Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
2433 | 2246 | 23.1 | 49% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
295 | 3 | CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY | 41419 |
632 | 2 | AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE | 13771 |
2433 | 1 | SMART CARD//PASSWORD//KEY AGREEMENT | 2246 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | SMART CARD | authKW | 2673193 | 16% | 56% | 352 |
2 | PASSWORD | authKW | 2553501 | 10% | 85% | 221 |
3 | KEY AGREEMENT | authKW | 2196704 | 9% | 80% | 203 |
4 | AUTHENTICATION | authKW | 2023764 | 27% | 25% | 599 |
5 | PASSWORD AUTHENTICATION | authKW | 1092800 | 4% | 93% | 86 |
6 | KEY EXCHANGE | authKW | 948717 | 5% | 68% | 103 |
7 | USER ANONYMITY | authKW | 913667 | 3% | 95% | 71 |
8 | AUTHENTICATED KEY EXCHANGE | authKW | 745865 | 3% | 84% | 65 |
9 | MUTUAL AUTHENTICATION | authKW | 669848 | 4% | 51% | 96 |
10 | AUTHENTICATED KEY AGREEMENT | authKW | 572589 | 2% | 86% | 49 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 53836 | 40% | 0% | 902 |
2 | Telecommunications | 48212 | 39% | 0% | 872 |
3 | Computer Science, Theory & Methods | 13851 | 22% | 0% | 493 |
4 | Computer Science, Hardware & Architecture | 11563 | 13% | 0% | 291 |
5 | Computer Science, Software Engineering | 5630 | 12% | 0% | 268 |
6 | Engineering, Electrical & Electronic | 5328 | 30% | 0% | 669 |
7 | Medical Informatics | 2818 | 4% | 0% | 101 |
8 | Computer Science, Artificial Intelligence | 1254 | 7% | 0% | 151 |
9 | Health Care Sciences & Services | 749 | 4% | 0% | 97 |
10 | Computer Science, Interdisciplinary Applications | 288 | 4% | 0% | 83 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | SECUR THEORY ALGORITHM | 410823 | 2% | 67% | 45 |
2 | EXCELLENCE INFORMAT ASSURANCE | 184227 | 2% | 33% | 41 |
3 | AGRA | 127429 | 1% | 63% | 15 |
4 | NETWORKS ENGN | 104562 | 0% | 77% | 10 |
5 | HANGZHOU CRYPTOG NETWORK SECUR | 96664 | 0% | 89% | 8 |
6 | PHOTON COMMUN ENGN | 85388 | 1% | 23% | 27 |
7 | CYBER INVEST POLICE | 67968 | 0% | 100% | 5 |
8 | INFORMAT SECUR | 67614 | 4% | 6% | 79 |
9 | INFORMAT MANAGEMENT | 58171 | 9% | 2% | 202 |
10 | COMP SCI INFORMAT ENGN | 55096 | 9% | 2% | 210 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | SECURITY AND COMMUNICATION NETWORKS | 106042 | 5% | 8% | 104 |
2 | JOURNAL OF MEDICAL SYSTEMS | 71319 | 4% | 6% | 94 |
3 | COMPUTERS & SECURITY | 48019 | 3% | 5% | 65 |
4 | INFORMATION TECHNOLOGY AND CONTROL | 35092 | 1% | 8% | 32 |
5 | INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS | 30303 | 3% | 3% | 64 |
6 | COMPUTER STANDARDS & INTERFACES | 23090 | 2% | 4% | 46 |
7 | WIRELESS PERSONAL COMMUNICATIONS | 19970 | 3% | 2% | 78 |
8 | COMPUTER COMMUNICATIONS | 13273 | 3% | 1% | 66 |
9 | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | 12135 | 2% | 2% | 48 |
10 | PEER-TO-PEER NETWORKING AND APPLICATIONS | 11004 | 1% | 5% | 18 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | SMART CARD | 2673193 | 16% | 56% | 352 | Search SMART+CARD | Search SMART+CARD |
2 | PASSWORD | 2553501 | 10% | 85% | 221 | Search PASSWORD | Search PASSWORD |
3 | KEY AGREEMENT | 2196704 | 9% | 80% | 203 | Search KEY+AGREEMENT | Search KEY+AGREEMENT |
4 | AUTHENTICATION | 2023764 | 27% | 25% | 599 | Search AUTHENTICATION | Search AUTHENTICATION |
5 | PASSWORD AUTHENTICATION | 1092800 | 4% | 93% | 86 | Search PASSWORD+AUTHENTICATION | Search PASSWORD+AUTHENTICATION |
6 | KEY EXCHANGE | 948717 | 5% | 68% | 103 | Search KEY+EXCHANGE | Search KEY+EXCHANGE |
7 | USER ANONYMITY | 913667 | 3% | 95% | 71 | Search USER+ANONYMITY | Search USER+ANONYMITY |
8 | AUTHENTICATED KEY EXCHANGE | 745865 | 3% | 84% | 65 | Search AUTHENTICATED+KEY+EXCHANGE | Search AUTHENTICATED+KEY+EXCHANGE |
9 | MUTUAL AUTHENTICATION | 669848 | 4% | 51% | 96 | Search MUTUAL+AUTHENTICATION | Search MUTUAL+AUTHENTICATION |
10 | AUTHENTICATED KEY AGREEMENT | 572589 | 2% | 86% | 49 | Search AUTHENTICATED+KEY+AGREEMENT | Search AUTHENTICATED+KEY+AGREEMENT |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | FARASH, MS , ATTARI, MA , KUMARI, S , (2017) CRYPTANALYSIS AND IMPROVEMENT OF A THREE-PARTY PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITH USER ANONYMITY USING EXTENDED CHAOTIC MAPS.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - | 51 | 96% | 4 |
2 | FARASH, MS , (2017) AN IMPROVED PASSWORD-BASED AUTHENTICATION SCHEME FOR SESSION INITIATION PROTOCOL USING SMART CARDS WITHOUT VERIFICATION TABLE.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - | 28 | 85% | 13 |
3 | WANG, D , WANG, N , WANG, P , QING, SH , (2015) PRESERVING PRIVACY FOR FREE: EFFICIENT AND PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME WITH USER ANONYMITY.INFORMATION SCIENCES. VOL. 321. ISSUE . P. 162 -178 | 54 | 87% | 13 |
4 | JIANG, Q , WEI, FS , FU, S , MA, JF , LI, GS , ALELAIWI, A , (2016) ROBUST EXTENDED CHAOTIC MAPS-BASED THREE-FACTOR AUTHENTICATION SCHEME PRESERVING BIOMETRIC TEMPLATE PRIVACY.NONLINEAR DYNAMICS. VOL. 83. ISSUE 4. P. 2085 -2101 | 41 | 85% | 9 |
5 | WANG, D , WANG, P , (2014) ON THE ANONYMITY OF TWO-FACTOR AUTHENTICATION SCHEMES FOR WIRELESS SENSOR NETWORKS: ATTACKS, PRINCIPLE AND SOLUTIONS.COMPUTER NETWORKS. VOL. 73. ISSUE . P. 41 -57 | 57 | 78% | 24 |
6 | AMIN, R , ISLAM, SKH , BISWAS, GP , KHAN, MK , LI, X , (2015) CRYPTANALYSIS AND ENHANCEMENT OF ANONYMITY PRESERVING REMOTE USER MUTUAL AUTHENTICATION AND SESSION KEY AGREEMENT SCHEME FOR E-HEALTH CARE SYSTEMS.JOURNAL OF MEDICAL SYSTEMS. VOL. 39. ISSUE 11. P. - | 51 | 89% | 1 |
7 | AMIN, R , ISLAM, SKH , BISWAS, GP , KHAN, MK , OBAIDAT, MS , (2015) DESIGN AND ANALYSIS OF AN ENHANCED PATIENT-SERVER MUTUAL AUTHENTICATION PROTOCOL FOR TELECARE MEDICAL INFORMATION SYSTEM.JOURNAL OF MEDICAL SYSTEMS. VOL. 39. ISSUE 11. P. - | 49 | 91% | 2 |
8 | MISHRA, D , KUMARI, S , KHAN, MK , MUKHOPADHYAY, S , (2017) AN ANONYMOUS BIOMETRIC-BASED REMOTE USER-AUTHENTICATED KEY AGREEMENT SCHEME FOR MULTIMEDIA SYSTEMS.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - | 15 | 94% | 5 |
9 | CHAUDHRY, SA , (2016) A SECURE BIOMETRIC BASED MULTI-SERVER AUTHENTICATION SCHEME FOR SOCIAL MULTIMEDIA NETWORKS.MULTIMEDIA TOOLS AND APPLICATIONS. VOL. 75. ISSUE 20. P. 12705 -12725 | 38 | 90% | 3 |
10 | WANG, CQ , ZHANG, X , ZHENG, ZM , (2016) CRYPTANALYSIS AND IMPROVEMENT OF A BIOMETRIC-BASED MULTI-SERVER AUTHENTICATION AND KEY AGREEMENT SCHEME.PLOS ONE. VOL. 11. ISSUE 2. P. - | 41 | 80% | 2 |
Classes with closest relation at Level 1 |