default search action
Yutaka Miyake
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j21]Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake, Ayumu Kubota:
Malware detection for IoT devices using hybrid system of whitelist and machine learning based on lightweight flow data. Enterp. Inf. Syst. 17(9) (2023) - [j20]Arman Pashamokhtari, Norihiro Okui, Yutaka Miyake, Masataka Nakahara, Hassan Habibi Gharakheili:
Combining Stochastic and Deterministic Modeling of IPFIX Records to Infer Connected IoT Devices in Residential ISP Networks. IEEE Internet Things J. 10(6, March 15): 5128-5145 (2023) - 2022
- [c68]Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Mizuho Yoshihira, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki:
Improving Palmprint-Region Estimation for ID-Less Palmprint Recognition. BWCCA 2022: 125-136 - [c67]Norihiro Okui, Masataka Nakahara, Yutaka Miyake, Ayumu Kubota:
Identification of an IoT Device Model in the Home Domain Using IPFIX Records. COMPSAC 2022: 583-592 - [c66]Mizuho Yoshihira, Ayumi Serizawa, Ryosuke Okudera, Yumo Ouchi, Yuya Shiomi, Naoya Nitta, Masataka Nakahara, Akira Baba, Yutaka Miyake, Tetsushi Ohki, Masakatsu Nishigaki:
Improving Rank-N Identification Rate of Palmprint Identification Using Permutation-Based Indexing. HCI (32) 2022: 78-93 - 2021
- [c65]Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake:
Malware Detection for IoT Devices using Automatically Generated White List and Isolation Forest. IoTBDS 2021: 38-47 - [c64]Arman Pashamokhtari, Norihiro Okui, Yutaka Miyake, Masataka Nakahara, Hassan Habibi Gharakheili:
Inferring Connected IoT Devices from IPFIX Records in Residential ISP Networks. LCN 2021: 57-64 - [c63]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Takashi Ozu, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Automatic Security Inspection Framework for Trustworthy Supply Chain. SERA 2021: 45-50 - 2020
- [c62]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Consideration on Data Conformance Toward Building Trust in Supply Chain. EuCNC 2020: 128-132 - [c61]Ayaka Sugimoto, Yuya Shiomi, Akira Baba, Norihiro Okui, Tetsushi Ohki, Yutaka Miyake, Masakatsu Nishigaki:
A Liveness Detection Method for Palmprint Authentication. IHSI 2020: 385-391 - [c60]Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake:
Machine Learning based Malware Traffic Detection on IoT Devices using Summarized Packet Data. IoTBDS 2020: 78-87
2010 – 2019
- 2018
- [c59]Masaki Hashimoto, Yoshiaki Hori, Yutaka Miyake:
Message from the NETSAP 2018 Workshop Organizers. COMPSAC (2) 2018: 652 - 2017
- [j19]Gino Masini, Craig Gunther, Jonathan Segev, Yuan Zhang, Huan Deng, Gyu Myoung Lee, Dong Wang, Emil Kowalczyk, Kangchan Lee, Leo Lehmann, Tom Huber, Steve S. Gorshe, Stephen Shew, Stefano Ruffini, Silvana Rodrigues, Heung Youl Youm, Yutaka Miyake, Arnaud Taddei:
Standards News. IEEE Commun. Stand. Mag. 1(4): 16-21 (2017) - 2016
- [j18]Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Portable Implementation of Lattice-based Cryptography using JavaScript. Int. J. Netw. Comput. 6(2): 309-327 (2016) - [c58]Katsuyoshi Iida, Yutaka Miyake, Chung Huang Yang, Bian Yang, Julien Bringer:
Message from the NETSAP and SIMICE Workshop Organizers. COMPSAC Workshops 2016: 552 - 2015
- [c57]Anirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Yung Shin Van Der Sype, Yutaka Miyake:
Practical Private One-way Anonymous Message Routing. AsiaCCS 2015: 665 - [c56]Yoshiaki Hori, Yutaka Miyake, Chung Huang Yang:
Message from the NETSAP 2015 Workshop Organizers. COMPSAC Workshops 2015: 248 - [c55]Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Portable Implementation of Lattice-Based Cryptography Using JavaScript. CANDAR 2015: 58-67 - [c54]Shinsaku Kiyomoto, Toru Nakamura, Yutaka Miyake:
Towards Tracing of k-Anonymized Datasets. TrustCom/BigDataSE/ISPA (1) 2015: 1237-1242 - [c53]Ricardo Neisse, Gianmarco Baldini, Gary Steri, Yutaka Miyake, Shinsaku Kiyomoto, Abdur Rahim Biswas:
An agent-based framework for Informed Consent in the internet of things. WF-IoT 2015: 789-794 - 2014
- [j17]Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai:
Fast Implementation of KCipher-2 for Software and Hardware. IEICE Trans. Inf. Syst. 97-D(1): 43-52 (2014) - [j16]Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Takafumi Aoki:
Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 157-166 (2014) - [j15]Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation. IEICE Trans. Inf. Syst. 97-D(10): 2576-2585 (2014) - [j14]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Security issues on IT systems during disasters: a survey. J. Ambient Intell. Humaniz. Comput. 5(2): 173-185 (2014) - [c52]Shinsaku Kiyomoto, Yutaka Miyake:
PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring Functions. CD-ARES 2014: 211-225 - [c51]Juan Camilo Corena, Anirban Basu, Shinsaku Kiyomoto, Yutaka Miyake, Tomoaki Ohtsuki:
XOR network coding pollution prevention without homomorphic functions. CCNC 2014: 293-300 - [c50]Anirban Basu, Juan Camilo Corena, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Shinsaku Kiyomoto, Jaideep Vaidya, Yutaka Miyake:
CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud. CloudCom 2014: 731-734 - [c49]Juan Camilo Corena, Anirban Basu, Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake:
Data Storage on the Cloud under User Control. CloudCom 2014: 739-742 - [c48]Yuto Nakano, Anirban Basu, Shinsaku Kiyomoto, Yutaka Miyake:
Key Extraction Attack Using Statistical Analysis of Memory Dump Data. CRiSIS 2014: 239-246 - [c47]Juan Camilo Corena, Anirban Basu, Shinsaku Kiyomoto, Yutaka Miyake, Tomoaki Ohtsuki:
Beyond proofs of data possession: Finding defective blocks in outsourced storage. GLOBECOM 2014: 2381-2386 - [c46]Anirban Basu, Anna Monreale, Juan Camilo Corena, Fosca Giannotti, Dino Pedreschi, Shinsaku Kiyomoto, Yutaka Miyake, Tadashi Yanagihara, Roberto Trasarti:
A Privacy Risk Model for Trajectory Data. IFIPTM 2014: 125-140 - [c45]Shinsaku Kiyomoto, Yutaka Miyake:
How to Find an Appropriate K for K-Anonymization. IMIS 2014: 273-279 - [c44]Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice. Public Key Cryptography 2014: 411-428 - [c43]Anirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh, Yutaka Miyake:
PrefRank: fair aggregation of subjective user preferences. SAC 2014: 287-288 - [c42]Anirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Stephen Marsh, Jaideep Vaidya, Guibing Guo, Jie Zhang, Yutaka Miyake:
Privacy preserving trusted social feedback. SAC 2014: 1706-1711 - [c41]Juan Camilo Corena, Anirban Basu, Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake:
A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques. SECRYPT 2014: 307-314 - [c40]Yuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Shinsaku Kiyomoto, Yutaka Miyake:
A Pre-processing Composition for Secret Key Recovery on Android Smartphone. WISTP 2014: 76-91 - 2013
- [j13]Haruki Ota, Shoichiro Aoyama, Ryu Watanabe, Koichi Ito, Yutaka Miyake, Takafumi Aoki:
Implementation and evaluation of a remote authentication system using touchless palmprint recognition. Multim. Syst. 19(2): 117-129 (2013) - [c39]Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Ryu Watanabe, Yutaka Miyake:
PPM: Privacy Policy Manager for Personalized Services. CD-ARES Workshops 2013: 377-392 - [c38]Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Takafumi Aoki:
Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure. COSADE 2013: 169-183 - [c37]Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract). ESORICS 2013: 775-792 - [c36]Takuya Kaneko, Takumi Nagaya, Keisuke Takemori, Yutaka Miyake, Masakatsu Nishigaki:
A Proposal for the Deterrence of Information Leakage Using Anti-virus Software. NBiS 2013: 90-96 - [c35]Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake:
A Key-revocable Attribute-based Encryption for Mobile Cloud Environments. SECRYPT 2013: 51-61 - [c34]Shinsaku Kiyomoto, Andre Rein, Yuto Nakano, Carsten Rudolph, Yutaka Miyake:
LMM - A Common Component for Software License Management on Cloud. SECRYPT 2013: 284-295 - [c33]Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake:
P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering. TrustCom/ISPA/IUCC 2013: 354-361 - [i1]Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions. IACR Cryptol. ePrint Arch. 2013: 388 (2013) - 2012
- [j12]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
Software Protection Combined with Tamper-Proof Device. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 213-222 (2012) - [j11]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Design of Categorization Mechanism for Disaster-Information-Gathering System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 21-34 (2012) - [c32]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Security-and-Privacy-Related Issues on IT Systems During Disasters. CD-ARES 2012: 445-459 - [c31]Yuto Nakano, Carlos Cid, Shinsaku Kiyomoto, Yutaka Miyake:
Memory Access Pattern Protection for Resource-Constrained Devices. CARDIS 2012: 188-202 - [c30]Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka:
On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters. TrustCom 2012: 1755-1762 - [c29]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Privacy Preservation of User History Graph. WISTP 2012: 87-96 - 2011
- [j10]Yutaka Miyake:
Foreword. IEICE Trans. Inf. Syst. 94-D(11): 2067-2068 (2011) - [j9]Akira Yamada, Hara Masanori, Yutaka Miyake:
Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation. Inf. Media Technol. 6(2): 560-571 (2011) - [j8]Keisuke Takemori, Takahiro Sakai, Masakatsu Nishigaki, Yutaka Miyake:
Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists. Inf. Media Technol. 6(2): 649-659 (2011) - [j7]Akira Yamada, Hara Masanori, Yutaka Miyake:
Web Tracking Site Detection Based on Temporal Link Analysis and Automatic Blacklist Generation. J. Inf. Process. 19: 62-73 (2011) - [j6]Keisuke Takemori, Takahiro Sakai, Masakatsu Nishigaki, Yutaka Miyake:
Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists. J. Inf. Process. 19: 169-179 (2011) - [j5]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism. J. Internet Serv. Inf. Secur. 1(1): 4-17 (2011) - [j4]Wook Shin, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
AMY: Use your cell phone to create a protected personal network over devices. IEEE Trans. Consumer Electron. 57(1): 99-104 (2011) - [c28]Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka:
Privacy Frost: A User-Oriented Data Anonymization Tool. ARES 2011: 442-447 - [c27]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Data Anonymity in Multi-Party Service Model. FGIT-SecTech 2011: 21-30 - [c26]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme. ICETE (Selected Papers) 2011: 233-248 - [c25]Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake:
Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha. ICICS 2011: 255-266 - [c24]Seiichiro Mizoguchi, Keisuke Takemori, Yutaka Miyake, Yoshiaki Hori, Kouichi Sakurai:
Traceback Framework against Botmaster by Sharing Network Communication Pattern Information. IMIS 2011: 639-644 - [c23]Shinsaku Kiyomoto, Yutaka Miyake:
On Data Importance Analysis. INCoS 2011: 628-633 - [c22]Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake:
Automatic security verification for 3-party authentication and key exchange protocols. NSS 2011: 254-258 - [c21]Yukiko Sawaya, Ayumu Kubota, Yutaka Miyake:
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics. SAINT 2011: 353-359 - [c20]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree. SECRYPT 2011: 37-49 - 2010
- [c19]Takamasa Isohara, Keisuke Takemori, Yutaka Miyake, Ning Qu, Adrian Perrig:
LSM-Based Secure System Monitoring Using Kernel Protection Schemes. ARES 2010: 591-596 - [c18]Akira Yamada, Hara Masanori, Yutaka Miyake:
Web Tracking Site Detection Based on Temporal Link Analysis. AINA Workshops 2010: 626-631 - [c17]Keisuke Takemori, Adrian Perrig, Ning Qu, Yutaka Miyake:
Remote Attestation for HDD Files Using Kernel Protection Mechanism. ICC 2010: 1-6
2000 – 2009
- 2009
- [j3]Akira Yamada, Ayumu Kubota, Yutaka Miyake, Kazuo Hashimoto:
Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation. IEICE Trans. Inf. Syst. 92-D(10): 1961-1970 (2009) - [c16]Akira Yamada, Yutaka Miyake, Masahiro Terabe, Kazuo Hashimoto, Nei Kato:
Anomaly Detection for DNS Servers Using Frequent Host Selection. AINA 2009: 853-860 - [c15]Masanoei Hara, Akira Yamada, Yutaka Miyake:
Visual similarity-based phishing detection without victim site information. CICS 2009: 30-36 - [c14]Ayumu Kubota, Yutaka Miyake:
Public Key-Based Rendezvous Infrastructure for Secure and Flexible Private Networking. ICC 2009: 1-6 - 2008
- [c13]Akira Yamada, Ayumu Kubota, Yutaka Miyake:
Service Independent Access Control Architecture for User Generated Content (UGC). Security and Management 2008: 220-226 - [c12]Keisuke Takemori, Masakatsu Nishigaki, Tomohiro Takami, Yutaka Miyake:
Detection of Bot Infected PCs Using Destination-Based IP and Domain Whitelists During a Non-Operating Term. GLOBECOM 2008: 2072-2077 - 2007
- [j2]Shinsaku Kiyomoto, Toshiaki Tanaka, Yutaka Miyake, Yoshinori Mitamura:
Development of security functions for a medical information sharing platform. Syst. Comput. Jpn. 38(11): 49-63 (2007) - [c11]Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig:
Intrusion Detection for Encrypted Web Accesses. AINA Workshops (1) 2007: 569-576 - [c10]Zubair Md. Fadlullah, Tarik Taleb, Nirwan Ansari, Kazuo Hashimoto, Yutaka Miyake, Yoshiaki Nemoto, Nei Kato:
Combating Against Attacks on Encrypted Protocols. ICC 2007: 1211-1216 - [c9]Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase:
A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns. ISI 2007: 172-179 - 2006
- [j1]Ayumu Kubota, Yutaka Miyake, Toshiaki Tanaka:
Secure Host Name Resolution Infrastructure for Overlay Networks. IEICE Trans. Commun. 89-B(9): 2434-2439 (2006) - [c8]Ayumu Kubota, Akira Yamada, Yutaka Miyake:
L2VPN over Chord: Hosting Millions of Small Zeroconf Networks over DHT Nodes. GLOBECOM 2006 - 2005
- [c7]Akira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka:
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. ITCC (1) 2005: 650-655 - 2002
- [c6]Grit Denker, Jonathan K. Millen, Yutaka Miyake:
Cross-Domain Access Control via PKI. POLICY 2002: 202-205 - [c5]Teruyuki Hasegawa, Toru Hasegawa, Yutaka Miyake, Koji Nakao:
TCP gateway for satellite-based Internet service accommodating multiple subscribers. WCNC 2002: 849-854 - 2000
- [c4]Yutaka Miyake, Teruyuki Hasegawa, Toru Hasegawa, Toshihiko Kato:
Acceleration of TCP Throughput over Satellite-Based Internet Access Using TCP Gateway. ISCC 2000: 245-253 - [c3]Toshihiko Kato, Tomohiko Ogishi, Hiroyuki Shinbo, Yutaka Miyake, Akira Idoue, Kenji Suzuki:
Interoperability Testing System of TCP/IP Based Systems in Operational Environment. TestCom 2000: 143-
1990 – 1999
- 1995
- [c2]Yutaka Miyake, Toshihiko Kato, Kenji Suzuki:
Implementation method of high speed protocol as transport library. ICNP 1995: 172-179
1980 – 1989
- 1989
- [c1]Yutaka Miyake, Masafumi Hagiwara, Masao Nakagawa:
A new timing extraction method and data interpolation for block demodulation. ICASSP 1989: 1223-1226
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 00:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint