri, Joseph Bonneau, Dan Boneh:
Certificate Transparency with Privacy. Proc. Priv. Enhancing Technol. 2017(4): 329-344 (2017) - [c53]Joshua Tan, Lujo Bauer, Joseph Bonneau, Lorrie Faith Cranor, Jeremy Thomas, Blase Ur:
Can Unicorns Help Users Compare Crypto Key Fingerprints? CHI 2017: 3787-3798 - [c52]Steven Goldfeder, Joseph Bonneau, Rosario Gennaro, Arvind Narayanan:
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin. Financial Cryptography 2017: 321-339 - [c51]Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, Matthew Smith:
Obstacles to the Adoption of Secure Communication Tools. IEEE Symposium on Security and Privacy 2017: 137-153 - [e2]Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, Markus Jakobsson:
Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10323, Springer 2017, ISBN 978-3-319-70277-3 [contents] - [i9]Saba Eskandarian, Eran Messeri, Joseph Bonneau, Dan Boneh:
Certificate Transparency with Privacy. CoRR abs/1703.02209 (2017) - 2016
- [b2]Arvind Narayanan, Joseph Bonneau, Edward W. Felten, Andrew Miller, Steven Goldfeder:
Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction. Princeton University Press 2016, ISBN 978-0-691-17169-2, pp. I-XXVII, 1-304 - [c50]Joseph Bonneau:
Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus. Financial Cryptography Workshops 2016: 19-26 - [c49]Joseph Bonneau:
EthIKS: Using Ethereum to Audit a CONIKS Key Transparency Log. Financial Cryptography Workshops 2016: 95-105 - [c48]Okke Schrijvers, Joseph Bonneau, Dan Boneh, Tim Roughgarden:
Incentive Compatibility of Bitcoin Mining Pool Reward Functions. Financial Cryptography 2016: 477-498 - [c47]Marie Vasek, Joseph Bonneau, Ryan Castellucci, Cameron Keith, Tyler Moore:
The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets. Financial Cryptography 2016: 609-618 - [c46]Jeremiah Blocki, Anupam Datta, Joseph Bonneau:
Differentially Private Password Frequency Lists. NDSS 2016 - [i8]Jeremiah Blocki, Anupam Datta, Joseph Bonneau:
Differentially Private Password Frequency Lists. IACR Cryptol. ePrint Arch. 2016: 153 (2016) - 2015
- [j1]Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano:
Passwords and the evolution of imperfect authentication. Commun. ACM 58(7): 78-87 (2015) - [c45]Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau, Jeremy Clark, Dan Boneh:
Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges. CCS 2015: 720-731 - [c44]Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Matthew Smith:
POSTER: Secure Chat for the Masses? User-centered Security to the Rescue. CCS 2015: 1623-1625 - [c43]Michael J. Kranch, Joseph Bonneau:
Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning. NDSS 2015 - [c42]Stuart E. Schechter, Joseph Bonneau:
Learning Assigned Secrets for Unlocking Mobile Devices. SOUPS 2015: 277-295 - [c41]Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IEEE Symposium on Security and Privacy 2015: 104-121 - [c40]Nik Unger, Sergej Dechand, Joseph Bonneau, Sascha Fahl, Henning Perl, Ian Goldberg, Matthew Smith:
SoK: Secure Messaging. IEEE Symposium on Security and Privacy 2015: 232-249 - [c39]Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart:
Cracking-Resistant Password Vaults Using Natural Language Encoders. IEEE Symposium on Security and Privacy 2015: 481-498 - [c38]Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman:
CONIKS: Bringing Key Transparency to End Users. USENIX Security Symposium 2015: 383-398 - [c37]Harry A. Kalodner, Miles Carlsten, Paul M. Ellenbogen, Joseph Bonneau, Arvind Narayanan:
An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design. WEIS 2015 - [c36]Joseph Bonneau, Elie Bursztein, Ilan Caron, Rob Jackson, Mike Williamson:
Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google. WWW 2015: 141-150 - [i7]Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IACR Cryptol. ePrint Arch. 2015: 261 (2015) - [i6]Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart:
Cracking-Resistant Password Vaults using Natural Language Encoders. IACR Cryptol. ePrint Arch. 2015: 788 (2015) - [i5]Gaby G. Dagher, Benedikt Bünz, Joseph Bonneau, Jeremy Clark, Dan Boneh:
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges. IACR Cryptol. ePrint Arch. 2015: 1008 (2015) - [i4]Joseph Bonneau, Jeremy Clark, Steven Goldfeder:
On Bitcoin as a public randomness source. IACR Cryptol. ePrint Arch. 2015: 1015 (2015) - 2014
- [c35]Nicky Robinson, Joseph Bonneau:
Cognitive disconnect: understanding facebook connect login permissions. COSN 2014: 247-258 - [c34]Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten:
Mixcoin: Anonymity for Bitcoin with Accountable Mixes. Financial Cryptography 2014: 486-504 - [c33]Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, XiaoFeng Wang:
The Tangled Web of Password Reuse. NDSS 2014 - [c32]Joseph Bonneau, Andrew Miller:
Fawkescoin - A Cryptocurrency Without Public-Key Cryptography. Security Protocols Workshop 2014: 350-358 - [c31]Joseph Bonneau:
FawkesCoin: A Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion). Security Protocols Workshop 2014: 359-370 - [c30]Joseph Bonneau, Stuart E. Schechter:
Towards Reliable Storage of 56-bit Secrets in Human Memory. USENIX Security Symposium 2014: 607-623 - [i3]Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten:
Mixcoin: Anonymity for Bitcoin with accountable mixes. IACR Cryptol. ePrint Arch. 2014: 77 (2014) - [i2]Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Michael J. Freedman, Edward W. Felten:
CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication. IACR Cryptol. ePrint Arch. 2014: 1004 (2014) - 2013
- [e1]Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau:
Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8263, Springer 2013, ISBN 978-3-642-41716-0 [contents] - 2012
- [b1]Joseph Bonneau:
Guessing human-chosen secrets. University of Cambridge, UK, 2012 - [c29]Joseph Bonneau, Ekaterina Shutova:
Linguistic Properties of Multi-word Passphrases. Financial Cryptography Workshops 2012: 1-12 - [c28]Joseph Bonneau, Sören Preibusch, Ross J. Anderson:
A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs. Financial Cryptography 2012: 25-40 - [c27]Serge Egelman, Joseph Bonneau, Sonia Chiasson, David Dittrich, Stuart E. Schechter:
It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin. Financial Cryptography Workshops 2012: 124-132 - [c26]Joseph Bonneau:
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords. IEEE Symposium on Security and Privacy 2012: 538-552 - [c25]Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano:
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. IEEE Symposium on Security and Privacy 2012: 553-567 - [c24]Joseph Bonneau:
Statistical Metrics for Individual Password Strength. Security Protocols Workshop 2012: 76-86 - [c23]Joseph Bonneau:
Statistical Metrics for Individual Password Strength (Transcript of Discussion). Security Protocols Workshop 2012: 87-95 - 2011
- [c22]Joseph Bonneau:
Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords. Security Protocols Workshop 2011: 98-104 - [c21]Joseph Bonneau:
Getting Web Authentication Right (Transcript of Discussion). Security Protocols Workshop 2011: 105-114 - [c20]Joseph Bonneau, Rubin Xu:
Scrambling for Lightweight Censorship Resistance. Security Protocols Workshop 2011: 296-302 - [c19]Sören Preibusch, Joseph Bonneau:
The Privacy Landscape: Product Differentiation on Data Collection. WEIS 2011 - [c18]Sören Preibusch, Joseph Bonneau:
The Privacy Landscape: Product Differentiation on Data Collection. WEIS (Springer Volume) 2011: 263-283 - 2010
- [c17]Joseph Bonneau, Mike Just, Greg Matthews:
What's in a Name? Financial Cryptography 2010: 98-113 - [c16]Sören Preibusch, Joseph Bonneau:
The Password Game: Negative Externalities from Weak Password Practices. GameSec 2010: 192-207 - [c15]Joseph Bonneau:
Digital Immolation - New Directions for Online Protest. Security Protocols Workshop 2010: 25-33 - [c14]Joseph Bonneau:
Digital Immolation (Transcript of Discussion). Security Protocols Workshop 2010: 34-44 - [c13]Jonathan Anderson, Joseph Bonneau, Frank Stajano:
Inglorious Installers: Security in the Application Marketplace. WEIS 2010 - [c12]Joseph Bonneau, Sören Preibusch:
The Password Thicket: Technical and Market Failures in Human Authentication on the Web. WEIS 2010 - [c11]Christo Wilson, Alessandra Sala, Joseph Bonneau, Robert Zablit, Ben Y. Zhao:
Don't Tread on Me: Moderating Access to OSN Data with SpikeStrip. WOSN 2010
2000 – 2009
- 2009
- [c10]Joseph Bonneau, Jonathan Anderson, George Danezis:
Prying Data out of a Social Network. ASONAM 2009: 249-254 - [c9]Hyoungshick Kim, Joseph Bonneau:
Privacy-enhanced public view for social graphs. CIKM-SWSM 2009: 41-48 - [c8]Jonathan Anderson, Claudia Díaz, Joseph Bonneau, Frank Stajano:
Privacy-enabling social networking over untrusted networks. WOSN 2009: 1-6 - [c7]Joseph Bonneau, Jonathan Anderson, Ross J. Anderson, Frank Stajano:
Eight friends are enough: social graph approximation via public listings. SNS 2009: 13-18 - [c6]Joseph Bonneau, Jonathan Anderson, Luke Church:
Privacy suites: shared privacy for social networks. SOUPS 2009 - [c5]Luke Church, Jonathan Anderson, Joseph Bonneau, Frank Stajano:
Privacy stories: confidence in privacy behaviors through end user programming. SOUPS 2009 - [c4]Joseph Bonneau:
Alice and Bob in Love. Security Protocols Workshop 2009: 189-198 - [c3]Joseph Bonneau:
Alice and Bob in Love. Security Protocols Workshop 2009: 199-212 - [c2]Joseph Bonneau, Sören Preibusch:
The Privacy Jungle: On the Market for Data Protection in Social Networks. WEIS 2009 - 2006
- [c1]Joseph Bonneau, Ilya Mironov:
Cache-Collision Timing Attacks Against AES. CHES 2006: 201-215 - [i1]Joseph Bonneau:
Robust Final-Round Cache-Trace Attacks Against AES. IACR Cryptol. ePrint Arch. 2006: 374 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint