Class information for: |
Basic class information |
ID | Publications | Average number of references |
Avg. shr. active ref. in WoS |
---|---|---|---|
744 | 11875 | 22.4 | 39% |
Classes in level above (level 3) |
ID, lev. above |
Publications | Label for level above |
---|---|---|
450 | 23673 | CRYPTOGRAPHY//JOURNAL OF CRYPTOLOGY//CRYPTANALYSIS |
Classes in level below (level 1) |
ID, lev. below | Publications | Label for level below |
---|---|---|
248 | 3739 | RANDOM ORACLE MODEL//PROXY SIGNATURE//DIGITAL SIGNATURE |
3143 | 1973 | PASSWORD//SMART CARD//PASSWORD AUTHENTICATION |
6250 | 1444 | STATISTICAL DISCLOSURE CONTROL//PRIVACY PRESERVING DATA MINING//MICROAGGREGATION |
11174 | 936 | VISUAL SECRET SHARING//VISUAL CRYPTOGRAPHY//SECRET SHARING |
11932 | 879 | BROADCAST ENCRYPTION//TRAITOR TRACING//GROUP KEY MANAGEMENT |
14043 | 732 | LATTICE BASIS REDUCTION//NTRU//KNAPSACK CRYPTOSYSTEM |
14396 | 706 | ELECTRONIC VOTING//HYBRID MIX//MIX NET |
19797 | 425 | OBLIVIOUS TRANSFER//PRIVATE INFORMATION RETRIEVAL//LOCALLY DECODABLE CODES |
20483 | 397 | CONDITIONAL ACCESS SYSTEM//PAY TV//MOBILE PAY TV |
22137 | 335 | USER HIERARCHY//KEY ASSIGNMENT//CRYPTOGRAPHIC KEY ASSIGNMENT |
26286 | 213 | MATH INF//ORBIT OF SUBSPACES//AUTHENTICATION CODE |
33203 | 96 | DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//CARE DEV |
Terms with highest relevance score |
Rank | Term | Type of term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|---|
1 | CRYPTOGRAPHY | Author keyword | 210 | 23% | 7% | 819 |
2 | PASSWORD | Author keyword | 179 | 58% | 2% | 209 |
3 | JOURNAL OF CRYPTOLOGY | Journal | 157 | 53% | 2% | 207 |
4 | SECRET SHARING | Author keyword | 155 | 41% | 2% | 295 |
5 | SMART CARD | Author keyword | 141 | 38% | 2% | 294 |
6 | ANONYMITY | Author keyword | 137 | 29% | 3% | 393 |
7 | RANDOM ORACLE MODEL | Author keyword | 136 | 63% | 1% | 135 |
8 | VISUAL SECRET SHARING | Author keyword | 135 | 76% | 1% | 96 |
9 | PROVABLE SECURITY | Author keyword | 133 | 46% | 2% | 217 |
10 | VISUAL CRYPTOGRAPHY | Author keyword | 119 | 52% | 1% | 164 |
Web of Science journal categories |
Author Key Words |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | CRYPTOGRAPHY | 210 | 23% | 7% | 819 | Search CRYPTOGRAPHY | Search CRYPTOGRAPHY |
2 | PASSWORD | 179 | 58% | 2% | 209 | Search PASSWORD | Search PASSWORD |
3 | SECRET SHARING | 155 | 41% | 2% | 295 | Search SECRET+SHARING | Search SECRET+SHARING |
4 | SMART CARD | 141 | 38% | 2% | 294 | Search SMART+CARD | Search SMART+CARD |
5 | ANONYMITY | 137 | 29% | 3% | 393 | Search ANONYMITY | Search ANONYMITY |
6 | RANDOM ORACLE MODEL | 136 | 63% | 1% | 135 | Search RANDOM+ORACLE+MODEL | Search RANDOM+ORACLE+MODEL |
7 | VISUAL SECRET SHARING | 135 | 76% | 1% | 96 | Search VISUAL+SECRET+SHARING | Search VISUAL+SECRET+SHARING |
8 | PROVABLE SECURITY | 133 | 46% | 2% | 217 | Search PROVABLE+SECURITY | Search PROVABLE+SECURITY |
9 | VISUAL CRYPTOGRAPHY | 119 | 52% | 1% | 164 | Search VISUAL+CRYPTOGRAPHY | Search VISUAL+CRYPTOGRAPHY |
10 | DIGITAL SIGNATURE | 117 | 32% | 3% | 304 | Search DIGITAL+SIGNATURE | Search DIGITAL+SIGNATURE |
Key Words Plus |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | SECURE | 263 | 40% | 4% | 518 |
2 | SMART CARDS | 186 | 57% | 2% | 218 |
3 | RANDOM ORACLES | 178 | 44% | 3% | 312 |
4 | DIGITAL SIGNATURES | 154 | 55% | 2% | 193 |
5 | IDENTITY BASED ENCRYPTION | 131 | 42% | 2% | 239 |
6 | ENCRYPTION | 126 | 26% | 4% | 416 |
7 | PASSWORD AUTHENTICATION | 113 | 56% | 1% | 136 |
8 | K ANONYMITY | 104 | 54% | 1% | 136 |
9 | PAIRINGS | 77 | 44% | 1% | 131 |
10 | SERVER PUBLIC KEYS | 76 | 93% | 0% | 28 |
Journals |
Rank | Web of Science journal category | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | JOURNAL OF CRYPTOLOGY | 157 | 53% | 2% | 207 |
2 | SECURITY AND COMMUNICATION NETWORKS | 64 | 25% | 2% | 222 |
3 | IET INFORMATION SECURITY | 32 | 32% | 1% | 83 |
4 | COMPUTERS & SECURITY | 30 | 16% | 1% | 167 |
5 | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 24 | 29% | 1% | 68 |
6 | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 18 | 12% | 1% | 137 |
7 | COMPUTER STANDARDS & INTERFACES | 13 | 11% | 1% | 119 |
8 | ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY | 10 | 22% | 0% | 39 |
9 | INFORMATICA | 9 | 13% | 1% | 64 |
10 | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | 6 | 12% | 0% | 50 |
Reviews |
Title | Publ. year | Cit. | Active references |
% act. ref. to same field |
---|---|---|---|---|
A Firm Foundation for Private Data Analysis | 2011 | 56 | 4 | 100% |
Building public trust in uses of Health Insurance Portability and Accountability Act de-identified data | 2013 | 18 | 8 | 50% |
Publishing data from electronic health records while preserving privacy: A survey of algorithms | 2014 | 4 | 44 | 73% |
Dynamic ID-based remote user password authentication schemes using smart cards: A review | 2012 | 13 | 23 | 100% |
Protecting privacy using k-anonymity | 2008 | 28 | 19 | 74% |
Location privacy: going beyond K-anonymity, cloaking and anonymizers | 2011 | 15 | 10 | 60% |
Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme | 2014 | 1 | 24 | 96% |
On Anonymity in an Electronic Society: A Survey of Anonymous Communication Systems | 2009 | 9 | 8 | 100% |
A Systematic Review of Re-Identification Attacks on Health Data | 2011 | 17 | 20 | 45% |
A survey on mix networks and their secure applications | 2006 | 14 | 21 | 100% |
Address terms |
Rank | Address term | Relevance score (tfidf) |
Class's shr. of term's tot. occurrences |
Shr. of publ. in class containing term |
Num. of publ. in class |
---|---|---|---|---|---|
1 | COMP INFORMAT SECUR | 71 | 68% | 0.5% | 63 |
2 | STATE INFORMAT SECUR | 67 | 26% | 1.9% | 222 |
3 | INFORMAT SECUR | 62 | 23% | 2.0% | 241 |
4 | COMP NETWORKS INFORMAT SECUR | 50 | 53% | 0.6% | 66 |
5 | INFORMAT SECUR GRP | 48 | 40% | 0.8% | 94 |
6 | INFORMAT TECHNOL COMP SCI | 47 | 45% | 0.7% | 79 |
7 | INT INFORMAT SECUR | 45 | 94% | 0.1% | 16 |
8 | UNESCO CHAIR DATA PRIVACY | 38 | 60% | 0.4% | 42 |
9 | DIPARTIMENTO INFORMAT PLICAZ | 24 | 28% | 0.6% | 72 |
10 | SECUR THEORY ALGORITHM | 23 | 70% | 0.2% | 19 |
Related classes at same level (level 2) |
Rank | Relatedness score | Related classes |
---|---|---|
1 | 0.0000028635 | BLOCK CIPHER//ALGEBRAIC IMMUNITY//CRYPTOGRAPHY |
2 | 0.0000018597 | PRIVACY CALCULUS//ACCESS CONTROL//INFORMATION PRIVACY |
3 | 0.0000014477 | REVERSIBLE DATA HIDING//STEGANOGRAPHY//WATERMARKING |
4 | 0.0000007177 | WIRELESS SENSOR NETWORKS//AD HOC NETWORKS//INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS |
5 | 0.0000006568 | GROUP TESTING//METRIC DIMENSION//RESOLVING SET |
6 | 0.0000004946 | DIGITAL INVESTIGATION//COMPUTERS & SECURITY//INTRUSION DETECTION |
7 | 0.0000004228 | MOBILITY MANAGEMENT//BELL LABS TECHNICAL JOURNAL//LOCATION MANAGEMENT |
8 | 0.0000004009 | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE//JOURNAL OF GRID COMPUTING//GRID COMPUTING |
9 | 0.0000003964 | ACM SIGCOMM COMPUTER COMMUNICATION REVIEW//PEER-TO-PEER NETWORKING AND APPLICATIONS//PEER TO PEER |
10 | 0.0000003534 | RADIO FREQUENCY IDENTIFICATION RFID//RFID//WIRELESS POWER TRANSFER |