Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
19425 | 506 | 19.9 | 46% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
295 | 3 | CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY | 41419 |
632 | 2 | AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE | 13771 |
19425 | 1 | TRAITOR TRACING//DIGITAL FINGERPRINTING//FRAMEPROOF CODES | 506 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | TRAITOR TRACING | authKW | 2749892 | 12% | 76% | 60 |
2 | DIGITAL FINGERPRINTING | authKW | 1324641 | 6% | 73% | 30 |
3 | FRAMEPROOF CODES | authKW | 977593 | 4% | 90% | 18 |
4 | PERFECT HASH FAMILY | authKW | 893997 | 4% | 74% | 20 |
5 | COLLUSION ATTACK | authKW | 773092 | 7% | 39% | 33 |
6 | SEPARATING HASH FAMILY | authKW | 728454 | 3% | 93% | 13 |
7 | MULTIMEDIA FINGERPRINTING | authKW | 657089 | 3% | 78% | 14 |
8 | COLLUSION RESISTANCE | authKW | 573263 | 4% | 50% | 19 |
9 | IDENTIFIABLE PARENT PROPERTY | authKW | 543109 | 2% | 100% | 9 |
10 | ANONYMOUS FINGERPRINTING | authKW | 482764 | 2% | 100% | 8 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Theory & Methods | 15114 | 47% | 0% | 240 |
2 | Computer Science, Information Systems | 9157 | 35% | 0% | 177 |
3 | Engineering, Electrical & Electronic | 1690 | 35% | 0% | 176 |
4 | Computer Science, Software Engineering | 1480 | 13% | 0% | 65 |
5 | Computer Science, Hardware & Architecture | 1431 | 10% | 0% | 49 |
6 | Mathematics, Applied | 558 | 14% | 0% | 72 |
7 | Telecommunications | 456 | 8% | 0% | 43 |
8 | Computer Science, Artificial Intelligence | 198 | 6% | 0% | 29 |
9 | Mathematics | 157 | 9% | 0% | 46 |
10 | Imaging Science & Photographic Technology | 144 | 3% | 0% | 13 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | ESTUDIS INFORMAT MULTIMEDIA TELECOMUNICACIO | 94283 | 1% | 31% | 5 |
2 | IT CS | 68567 | 1% | 23% | 5 |
3 | INFORMAT TECHNOL COMP SCI | 63564 | 3% | 8% | 14 |
4 | COMP NETWORKS INFORMAT SECUR MINIST EDUC | 60345 | 0% | 100% | 1 |
5 | CREAT SCI ENG | 60345 | 0% | 100% | 1 |
6 | DEBIS | 60345 | 0% | 100% | 1 |
7 | DISTRIBUTED MULTIMEDIA SYST SECUR GRP | 60345 | 0% | 100% | 1 |
8 | ENGINYERIA TELEMAT | 60345 | 0% | 100% | 1 |
9 | ETSE AUTOVIA DE SALOU | 60345 | 0% | 100% | 1 |
10 | FUNDAMENTAL SCI ENG | 60345 | 0% | 100% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 52322 | 7% | 2% | 35 |
2 | DESIGNS CODES AND CRYPTOGRAPHY | 38076 | 7% | 2% | 33 |
3 | LECTURE NOTES IN COMPUTER SCIENCE | 9274 | 23% | 0% | 117 |
4 | IEEE TRANSACTIONS ON INFORMATION THEORY | 5036 | 6% | 0% | 28 |
5 | JOURNAL OF COMBINATORIAL THEORY SERIES A | 4119 | 3% | 0% | 15 |
6 | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | 3986 | 5% | 0% | 23 |
7 | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 3356 | 1% | 1% | 4 |
8 | MULTIMEDIA TOOLS AND APPLICATIONS | 2539 | 2% | 0% | 12 |
9 | MULTIMEDIA SYSTEMS | 2074 | 1% | 1% | 5 |
10 | COMBINATORICS PROBABILITY & COMPUTING | 1648 | 1% | 1% | 5 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | TRAITOR TRACING | 2749892 | 12% | 76% | 60 | Search TRAITOR+TRACING | Search TRAITOR+TRACING |
2 | DIGITAL FINGERPRINTING | 1324641 | 6% | 73% | 30 | Search DIGITAL+FINGERPRINTING | Search DIGITAL+FINGERPRINTING |
3 | FRAMEPROOF CODES | 977593 | 4% | 90% | 18 | Search FRAMEPROOF+CODES | Search FRAMEPROOF+CODES |
4 | PERFECT HASH FAMILY | 893997 | 4% | 74% | 20 | Search PERFECT+HASH+FAMILY | Search PERFECT+HASH+FAMILY |
5 | COLLUSION ATTACK | 773092 | 7% | 39% | 33 | Search COLLUSION+ATTACK | Search COLLUSION+ATTACK |
6 | SEPARATING HASH FAMILY | 728454 | 3% | 93% | 13 | Search SEPARATING+HASH+FAMILY | Search SEPARATING+HASH+FAMILY |
7 | MULTIMEDIA FINGERPRINTING | 657089 | 3% | 78% | 14 | Search MULTIMEDIA+FINGERPRINTING | Search MULTIMEDIA+FINGERPRINTING |
8 | COLLUSION RESISTANCE | 573263 | 4% | 50% | 19 | Search COLLUSION+RESISTANCE | Search COLLUSION+RESISTANCE |
9 | IDENTIFIABLE PARENT PROPERTY | 543109 | 2% | 100% | 9 | Search IDENTIFIABLE+PARENT+PROPERTY | Search IDENTIFIABLE+PARENT+PROPERTY |
10 | ANONYMOUS FINGERPRINTING | 482764 | 2% | 100% | 8 | Search ANONYMOUS+FINGERPRINTING | Search ANONYMOUS+FINGERPRINTING |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | STINSON, DR , WEI, R , CHEN, K , (2008) ON GENERALIZED SEPARATING HASH FAMILIES.JOURNAL OF COMBINATORIAL THEORY SERIES A. VOL. 115. ISSUE 1. P. 105-120 | 23 | 96% | 19 |
2 | BARG, A , KABATIANSKY, G , (2013) ROBUST PARENT-IDENTIFYING CODES AND COMBINATORIAL ARRAYS.IEEE TRANSACTIONS ON INFORMATION THEORY. VOL. 59. ISSUE 2. P. 994 -1003 | 17 | 100% | 1 |
3 | CHEE, YM , ZHANG, XD , (2012) IMPROVED CONSTRUCTIONS OF FRAMEPROOF CODES.IEEE TRANSACTIONS ON INFORMATION THEORY. VOL. 58. ISSUE 8. P. 5449 -5453 | 17 | 100% | 0 |
4 | CHONG, SG , GE, GN , (2016) SEPARATING HASH FAMILIES: A JOHNSON-TYPE BOUND AND NEW CONSTRUCTIONS.SIAM JOURNAL ON DISCRETE MATHEMATICS. VOL. 30. ISSUE 4. P. 2243 -2264 | 20 | 77% | 0 |
5 | BAZRAFSHAN, M , TRUNG, TV , (2013) IMPROVED BOUNDS FOR SEPARATING HASH FAMILIES.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 69. ISSUE 3. P. 369-382 | 14 | 93% | 3 |
6 | SKORIC, B , (2015) TALLY-BASED SIMPLE DECODERS FOR TRAITOR TRACING AND GROUP TESTING.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 10. ISSUE 6. P. 1221 -1233 | 13 | 93% | 0 |
7 | TRUNG, TV , (2014) A TIGHT BOUND FOR FRAMEPROOF CODES VIEWED IN TERMS OF SEPARATING HASH FAMILIES.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 72. ISSUE 3. P. 713 -718 | 12 | 100% | 0 |
8 | MIXON, DG , QUINN, CJ , KIYAVASH, N , FICKUS, M , (2013) FINGERPRINTING WITH EQUIANGULAR TIGHT FRAMES.IEEE TRANSACTIONS ON INFORMATION THEORY. VOL. 59. ISSUE 3. P. 1855-1865 | 18 | 67% | 3 |
9 | FENG, H , LING, HF , ZOU, FH , YAN, WQ , LU, ZD , (2012) A COLLUSION ATTACK OPTIMIZATION STRATEGY FOR DIGITAL FINGERPRINTING.ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS. VOL. 8. ISSUE 2. P. - | 14 | 88% | 2 |
10 | FRATTOLILLO, F , (2015) WATERMARKING PROTOCOLS: PROBLEMS, CHALLENGES AND A POSSIBLE SOLUTION.COMPUTER JOURNAL. VOL. 58. ISSUE 4. P. 944 -960 | 13 | 87% | 1 |
Classes with closest relation at Level 1 |