Class information for:
Level 1: SECURITY PROTOCOLS//FAIR EXCHANGE//CRYPTOGRAPHIC PROTOCOLS

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
11223 999 25.0 29%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
632 2             AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE 13771
11223 1                   SECURITY PROTOCOLS//FAIR EXCHANGE//CRYPTOGRAPHIC PROTOCOLS 999

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 SECURITY PROTOCOLS authKW 1223937 9% 46% 87
2 FAIR EXCHANGE authKW 573151 4% 51% 37
3 CRYPTOGRAPHIC PROTOCOLS authKW 558454 6% 30% 60
4 NON REPUDIATION authKW 447207 3% 43% 34
5 SECURITY PROTOCOL ANALYSIS authKW 225062 1% 82% 9
6 CERTIFIED E MAIL authKW 195609 1% 80% 8
7 DOLEV YAO MODEL authKW 187205 1% 88% 7
8 SECURE ELECTRONIC COMMERCE authKW 177825 1% 73% 8
9 AUTHENTICATION PROTOCOLS authKW 176315 2% 38% 15
10 SPI CALCULUS authKW 166403 1% 78% 7

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Theory & Methods 42794 57% 0% 566
2 Computer Science, Software Engineering 18850 32% 0% 318
3 Computer Science, Information Systems 12793 30% 0% 295
4 Computer Science, Hardware & Architecture 3963 11% 0% 114
5 Telecommunications 1893 12% 0% 120
6 Logic 1466 3% 0% 27
7 Computer Science, Artificial Intelligence 1057 9% 0% 90
8 Engineering, Electrical & Electronic 286 12% 0% 123
9 Computer Science, Interdisciplinary Applications 104 3% 0% 34
10 Mathematics, Applied 80 5% 0% 49

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 LSV 75460 3% 10% 25
2 IST INFORMAT TELEMAT 66099 2% 14% 15
3 LOG SECUR 61129 0% 100% 2
4 PROSECCO 61129 0% 100% 2
5 TEAM LILAC 61129 0% 100% 2
6 UGBS 55014 0% 60% 3
7 LOG COMPUTAT 45844 0% 50% 3
8 IST PLICAZ TELEMAT 40751 0% 67% 2
9 LORIA INRIA 40751 0% 67% 2
10 UMR 8643 40179 1% 12% 11

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 LECTURE NOTES IN COMPUTER SCIENCE 51913 39% 0% 387
2 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 27233 2% 6% 16
3 JOURNAL OF AUTOMATED REASONING 11115 2% 2% 16
4 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 10335 1% 4% 8
5 FORMAL ASPECTS OF COMPUTING 9585 1% 3% 11
6 INTERNATIONAL FEDERATION FOR INFORMATION PROCESSING 9401 0% 15% 2
7 JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING 7462 1% 3% 9
8 COMPUTERS & SECURITY 7371 2% 1% 17
9 ELECTRONIC COMMERCE RESEARCH 6034 1% 3% 6
10 COMPUTER STANDARDS & INTERFACES 5512 2% 1% 15

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 SECURITY PROTOCOLS 1223937 9% 46% 87 Search SECURITY+PROTOCOLS Search SECURITY+PROTOCOLS
2 FAIR EXCHANGE 573151 4% 51% 37 Search FAIR+EXCHANGE Search FAIR+EXCHANGE
3 CRYPTOGRAPHIC PROTOCOLS 558454 6% 30% 60 Search CRYPTOGRAPHIC+PROTOCOLS Search CRYPTOGRAPHIC+PROTOCOLS
4 NON REPUDIATION 447207 3% 43% 34 Search NON+REPUDIATION Search NON+REPUDIATION
5 SECURITY PROTOCOL ANALYSIS 225062 1% 82% 9 Search SECURITY+PROTOCOL+ANALYSIS Search SECURITY+PROTOCOL+ANALYSIS
6 CERTIFIED E MAIL 195609 1% 80% 8 Search CERTIFIED+E+MAIL Search CERTIFIED+E+MAIL
7 DOLEV YAO MODEL 187205 1% 88% 7 Search DOLEV+YAO+MODEL Search DOLEV+YAO+MODEL
8 SECURE ELECTRONIC COMMERCE 177825 1% 73% 8 Search SECURE+ELECTRONIC+COMMERCE Search SECURE+ELECTRONIC+COMMERCE
9 AUTHENTICATION PROTOCOLS 176315 2% 38% 15 Search AUTHENTICATION+PROTOCOLS Search AUTHENTICATION+PROTOCOLS
10 SPI CALCULUS 166403 1% 78% 7 Search SPI+CALCULUS Search SPI+CALCULUS

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 CORTIER, V , KREMER, S , WARINSCHI, B , (2011) A SURVEY OF SYMBOLIC METHODS IN COMPUTATIONAL ANALYSIS OF CRYPTOGRAPHIC SYSTEMS.JOURNAL OF AUTOMATED REASONING. VOL. 46. ISSUE 3-4. P. 225-259 32 94% 12
2 SATTARZADEH, B , FALLAH, MS , (2015) AUTOMATED TYPE-BASED ANALYSIS OF INJECTIVE AGREEMENT IN THE PRESENCE OF COMPROMISED PRINCIPALS.JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING. VOL. 84. ISSUE 5. P. 576 -610 21 88% 0
3 AVALLE, M , PIRONTI, A , SISTO, R , (2014) FORMAL VERIFICATION OF SECURITY PROTOCOL IMPLEMENTATIONS: A SURVEY.FORMAL ASPECTS OF COMPUTING. VOL. 26. ISSUE 1. P. 99 -123 16 73% 5
4 BASIN, D , CALEIRO, C , RAMOS, J , VIGANO, L , (2011) DISTRIBUTED TEMPORAL LOGIC FOR THE ANALYSIS OF SECURITY PROTOCOL MODELS.THEORETICAL COMPUTER SCIENCE. VOL. 412. ISSUE 31. P. 4007 -4043 16 80% 1
5 AVANESOV, T , CHEVALIER, Y , RUSINOWITCH, M , TURUANI, M , (2017) SATISFIABILITY OF GENERAL INTRUDER CONSTRAINTS WITH AND WITHOUT A SET CONSTRUCTOR.JOURNAL OF SYMBOLIC COMPUTATION. VOL. 80. ISSUE . P. 27 -61 11 100% 0
6 BAUDET, M , CORTIER, V , KREMER, S , (2009) COMPUTATIONALLY SOUND IMPLEMENTATIONS OF EQUATIONAL THEORIES AGAINST PASSIVE ADVERSARIES.INFORMATION AND COMPUTATION. VOL. 207. ISSUE 4. P. 496 -520 14 88% 4
7 KAHLER, D , KUSTERS, R , WILKE, T , (2010) DECIDING STRATEGY PROPERTIES OF CONTRACT-SIGNING PROTOCOLS.ACM TRANSACTIONS ON COMPUTATIONAL LOGIC. VOL. 11. ISSUE 3. P. - 12 100% 0
8 CHEVALIER, Y , RUSINOWITCH, M , (2008) HIERARCHICAL COMBINATION OF INTRUDER THEORIES.INFORMATION AND COMPUTATION. VOL. 206. ISSUE 2-4. P. 352 -377 14 88% 4
9 BACKES, M , CERVESATO, I , JAGGARD, AD , SCEDROV, A , TSAY, JK , (2011) CRYPTOGRAPHICALLY SOUND SECURITY PROOFS FOR BASIC AND PUBLIC-KEY KERBEROS.INTERNATIONAL JOURNAL OF INFORMATION SECURITY. VOL. 10. ISSUE 2. P. 107 -134 13 87% 4
10 PERMPOONTANALARP, Y , SORNKHOM, P , (2014) ON-THE-FLY TRACE GENERATION APPROACH TO THE SECURITY ANALYSIS OF CRYPTOGRAPHIC PROTOCOLS: COLOURED PETRI NETS-BASED METHOD.FUNDAMENTA INFORMATICAE. VOL. 130. ISSUE 4. P. 423 -466 13 81% 0

Classes with closest relation at Level 1



Rank Class id link
1 8999 PI CALCULUS//PROCESS CALCULI//SESSION TYPES
2 20701 INFORMATION FLOW CONTROL//BYTECODE VERIFICATION//LANGUAGE BASED SECURITY
3 2433 SMART CARD//PASSWORD//KEY AGREEMENT
4 37532 DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL
5 28047 HIMALIS//FUTURE NETWORK//NEW GENERATION NETWORK
6 7314 ZERO KNOWLEDGE//OBLIVIOUS TRANSFER//JOURNAL OF CRYPTOLOGY
7 28772 AUTHENTICATED DATA STRUCTURES//CERTIFICATE REVOCATION//CHAIR MOBILE COMMERCE MULTILATERAL SECUR
8 414 DIGITAL SIGNATURE//BILINEAR PAIRING//PROXY SIGNATURE
9 13842 ELECTRONIC VOTING//MIX NET//ANONYMOUS COMMUNICATION
10 34337 CLIENT SERVER TRANSACTIONS//COARSELY INTEGRATED OPERAND SCANNING CIOS//COMPATIBILITY PRE ADOPTION CONSTRUCT

Go to start page