default search action
Arturo Ribagorda
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j34]Lorena González-Manzano, José María de Fuentes, Arturo Ribagorda:
Leveraging User-related Internet of Things for Continuous Authentication: A Survey. ACM Comput. Surv. 52(3): 53:1-53:38 (2019) - 2018
- [j33]José María de Fuentes, Lorena González-Manzano, Arturo Ribagorda:
Secure and Usable User-in-a-Context Continuous Authentication in Smartphones Leveraging Non-Assisted Sensors. Sensors 18(4): 1219 (2018) - [p2]José María de Fuentes, Luis Hernández Encinas, Arturo Ribagorda:
Security Protocols for Networks and Internet: A Global Vision. Computer and Network Security Essentials 2018: 135-151 - 2015
- [j32]Guillermo Suarez-Tangil, Esther Palomar, Arturo Ribagorda, Ivan Sanz:
Providing SIEM systems with self-adaptation. Inf. Fusion 21: 145-158 (2015) - [j31]Juan E. Tapiador, Agustín Orfila, Arturo Ribagorda, Benjamín Ramos:
Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System. IEEE Trans. Dependable Secur. Comput. 12(3): 312-325 (2015) - 2014
- [j30]Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda:
SoNeUCONABC, an expressive usage control model for Web-Based Social Networks. Comput. Secur. 43: 159-187 (2014) - [j29]Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda:
CooPeD: Co-owned Personal Data management. Comput. Secur. 47: 41-65 (2014) - [j28]Guillermo Suarez-Tangil, Juan E. Tapiador, Pedro Peris-Lopez, Arturo Ribagorda:
Evolution, Detection and Analysis of Malware for Smart Devices. IEEE Commun. Surv. Tutorials 16(2): 961-987 (2014) - [j27]Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda:
Extended U+F Social Network Protocol: Interoperability, reusability, data protection and indirect relationships in Web Based Social Networks. J. Syst. Softw. 94: 50-71 (2014) - 2013
- [j26]Almudena Alcaide, Esther Palomar, José Montero-Castillo, Arturo Ribagorda:
Anonymous authentication for privacy-preserving IoT target-driven applications. Comput. Secur. 37: 111-123 (2013) - [p1]Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda:
User-Managed Access Control in Web Based Social Networks. Security and Privacy Preserving in Social Networks 2013: 97-137 - 2012
- [j25]Esther Palomar, Almudena Alcaide, Arturo Ribagorda, Yan Zhang:
The Peer's Dilemma: A general framework to examine cooperation in pure peer-to-peer systems. Comput. Networks 56(17): 3756-3766 (2012) - [j24]Jorge Blasco Alís, Julio César Hernández Castro, Juan E. Tapiador, Arturo Ribagorda:
Bypassing information leakage protection with trusted applications. Comput. Secur. 31(4): 557-568 (2012) - [c59]Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda:
U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social Networks. TrustCom 2012: 1387-1392 - 2011
- [c58]Sergio Pastrana, Agustín Orfila, Arturo Ribagorda:
A Functional Framework to Evade Network IDS. HICSS 2011: 1-10 - [c57]Carlos Javier Hernández-Castro, Arturo Ribagorda, Julio César Hernández Castro:
On the Strength of Egglue and Other Logic CAPTCHAs. SECRYPT 2011: 157-167 - [c56]Guillermo Suarez-Tangil, Esther Palomar, Sergio Pastrana, Arturo Ribagorda:
Artificial Immunity-based Correlation System. SECRYPT 2011: 422-425 - 2010
- [j23]Carlos Javier Hernández-Castro, Arturo Ribagorda:
Pitfalls in CAPTCHA design and implementation: The Math CAPTCHA, a case study. Comput. Secur. 29(1): 141-157 (2010) - [c55]Jorge Blasco Alís, Agustín Orfila, Arturo Ribagorda:
Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming. ARES 2010: 327-332 - [c54]Sergio Pastrana, Agustín Orfila, Arturo Ribagorda:
Modeling NIDS Evasion with Genetic Programming. Security and Management 2010: 444-448 - [c53]Esther Palomar, Almudena Alcaide, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda:
A Simple Mechanism to Maintain Peer's Cooperativeness: The Peer's RPS Dilemma. International Conference on Internet Computing 2010: 37-43 - [c52]Carlos Javier Hernández-Castro, Jonathan D. Stainton-Ellis, Arturo Ribagorda, Julio César Hernández Castro:
Shortcomings in CAPTCHA Design and Implementation: Captcha2, a Commercial Proposal. INC 2010: 159-168 - [c51]Carlos Javier Hernández-Castro, Arturo Ribagorda, Yago Sáez:
Side-channel Attack on the HumanAuth CAPTCHA. SECRYPT 2010: 59-65 - [c50]Almudena Alcaide, Esther Palomar, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda:
Formal Proof of Cooperativeness in a Multi-Party P2P Content Authentication Protocol. TrustBus 2010: 141-152 - [c49]Elena Castro Galán, Julio César Hernández Castro, Almudena Alcaide, Arturo Ribagorda:
A Strong Authentication Protocol Based on Portable One-Time Dynamic URLs. Web Intelligence 2010: 682-685
2000 – 2009
- 2009
- [j22]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. Comput. Stand. Interfaces 31(1): 88-97 (2009) - [j21]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Comput. Stand. Interfaces 31(2): 372-380 (2009) - [j20]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification. J. Inf. Sci. Eng. 25(1): 33-57 (2009) - [c48]Guillermo Suarez-Tangil, Esther Palomar, José María de Fuentes, Jorge Blasco Alís, Arturo Ribagorda:
Automatic Rule Generation Based on Genetic Programming for Event Correlation. CISIS 2009: 127-134 - [c47]Agustín Orfila, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming. EvoWorkshops 2009: 93-98 - [c46]Carlos Javier Hernández-Castro, Arturo Ribagorda:
Remotely Telling Humans and Computers Apart: An Unsolved Problem. iNetSeC 2009: 9-26 - [c45]Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros:
Steganalysis of Hydan. SEC 2009: 132-142 - [c44]Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda:
On the Need to Divide the Signature Creation Environment. SECRYPT 2009: 375-380 - [c43]Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda:
Extended electronic signature policies. SIN 2009: 268-277 - [i2]Carlos Javier Hernández-Castro, Arturo Ribagorda, Yago Sáez:
Side-channel attack on labeling CAPTCHAs. CoRR abs/0908.1185 (2009) - 2008
- [j19]Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Secure content access and replication in pure P2P networks. Comput. Commun. 31(2): 266-279 (2008) - [j18]Agustín Orfila, Javier Carbó, Arturo Ribagorda:
Autonomous decision on intrusion detection with trained BDI agents. Comput. Commun. 31(9): 1803-1813 (2008) - [j17]Juan M. Estévez-Tapiador, Almudena Alcaide, Julio César Hernández Castro, Arturo Ribagorda:
Bayesian rational exchange. Int. J. Inf. Sec. 7(1): 85-100 (2008) - [j16]Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Cryptanalysis of Syverson's Rational Exchange Protocol. Int. J. Netw. Secur. 7(2): 151-156 (2008) - [j15]Ana Isabel González-Tablas Ferreres, A. Orfila Ramos, Arturo Ribagorda:
EVAWEB V2: Enhancing a Web-Based Assessment Systems Focused on Nonrepudiation Use and Teaching. Int. J. Web Based Learn. Teach. Technol. 3(1): 21-32 (2008) - [j14]Juan M. Estévez-Tapiador, Julio César Hernández Castro, Pedro Peris-Lopez, Arturo Ribagorda:
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions. J. Inf. Sci. Eng. 24(5): 1485-1504 (2008) - [j13]Javier Polimón, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Automated design of a lightweight block cipher with Genetic Programming. Int. J. Knowl. Based Intell. Eng. Syst. 12(1): 3-14 (2008) - [j12]Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho:
Guaranteeing the Authenticity of Location Information. IEEE Pervasive Comput. 7(3): 72-80 (2008) - [j11]Juan M. Estévez-Tapiador, Julio César Hernández Castro, Almudena Alcaide, Arturo Ribagorda:
On the Distinguishability of Distance-Bounded Permutations in Ordered Channels. IEEE Trans. Inf. Forensics Secur. 3(2): 166-172 (2008) - [c42]José María de Fuentes, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda:
CERTILOC: Implementation of a Spatial-Temporal Certification Service Compatible with Several Localization Technologies. ARES 2008: 363-368 - [c41]Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Non-standard Attacks against Cryptographic Protocols, with an Example over a Simplified Mutual Authentication Protocol. MCO 2008: 589-596 - [c40]Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Nature-Inspired Synthesis of Rational Protocols. PPSN 2008: 981-990 - [c39]Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho:
CSteg: Talking in C Code - Steganography of C Source Code in Text. SECRYPT 2008: 399-406 - [c38]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. WISA 2008: 56-68 - [i1]Juan M. Estévez-Tapiador, Almudena Alcaide, Julio César Hernández Castro, Arturo Ribagorda:
Cryptanalysis of the RSA-CEGD protocol. CoRR abs/0812.0686 (2008) - 2007
- [j10]Ana Isabel González-Tablas Ferreres, Karel Wouters, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho:
EVAWEB: A Web-Based Assessment System to Learn X.509/PKIX-Based Digital Signatures. IEEE Trans. Educ. 50(2): 112-117 (2007) - [c37]Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security. DEXA Workshops 2007: 779-783 - [c36]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. EUC Workshops 2007: 781-794 - [c35]Ana Isabel González-Tablas Ferreres, Benjamín Ramos Álvarez, Arturo Ribagorda Garnacho:
Spatial-Temporal Certification Framework and Extension of X.509 Attribute Certificate Framework and SAML Standard to Support Spatial-Temporal Certificates. EuroPKI 2007: 321-329 - [c34]Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Towards Automated Design of Multi-party Rational Exchange Security Protocols. Web Intelligence/IAT Workshops 2007: 387-390 - [c33]Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
A Multi-party Rational Exchange Protocol. OTM Workshops (1) 2007: 42-43 - [c32]Pedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Solving the Simultaneous Scanning Problem Anonymously: Clumping Proofs for RFID Tags. SECPerU 2007: 55-60 - 2006
- [j9]Joaquín Torres Márquez, Antonio Izquierdo, José María Sierra, Arturo Ribagorda:
Towards self-authenticable smart cards. Comput. Commun. 29(15): 2781-2787 (2006) - [j8]Julio César Hernández Castro, Ignacio Blasco-Lopez, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho:
Steganography in games: A general methodology and its application to the game of Go. Comput. Secur. 25(1): 64-71 (2006) - [c31]Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho, Benjamín Ramos Álvarez:
Wheedham: An Automatically Designed Block Cipher by means of Genetic Programming. IEEE Congress on Evolutionary Computation 2006: 192-199 - [c30]Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
A Protocol for Secure Content Distribution in Pure P2P Networks. DEXA Workshops 2006: 712-716 - [c29]Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
A P2P Content Authentication Protocol Based on Byzantine Agreement. ETRICS 2006: 60-72 - [c28]Almudena Alcaide, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
An Extended Model of Rational Exchange Based on Dynamic Games of Imperfect Information. ETRICS 2006: 396-408 - [c27]Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Security in P2P Networks: Survey and Research Directions. EUC Workshops 2006: 183-192 - [c26]César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi:
Evolving hash functions by means of genetic programming. GECCO 2006: 1861-1862 - [c25]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
RFID Systems: A Survey on Security Threats and Proposed Solutions. PWC 2006: 159-170 - [c24]Agustín Orfila, Javier Carbó, Arturo Ribagorda:
Effectiveness Evaluation of Data Mining Based IDS. ICDM 2006: 377-388 - [c23]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags. OTM Workshops (1) 2006: 352-361 - [c22]Hugo A. Mitre-Hernández, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda:
A Legal Ontology to Support Privacy Preservation in Location-Based Services. OTM Workshops (2) 2006: 1755-1764 - [c21]Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Certificate-based Access Control in Pure P2P Networks. Peer-to-Peer Computing 2006: 177-184 - [c20]César Estébanez, Julio César Hernández Castro, Arturo Ribagorda, Pedro Isasi Viñuela:
Finding State-of-the-Art Non-cryptographic Hashes with Genetic Programming. PPSN 2006: 818-827 - [c19]Carlos Lamenca-Martinez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Lamar: A New Pseudorandom Number Generator Evolved by Means of Genetic Programming. PPSN 2006: 850-859 - [c18]Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags. UIC 2006: 912-923 - 2005
- [j7]Agustín Orfila, Javier Carbó, Arturo Ribagorda:
Intrusion Detection Effectiveness Improvement by a Multiagent System. Int. J. Comput. Sci. Appl. 2(1): 1-6 (2005) - [j6]Julio César Hernández Castro, José María Sierra, André Seznec, Antonio Izquierdo, Arturo Ribagorda:
The strict avalanche criterion randomness test. Math. Comput. Simul. 68(1): 1-7 (2005) - [c17]Ana Isabel González-Tablas Ferreres, L. M. Salas, Benjamín Ramos, Arturo Ribagorda:
Providing Personalization and Automation to Spatial-Temporal Stamping Services. DEXA Workshops 2005: 219-225 - [c16]Ana Isabel González-Tablas Ferreres, Klaus Kursawe, Benjamín Ramos, Arturo Ribagorda:
Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services. EUC Workshops 2005: 797-806 - [c15]Joaquín Torres Márquez, Antonio Izquierdo, Arturo Ribagorda, Almudena Alcaide:
Secure Electronic Payments in Heterogeneous Networking: New Authentication Protocols Approach. ICCSA (3) 2005: 729-738 - 2004
- [j5]José María Sierra, Julio César Hernández Castro, Narayana Jayaram, Arturo Ribagorda:
Low computational cost integrity for block ciphers. Future Gener. Comput. Syst. 20(5): 857-863 (2004) - [j4]Julio César Hernández Castro, José María Sierra, Arturo Ribagorda:
Beware of the Security Software. Inf. Secur. J. A Glob. Perspect. 12(6): 39-45 (2004) - [c14]Antonio Izquierdo, José María Sierra, Julio César Hernández Castro, Arturo Ribagorda:
Security Issues in Network File Systems. ICCSA (1) 2004: 812-820 - [c13]José María Sierra, Julio César Hernández Castro, Antonio Izquierdo, Arturo Ribagorda:
Secure Communications in Multi-Agent Systems Protecting KQML. WOSIS 2004: 305-313 - 2003
- [c12]Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda:
Path-Stamps: A Proposal for Enhancing Security of Location Tracking Applications. CAiSE Workshops 2003 - [c11]Javier Carbo Rubiera, Agustín Orfila, Arturo Ribagorda:
Adaptive Agents Applied to Intrusion Detection. CEEMAS 2003: 445-453 - [c10]Agustín Orfila, Javier Carbó, Arturo Ribagorda:
Fuzzy logic on decision model for IDS. FUZZ-IEEE 2003: 1237-1242 - [c9]José María Sierra, Julio César Hernández Castro, Eva Ponce, Arturo Ribagorda:
Protection of Multiagent Systems. ICCSA (3) 2003: 123-128 - 2002
- [c8]Julio CCsar HemBndez, Pedro Isasi, Arturo Ribagorda:
Easing collision finding in cryptographic primitives with genetic algorithms. IEEE Congress on Evolutionary Computation 2002: 535-539 - [c7]Ana Isabel González-Tablas Ferreres, Elena Castro, Arturo Ribagorda, Manuel Velasco:
A Secure Perspective of Data. Including Authentication in the NewsML DTD. ICWI 2002: 791-794 - [c6]Julio César Hernández Castro, José María Sierra, Pedro Isasi, Arturo Ribagorda:
Genetic Cryptoanalysis of Two Rounds TEA. International Conference on Computational Science (3) 2002: 1024-1031 - [c5]Karel Wouters, Bart Preneel, Ana Isabel González-Tablas Ferreres, Arturo Ribagorda:
Towards an XML format for time-stamps. XML Security 2002: 61-70 - 2001
- [j3]Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos:
Search Engines as a Security Threat. Computer 34(10): 25-30 (2001) - [j2]Julio C. Hernandez-Castro, Arturo Ribagorda, Pedro Isasi, José M. Sierra:
Genetic Algorithms Can be Used to Obtain Good Linear Congruential Generators. Cryptologia 25(3): 213-229 (2001) - [c4]Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos, J. Carlos Mex-Perera:
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers. IMACC 2001: 374-377 - [c3]Julio César Hernández Castro, Eva María Cebrián, José María Sierra, Arturo Ribagorda, Benjamín Ramos:
Project WebOracle: Developing an advanced web server security assesment tool. WebNet 2001: 526-529 - [c2]Julio César Hernández Castro, José María Sierra, Arturo Ribagorda, Benjamín Ramos:
Search Engines as a security thread. WebNet 2001: 530-533
1990 – 1999
- 1999
- [c1]Alberto Muñoz, Arturo Ribagorda, José M. Sierra:
IPR techniques applied to a multimedia environment in the HYPERMEDIA project. Security and Watermarking of Multimedia Contents 1999: 125-133 - 1993
- [j1]J. Fernández-González, Gordon B. Agnew, Arturo Ribagorda:
Encryption and error correction codes for reliable file storage. Comput. Secur. 12(5): 501-510 (1993)
Coauthor Index
aka: Julio C. Hernandez-Castro
aka: Ana Isabel González-Tablas Ferreres
aka: Benjamín Ramos Álvarez
aka: José M. Sierra
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 19:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint