default search action
Bao Li 0001
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- affiliation: University of Chinese Academy of Sciences, School of Cyber Security, Beijing, China
Other persons with the same name
- Bao Li — disambiguation page
- Bao Li 0002 — National University of Defense Technology, School of Computer Science, National Laboratory for Parallel and Distributed Processing, Changsha, China
- Bao Li 0003 — Peking University, Shanghai Research Institute of Microelectronics, Shanghai, China (and 1 more)
- Bao Li 0004 — Beijing University of Technology, Department of Biomedical Engineering, Beijing, China
- Bao Li 0005 — Northeastern University, Software College, Shenyang, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c75]Yao Cheng, Xianhui Lu, Ziyi Li, Bao Li:
Revisiting Anonymity in Post-quantum Public Key Encryption. PQCrypto (2) 2024: 336-370 - 2023
- [c74]Ziyi Li, Xianhui Lu, Yao Cheng, Bao Li:
Power of Randomness Recovery: Tighter CCA-Secure KEM in the QROM. Inscrypt (2) 2023: 403-406 - 2022
- [c73]Zhao Chen, Xianhui Lu, Dingding Jia, Bao Li:
IND-CCA Security of Kyber in the Quantum Random Oracle Model, Revisited. Inscrypt 2022: 148-166 - [c72]Zhao Chen, Xianhui Lu, Dingding Jia, Bao Li:
Implicit Rejection in Fujisaki-Okamoto: Framework and a Novel Realization. ISC 2022: 110-130 - 2021
- [c71]Shuaigang Li, Xianhui Lu, Jiang Zhang, Bao Li, Lei Bi:
Predicting the Concrete Security of LWE Against the Dual Attack Using Binary Search. ICICS (2) 2021: 265-282 - 2020
- [j15]Dingding Jia, Yamin Liu, Bao Li:
IBE with tight security against selective opening and chosen-ciphertext attacks. Des. Codes Cryptogr. 88(7): 1371-1400 (2020) - [j14]Xingran Li, Wei Yu, Bao Li:
Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields. Secur. Commun. Networks 2020: 4087873:1-4087873:10 (2020) - [c70]Xuejun Fan, Song Tian, Xiu Xu, Bao Li:
CSURF-TWO: CSIDH for the Ratio (2 : 1). Inscrypt 2020: 148-156 - [c69]Xuejun Fan, Xiu Xu, Bao Li:
Group Key Exchange Protocols from Supersingular Isogenies. Inscrypt 2020: 157-173 - [c68]Wei Yu, Saud Al Musa, Bao Li:
Double-Base Chains for Scalar Multiplications on Elliptic Curves. EUROCRYPT (3) 2020: 538-565 - [i20]Wei Yu, Saud Al Musa, Bao Li:
Double-Base Chains for Scalar Multiplications on Elliptic Curves. IACR Cryptol. ePrint Arch. 2020: 144 (2020)
2010 – 2019
- 2019
- [j13]Tongchen Shen, Fuqun Wang, Kefei Chen, Kunpeng Wang, Bao Li:
Efficient Leveled (Multi) Identity-Based Fully Homomorphic Encryption Schemes. IEEE Access 7: 79299-79310 (2019) - [j12]Yanyan Liu, Daode Zhang, Yi Deng, Bao Li:
(Identity-based) dual receiver encryption from lattice-based programmable hash functions with high min-entropy. Cybersecur. 2(1): 18 (2019) - [j11]Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. Secur. Commun. Networks 2019: 1816393:1-1816393:12 (2019) - [c67]Weixuan Li, Wei Yu, Bao Li, Xuejun Fan:
Speeding up Scalar Multiplication on Koblitz Curves Using \mu _4 Coordinates. ACISP 2019: 620-629 - [c66]Xuejun Fan, Song Tian, Bao Li, Weixuan Li:
Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields. ACISP 2019: 630-638 - [i19]Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. IACR Cryptol. ePrint Arch. 2019: 51 (2019) - [i18]Xuejun Fan, Song Tian, Bao Li, Xiu Xu:
CSIDH on Other Form of Elliptic Curves. IACR Cryptol. ePrint Arch. 2019: 1417 (2019) - 2018
- [j10]Song Tian, Bao Li, Kunpeng Wang, Wei Yu:
Cover attacks for elliptic curves with cofactor two. Des. Codes Cryptogr. 86(11): 2451-2468 (2018) - [c65]Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li:
Lattice-Based Dual Receiver Encryption and More. ACISP 2018: 520-538 - [c64]Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He:
Understanding and Constructing AKE via Double-Key Key Encapsulation Mechanism. ASIACRYPT (2) 2018: 158-189 - [c63]Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He:
Preprocess-then-NTT Technique and Its Applications to Kyber and NewHope. Inscrypt 2018: 117-137 - [i17]Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li:
Lattice-Based Dual Receiver Encryption and More. IACR Cryptol. ePrint Arch. 2018: 636 (2018) - [i16]Haiyang Xue, Xianhui Lu, Bao Li, Bei Liang, Jingnan He:
Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2018: 817 (2018) - [i15]Shuai Zhou, Haiyang Xue, Daode Zhang, Kunpeng Wang, Xianhui Lu, Bao Li, Jingnan He:
Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE. IACR Cryptol. ePrint Arch. 2018: 995 (2018) - [i14]Xianhui Lu, Yamin Liu, Zhenfei Zhang, Dingding Jia, Haiyang Xue, Jingnan He, Bao Li:
LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus. IACR Cryptol. ePrint Arch. 2018: 1009 (2018) - 2017
- [c62]Jingnan He, Wenpan Jing, Bao Li, Xianhui Lu, Dingding Jia:
Dual-Mode Cryptosystem Based on the Learning with Errors Problem. ACISP (2) 2017: 443-451 - [c61]Jingnan He, Bao Li, Xianhui Lu, Dingding Jia, Wenpan Jing:
KDM and Selective Opening Secure IBE Based on the LWE Problem. APKC@AsiaCCS 2017: 31-42 - [c60]Dingding Jia, Xianhui Lu, Bao Li:
Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks. CT-RSA 2017: 417-431 - [c59]Daode Zhang, Bao Li, Yamin Liu, Haiyang Xue, Xianhui Lu, Dingding Jia:
Towards Tightly Secure Deterministic Public Key Encryption. ICICS 2017: 154-161 - [c58]Daode Zhang, Fuyang Fang, Bao Li, Haiyang Xue, Bei Liang:
Compact Hierarchical IBE from Lattices in the Standard Model. ICICS 2017: 210-221 - [c57]Daode Zhang, Fuyang Fang, Bao Li, Xin Wang:
Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters. IWSEC 2017: 215-230 - [c56]Haiyang Xue, Bao Li, Xianhui Lu:
IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper). IWSEC 2017: 231-241 - [c55]Haiyang Xue, Bao Li, Jingnan He:
New Framework of Password-Based Authenticated Key Exchange from Only-One Lossy Encryption. ProvSec 2017: 188-198 - [i13]Wei Yu, Saud Al Musa, Guangwu Xu, Bao Li:
A Novel Pre-Computation Scheme of Window τNAF for Koblitz Curves. IACR Cryptol. ePrint Arch. 2017: 1020 (2017) - 2016
- [c54]Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian:
Deterministic Encoding into Twisted Edwards Curves. ACISP (2) 2016: 285-297 - [c53]Fuyang Fang, Bao Li, Xianhui Lu, Yamin Liu, Dingding Jia, Haiyang Xue:
(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus. AsiaCCS 2016: 907-912 - [c52]Wenpan Jing, Xianhui Lu, Bao Li:
Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation. Inscrypt 2016: 291-308 - [c51]Yamin Liu, Xianhui Lu, Bao Li, Haiyang Xue:
Lossy Key Encapsulation Mechanism and Its Applications. ICISC 2016: 126-144 - [c50]Yamin Liu, Xianhui Lu, Bao Li, Wenpan Jing, Fuyang Fang:
Approximate-Deterministic Public Key Encryption from Hard Learning Problems. INDOCRYPT 2016: 25-42 - [c49]Dingding Jia, Xianhui Lu, Bao Li:
Receiver Selective Opening Security from Indistinguishability Obfuscation. INDOCRYPT 2016: 393-410 - [i12]Guangwu Xu, Bao Li:
On the Algorithmic Significance and Analysis of the Method of DaYan Deriving One. CoRR abs/1610.01175 (2016) - [i11]Dingding Jia, Xianhui Lu, Bao Li:
Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks. IACR Cryptol. ePrint Arch. 2016: 1083 (2016) - 2015
- [j9]Haixia Xu, Bao Li, Qixiang Mei:
Complementary witness soundness for witness indistinguishable proof system and CCA2 public-key encryption schemes. Int. J. Inf. Comput. Secur. 7(1): 14-38 (2015) - [c48]Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Cryptanalysis of Reduced-Round Whirlwind. ACISP 2015: 20-38 - [c47]Xiaochao Sun, Bao Li, Xianhui Lu, Fuyang Fang:
CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian Sampling. Inscrypt 2015: 361-378 - [c46]Xianhui Lu, Bao Li, Dingding Jia:
KDM-CCA Security from RKA Secure Authenticated Encryption. EUROCRYPT (1) 2015: 559-583 - [c45]Haiyang Xue, Yamin Liu, Xianhui Lu, Bao Li:
Lossy Projective Hashing and Its Applications. INDOCRYPT 2015: 64-84 - [c44]Xiaochao Sun, Bao Li, Xianhui Lu:
Cramer-Shoup Like Chosen Ciphertext Security from LPN. ISPEC 2015: 79-95 - [c43]Song Tian, Wei Yu, Bao Li, Kunpeng Wang:
Models of Curves from GHS Attack in Odd Characteristic. ISPEC 2015: 171-180 - [c42]Song Tian, Wei Yu, Bao Li, Kunpeng Wang:
Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves. ISPEC 2015: 181-191 - [c41]Fuqun Wang, Kunpeng Wang, Bao Li, Yuanyuan Gao:
Leveled Strongly-Unforgeable Identity-Based Fully Homomorphic Signatures. ISC 2015: 42-60 - [c40]Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian:
Hashing into Jacobi Quartic Curves. ISC 2015: 355-375 - [c39]Jingnan He, Bao Li, Xianhui Lu, Dingding Jia, Haiyang Xue, Xiaochao Sun:
Identity-Based Lossy Encryption from Learning with Errors. IWSEC 2015: 3-20 - [c38]Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions. IWSEC 2015: 79-96 - [c37]Fuqun Wang, Kunpeng Wang, Bao Li:
LWE-Based FHE with Better Parameters. IWSEC 2015: 175-192 - [c36]Fuyang Fang, Bao Li, Xianhui Lu, Xiaochao Sun:
Improved Efficiency of MP12. IWSEC 2015: 193-210 - [c35]Fuqun Wang, Kunpeng Wang, Bao Li:
An Efficient Leveled Identity-Based FHE. NSS 2015: 303-315 - [i10]Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Cryptanalysis of Reduced-Round Whirlwind (Full Version). IACR Cryptol. ePrint Arch. 2015: 568 (2015) - [i9]Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version). IACR Cryptol. ePrint Arch. 2015: 569 (2015) - 2014
- [j8]Tongjiang Yan, Zhixiong Chen, Bao Li:
A general construction of binary interleaved sequences of period 4N with optimal autocorrelation. Inf. Sci. 287: 26-31 (2014) - [c34]Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function. ACNS 2014: 289-307 - [c33]Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu:
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP. CANS 2014: 34-49 - [c32]Song Tian, Kunpeng Wang, Bao Li, Wei Yu:
A Note on Diem's Proof. Inscrypt 2014: 463-471 - [c31]Ronglin Hao, Bao Li, Bingke Ma, Xiaoqian Li:
Improved Preimage Attacks against Reduced HAS-160. ISPEC 2014: 524-536 - [c30]Xianhui Lu, Bao Li, Dingding Jia:
Related-Key Security for Hybrid Encryption. ISC 2014: 19-32 - [c29]Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei:
Related Key Secure PKE from Hash Proof Systems. IWSEC 2014: 250-265 - [c28]Haiyang Xue, Xianhui Lu, Bao Li, Yamin Liu:
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation. ProvSec 2014: 162-177 - [i8]Tongjiang Yan, Zhixiong Chen, Bao Li:
A General Construction of Binary Sequences with Optimal Autocorrelation. CoRR abs/1401.2530 (2014) - [i7]Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version). IACR Cryptol. ePrint Arch. 2014: 375 (2014) - 2013
- [c27]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
On the Expansion Length Of Triple-Base Number Systems. AFRICACRYPT 2013: 424-432 - [c26]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
Triple-Base Number System for Scalar Multiplication. AFRICACRYPT 2013: 433-451 - [c25]Haiyang Xue, Bao Li, Xianhui Lu, Dingding Jia, Yamin Liu:
Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions. CANS 2013: 235-250 - [c24]Dingding Jia, Bao Li, Xianhui Lu, Yamin Liu:
RSA-OAEP is RKA Secure. Inscrypt 2013: 270-281 - [c23]Xiaoqian Li, Peng Wang, Bao Li, Zhelei Sun:
Cryptanalysis of Three Authenticated Encryption Schemes for Wireless Sensor Networks. Inscrypt 2013: 395-406 - [c22]Xiaoqian Li, Bao Li, Wenling Wu, Xiaoli Yu, Ronglin Hao, Bingke Ma:
First Multidimensional Cryptanalysis on Reduced-Round \mathrmPRINCE _core. ICISC 2013: 158-172 - [c21]Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei:
Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme. ISPEC 2013: 105-116 - [c20]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
About Hash into Montgomery Form Elliptic Curves. ISPEC 2013: 147-159 - [c19]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
Joint Triple-Base Number System for Multi-Scalar Multiplication. ISPEC 2013: 160-173 - [c18]Xianhui Lu, Bao Li, Yamin Liu:
How to Remove the Exponent GCD in HK09. ProvSec 2013: 239-248 - [c17]Dingding Jia, Xianhui Lu, Bao Li, Qixiang Mei:
RKA Secure PKE Based on the DDH and HR Assumptions. ProvSec 2013: 271-287 - [i6]Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei:
Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme. IACR Cryptol. ePrint Arch. 2013: 159 (2013) - 2012
- [j7]Hongda Li, Dengguo Feng, Bao Li, Haixia Xue:
Round-optimal zero-knowledge proofs of knowledge for NP. Sci. China Inf. Sci. 55(11): 2473-2484 (2012) - [j6]Haixia Xu, Hongda Li, Bao Li:
Universally composable zero-knowledge sets. Int. J. Grid Util. Comput. 3(1): 25-31 (2012) - [c16]Wenpan Jing, Haixia Xu, Bao Li:
Non-malleable Instance-Dependent Commitment in the Standard Model. ACISP 2012: 450-457 - [c15]Haixia Xu, Bao Li, Qixiang Mei:
Complementary Witness Soundness Witness Indistinguishable Proof System and CCA2 Public-Key Encryption Schemes. INCoS 2012: 270-278 - [c14]Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu:
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring. ISPEC 2012: 34-45 - 2011
- [c13]Yamin Liu, Bao Li, Xianhui Lu, Dingding Jia:
Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key. ACISP 2011: 310-318 - [c12]Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu:
Improved Tradeoff between Encapsulation and Decapsulation of HK09. Inscrypt 2011: 131-141 - [c11]Yamin Liu, Bao Li, Xianhui Lu, Xiaoying Jia:
Encryption Simulatability Reconsidered. ISPEC 2011: 14-23 - [c10]Tongjiang Yan, Yuhua Sun, Zilong Wang, Bao Li:
Cross-correlation of some extended d-form sequences. IWSDA 2011: 56-59 - [c9]Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia:
Chosen Ciphertext Secure Encryption under Factoring Assumption Revisited. Public Key Cryptography 2011: 210-227 - [c8]Xianhui Lu, Bao Li, Qixiang Mei, Haixia Xu:
Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing. ProvSec 2011: 297-308 - 2010
- [j5]HongDa Li, Haixia Xu, Bao Li, Dengguo Feng:
On constant-round zero-knowledge proofs of knowledge for NP-relations. Sci. China Inf. Sci. 53(4): 788-799 (2010) - [c7]Yazhe Zhang, Kunpeng Wang, Bao Li:
A Deniable Group Key Establishment Protocol in the Standard Model. ISPEC 2010: 308-323 - [c6]Yamin Liu, Bao Li, Xianhui Lu, Yazhe Zhang:
PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples. IWSEC 2010: 40-54 - [c5]Wenpan Jing, Haixia Xu, Bao Li:
A New Efficient Construction for Non-Malleable Zero-Knowledge Sets. WISA 2010: 31-43 - [i5]Qixiang Mei, Bao Li, Xianhui Lu, Dingding Jia:
Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup. IACR Cryptol. ePrint Arch. 2010: 172 (2010) - [i4]Hong Wang, Kunpeng Wang, Lijun Zhang, Bao Li:
Pairing Computation on Elliptic Curves of Jacobi Quartic Form. IACR Cryptol. ePrint Arch. 2010: 475 (2010)
2000 – 2009
- 2008
- [j4]HongDa Li, Bao Li:
Existence of 3-round zero-knowledge proof systems for NP. Sci. China Ser. F Inf. Sci. 51(3): 273-282 (2008) - [i3]HongDa Li, Dengguo Feng, Bao Li, Haixia Xue:
Round-Optimal Zero-Knowledge Proofs of Knowledge for NP. IACR Cryptol. ePrint Arch. 2008: 524 (2008) - 2007
- [j3]Haixia Xu, Bao Li:
Relationship Between a Non-Malleable Commitment Scheme and a Modified Selective Decommitment Scheme. J. Comput. Sci. Technol. 22(1): 75-78 (2007) - [c4]Canming Jiang, Bao Li, Haixia Xu:
An Efficient Scheme for User Authentication in Wireless Sensor Networks. AINA Workshops (1) 2007: 438-442 - 2006
- [c3]Yin Yin, Bao Li:
Secure Cross-Realm C2C-PAKE Protocol. ACISP 2006: 395-406 - 2005
- [c2]Hongda Li, Bao Li:
An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP. CISC 2005: 210-220 - [i2]Bao Li, Hongda Li, Guangwu Xu, Haixia Xu:
Efficient reduction of 1 out of n oblivious transfers in random oracle model. IACR Cryptol. ePrint Arch. 2005: 279 (2005) - [i1]Kunpeng Wang, Bao Li:
Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7. IACR Cryptol. ePrint Arch. 2005: 374 (2005) - 2004
- [j2]Hong-Da Li, Dongyao Ji, Dengguo Feng, Bao Li:
Oblivious Polynomial Evaluation. J. Comput. Sci. Technol. 19(4): 550-554 (2004) - [j1]Hong-Da Li, Xiong Yang, Dengguo Feng, Bao Li:
Distributed Oblivious Function Evaluation and Its Applications. J. Comput. Sci. Technol. 19(6): 942-947 (2004)
1990 – 1999
- 1999
- [c1]Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing:
Cryptanalysis of some AES Candidate Algorithms. ICICS 1999: 13-21
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint