default search action
Hong-Sheng Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c49]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Practical Constructions for Single Input Functionality Against a Dishonest Majority. EuroS&P 2024: 398-414 - [c48]Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu:
Scalable Private Set Union, with Stronger Security. USENIX Security Symposium 2024 - [c47]Lei Fan, Jonathan Katz, Zhenghao Lu, Phuc Thai, Hong-Sheng Zhou:
Brief Announcement: Best-Possible Unpredictable Proof-Of-Stake. DISC 2024: 45:1-45:7 - [i47]Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu:
Correcting Subverted Random Oracles. CoRR abs/2404.09442 (2024) - [i46]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Single-Input Functionality against a Dishonest Majority: Practical and Round-Optimal. IACR Cryptol. ePrint Arch. 2024: 305 (2024) - [i45]Lei Fan, Zhenghao Lu, Hong-Sheng Zhou:
Column-wise Garbling, and How to Go Beyond the Linear Model. IACR Cryptol. ePrint Arch. 2024: 415 (2024) - [i44]Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Dawu Gu:
Scalable Private Set Union, with Stronger Security. IACR Cryptol. ePrint Arch. 2024: 922 (2024) - [i43]Keyu Ji, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Distributed Point Function with Constraints, Revisited. IACR Cryptol. ePrint Arch. 2024: 937 (2024) - [i42]Cong Zhang, Keyu Ji, Taiyu Wang, Bingsheng Zhang, Hong-Sheng Zhou, Xin Wang, Kui Ren:
On the Complexity of Cryptographic Groups and Generic Group Models. IACR Cryptol. ePrint Arch. 2024: 1452 (2024) - [i41]Yuting Xiao, Rui Zhang, Hong-Sheng Zhou:
Maximizing the Utility of Cryptographic Setups: Secure PAKEs, with either functional RO or CRS. IACR Cryptol. ePrint Arch. 2024: 1640 (2024) - 2023
- [c46]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Endemic Oblivious Transfer via Random Oracles, Revisited. EUROCRYPT (1) 2023: 303-329 - [i40]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Practical Constructions for Single Input Functionality against a Dishonest Majority. IACR Cryptol. ePrint Arch. 2023: 1367 (2023) - 2022
- [j7]Zhelei Zhou, Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Yibiao Lu, Kui Ren, Phuc Thai, Hong-Sheng Zhou:
Scriptable and composable SNARKs in the trusted hardware model. J. Comput. Secur. 30(6): 757-793 (2022) - [c45]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility. ASIACRYPT (4) 2022: 129-158 - [c44]Cong Zhang, Hong-Sheng Zhou, Jonathan Katz:
An Analysis of the Algebraic Group Model. ASIACRYPT (4) 2022: 310-322 - [c43]Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Dawu Gu:
A Universally Composable Non-interactive Aggregate Cash System. ASIACRYPT (1) 2022: 745-773 - [c42]Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu:
Shuffle-based Private Set Union: Faster and More Secure. USENIX Security Symposium 2022: 2947-2964 - [i39]Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu:
Shuffle-based Private Set Union: Faster and More Secure. IACR Cryptol. ePrint Arch. 2022: 157 (2022) - [i38]Jonathan Katz, Cong Zhang, Hong-Sheng Zhou:
An Analysis of the Algebraic Group Model. IACR Cryptol. ePrint Arch. 2022: 210 (2022) - [i37]Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Dawu Gu:
The Ideal Functionalities for Private Set Union, Revisited. IACR Cryptol. ePrint Arch. 2022: 750 (2022) - [i36]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
GUC-Secure Commitments via Random Oracles: New Impossibility and Feasibility. IACR Cryptol. ePrint Arch. 2022: 1127 (2022) - [i35]Zhelei Zhou, Bingsheng Zhang, Hong-Sheng Zhou, Kui Ren:
Endemic Oblivious Transfer via Random Oracles, Revisited. IACR Cryptol. ePrint Arch. 2022: 1525 (2022) - 2021
- [j6]Anne Broadbent, Sevag Gharibian, Hong-Sheng Zhou:
Towards Quantum One-Time Memories from Stateless Hardware. Quantum 5: 429 (2021) - [c41]Bingsheng Zhang, Yuan Chen, Jiaqi Li, Yajin Zhou, Phuc Thai, Hong-Sheng Zhou, Kui Ren:
Succinct Scriptable NIZK via Trusted Hardware. ESORICS (1) 2021: 430-451 - [c40]Yibiao Lu, Bingsheng Zhang, Hong-Sheng Zhou, Weiran Liu, Lei Zhang, Kui Ren:
Correlated Randomness Teleportation via Semi-trusted Hardware - Enabling Silent Multi-party Computation. ESORICS (2) 2021: 699-720 - [i34]Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou, Jiadong Zhu:
Correcting Subverted Random Oracles. IACR Cryptol. ePrint Arch. 2021: 42 (2021) - [i33]Cong Zhang, Hong-Sheng Zhou:
From Random Oracles to Ideal Signatures, and Back. IACR Cryptol. ePrint Arch. 2021: 566 (2021) - [i32]Charalampos Papamanthou, Cong Zhang, Hong-Sheng Zhou:
Indifferentiable Signatures: High Performance and Fallback Security. IACR Cryptol. ePrint Arch. 2021: 639 (2021) - [i31]Lei Fan, Jonathan Katz, Phuc Thai, Hong-Sheng Zhou:
A Permissionless Proof-of-Stake Blockchain with Best-Possible Unpredictability. IACR Cryptol. ePrint Arch. 2021: 660 (2021) - 2020
- [j5]Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Locally Decodable and Updatable Non-malleable Codes and Their Applications. J. Cryptol. 33(1): 319-355 (2020) - [c39]Tuyet Duong, Lei Fan, Jonathan Katz, Phuc Thai, Hong-Sheng Zhou:
2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely. ESORICS (2) 2020: 697-712 - [c38]Anne Broadbent, Sevag Gharibian, Hong-Sheng Zhou:
Towards Quantum One-Time Memories from Stateless Hardware. TQC 2020: 6:1-6:25
2010 – 2019
- 2019
- [j4]Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou:
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. J. Cryptol. 32(2): 459-497 (2019) - [j3]Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou:
Leakage Resilience from Program Obfuscation. J. Cryptol. 32(3): 742-824 (2019) - [c37]Hong-Sheng Zhou:
Fractal: A New Paradigm for High-Performance Proof-of-Stake Blockchains. SCC@AsiaCCS 2019: 3 - [c36]Bingsheng Zhang, Hong-Sheng Zhou:
Statement Voting. Financial Cryptography 2019: 667-685 - [c35]Sherman S. M. Chow, Alexander Russell, Qiang Tang, Moti Yung, Yongjun Zhao, Hong-Sheng Zhou:
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog. Public Key Cryptography (1) 2019: 221-251 - 2018
- [j2]Zengpeng Li, Chunguang Ma, Hong-Sheng Zhou:
Multi-key FHE for multi-bit messages. Sci. China Inf. Sci. 61(2): 029101:1-029101:3 (2018) - [c34]Yu Chen, Yuyu Wang, Hong-Sheng Zhou:
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation. ASIACRYPT (2) 2018: 575-606 - [c33]Tuyet Duong, Alexander Chepurnoy, Lei Fan, Hong-Sheng Zhou:
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake. BCC@AsiaCCS 2018: 1-13 - [c32]Tuyet Duong, Alexander Chepurnoy, Hong-Sheng Zhou:
Multi-mode Cryptocurrency Systems. BCC@AsiaCCS 2018: 35-46 - [c31]Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou:
Correcting Subverted Random Oracles. CRYPTO (2) 2018: 241-271 - [c30]Phuc Thai, Laurent Njilla, Tuyet Duong, Lei Fan, Hong-Sheng Zhou:
A Generic Paradigm for Blockchain Design. MobiQuitous 2018: 460-469 - [i30]Tuyet Duong, Alexander Chepurnoy, Hong-Sheng Zhou:
Multi-mode Cryptocurrency Systems. IACR Cryptol. ePrint Arch. 2018: 129 (2018) - [i29]Yu Chen, Yuyu Wang, Hong-Sheng Zhou:
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation. IACR Cryptol. ePrint Arch. 2018: 781 (2018) - [i28]Anne Broadbent, Sevag Gharibian, Hong-Sheng Zhou:
Towards Quantum One-Time Memories from Stateless Hardware. IACR Cryptol. ePrint Arch. 2018: 960 (2018) - 2017
- [c29]Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou:
Generic Semantic Security against a Kleptographic Adversary. CCS 2017: 907-922 - [c28]Bingsheng Zhang, Hong-Sheng Zhou:
Brief Announcement: Statement Voting and Liquid Democracy. PODC 2017: 359-361 - [i27]Alexander Chepurnoy, Tuyet Duong, Lei Fan, Hong-Sheng Zhou:
TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake. IACR Cryptol. ePrint Arch. 2017: 232 (2017) - [i26]Bingsheng Zhang, Hong-Sheng Zhou:
Digital Liquid Democracy: How to Vote Your Delegation Statement. IACR Cryptol. ePrint Arch. 2017: 616 (2017) - [i25]Lei Fan, Hong-Sheng Zhou:
iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake). IACR Cryptol. ePrint Arch. 2017: 656 (2017) - 2016
- [c27]Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou:
Cliptography: Clipping the Power of Kleptographic Attacks. ASIACRYPT (2) 2016: 34-64 - [c26]Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas:
Fair and Robust Multi-party Computation Using a Global Transaction Ledger. EUROCRYPT (2) 2016: 705-734 - [c25]Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:
Cryptography for Parallel RAM from Indistinguishability Obfuscation. ITCS 2016: 179-190 - [c24]Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou:
Leakage-Resilient Public-Key Encryption from Obfuscation. Public Key Cryptography (2) 2016: 101-128 - [c23]Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou:
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation. SCN 2016: 587-603 - [c22]Jeremiah Blocki, Hong-Sheng Zhou:
Designing Proof of Human-Work Puzzles for Cryptocurrency and Beyond. TCC (B2) 2016: 517-546 - [i24]Jeremiah Blocki, Hong-Sheng Zhou:
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond. IACR Cryptol. ePrint Arch. 2016: 145 (2016) - [i23]Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou:
Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption. IACR Cryptol. ePrint Arch. 2016: 530 (2016) - [i22]Tuyet Duong, Lei Fan, Thomas Veale, Hong-Sheng Zhou:
Securing Bitcoin-like Backbone Protocols against a Malicious Majority of Computing Power. IACR Cryptol. ePrint Arch. 2016: 716 (2016) - [i21]Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou:
Leakage-Resilient Public-Key Encryption from Obfuscation. IACR Cryptol. ePrint Arch. 2016: 730 (2016) - 2015
- [c21]Joël Alwen, Rafail Ostrovsky, Hong-Sheng Zhou, Vassilis Zikas:
Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting. CRYPTO (2) 2015: 763-780 - [c20]Dana Dachman-Soled, Feng-Hao Liu, Hong-Sheng Zhou:
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware. EUROCRYPT (2) 2015: 131-158 - [c19]S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Client Verifiable Computation with Stronger Security Guarantees. TCC (2) 2015: 144-168 - [c18]Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Locally Decodable and Updatable Non-malleable Codes and Their Applications. TCC (1) 2015: 427-450 - [i20]S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Client Verifiable Computation with Stronger Security Guarantees. IACR Cryptol. ePrint Arch. 2015: 142 (2015) - [i19]Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou:
Functional Encryption from (Small) Hardwae Tokens. IACR Cryptol. ePrint Arch. 2015: 153 (2015) - [i18]Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou:
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2015: 280 (2015) - [i17]Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas:
Feasibility and Completeness of Cryptographic Tasks in the Quantum World. IACR Cryptol. ePrint Arch. 2015: 385 (2015) - [i16]Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:
Computation-Trace Indistinguishability Obfuscation and its Applications. IACR Cryptol. ePrint Arch. 2015: 406 (2015) - [i15]Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas:
Fair and Robust Multi-Party Computation using a Global Transaction Ledger. IACR Cryptol. ePrint Arch. 2015: 574 (2015) - [i14]Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou:
Cliptography: Clipping the Power of Kleptographic Attacks. IACR Cryptol. ePrint Arch. 2015: 695 (2015) - 2014
- [c17]Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou:
Multi-input Functional Encryption. EUROCRYPT 2014: 578-602 - [c16]Jonathan Katz, Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas:
Distributing the setup in universally composable multi-party computation. PODC 2014: 20-29 - [c15]Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou:
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. TCC 2014: 638-662 - [i13]Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Locally Decodable and Updatable Non-Malleable Codes and Their Applications. IACR Cryptol. ePrint Arch. 2014: 663 (2014) - [i12]Dana Dachman-Soled, Feng-Hao Liu, Hong-Sheng Zhou:
Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components without Leak-free Hardware. IACR Cryptol. ePrint Arch. 2014: 856 (2014) - [i11]Matthew D. Green, Jonathan Katz, Alex J. Malozemoff, Hong-Sheng Zhou:
A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2014: 863 (2014) - 2013
- [c14]Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou:
Functional Encryption from (Small) Hardware Tokens. ASIACRYPT (2) 2013: 120-139 - [c13]Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou:
Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption. Public Key Cryptography 2013: 14-31 - [c12]Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou:
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS. Public Key Cryptography 2013: 73-88 - [c11]Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas:
Feasibility and Completeness of Cryptographic Tasks in the Quantum World. TCC 2013: 281-296 - [i10]S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Multi-Input Functional Encryption. IACR Cryptol. ePrint Arch. 2013: 774 (2013) - [i9]Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou:
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. IACR Cryptol. ePrint Arch. 2013: 840 (2013) - 2012
- [c10]Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou:
On the Security of the "Free-XOR" Technique. TCC 2012: 39-53 - [i8]Seung Geol Choi, Jonathan Katz, Hoeteck Wee, Hong-Sheng Zhou:
Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS. IACR Cryptol. ePrint Arch. 2012: 700 (2012) - 2011
- [c9]Juan A. Garay, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou:
Adaptively secure broadcast, revisited. PODC 2011: 179-186 - [i7]Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou:
On the Security of the Free-XOR Technique. IACR Cryptol. ePrint Arch. 2011: 510 (2011) - 2010
- [c8]Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou:
A Framework for the Sound Specification of Cryptographic Tasks. CSF 2010: 277-289
2000 – 2009
- 2009
- [j1]Aggelos Kiayias, Hong-Sheng Zhou:
Hidden identity-based signatures. IET Inf. Secur. 3(3): 119-127 (2009) - [c7]Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou:
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer. CRYPTO 2009: 505-523 - [c6]Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong-Sheng Zhou:
Secure Function Collection with Sublinear Storage. ICALP (2) 2009: 534-545 - [c5]Aggelos Kiayias, Hong-Sheng Zhou:
Zero-Knowledge Proofs with Witness Elimination. Public Key Cryptography 2009: 124-138 - 2008
- [c4]Aggelos Kiayias, Hong-Sheng Zhou:
Equivocal Blind Signatures and Adaptive UC-Security. TCC 2008: 340-355 - [i6]Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou:
Sound and Fine-grain Specification of Ideal Functionalities. Theoretical Foundations of Practical Information Security 2008 - [i5]Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou:
A Framework for the Sound Specification of Cryptographic Tasks. IACR Cryptol. ePrint Arch. 2008: 132 (2008) - [i4]Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou:
Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer. IACR Cryptol. ePrint Arch. 2008: 534 (2008) - 2007
- [c3]Aggelos Kiayias, Hong-Sheng Zhou:
Hidden Identity-Based Signatures. Financial Cryptography 2007: 134-147 - [c2]Aggelos Kiayias, Hong-Sheng Zhou:
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge. ICALP 2007: 316-327 - [i3]Aggelos Kiayias, Hong-Sheng Zhou:
Equivocal Blind Signatures and Adaptive UC-Security. IACR Cryptol. ePrint Arch. 2007: 132 (2007) - [i2]Aggelos Kiayias, Hong-Sheng Zhou:
Hidden Identity-Based Signatures. IACR Cryptol. ePrint Arch. 2007: 140 (2007) - 2006
- [c1]Aggelos Kiayias, Hong-Sheng Zhou:
Concurrent Blind Signatures Without Random Oracles. SCN 2006: 49-62 - 2005
- [i1]Aggelos Kiayias, Hong-Sheng Zhou:
Concurrent Blind Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2005: 435 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint