Class information for:
Level 1: SMART CARD//PASSWORD//KEY AGREEMENT

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
2433 2246 23.1 49%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
632 2             AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE 13771
2433 1                   SMART CARD//PASSWORD//KEY AGREEMENT 2246

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 SMART CARD authKW 2673193 16% 56% 352
2 PASSWORD authKW 2553501 10% 85% 221
3 KEY AGREEMENT authKW 2196704 9% 80% 203
4 AUTHENTICATION authKW 2023764 27% 25% 599
5 PASSWORD AUTHENTICATION authKW 1092800 4% 93% 86
6 KEY EXCHANGE authKW 948717 5% 68% 103
7 USER ANONYMITY authKW 913667 3% 95% 71
8 AUTHENTICATED KEY EXCHANGE authKW 745865 3% 84% 65
9 MUTUAL AUTHENTICATION authKW 669848 4% 51% 96
10 AUTHENTICATED KEY AGREEMENT authKW 572589 2% 86% 49

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 53836 40% 0% 902
2 Telecommunications 48212 39% 0% 872
3 Computer Science, Theory & Methods 13851 22% 0% 493
4 Computer Science, Hardware & Architecture 11563 13% 0% 291
5 Computer Science, Software Engineering 5630 12% 0% 268
6 Engineering, Electrical & Electronic 5328 30% 0% 669
7 Medical Informatics 2818 4% 0% 101
8 Computer Science, Artificial Intelligence 1254 7% 0% 151
9 Health Care Sciences & Services 749 4% 0% 97
10 Computer Science, Interdisciplinary Applications 288 4% 0% 83

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 SECUR THEORY ALGORITHM 410823 2% 67% 45
2 EXCELLENCE INFORMAT ASSURANCE 184227 2% 33% 41
3 AGRA 127429 1% 63% 15
4 NETWORKS ENGN 104562 0% 77% 10
5 HANGZHOU CRYPTOG NETWORK SECUR 96664 0% 89% 8
6 PHOTON COMMUN ENGN 85388 1% 23% 27
7 CYBER INVEST POLICE 67968 0% 100% 5
8 INFORMAT SECUR 67614 4% 6% 79
9 INFORMAT MANAGEMENT 58171 9% 2% 202
10 COMP SCI INFORMAT ENGN 55096 9% 2% 210

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 SECURITY AND COMMUNICATION NETWORKS 106042 5% 8% 104
2 JOURNAL OF MEDICAL SYSTEMS 71319 4% 6% 94
3 COMPUTERS & SECURITY 48019 3% 5% 65
4 INFORMATION TECHNOLOGY AND CONTROL 35092 1% 8% 32
5 INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS 30303 3% 3% 64
6 COMPUTER STANDARDS & INTERFACES 23090 2% 4% 46
7 WIRELESS PERSONAL COMMUNICATIONS 19970 3% 2% 78
8 COMPUTER COMMUNICATIONS 13273 3% 1% 66
9 INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL 12135 2% 2% 48
10 PEER-TO-PEER NETWORKING AND APPLICATIONS 11004 1% 5% 18

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 SMART CARD 2673193 16% 56% 352 Search SMART+CARD Search SMART+CARD
2 PASSWORD 2553501 10% 85% 221 Search PASSWORD Search PASSWORD
3 KEY AGREEMENT 2196704 9% 80% 203 Search KEY+AGREEMENT Search KEY+AGREEMENT
4 AUTHENTICATION 2023764 27% 25% 599 Search AUTHENTICATION Search AUTHENTICATION
5 PASSWORD AUTHENTICATION 1092800 4% 93% 86 Search PASSWORD+AUTHENTICATION Search PASSWORD+AUTHENTICATION
6 KEY EXCHANGE 948717 5% 68% 103 Search KEY+EXCHANGE Search KEY+EXCHANGE
7 USER ANONYMITY 913667 3% 95% 71 Search USER+ANONYMITY Search USER+ANONYMITY
8 AUTHENTICATED KEY EXCHANGE 745865 3% 84% 65 Search AUTHENTICATED+KEY+EXCHANGE Search AUTHENTICATED+KEY+EXCHANGE
9 MUTUAL AUTHENTICATION 669848 4% 51% 96 Search MUTUAL+AUTHENTICATION Search MUTUAL+AUTHENTICATION
10 AUTHENTICATED KEY AGREEMENT 572589 2% 86% 49 Search AUTHENTICATED+KEY+AGREEMENT Search AUTHENTICATED+KEY+AGREEMENT

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 FARASH, MS , ATTARI, MA , KUMARI, S , (2017) CRYPTANALYSIS AND IMPROVEMENT OF A THREE-PARTY PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITH USER ANONYMITY USING EXTENDED CHAOTIC MAPS.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - 51 96% 4
2 FARASH, MS , (2017) AN IMPROVED PASSWORD-BASED AUTHENTICATION SCHEME FOR SESSION INITIATION PROTOCOL USING SMART CARDS WITHOUT VERIFICATION TABLE.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - 28 85% 13
3 WANG, D , WANG, N , WANG, P , QING, SH , (2015) PRESERVING PRIVACY FOR FREE: EFFICIENT AND PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME WITH USER ANONYMITY.INFORMATION SCIENCES. VOL. 321. ISSUE . P. 162 -178 54 87% 13
4 JIANG, Q , WEI, FS , FU, S , MA, JF , LI, GS , ALELAIWI, A , (2016) ROBUST EXTENDED CHAOTIC MAPS-BASED THREE-FACTOR AUTHENTICATION SCHEME PRESERVING BIOMETRIC TEMPLATE PRIVACY.NONLINEAR DYNAMICS. VOL. 83. ISSUE 4. P. 2085 -2101 41 85% 9
5 WANG, D , WANG, P , (2014) ON THE ANONYMITY OF TWO-FACTOR AUTHENTICATION SCHEMES FOR WIRELESS SENSOR NETWORKS: ATTACKS, PRINCIPLE AND SOLUTIONS.COMPUTER NETWORKS. VOL. 73. ISSUE . P. 41 -57 57 78% 24
6 AMIN, R , ISLAM, SKH , BISWAS, GP , KHAN, MK , LI, X , (2015) CRYPTANALYSIS AND ENHANCEMENT OF ANONYMITY PRESERVING REMOTE USER MUTUAL AUTHENTICATION AND SESSION KEY AGREEMENT SCHEME FOR E-HEALTH CARE SYSTEMS.JOURNAL OF MEDICAL SYSTEMS. VOL. 39. ISSUE 11. P. - 51 89% 1
7 AMIN, R , ISLAM, SKH , BISWAS, GP , KHAN, MK , OBAIDAT, MS , (2015) DESIGN AND ANALYSIS OF AN ENHANCED PATIENT-SERVER MUTUAL AUTHENTICATION PROTOCOL FOR TELECARE MEDICAL INFORMATION SYSTEM.JOURNAL OF MEDICAL SYSTEMS. VOL. 39. ISSUE 11. P. - 49 91% 2
8 MISHRA, D , KUMARI, S , KHAN, MK , MUKHOPADHYAY, S , (2017) AN ANONYMOUS BIOMETRIC-BASED REMOTE USER-AUTHENTICATED KEY AGREEMENT SCHEME FOR MULTIMEDIA SYSTEMS.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - 15 94% 5
9 CHAUDHRY, SA , (2016) A SECURE BIOMETRIC BASED MULTI-SERVER AUTHENTICATION SCHEME FOR SOCIAL MULTIMEDIA NETWORKS.MULTIMEDIA TOOLS AND APPLICATIONS. VOL. 75. ISSUE 20. P. 12705 -12725 38 90% 3
10 WANG, CQ , ZHANG, X , ZHENG, ZM , (2016) CRYPTANALYSIS AND IMPROVEMENT OF A BIOMETRIC-BASED MULTI-SERVER AUTHENTICATION AND KEY AGREEMENT SCHEME.PLOS ONE. VOL. 11. ISSUE 2. P. - 41 80% 2

Classes with closest relation at Level 1



Rank Class id link
1 37532 DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL
2 11223 SECURITY PROTOCOLS//FAIR EXCHANGE//CRYPTOGRAPHIC PROTOCOLS
3 25699 USER HIERARCHY//KEY ASSIGNMENT//CRYPTOGRAPHIC KEY ASSIGNMENT
4 5759 KEY MANAGEMENT//GROUP KEY MANAGEMENT//KEY PREDISTRIBUTION
5 32726 DEVICE PAIRING//TWO CHANNEL CRYPTOGRAPHY//DEVICE ASSOCIATION
6 414 DIGITAL SIGNATURE//BILINEAR PAIRING//PROXY SIGNATURE
7 36636 STREAM AUTHENTICATION//MULTIMEDIA AUTHENTICATION//MULTICAST AUTHENTICATION
8 16868 RFID//DISTANCE BOUNDING PROTOCOL//RELAY ATTACK
9 26871 CONDITIONAL ACCESS SYSTEM//PAY TV//MOBILE PAY TV
10 28047 HIMALIS//FUTURE NETWORK//NEW GENERATION NETWORK

Go to start page