default search action
Jordi Herrera-Joancomartí
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Ghazaleh Keshavarzkalhori, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí, Habib Yajam:
Federify: A Verifiable Federated Learning Scheme Based on zkSNARKs and Blockchain. IEEE Access 12: 3240-3255 (2024) - [c49]Pol Espinasa-Vilarrasa, Sílvia Sanvicente, Cristina Pérez-Solà, Jordi Herrera-Joancomartí:
Decision Tree Based Inference of Lightning Network Client Implementations. MDAI 2024: 103-114 - 2022
- [j30]Luis E. Oleas Chavez, Cristina Pérez-Solà, Jordi Herrera-Joancomartí:
Apples and Oranges: On How to Measure Node Centrality in Payment Channel Networks. IEEE Access 10: 55469-55487 (2022) - 2020
- [j29]Cristina Pérez-Solà, Jordi Herrera-Joancomartí:
BArt: Trading digital contents through digital assets. Concurr. Comput. Pract. Exp. 32(12) (2020) - [j28]Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
A fair protocol for data trading based on Bitcoin transactions. Future Gener. Comput. Syst. 107: 832-840 (2020) - [c48]Luis E. Oleas Chavez, Cristina Pérez-Solà, Jordi Herrera-Joancomartí:
On the Selection of the LN Client Implementation Parameters. DPM/CBT@ESORICS 2020: 305-318 - [c47]Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Joaquín García-Alfaro:
LockDown: Balance Availability Attack Against Lightning Network Channels. Financial Cryptography 2020: 245-263 - [e5]Joaquín García-Alfaro, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17-18, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12484, Springer 2020, ISBN 978-3-030-66171-7 [contents]
2010 – 2019
- 2019
- [j27]Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
Double-spending prevention for Bitcoin zero-confirmation transactions. Int. J. Inf. Sec. 18(4): 451-463 (2019) - [j26]Cristina Pérez-Solà, Jordi Herrera-Joancomartí:
Improving Classification of Interlinked Entities Using Only the Network Structure. Int. J. Softw. Eng. Knowl. Eng. 29(1): 63-91 (2019) - [c46]Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquín García-Alfaro:
On the Difficulty of Hiding the Balance of Lightning Network Channels. AsiaCCS 2019: 602-612 - [c45]Francesco Zola, Cristina Pérez-Solà, Jon Egaña Zubia, Maria Eguimendia, Jordi Herrera-Joancomartí:
Kriptosare.gen, a Dockerized Bitcoin Testbed: Analysis of Server Performance. NTMS 2019: 1-5 - [i10]Francesco Zola, Cristina Pérez-Solà, Jon Egaña Zubia, Maria Eguimendia, Jordi Herrera-Joancomartí:
Kriptosare.gen, a dockerized Bitcoin testbed: analysis of server performance. CoRR abs/1910.07377 (2019) - [i9]Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, Joaquín García-Alfaro:
On the Difficulty of Hiding the Balance of Lightning Network Channels. IACR Cryptol. ePrint Arch. 2019: 328 (2019) - [i8]Cristina Pérez-Solà, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Joaquín García-Alfaro:
LockDown: Balance Availability Attack against Lightning Network Channels. IACR Cryptol. ePrint Arch. 2019: 1149 (2019) - 2018
- [j25]Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas:
Bitcoin private key locked transactions. Inf. Process. Lett. 140: 37-41 (2018) - [j24]Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Joan Borrell:
Cryptocurrency Networks: A New P2P Paradigm. Mob. Inf. Syst. 2018: 2159082:1-2159082:16 (2018) - [c44]Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
Analysis of the Bitcoin UTXO Set. Financial Cryptography Workshops 2018: 78-91 - [e4]Joaquín García-Alfaro, Jordi Herrera-Joancomartí, Giovanni Livraga, Ruben Rios:
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings. Lecture Notes in Computer Science 11025, Springer 2018, ISBN 978-3-030-00304-3 [contents] - [i7]Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies. IACR Cryptol. ePrint Arch. 2018: 513 (2018) - [i6]Kurt M. Alonso, Jordi Herrera-Joancomartí:
Monero - Privacy in the Blockchain. IACR Cryptol. ePrint Arch. 2018: 535 (2018) - 2017
- [j23]Jordi Casas-Roma, Jordi Herrera-Joancomartí, Vicenç Torra:
A survey of graph-modification techniques for privacy-preserving on networks. Artif. Intell. Rev. 47(3): 341-366 (2017) - [j22]Jordi Casas-Roma, Jordi Herrera-Joancomartí, Vicenç Torra:
k-Degree anonymity and edge selection: improving data utility in large networks. Knowl. Inf. Syst. 50(2): 447-474 (2017) - [c43]Néstor Álvarez-Díaz, Jordi Herrera-Joancomartí, Pino Caballero-Gil:
Smart contracts based on blockchain for logistics management. IML 2017: 73:1-73:8 - [c42]Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Helena Rifà-Pous:
On Improving Automated Self-assessment with Moodle Quizzes: Experiences from a Cryptography Course. TEA 2017: 176-189 - [e3]Joaquín García-Alfaro, Guillermo Navarro-Arribas, Hannes Hartenstein, Jordi Herrera-Joancomartí:
Data Privacy Management, Cryptocurrencies and Blockchain Technology - ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings. Lecture Notes in Computer Science 10436, Springer 2017, ISBN 978-3-319-67815-3 [contents] - [i5]Cristina Pérez-Solà, Sergi Delgado-Segura, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
Double-spending Prevention for Bitcoin zero-confirmation transactions. IACR Cryptol. ePrint Arch. 2017: 394 (2017) - [i4]Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
A Fair Protocol for Data Trading Based on Bitcoin Transactions. IACR Cryptol. ePrint Arch. 2017: 1018 (2017) - [i3]Sergi Delgado-Segura, Cristina Pérez-Solà, Guillermo Navarro-Arribas, Jordi Herrera-Joancomartí:
Analysis of the Bitcoin UTXO set. IACR Cryptol. ePrint Arch. 2017: 1095 (2017) - 2016
- [j21]Sergi Delgado-Segura, Cristian Tanas, Jordi Herrera-Joancomartí:
Reputation and Reward: Two Sides of the Same Bitcoin. Sensors 16(6): 776 (2016) - [c41]Jordi Herrera-Joancomartí, Cristina Pérez-Solà:
Privacy in Bitcoin Transactions: New Challenges from Blockchain Scalability Solutions. MDAI 2016: 26-44 - [i2]Sergi Delgado-Segura, Cristina Pérez-Solà, Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas:
Bitcoin Private Key Locked Transactions. IACR Cryptol. ePrint Arch. 2016: 1184 (2016) - 2015
- [j20]Cristian Tanas, Jordi Herrera-Joancomartí:
When users become sensors: can we trust their readings? Int. J. Commun. Syst. 28(4): 601-614 (2015) - [j19]Jordi Casas-Roma, Jordi Herrera-Joancomartí, Vicenç Torra:
Anonymizing graphs: measuring quality for clustering. Knowl. Inf. Syst. 44(3): 507-528 (2015) - [j18]Joaquín García-Alfaro, Jordi Herrera-Joancomartí, Joan Melià-Seguí:
Remarks on Peinado et al.'s Analysis of J3Gen. Sensors 15(3): 6217-6220 (2015) - [c40]Cristian Tanas, Sergi Delgado-Segura, Jordi Herrera-Joancomartí:
An Integrated Reward and Reputation Mechanism for MCS Preserving Users' Privacy. DPM/QASA@ESORICS 2015: 83-99 - [p2]Jordi Casas-Roma, Jordi Herrera-Joancomartí, Vicenç Torra:
A Summary of k k -Degree Anonymous Methods for Privacy-Preserving on Networks. Advanced Research in Data Privacy 2015: 231-250 - [p1]Joaquín García-Alfaro, Jordi Herrera-Joancomartí, Joan Melià-Seguí:
Security and Privacy Concerns About the RFID Layer of EPC Gen2 Networks. Advanced Research in Data Privacy 2015: 303-324 - [e2]Joaquín García-Alfaro, Jordi Herrera-Joancomartí, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, Neeraj Suri:
Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8872, Springer 2015, ISBN 978-3-319-17015-2 [contents] - 2014
- [j17]Joan Melià-Seguí, Joaquín García-Alfaro, Jordi Herrera-Joancomartí:
On the similarity of commercial EPC Gen2 pseudorandom number generators. Trans. Emerg. Telecommun. Technol. 25(2): 151-154 (2014) - [c39]Jordi Herrera-Joancomartí:
Research and Challenges on Bitcoin Anonymity. DPM/SETOP/QASA 2014: 3-16 - [c38]Joan Antoni Donet Donet, Cristina Pérez-Solà, Jordi Herrera-Joancomartí:
The Bitcoin P2P Network. Financial Cryptography Workshops 2014: 87-102 - 2013
- [j16]Cristina Pérez-Solà, Jordi Herrera-Joancomartí:
OSN Crawling Schedulers and Their Implications on k-Plexes Detection. Int. J. Intell. Syst. 28(6): 583-605 (2013) - [j15]Joan Melià-Seguí, Joaquín García-Alfaro, Jordi Herrera-Joancomartí:
J3Gen: A PRNG for Low-Cost Passive RFID. Sensors 13(3): 3816-3830 (2013) - [c37]Jordi Casas-Roma, Jordi Herrera-Joancomartí, Vicenç Torra:
An algorithm for k-degree anonymity on large networks. ASONAM 2013: 671-675 - [c36]Cristian Tanas, Jordi Herrera-Joancomartí:
Crowdsensing Simulation Using ns-3. CitiSens 2013: 47-58 - [c35]Cristina Pérez-Solà, Jordi Herrera-Joancomartí:
Improving Automatic Edge Selection for Relational Classification. MDAI 2013: 284-295 - [c34]Jordi Casas-Roma, Jordi Herrera-Joancomartí, Vicenç Torra:
Analyzing the Impact of Edge Modifications on Networks. MDAI 2013: 296-307 - [c33]Cristina Pérez-Solà, Jordi Herrera-Joancomartí:
Improving Relational Classification Using Link Prediction Techniques. ECML/PKDD (1) 2013: 590-605 - [i1]Jordi Casas-Roma, Jordi Herrera-Joancomartí, Vicenç Torra:
Evolutionary Algorithm for Graph Anonymization. CoRR abs/1310.0229 (2013) - 2012
- [j14]Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí, Josep Prieto-Blázquez:
Towards secure mobile P2P applications using JXME. J. Internet Serv. Inf. Secur. 2(1/2): 1-21 (2012) - [c32]Cristian Tanas, Jordi Herrera-Joancomartí:
Users as Smart Sensors: A Mobile Platform for Sensing Public Transport Incidents. CitiSens 2012: 81-93 - [c31]Cristina Pérez-Solà, Jordi Herrera-Joancomartí:
Classifying Online Social Network Users through the Social Graph. FPS 2012: 115-131 - [c30]Jordi Casas-Roma, Jordi Herrera-Joancomartí, Vicenç Torra:
Comparing Random-Based and k-Anonymity-Based Algorithms for Graph Anonymization. MDAI 2012: 197-209 - 2011
- [j13]Helena Rifà-Pous, Jordi Herrera-Joancomartí:
Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices. Future Internet 3(1): 31-48 (2011) - [j12]Helena Rifà-Pous, Jordi Herrera-Joancomartí:
A Fair and Secure Cluster Formation Process for Ad Hoc Networks. Wirel. Pers. Commun. 56(3): 625-636 (2011) - [j11]Joan Melià-Seguí, Joaquín García-Alfaro, Jordi Herrera-Joancomartí:
A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags. Wirel. Pers. Commun. 59(1): 27-42 (2011) - [c29]Jordi Herrera-Joancomartí, Cristina Pérez-Solà:
Online Social Honeynets: Trapping Web Crawlers in OSN. MDAI 2011: 1-16 - 2010
- [j10]Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
JXTA resource access control by means of advertisement encryption. Future Gener. Comput. Syst. 26(1): 21-28 (2010) - [j9]Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
XML-based security for JXTA core protocols. Int. J. Auton. Comput. 1(4): 447-469 (2010) - [c28]Cristina Pérez-Solà, Jordi Herrera-Joancomartí:
OSN: When Multiple Autonomous Users Disclose Another Individual's Information. 3PGCIC 2010: 471-476 - [c27]Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
JXTA Security in Mobile Constrained Devices. AINA Workshops 2010: 139-144 - [c26]Joan Melià-Seguí, Joaquín García-Alfaro, Jordi Herrera-Joancomartí:
Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags. Financial Cryptography Workshops 2010: 34-46
2000 – 2009
- 2009
- [j8]Jordi Castellà-Roca, Alexandre Viejo, Jordi Herrera-Joancomartí:
Preserving user's privacy in web search engines. Comput. Commun. 32(13-14): 1541-1551 (2009) - [j7]Helena Rifà-Pous, Jordi Herrera-Joancomartí:
Cryptographic Energy Costs Are Assumable in Ad Hoc Networks. IEICE Trans. Inf. Syst. 92-D(5): 1194-1196 (2009) - [j6]Josep Prieto-Blázquez, Jordi Herrera-Joancomartí, Ana-Elena Guerrero-Roldán:
A Virtual Laboratory Structure for Developing Programming Labs. Int. J. Emerg. Technol. Learn. 4(S1): 47-52 (2009) - [j5]Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
A survey on security in JXTA applications. J. Syst. Softw. 82(9): 1513-1525 (2009) - [c25]Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
A Security Layer for JXTA Core Protocols. CISIS 2009: 463-468 - [c24]Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
Maintaining Unlinkability in Group Based P2P Environments. WETICE 2009: 140-145 - 2008
- [j4]Josep Prieto-Blázquez, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
An Integrated Structure for a Virtual Networking Laboratory. IEEE Trans. Ind. Electron. 55(6): 2334-2342 (2008) - [c23]Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
Persistent Interoperable Security for JXTA Advertisements. CISIS 2008: 354-359 - [c22]Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
Collaborative group membership and access control for JXTA. COMSWARE 2008: 159-166 - 2007
- [c21]Helena Rifà-Pous, Jordi Herrera-Joancomartí:
Secure Dynamic MANET On-demand (SEDYMO) Routing Protocol. CNSR 2007: 372-380 - [c20]Helena Rifà-Pous, Jordi Herrera-Joancomartí:
An Interdomain PKI Model Based on Trust Lists. EuroPKI 2007: 49-64 - [c19]Helena Rifà-Pous, Jordi Herrera-Joancomartí:
A Forwarding Spurring Protocol for Multihop Ad Hoc Networks (FURIES). NEW2AN 2007: 281-293 - 2006
- [j3]Jana Dittmann, David Megías, Andreas Lang, Jordi Herrera-Joancomartí:
Theoretical Framework for a Practical Evaluation and Comparison of Audio Watermarking Schemes in the Triangle of Robustness, Transparency and Capacity. Trans. Data Hiding Multim. Secur. 1: 1-40 (2006) - [c18]Jordi Castellà-Roca, Jordi Herrera-Joancomartí, Aleix Dorca-Josa:
A Secure E-Exam Management System. ARES 2006: 864-871 - [c17]Joan Arnedo-Moreno, Jordi Herrera-Joancomartí:
Providing a collaborative mechanism for peer group access control. CollaborateCom 2006 - [c16]David Megías, Jordi Herrera-Joancomartí, Jordi Serra-Ruiz, Julià Minguillón:
A benchmark assessment of the WAUC watermarking audio algorithm. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60721K - 2005
- [j2]Julià Minguillón, Jordi Herrera-Joancomartí, David Megías:
Robust watermarking scheme based on the JPEG2000 standard. J. Electronic Imaging 14(3): 033015 (2005) - [c15]David Megías, Jordi Herrera-Joancomartí, Julià Minguillón:
Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio. ICICS 2005: 427-440 - [c14]Julià Minguillón, Jordi Herrera-Joancomartí, David Megías, Jordi Serra-Ruiz, Joan Serra-Sagristà, Fernando García-Vílchez:
Influence of mark embedding strategies on lossless compression of ultraspectral images. IGARSS 2005: 4 - [e1]Mauro Barni, Jordi Herrera-Joancomartí, Stefan Katzenbeisser, Fernando Pérez-González:
Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3727, Springer 2005, ISBN 3-540-29039-7 [contents] - 2004
- [c13]David Megías, Jordi Herrera-Joancomartí, Julià Minguillón:
A Robust Frequency Domain Audio Watermarking Scheme for Monophonic and Stereophonic PCM Formats. EUROMICRO 2004: 449-452 - [c12]Jordi Herrera-Joancomartí, Josep Prieto-Blázquez, Jordi Castellà-Roca:
A Secure Electronic Examination Protocol using Wireless Networks. ITCC (2) 2004: 263-268 - [c11]David Megías, Jordi Herrera-Joancomartí, Julià Minguillón:
Robust Frequency Domain Audio Watermarking: A Tuning Analysis. IWDW 2004: 244-258 - [c10]David Megías, Jordi Herrera-Joancomartí, Julià Minguillón:
An audio watermarking scheme robust against stereo attacks. MM&Sec 2004: 206-213 - 2003
- [c9]David Megías, Jordi Herrera-Joancomartí, Julià Minguillón:
A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression. Communications and Multimedia Security 2003: 226-238 - [c8]Jordi Herrera-Joancomartí, Josep Prieto-Blázquez:
A Personal Authentication Scheme Using Mobile Technology. ITCC 2003: 253-257 - [c7]Jordi Herrera-Joancomartí, Julià Minguillón, David Megías:
A family of image watermarking schemes based on lossy compression. ITCC 2003: 559-563 - [c6]Julià Minguillón, Jordi Herrera-Joancomartí, David Megías:
Empirical evaluation of a JPEG2000 standard-based robust watermarking scheme. Security and Watermarking of Multimedia Contents 2003: 717-727 - 2000
- [c5]Jordi Castellà-Roca, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí, Jordi Planes:
A Performance Comparison of Java Cards for Micropayment Implementation. CARDIS 2000: 19-38 - [c4]Francesc Sebé, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí:
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling. ISW 2000: 44-53 - [c3]Josep Domingo-Ferrer, Jordi Herrera-Joancomartí:
Simple Collusion-Secure Fingerprinting Schemes for Images. ITCC 2000: 128-132
1990 – 1999
- 1999
- [c2]Josep Domingo-Ferrer, Jordi Herrera-Joancomartí:
Spending Programs: A Tool for Flexible Micropayments. ISW 1999: 1-13 - 1998
- [j1]Josep Domingo-Ferrer, Jordi Herrera-Joancomartí:
An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents. SIGMOD Rec. 27(4): 62-67 (1998) - [c1]Josep Domingo-Ferrer, Jordi Herrera-Joancomartí:
Efficient Smart-Card Based Anonymous Fingerprinting. CARDIS 1998: 221-228
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-22 20:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint