Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
16868 | 631 | 26.0 | 36% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
295 | 3 | CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY | 41419 |
2771 | 2 | RFID//ANTI COLLISION//RADIO FREQUENCY IDENTIFICATION | 3146 |
16868 | 1 | RFID//DISTANCE BOUNDING PROTOCOL//RELAY ATTACK | 631 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | RFID | authKW | 1873590 | 41% | 15% | 261 |
2 | DISTANCE BOUNDING PROTOCOL | authKW | 1120153 | 4% | 93% | 25 |
3 | RELAY ATTACK | authKW | 1068986 | 4% | 82% | 27 |
4 | RFID SECURITY | authKW | 780692 | 3% | 73% | 22 |
5 | MAFIA FRAUD ATTACK | authKW | 774252 | 3% | 100% | 16 |
6 | GROUPING PROOF | authKW | 725861 | 2% | 100% | 15 |
7 | OWNERSHIP TRANSFER | authKW | 559386 | 3% | 68% | 17 |
8 | RFID AUTHENTICATION | authKW | 387126 | 1% | 100% | 8 |
9 | MUTUAL AUTHENTICATION | authKW | 373609 | 6% | 20% | 38 |
10 | DISTANCE FRAUD ATTACK | authKW | 338735 | 1% | 100% | 7 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 16311 | 42% | 0% | 263 |
2 | Telecommunications | 12880 | 38% | 0% | 239 |
3 | Computer Science, Hardware & Architecture | 3954 | 14% | 0% | 90 |
4 | Computer Science, Theory & Methods | 2840 | 19% | 0% | 119 |
5 | Medical Informatics | 2330 | 8% | 0% | 48 |
6 | Computer Science, Software Engineering | 1525 | 12% | 0% | 74 |
7 | Engineering, Electrical & Electronic | 859 | 23% | 0% | 147 |
8 | Health Care Sciences & Services | 785 | 8% | 0% | 50 |
9 | Computer Science, Artificial Intelligence | 598 | 9% | 0% | 54 |
10 | Computer Science, Interdisciplinary Applications | 198 | 5% | 0% | 34 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | DCCS | 169361 | 1% | 50% | 7 |
2 | INFORMAT COMMUN THEORY GRP ICT | 96782 | 0% | 100% | 2 |
3 | INFORMAT SECUR PRIVACY | 91680 | 1% | 32% | 6 |
4 | COSEC | 72583 | 0% | 50% | 3 |
5 | MED SAFETY ENGN | 64520 | 0% | 67% | 2 |
6 | ADV TECHNOL DEV SECT | 48391 | 0% | 100% | 1 |
7 | BLDG TECHNOL DEV | 48391 | 0% | 100% | 1 |
8 | COMMUN SECT GRP | 48391 | 0% | 100% | 1 |
9 | COMP SECUIRTY | 48391 | 0% | 100% | 1 |
10 | COS GRP | 48391 | 0% | 100% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | JOURNAL OF MEDICAL SYSTEMS | 53175 | 7% | 3% | 43 |
2 | SECURITY AND COMMUNICATION NETWORKS | 31409 | 5% | 2% | 30 |
3 | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | 12152 | 2% | 2% | 11 |
4 | WIRELESS PERSONAL COMMUNICATIONS | 11993 | 5% | 1% | 32 |
5 | IET INFORMATION SECURITY | 7350 | 1% | 2% | 7 |
6 | IEEE PERVASIVE COMPUTING | 6688 | 1% | 2% | 8 |
7 | JOURNAL OF NETWORK AND COMPUTER APPLICATIONS | 5525 | 2% | 1% | 14 |
8 | INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS | 4677 | 3% | 1% | 16 |
9 | INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING | 4663 | 1% | 1% | 7 |
10 | ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY | 4089 | 1% | 2% | 4 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | RFID | 1873590 | 41% | 15% | 261 | Search RFID | Search RFID |
2 | DISTANCE BOUNDING PROTOCOL | 1120153 | 4% | 93% | 25 | Search DISTANCE+BOUNDING+PROTOCOL | Search DISTANCE+BOUNDING+PROTOCOL |
3 | RELAY ATTACK | 1068986 | 4% | 82% | 27 | Search RELAY+ATTACK | Search RELAY+ATTACK |
4 | RFID SECURITY | 780692 | 3% | 73% | 22 | Search RFID+SECURITY | Search RFID+SECURITY |
5 | MAFIA FRAUD ATTACK | 774252 | 3% | 100% | 16 | Search MAFIA+FRAUD+ATTACK | Search MAFIA+FRAUD+ATTACK |
6 | GROUPING PROOF | 725861 | 2% | 100% | 15 | Search GROUPING+PROOF | Search GROUPING+PROOF |
7 | OWNERSHIP TRANSFER | 559386 | 3% | 68% | 17 | Search OWNERSHIP+TRANSFER | Search OWNERSHIP+TRANSFER |
8 | RFID AUTHENTICATION | 387126 | 1% | 100% | 8 | Search RFID+AUTHENTICATION | Search RFID+AUTHENTICATION |
9 | MUTUAL AUTHENTICATION | 373609 | 6% | 20% | 38 | Search MUTUAL+AUTHENTICATION | Search MUTUAL+AUTHENTICATION |
10 | DISTANCE FRAUD ATTACK | 338735 | 1% | 100% | 7 | Search DISTANCE+FRAUD+ATTACK | Search DISTANCE+FRAUD+ATTACK |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | CHOU, JS , (2014) AN EFFICIENT MUTUAL AUTHENTICATION RFID SCHEME BASED ON ELLIPTIC CURVE CRYPTOGRAPHY.JOURNAL OF SUPERCOMPUTING. VOL. 70. ISSUE 1. P. 75 -94 | 31 | 97% | 9 |
2 | CHEN, YL , CHOU, JS , (2015) ECC-BASED UNTRACEABLE AUTHENTICATION FOR LARGE-SCALE ACTIVE-TAG RFID SYSTEMS.ELECTRONIC COMMERCE RESEARCH. VOL. 15. ISSUE 1. P. 97 -120 | 35 | 85% | 2 |
3 | FALAHATI, A , JANNATI, H , (2016) DISTANCE BOUNDING-BASED RFID BINDING PROOF PROTOCOL TO PROTECT INPATIENT MEDICATION SAFETY AGAINST RELAY ATTACK.INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING. VOL. 22. ISSUE 2. P. 71 -83 | 26 | 93% | 0 |
4 | SUNDARESAN, S , DOSS, R , ZHOU, WL , (2015) ZERO KNOWLEDGE GROUPING PROOF PROTOCOL FOR RFID EPC C1G2 TAGS.IEEE TRANSACTIONS ON COMPUTERS. VOL. 64. ISSUE 10. P. 2994 -3008 | 20 | 100% | 1 |
5 | SUNDARESAN, S , DOSS, R , PIRAMUTHU, S , ZHOU, WL , (2014) A ROBUST GROUPING PROOF PROTOCOL FOR RFID EPC C1G2 TAGS.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 9. ISSUE 6. P. 961 -975 | 17 | 100% | 4 |
6 | DOSS, R , SUNDARESAN, S , ZHOU, WL , (2013) A PRACTICAL QUADRATIC RESIDUES BASED SCHEME FOR AUTHENTICATION AND PRIVACY IN MOBILE RFID SYSTEMS.AD HOC NETWORKS. VOL. 11. ISSUE 1. P. 383-396 | 17 | 94% | 20 |
7 | FARASH, MS , NAWAZ, O , MAHMOOD, K , CHAUDHRY, SA , KHAN, MK , (2016) A PROVABLY SECURE RFID AUTHENTICATION PROTOCOL BASED ON ELLIPTIC CURVE FOR HEALTHCARE ENVIRONMENTS.JOURNAL OF MEDICAL SYSTEMS. VOL. 40. ISSUE 7. P. - | 20 | 77% | 1 |
8 | XIE, W , XIE, L , ZHANG, C , WANG, Q , WANG, C , TANG, CJ , (2014) TOA: A TAG-OWNER-ASSISTING RFID AUTHENTICATION PROTOCOL TOWARD ACCESS CONTROL AND OWNERSHIP TRANSFER.SECURITY AND COMMUNICATION NETWORKS. VOL. 7. ISSUE 5. P. 934-944 | 18 | 95% | 1 |
9 | AVOINE, G , CARPENT, X , HERNANDEZ-CASTRO, J , (2016) PITFALLS IN ULTRALIGHTWEIGHT AUTHENTICATION PROTOCOL DESIGNS.IEEE TRANSACTIONS ON MOBILE COMPUTING. VOL. 15. ISSUE 9. P. 2317 -2332 | 19 | 86% | 0 |
10 | DOSS, R , ZHOU, WL , SUNDARESAN, S , YU, S , GAO, LX , (2012) A MINIMUM DISCLOSURE APPROACH TO AUTHENTICATION AND PRIVACY IN RFID SYSTEMS.COMPUTER NETWORKS. VOL. 56. ISSUE 15. P. 3401 -3416 | 16 | 100% | 14 |
Classes with closest relation at Level 1 |