default search action
J. Alex Halderman
Person information
- affiliation: University of Michigan, Ann Arbor, USA
- affiliation (former): Princeton University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c79]Zakir Durumeric, David Adrian, Phillip Stephens, Eric Wustrow, J. Alex Halderman:
Ten Years of ZMap. IMC 2024: 139-148 - [c78]Braden L. Crimmins, Dhanya Narayanan, Drew Springall, J. Alex Halderman:
DVSorder: Ballot Randomization Flaws Threaten Voter Privacy. USENIX Security Symposium 2024 - [i11]Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi:
OpenVPN is Open to VPN Fingerprinting. CoRR abs/2403.03998 (2024) - [i10]Zakir Durumeric, David Adrian, Phillip Stephens, Eric Wustrow, J. Alex Halderman:
Ten Years of ZMap. CoRR abs/2406.15585 (2024) - 2023
- [i9]Braden L. Crimmins, J. Alex Halderman, Bradley Sturt:
Improving the Security of United States Elections with Robust Optimization. CoRR abs/2308.02306 (2023) - [i8]Erik Chi, Gaukas Wang, J. Alex Halderman, Eric Wustrow, Jack Wampler:
Just add WATER: WebAssembly-based Circumvention Transports. CoRR abs/2312.00163 (2023) - 2022
- [c77]Josiah Walker, Nakul Bajaj, Braden L. Crimmins, J. Alex Halderman:
Logic and Accuracy Testing: A Fifty-State Review. E-Vote-ID 2022: 157-184 - [c76]Braden L. Crimmins, Marshall Rhea, J. Alex Halderman:
RemoteVote and SAFE Vote: Towards Usable End-to-End Verification for Vote-by-Mail. Financial Cryptography Workshops 2022: 391-406 - [c75]Diwen Xue, Reethika Ramesh, Arham Jain, Michalis Kallitsis, J. Alex Halderman, Jedidiah R. Crandall, Roya Ensafi:
OpenVPN is Open to VPN Fingerprinting. USENIX Security Symposium 2022: 483-500 - [c74]J. Alex Halderman:
The Antrim County 2020 Election Incident: An Independent Forensic Investigation. USENIX Security Symposium 2022: 589-605 - [i7]Josiah Walker, Nakul Bajaj, Braden L. Crimmins, J. Alex Halderman:
Logic and Accuracy Testing: A Fifty-State Review. CoRR abs/2207.14394 (2022) - 2021
- [c73]Sameer Barretto, William Chown, David Meyer, Aditya Soni, Atreya Tata, J. Alex Halderman:
Improving the Accuracy of Ballot Scanners Using Supervised Learning. E-VOTE-ID 2021: 17-32 - [c72]Michael A. Specter, J. Alex Halderman:
Security Analysis of the Democracy Live Online Voting System. USENIX Security Symposium 2021: 3077-3092 - [i6]Edward C. Schrom II, Ann Kinzig, Stephanie Forrest, Andrea L. Graham, Simon A. Levin, Carl T. Bergstrom, Carlos Castillo-Chavez, James P. Collins, Rob J. De Boer, Adam Doupé, Roya Ensafi, Stuart I. Feldman, Bryan T. Grenfell, J. Alex Halderman, Silvie Huijben, Carlo C. Maley, Melanie E. Moses, Alan S. Perelson, Charles Perrings, Joshua B. Plotkin, Jennifer Rexford, Mohit Tiwari:
Challenges in cybersecurity: Lessons from biological defense systems. CoRR abs/2107.10344 (2021) - [i5]Braden L. Crimmins, Marshall Rhea, J. Alex Halderman:
RemoteVote and SAFE Vote: Towards Usable End-to-End Verification for Vote-by-Mail. CoRR abs/2111.08662 (2021) - 2020
- [j7]Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:
Characterizing Transnational Internet Performance and the Great Bottleneck of China. Proc. ACM Meas. Anal. Comput. Syst. 4(1): 13:1-13:23 (2020) - [j6]Benjamin VanderSloot, Sergey Frolov, Jack Wampler, Sze Chuen Tan, Irv Simpson, Michalis Kallitsis, J. Alex Halderman, Nikita Borisov, Eric Wustrow:
Running Refraction Networking for Real. Proc. Priv. Enhancing Technol. 2020(4): 321-335 (2020) - [c71]Ram Sundara Raman, Leonid Evdokimov, Eric Wustrow, J. Alex Halderman, Roya Ensafi:
Investigating Large Scale HTTPS Interception in Kazakhstan. Internet Measurement Conference 2020: 125-132 - [c70]Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Hai-Xin Duan:
Characterizing Transnational Internet Performance and the Great Bottleneck of China. SIGMETRICS (Abstracts) 2020: 69-70 - [c69]Matthew Bernhard, Allison McDonald, Henry Meng, Jensen Hwa, Nakul Bajaj, Kevin Chang, J. Alex Halderman:
Can Voters Detect Malicious Manipulation of Ballot Marking Devices? SP 2020: 679-694
2010 – 2019
- 2019
- [j5]David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, Paul Zimmermann:
Imperfect forward secrecy: how Diffie-Hellman fails in practice. Commun. ACM 62(1): 106-114 (2019) - [c68]Sergey Frolov, Jack Wampler, Sze Chuen Tan, J. Alex Halderman, Nikita Borisov, Eric Wustrow:
Conjure: Summoning Proxies from Unused Address Space. CCS 2019: 2215-2229 - [c67]Josh Aas, Richard Barnes, Benton Case, Zakir Durumeric, Peter Eckersley, Alan Flores-López, J. Alex Halderman, Jacob Hoffman-Andrews, James Kasten, Eric Rescorla, Seth D. Schoen, Brad Warren:
Let's Encrypt: An Automated Certificate Authority to Encrypt the Entire Web. CCS 2019: 2473-2487 - [c66]Matthew Bernhard, Jonathan Sharman, Claudia Ziegler Acemyan, Philip T. Kortum, Dan S. Wallach, J. Alex Halderman:
On the Usability of HTTPS Deployment. CHI 2019: 310 - [c65]Kellie Ottoboni, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, Philip B. Stark:
Bernoulli Ballot Polling: A Manifest Improvement for Risk-Limiting Audits. Financial Cryptography Workshops 2019: 226-241 - [c64]Matthew Bernhard, Kartikeya Kandula, Jeremy Wink, J. Alex Halderman:
UnclearBallot: Automated Ballot Image Manipulation. E-VOTE-ID 2019: 14-31 - 2018
- [c63]Sergey Frolov, Eric Wustrow, Frederick Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman:
An ISP-Scale Deployment of TapDance. ANRW 2018: 22 - [c62]Allison McDonald, Matthew Bernhard, Luke Valenta, Benjamin VanderSloot, Will Scott, Nick Sullivan, J. Alex Halderman, Roya Ensafi:
403 Forbidden: A Global View of CDN Geoblocking. Internet Measurement Conference 2018: 218-230 - [c61]Deepak Kumar, Zhengping Wang, Matthew Hyder, Joseph Dickinson, Gabrielle Beck, David Adrian, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey:
Tracking Certificate Misissuance in the Wild. IEEE Symposium on Security and Privacy 2018: 785-798 - [c60]Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, Roya Ensafi:
Quack: Scalable Remote Measurement of Application-Layer Censorship. USENIX Security Symposium 2018: 187-202 - 2017
- [c59]Eduardo E. P. Pujol, Will Scott, Eric Wustrow, J. Alex Halderman:
Initial measurements of the cuban street network. Internet Measurement Conference 2017: 318-324 - [c58]Zakir Durumeric, Zane Ma, Drew Springall, Richard Barnes, Nick Sullivan, Elie Bursztein, Michael D. Bailey, J. Alex Halderman, Vern Paxson:
The Security Impact of HTTPS Interception. NDSS 2017 - [c57]Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger:
Measuring small subgroup attacks against Diffie-Hellman. NDSS 2017 - [c56]Manos Antonakakis, Tim April, Michael D. Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, Yi Zhou:
Understanding the Mirai Botnet. USENIX Security Symposium 2017: 1093-1110 - [c55]Sergey Frolov, Frederick Douglas, Will Scott, Allison McDonald, Benjamin VanderSloot, Rod Hynes, Adam Kruger, Michalis Kallitsis, David G. Robinson, Steve Schultze, Nikita Borisov, J. Alex Halderman, Eric Wustrow:
An ISP-Scale Deployment of TapDance. FOCI @ USENIX Security Symposium 2017 - [c54]Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. E-VOTE-ID 2017: 84-109 - [c53]Deepak Kumar, Zane Ma, Zakir Durumeric, Ariana Mirian, Joshua Mason, J. Alex Halderman, Michael D. Bailey:
Security Challenges in an Increasingly Tangled Web. WWW 2017: 677-684 - [i4]Josh Benaloh, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. CoRR abs/1707.08619 (2017) - 2016
- [c52]Drew Springall, Zakir Durumeric, J. Alex Halderman:
FTP: The Forgotten Cloud. DSN 2016: 503-513 - [c51]Earlence Fernandes, Qi Alfred Chen, Justin Paupore, Georg Essl, J. Alex Halderman, Zhuoqing Morley Mao, Atul Prakash:
Android UI Deception Revisited: Attacks and Defenses. Financial Cryptography 2016: 41-59 - [c50]Drew Springall, Zakir Durumeric, J. Alex Halderman:
Measuring the Security Harm of TLS Crypto Shortcuts. Internet Measurement Conference 2016: 33-47 - [c49]Benjamin VanderSloot, Johanna Amann, Matthew Bernhard, Zakir Durumeric, Michael D. Bailey, J. Alex Halderman:
Towards a Complete View of the Certificate Ecosystem. Internet Measurement Conference 2016: 543-549 - [c48]Alexander Afanasyev, J. Alex Halderman, Scott Ruoti, Kent E. Seamons, Yingdi Yu, Daniel Zappala, Lixia Zhang:
Content-based security for the web. NSPW 2016: 49-60 - [c47]Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit, Tim Yardley, Robin Berthier, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey:
An Internet-wide view of ICS devices. PST 2016: 96-103 - [c46]Benjamin VanderSloot, Stuart Wheaton, J. Alex Halderman:
A security analysis of police computer systems. PST 2016: 714-721 - [c45]Matthew Bernhard, Gabe Stocco, J. Alex Halderman:
Implementing Attestable kiosks. PST 2016: 722-729 - [c44]Nimrod Aviram, Sebastian Schinzel, Juraj Somorovsky, Nadia Heninger, Maik Dankel, Jens Steube, Luke Valenta, David Adrian, J. Alex Halderman, Viktor Dukhovni, Emilia Käsper, Shaanan Cohney, Susanne Engels, Christof Paar, Yuval Shavitt:
DROWN: Breaking TLS Using SSLv2. USENIX Security Symposium 2016: 689-706 - [i3]Luke Valenta, David Adrian, Antonio Sanso, Shaanan Cohney, Joshua Fried, Marcella Hastings, J. Alex Halderman, Nadia Heninger:
Measuring small subgroup attacks against Diffie-Hellman. IACR Cryptol. ePrint Arch. 2016: 995 (2016) - 2015
- [c43]David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green, J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta, Benjamin VanderSloot, Eric Wustrow, Santiago Zanella Béguelin, Paul Zimmermann:
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. CCS 2015: 5-17 - [c42]Zakir Durumeric, David Adrian, Ariana Mirian, Michael D. Bailey, J. Alex Halderman:
A Search Engine Backed by Internet-Wide Scanning. CCS 2015: 542-553 - [c41]Travis Finkenauer, J. Alex Halderman:
Umbra: Embedded Web Security Through Application-Layer Firewalls. CyberICS/WOS-CPS@ESORICS 2015: 112-126 - [c40]Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael D. Bailey, J. Alex Halderman:
Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security. Internet Measurement Conference 2015: 27-39 - [c39]J. Alex Halderman, Vanessa Teague:
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. VoteID 2015: 35-53 - [c38]Ben Burgess, Eric Wustrow, J. Alex Halderman:
Replication Prohibited: Attacking Restricted Keyways with 3D-Printing. WOOT 2015 - [i2]J. Alex Halderman, Vanessa Teague:
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election. CoRR abs/1504.05646 (2015) - 2014
- [c37]Drew Springall, Travis Finkenauer, Zakir Durumeric, Jason Kitcat, Harri Hursti, Margaret MacAlpine, J. Alex Halderman:
Security Analysis of the Estonian Internet Voting System. CCS 2014: 703-715 - [c36]Alex Migicovsky, Zakir Durumeric, Jeff Ringenberg, J. Alex Halderman:
Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security. Financial Cryptography 2014: 89-96 - [c35]Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow:
Elliptic Curve Cryptography in Practice. Financial Cryptography 2014: 157-175 - [c34]Zakir Durumeric, James Kasten, David Adrian, J. Alex Halderman, Michael D. Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer, Vern Paxson:
The Matter of Heartbleed. Internet Measurement Conference 2014: 475-488 - [c33]Zakir Durumeric, Michael D. Bailey, J. Alex Halderman:
An Internet-Wide View of Internet-Wide Scanning. USENIX Security Symposium 2014: 65-78 - [c32]Eric Wustrow, Colleen Swanson, J. Alex Halderman:
TapDance: End-to-Middle Anticensorship without Flow Blocking. USENIX Security Symposium 2014: 159-174 - [c31]Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, J. Alex Halderman, Hovav Shacham, Stephen Checkoway:
Security Analysis of a Full-Body Scanner. USENIX Security Symposium 2014: 369-384 - [c30]David Adrian, Zakir Durumeric, Gulshan Singh, J. Alex Halderman:
Zippier ZMap: Internet-Wide Scanning at 10 Gbps. WOOT 2014 - [c29]Branden Ghena, William Beyer, Allen Hillaker, Jonathan Pevarnek, J. Alex Halderman:
Green Lights Forever: Analyzing the Security of Traffic Infrastructure. WOOT 2014 - 2013
- [c28]James Kasten, Eric Wustrow, J. Alex Halderman:
CAge: Taming Certificate Authorities by Inferring Restricted Scopes. Financial Cryptography 2013: 329-337 - [c27]Zakir Durumeric, James Kasten, Michael D. Bailey, J. Alex Halderman:
Analysis of the HTTPS certificate ecosystem. Internet Measurement Conference 2013: 291-304 - [c26]Simurgh Aryan, Homa Aryan, J. Alex Halderman:
Internet Censorship in Iran: A First Look. FOCI 2013 - [c25]Zakir Durumeric, Eric Wustrow, J. Alex Halderman:
ZMap: Fast Internet-wide Scanning and Its Security Applications. USENIX Security Symposium 2013: 605-620 - [c24]Anthony Bonkoski, Russ Bielawski, J. Alex Halderman:
Illuminating the Security Issues Surrounding Lights-Out Server Management. WOOT 2013 - [i1]Joppe W. Bos, J. Alex Halderman, Nadia Heninger, Jonathan Moore, Michael Naehrig, Eric Wustrow:
Elliptic Curve Cryptography in Practice. IACR Cryptol. ePrint Arch. 2013: 734 (2013) - 2012
- [c23]Scott Wolchok, Eric Wustrow, Dawn Isabel, J. Alex Halderman:
Attacking the Washington, D.C. Internet Voting System. Financial Cryptography 2012: 114-128 - [c22]Nadia Heninger, Zakir Durumeric, Eric Wustrow, J. Alex Halderman:
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. USENIX Security Symposium 2012: 205-220 - [e1]J. Alex Halderman, Olivier Pereira:
2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, EVT/WOTE '12, Bellevue, WA, USA, August 6-7, 2012. USENIX Association 2012 [contents] - 2011
- [c21]Jay Novak, Jonathan Stribley, Kenneth Meagher, J. Alex Halderman:
Absolute Pwnage: A Short Paper about the Security Risks of Remote Administration Tools. Financial Cryptography 2011: 77-84 - [c20]David G. Robinson, J. Alex Halderman:
Ethical Issues in E-Voting Security Analysis. Financial Cryptography Workshops 2011: 119-130 - [c19]Xueyang Xu, Zhuoqing Morley Mao, J. Alex Halderman:
Internet Censorship in China: Where Does the Filtering Occur? PAM 2011: 133-142 - [c18]Eric Wustrow, Scott Wolchok, Ian Goldberg, J. Alex Halderman:
Telex: Anticensorship in the Network Infrastructure. USENIX Security Symposium 2011 - 2010
- [j4]J. Alex Halderman:
To Strengthen Security, Change Developers' Incentives. IEEE Secur. Priv. 8(2): 79-82 (2010) - [c17]Scott Wolchok, Eric Wustrow, J. Alex Halderman, Hari K. Prasad, Arun Kankipati, Sai Krishna Sakhamuri, Vasavya Yagati, Rop Gonggrijp:
Security analysis of India's electronic voting machines. CCS 2010: 1-14 - [c16]Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, Emmett Witchel:
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs. NDSS 2010 - [c15]Scott Wolchok, J. Alex Halderman:
Crawling BitTorrent DHTs for Fun and Profit. WOOT 2010 - [c14]Steven A. Ross, J. Alex Halderman, Adam Finkelstein:
Sketcha: a captcha based on line drawings of 3D models. WWW 2010: 821-830
2000 – 2009
- 2009
- [j3]J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5): 91-98 (2009) - [c13]William Clarkson, Tim Weyrich, Adam Finkelstein, Nadia Heninger, J. Alex Halderman, Edward W. Felten:
Fingerprinting Blank Paper Using Commodity Scanners. SP 2009: 301-314 - [c12]Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, Hovav Shacham:
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage. EVT/WOTE 2009 - 2008
- [c11]Joseph A. Calandrino, J. Alex Halderman, Edward W. Felten:
In Defense of Pseudorandom Sample Selection. EVT 2008 - [c10]J. Alex Halderman, Eric Rescorla, Hovav Shacham, David A. Wagner:
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems. EVT 2008 - [c9]J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
Lest We Remember: Cold Boot Attacks on Encryption Keys. USENIX Security Symposium 2008: 45-60 - 2007
- [c8]J. Alex Halderman, Brent Waters:
Harvesting verifiable challenges from oblivious online sources. CCS 2007: 330-341 - [c7]Ariel J. Feldman, J. Alex Halderman, Edward W. Felten:
Security Analysis of the Diebold AccuVote-TS Voting Machine. EVT 2007 - 2006
- [j2]Edward W. Felten, J. Alex Halderman:
Digital Rights Management, Spyware, and Security. IEEE Secur. Priv. 4(1): 18-23 (2006) - [c6]J. Alex Halderman, Edward W. Felten:
Lessons from the Sony CD DRM Episode. USENIX Security Symposium 2006 - 2005
- [c5]J. Alex Halderman, Brent Waters, Edward W. Felten:
A convenient method for securely managing passwords. WWW 2005: 471-479 - 2004
- [c4]Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten:
New client puzzle outsourcing techniques for DoS resistance. CCS 2004: 246-256 - [c3]J. Alex Halderman, Brent R. Waters, Edward W. Felten:
Privacy management for portable recording devices. WPES 2004: 16-24 - 2003
- [j1]Thomas A. Funkhouser, Patrick Min, Michael M. Kazhdan, Joyce Chen, J. Alex Halderman, David P. Dobkin, David Pokrass Jacobs:
A search engine for 3D models. ACM Trans. Graph. 22(1): 83-105 (2003) - [c2]Patrick Min, John A. Halderman, Michael M. Kazhdan, Thomas A. Funkhouser:
Early experiences with a 3D model search engine. Web3D 2003: 7-18 - 2002
- [c1]John A. Halderman:
Evaluating New Copy-Prevention Techniques for Audio CDs. Digital Rights Management Workshop 2002: 101-117
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint