default search action
Takashi Nishide
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide:
Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 234-247 (2024) - [c60]Genki Osada, Tsubasa Takahashi, Takashi Nishide:
Understanding Likelihood of Normalizing Flow and Image Complexity through the Lens of Out-of-Distribution Detection. AAAI 2024: 21492-21500 - [i10]Genki Osada, Tsubasa Takahashi, Takashi Nishide:
Understanding Likelihood of Normalizing Flow and Image Complexity through the Lens of Out-of-Distribution Detection. CoRR abs/2402.10477 (2024) - [i9]Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Takashi Nishide:
Time-Memory Trade-off Algorithms for Homomorphically Evaluating Look-up Table in TFHE. IACR Cryptol. ePrint Arch. 2024: 1114 (2024) - 2023
- [j27]Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide:
PoS Blockchain-Based Forward-Secure Public Key Encryption with Immutable Keys and Post-Compromise Security Guarantees. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 212-227 (2023) - [j26]Koki Morimura, Daisuke Maeda, Takashi Nishide:
Accelerating Polynomial Evaluation for Integer-wise Homomorphic Comparison and Division. J. Inf. Process. 31: 288-298 (2023) - [c59]Genki Osada, Tsubasa Takahashi, Budrul Ahsan, Takashi Nishide:
Out-of-Distribution Detection with Reconstruction Error and Typicality-based Penalty. WACV 2023: 5540-5552 - [c58]Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Takashi Nishide:
GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation. WAHC@CCS 2023: 1-9 - [i8]Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide:
Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications. IACR Cryptol. ePrint Arch. 2023: 366 (2023) - [i7]Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Takashi Nishide:
GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation. IACR Cryptol. ePrint Arch. 2023: 1467 (2023) - 2022
- [j25]Hikaru Tsuchida, Takashi Nishide, Yusaku Maeda:
Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring and Field. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 214-230 (2022) - [j24]Hikaru Tsuchida, Takashi Nishide:
Constant-Round Fair SS-4PC for Private Decision Tree Evaluation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(9): 1270-1288 (2022) - [j23]Naoya Okanami, Ryuya Nakamura, Takashi Nishide:
Load Balancing with In-Protocol/Wallet-Level Account Assignment in Sharded Blockchains. IEICE Trans. Inf. Syst. 105-D(2): 205-214 (2022) - [j22]Genki Osada, Budrul Ahsan, Revoti Prasad Bora, Takashi Nishide:
Latent Space Virtual Adversarial Training for Supervised and Semi-Supervised Learning. IEICE Trans. Inf. Syst. 105-D(3): 667-678 (2022) - [c57]Koki Morimura, Daisuke Maeda, Takashi Nishide:
Improved Integer-wise Homomorphic Comparison and Division based on Polynomial Evaluation. ARES 2022: 33:1-33:10 - [c56]Daisuke Maeda, Koki Morimura, Takashi Nishide:
Efficient Homomorphic Evaluation of Arbitrary Bivariate Integer Functions. WAHC@CCS 2022: 13-22 - [c55]Zhongqi Wang, Keita Fuse, Takashi Nishide:
Square Table Lookup Multiparty Computation Protocol. CANDARW 2022: 392-395 - [i6]Genki Osada, Tsubasa Takahashi, Budrul Ahsan, Takashi Nishide:
Out-of-Distribution Detection with Reconstruction Error and Typicality-based Penalty. CoRR abs/2212.12641 (2022) - [i5]Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide:
Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain. IACR Cryptol. ePrint Arch. 2022: 73 (2022) - 2021
- [j21]Hikaru Tsuchida, Takashi Nishide:
Client-aided Robust Bit-composition Protocol with Deterministic Cheater Identification in Standard Model. J. Inf. Process. 29: 515-524 (2021) - [c54]Hikaru Tsuchida, Takashi Nishide:
Private Decision Tree Evaluation with Constant Rounds via (Only) Fair SS-4PC. ACISP 2021: 309-329 - [c53]Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide:
Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain. INDOCRYPT 2021: 436-461 - [i4]Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography. IACR Cryptol. ePrint Arch. 2021: 276 (2021) - 2020
- [c52]Genki Osada, Budrul Ahsan, Revoti Prasad Bora, Takashi Nishide:
Regularization with Latent Space Virtual Adversarial Training. ECCV (1) 2020: 565-581 - [c51]Naoya Okanami, Ryuya Nakamura, Takashi Nishide:
Load Balancing for Sharded Blockchains. Financial Cryptography Workshops 2020: 512-524 - [c50]Hikaru Tsuchida, Takashi Nishide:
Client-Aided Bit-Composition Protocol with Guaranteed Output Delivery. ISITA 2020: 387-391 - [c49]Takashi Nishide:
One-Time Delegation of Unlinkable Signing Rights and Its Application. ProvSec 2020: 103-123 - [c48]Hikaru Tsuchida, Takashi Nishide, Yusaku Maeda:
Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring. ProvSec 2020: 298-317 - [i3]Genki Osada, Budrul Ahsan, Revoti Prasad Bora, Takashi Nishide:
Regularization with Latent Space Virtual Adversarial Training. CoRR abs/2011.13181 (2020) - [i2]Naoya Okanami, Ryuya Nakamura, Takashi Nishide:
Load Balancing for Sharded Blockchains. IACR Cryptol. ePrint Arch. 2020: 1466 (2020) - [i1]Takashi Nishide:
One-Time Delegation of Unlinkable Signing Rights and Its Application. IACR Cryptol. ePrint Arch. 2020: 1603 (2020)
2010 – 2019
- 2018
- [j20]Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto:
Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption. J. Internet Serv. Inf. Secur. 8(4): 37-56 (2018) - [c47]Noboru Kunihiro, Wenjie Lu, Takashi Nishide, Jun Sakuma:
Outsourced Private Function Evaluation with Privacy Policy Enforcement. TrustCom/BigDataSE 2018: 412-423 - 2017
- [j19]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Card-Based Protocols Using Regular Polygon Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1900-1909 (2017) - [j18]Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto:
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 2991-3006 (2017) - [j17]Sanami Nakagawa, Takashi Nishide, Eiji Okamoto, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Akihisa Kodate:
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures. Int. J. Appl. Cryptogr. 3(4): 394-406 (2017) - [c46]Takuya Kitamura, Kazumasa Shinagawa, Takashi Nishide, Eiji Okamoto:
One-time Programs with Cloud Storage and Its Application to Electronic Money. APKC@AsiaCCS 2017: 25-30 - [c45]Nobuaki Kitajima, Naoto Yanai, Takashi Nishide:
Identity-Based Key-Insulated Aggregate Signatures, Revisited. Inscrypt 2017: 141-156 - [c44]Genki Osada, Kazumasa Omote, Takashi Nishide:
Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder. ESORICS (2) 2017: 344-361 - [c43]Kouichi Sakurai, Takashi Nishide, Amril Syalim:
Improved proxy re-encryption scheme for symmetric key cryptography. IWBIS 2017: 105-111 - 2016
- [j16]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Secure Computation Protocols Using Polarizing Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(6): 1122-1131 (2016) - [j15]Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions. J. Inf. Process. 24(2): 275-291 (2016) - [j14]Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability. J. Inf. Process. 24(5): 764-771 (2016) - [j13]Takanori Suga, Takashi Nishide, Kouichi Sakurai:
Character-based symmetric searchable encryption and its implementation and experiment on mobile devices. Secur. Commun. Networks 9(12): 1717-1725 (2016) - [c42]Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Size-Hiding Computation for Multiple Parties. ASIACRYPT (2) 2016: 937-966 - [c41]Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto, Kwangjo Kim:
Revocable Decentralized Multi-Authority Functional Encryption. INDOCRYPT 2016: 248-265 - [c40]Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Committed AND protocol using three cards with more handy shuffle. ISITA 2016: 700-702 - [c39]Fangming Zhao, Takashi Nishide:
Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards. NSS 2016: 266-282 - 2015
- [c38]Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Constructions of Fail-Stop Signatures for Multi-signer Setting. AsiaJCIS 2015: 112-123 - [c37]Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability. ICITCS 2015: 1-4 - [c36]Yusuke Kanbara, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, Eiji Okamoto:
Software Implementation of a Pairing Function for Public Key Cryptosystems. ICITCS 2015: 1-5 - [c35]Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto:
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs. INTRUST 2015: 32-48 - [c34]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Secure Multi-Party Computation Using Polarizing Cards. IWSEC 2015: 281-297 - [c33]Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards. ProvSec 2015: 127-146 - [c32]Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto:
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack. SECRYPT 2015: 39-52 - 2014
- [j12]Fangming Zhao, Takashi Nishide, Kouichi Sakurai:
Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search. IEICE Trans. Inf. Syst. 97-D(7): 1790-1803 (2014) - [j11]Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi:
Anonymous encryption with partial-order subset delegation and its application in privacy email systems. IET Inf. Secur. 8(4): 240-249 (2014) - [c31]Takashi Nishide, Mitsugu Iwamoto, Atsushi Iwasaki, Kazuo Ohta:
Secure (M+1) st-Price Auction with Automatic Tie-Break. INTRUST 2014: 422-437 - [c30]Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
A Short Fail-Stop Signature Scheme from Factoring. ProvSec 2014: 309-316 - [c29]Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai:
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures. TrustCom 2014: 565-574 - 2013
- [j10]Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai:
Efficient implementation for QUAD stream cipher with GPUs. Comput. Sci. Inf. Syst. 10(2): 897-911 (2013) - [c28]Motoki Kitahara, Takanori Yasuda, Takashi Nishide, Kouichi Sakurai:
Upper bound of the length of information embedd in RSA public key efficiently. AsiaPKC@AsiaCCS 2013: 33-38 - [c27]Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance. ICT-EurAsia 2013: 363-372 - 2012
- [j9]Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Securing Provenance of Distributed Processes in an Untrusted Environment. IEICE Trans. Inf. Syst. 95-D(7): 1894-1907 (2012) - [j8]Naoto Kiribuchi, Ryo Kato, Tsukasa Endo, Takashi Nishide, Hiroshi Yoshiura:
Batch Logical Protocols for Efficient Multi-Party Computation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(10): 1718-1728 (2012) - [j7]Na Ruan, Takashi Nishide, Yoshiaki Hori:
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. Inf. Media Technol. 7(4): 1588-1595 (2012) - [j6]Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura:
Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation. Inf. Media Technol. 7(4): 1596-1605 (2012) - [j5]Ruan Na, Takashi Nishide, Yoshiaki Hori:
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. J. Inf. Process. 20(4): 846-853 (2012) - [j4]Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura:
Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation. J. Inf. Process. 20(4): 861-870 (2012) - [j3]Takashi Nishide, Shingo Miyazaki, Kouichi Sakurai:
Security Analysis of Offline E-cash Systems with Malicious Insider. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 55-71 (2012) - [c26]Liang Zhao, Takashi Nishide, Kouichi Sakurai:
Differential Fault Analysis of Full LBlock. COSADE 2012: 135-150 - [c25]Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai:
Analysis of Methods for Detecting Compromised Nodes and its Countermeasures. ICITCS 2012: 53-60 - [c24]Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai:
Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs. IMIS 2012: 660-664 - [c23]Motoki Kitahara, Takashi Nishide, Kouichi Sakurai:
A Method for Embedding Secret Key Information in RSA Public Key and Its Application. IMIS 2012: 665-670 - [c22]Takanori Suga, Takashi Nishide, Kouichi Sakurai:
Secure Keyword Search Using Bloom Filter with Specified Character Positions. ProvSec 2012: 235-252 - 2011
- [c21]Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Hyune Rhee:
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs. ARES 2011: 271-285 - [c20]Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Hiroshi Yoshiura:
Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation. Inscrypt 2011: 289-308 - [c19]Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai:
Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. Inscrypt 2011: 341-362 - [c18]Fangming Zhao, Takashi Nishide, Kouichi Sakurai:
Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control. ICISC 2011: 406-418 - [c17]Peng Gao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai:
Integrity for the In-flight web page based on a fragile watermarking chain scheme. ICUIMC 2011: 86 - [c16]Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai:
Design and Implementation of a Forced Encryption Kernel Module. IMIS 2011: 607-611 - [c15]Yoshiaki Hori, Takashi Nishide, Kouichi Sakurai:
Towards Countermeasure of Insider Threat in Network Security. INCoS 2011: 634-636 - [c14]Takashi Nishide, Kouichi Sakurai:
Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited. INCoS 2011: 656-661 - [c13]Fangming Zhao, Takashi Nishide, Kouichi Sakurai:
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems. ISPEC 2011: 83-97 - [c12]Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi:
Anonymous Encryption with Partial-Order Subset Delegation Functionality. ProvSec 2011: 154-169 - [c11]Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura:
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols. WISA 2011: 187-202 - 2010
- [c10]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Adaptive and Composable Non-committing Encryptions. ACISP 2010: 135-144 - [c9]Amril Syalim, Takashi Nishide, Kouichi Sakurai:
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance. DBSec 2010: 311-318 - [c8]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Adaptive and Composable Non-interactive String-Commitment Protocols. ICETE (Selected Papers) 2010: 233-242 - [c7]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries. ICETE (Selected Papers) 2010: 274-288 - [c6]Jingyu Hua, Takashi Nishide, Kouichi Sakurai:
Model-Based Intrusion Detection by Abstract Interpretation. SAINT 2010: 359-362 - [c5]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Adaptive and Composable Non-interactive String-commitment Protocols. SECRYPT 2010: 354-361 - [c4]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries. SECRYPT 2010: 389-398 - [c3]Takashi Nishide, Kouichi Sakurai:
Distributed Paillier Cryptosystem without Trusted Dealer. WISA 2010: 44-60
2000 – 2009
- 2009
- [j2]Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta:
Attribute-Based Encryption with Partially Hidden Ciphertext Policies. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 22-32 (2009) - 2008
- [c2]Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta:
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. ACNS 2008: 111-129 - 2007
- [j1]Takashi Nishide, Kazuo Ohta:
Constant-Round Multiparty Computation for Interval Test, Equality Test, and Comparison. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(5): 960-968 (2007) - [c1]Takashi Nishide, Kazuo Ohta:
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. Public Key Cryptography 2007: 343-360
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint