Class information for: |
Basic class information |
ID | Publications | Average number of references |
Avg. shr. active ref. in WoS |
---|---|---|---|
22137 | 335 | 17.4 | 38% |
Classes in level above (level 2) |
ID, lev. above |
Publications | Label for level above |
---|---|---|
744 | 11875 | CRYPTOGRAPHY//PASSWORD//JOURNAL OF CRYPTOLOGY |
Terms with highest relevance score |
Rank | Term | Type of term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|---|
1 | USER HIERARCHY | Author keyword | 35 | 73% | 8% | 27 |
2 | KEY ASSIGNMENT | Author keyword | 19 | 63% | 6% | 19 |
3 | CRYPTOGRAPHIC KEY ASSIGNMENT | Author keyword | 15 | 77% | 3% | 10 |
4 | SUBLIMINAL CHANNELS | Author keyword | 5 | 63% | 1% | 5 |
5 | HIERARCHICAL ACCESS CONTROL | Author keyword | 5 | 37% | 3% | 10 |
6 | INFORMATION PROTECTION SYSTEM | Author keyword | 4 | 75% | 1% | 3 |
7 | KEY LOCK PAIR | Author keyword | 4 | 75% | 1% | 3 |
8 | SECURE BROADCASTING | Author keyword | 3 | 50% | 1% | 5 |
9 | EFFICIENT KEY DERIVATION | Author keyword | 3 | 100% | 1% | 3 |
10 | KEY AUTHENTICATION SCHEME | Author keyword | 3 | 100% | 1% | 3 |
Web of Science journal categories |
Author Key Words |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | USER HIERARCHY | 35 | 73% | 8% | 27 | Search USER+HIERARCHY | Search USER+HIERARCHY |
2 | KEY ASSIGNMENT | 19 | 63% | 6% | 19 | Search KEY+ASSIGNMENT | Search KEY+ASSIGNMENT |
3 | CRYPTOGRAPHIC KEY ASSIGNMENT | 15 | 77% | 3% | 10 | Search CRYPTOGRAPHIC+KEY+ASSIGNMENT | Search CRYPTOGRAPHIC+KEY+ASSIGNMENT |
4 | SUBLIMINAL CHANNELS | 5 | 63% | 1% | 5 | Search SUBLIMINAL+CHANNELS | Search SUBLIMINAL+CHANNELS |
5 | HIERARCHICAL ACCESS CONTROL | 5 | 37% | 3% | 10 | Search HIERARCHICAL+ACCESS+CONTROL | Search HIERARCHICAL+ACCESS+CONTROL |
6 | INFORMATION PROTECTION SYSTEM | 4 | 75% | 1% | 3 | Search INFORMATION+PROTECTION+SYSTEM | Search INFORMATION+PROTECTION+SYSTEM |
7 | KEY LOCK PAIR | 4 | 75% | 1% | 3 | Search KEY+LOCK+PAIR | Search KEY+LOCK+PAIR |
8 | SECURE BROADCASTING | 3 | 50% | 1% | 5 | Search SECURE+BROADCASTING | Search SECURE+BROADCASTING |
9 | EFFICIENT KEY DERIVATION | 3 | 100% | 1% | 3 | Search EFFICIENT+KEY+DERIVATION | Search EFFICIENT+KEY+DERIVATION |
10 | KEY AUTHENTICATION SCHEME | 3 | 100% | 1% | 3 | Search KEY+AUTHENTICATION+SCHEME | Search KEY+AUTHENTICATION+SCHEME |
Key Words Plus |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | SINGLE KEY LOCK | 27 | 92% | 3% | 11 |
2 | CRYPTOGRAPHIC KEYS | 19 | 76% | 4% | 13 |
3 | KEY ASSIGNMENT SCHEME | 14 | 64% | 4% | 14 |
4 | ASSIGNMENT SCHEME | 13 | 49% | 6% | 19 |
5 | USER HIERARCHY | 12 | 75% | 3% | 9 |
6 | TREE HIERARCHY | 12 | 86% | 2% | 6 |
7 | INFORMATION PROTECTION SYSTEMS | 11 | 100% | 2% | 6 |
8 | KEY LOCK | 6 | 100% | 1% | 4 |
9 | DYNAMIC ACCESS CONTROL | 4 | 75% | 1% | 3 |
10 | PARTIALLY ORDERED HIERARCHIES | 4 | 75% | 1% | 3 |
Journals |
Reviews |
Address terms |
Rank | Address term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | HBEREICH ANGEW INFORMAT | 2 | 67% | 0.6% | 2 |
2 | ELECT PAYMENT TEAM | 1 | 50% | 0.3% | 1 |
3 | SECUR THEORY ALGORITHM | 1 | 15% | 1.2% | 4 |
4 | GMD FIT | 0 | 33% | 0.3% | 1 |
5 | TAIWAN INFORMAT SECUR | 0 | 13% | 0.6% | 2 |
6 | CRYPTOG COMP NETWORK SECUR | 0 | 11% | 0.6% | 2 |
7 | DIIMM | 0 | 20% | 0.3% | 1 |
8 | RD 9 | 0 | 20% | 0.3% | 1 |
9 | SECURE DEPENDABLE SYST | 0 | 20% | 0.3% | 1 |
10 | TITR | 0 | 20% | 0.3% | 1 |
Related classes at same level (level 1) |
Rank | Relatedness score | Related classes |
---|---|---|
1 | 0.0000191511 | BROADCAST ENCRYPTION//TRAITOR TRACING//GROUP KEY MANAGEMENT |
2 | 0.0000119386 | PASSWORD//SMART CARD//PASSWORD AUTHENTICATION |
3 | 0.0000117698 | RANDOM ORACLE MODEL//PROXY SIGNATURE//DIGITAL SIGNATURE |
4 | 0.0000109229 | CREDENTIAL VALIDATION SERVICE//ROLE BASED ACCESS CONTROLS//ACCESS CONTROL IN COLLABORATION ENVIRONMENTS |
5 | 0.0000092884 | MOBILE AGENTS//MOBILE AGENT PLANNING//C C PLUS PLUS INTERPRETER |
6 | 0.0000082388 | CONTINUOUS ASSURANCE//CONTINUOUS AUDITING//XBRL |
7 | 0.0000078156 | ELECTRONIC VOTING//HYBRID MIX//MIX NET |
8 | 0.0000076630 | LATTICE BASIS REDUCTION//NTRU//KNAPSACK CRYPTOSYSTEM |
9 | 0.0000073359 | CONTROLLED QUERY EVALUATION//ROLE BASED ACCESS CONTROL//RBAC |
10 | 0.0000051996 | SCALAR MULTIPLICATION//MODULAR MULTIPLICATION//FINITE FIELD ARITHMETIC |