Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
32726 | 135 | 30.5 | 26% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
295 | 3 | CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY | 41419 |
632 | 2 | AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE | 13771 |
32726 | 1 | DEVICE PAIRING//TWO CHANNEL CRYPTOGRAPHY//DEVICE ASSOCIATION | 135 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | DEVICE PAIRING | authKW | 1357136 | 4% | 100% | 6 |
2 | TWO CHANNEL CRYPTOGRAPHY | authKW | 678568 | 2% | 100% | 3 |
3 | DEVICE ASSOCIATION | authKW | 452379 | 1% | 100% | 2 |
4 | OUT OF BAND CHANNEL | authKW | 452379 | 1% | 100% | 2 |
5 | MAN IN THE MIDDLE MITM ATTACKS | authKW | 301584 | 1% | 67% | 2 |
6 | ACTIVE READING | authKW | 226189 | 1% | 100% | 1 |
7 | AD HOC ACCESS | authKW | 226189 | 1% | 100% | 1 |
8 | AD HOC AUTHENTICATION | authKW | 226189 | 1% | 100% | 1 |
9 | AEROSPACE ENGINEERING DEGREES | authKW | 226189 | 1% | 100% | 1 |
10 | AMBIENT INTELLIGENCE ENVIRONMENT | authKW | 226189 | 1% | 100% | 1 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 4249 | 46% | 0% | 62 |
2 | Telecommunications | 2124 | 33% | 0% | 45 |
3 | Computer Science, Theory & Methods | 1707 | 31% | 0% | 42 |
4 | Computer Science, Hardware & Architecture | 1326 | 18% | 0% | 24 |
5 | Computer Science, Software Engineering | 427 | 13% | 0% | 18 |
6 | Engineering, Aerospace | 306 | 7% | 0% | 10 |
7 | Engineering, Electrical & Electronic | 191 | 24% | 0% | 32 |
8 | Computer Science, Cybernetics | 128 | 3% | 0% | 4 |
9 | COMPUTER APPLICATIONS & CYBERNETICS | 85 | 1% | 0% | 1 |
10 | Information Science & Library Science | 21 | 2% | 0% | 3 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | ANIMAT PROD DESIGN | 226189 | 1% | 100% | 1 |
2 | ELECT MECH ENGN NAVAL ARCHITECTURE FESB | 226189 | 1% | 100% | 1 |
3 | HUMAN CENTERED COMP SECT | 226189 | 1% | 100% | 1 |
4 | JAMES MARTIN FUTURE COMP | 226189 | 1% | 100% | 1 |
5 | JOSEF SEL USER FRIENDLY SECURE MOBILE SERV | 226189 | 1% | 100% | 1 |
6 | NIJMEGEN COMP INFORMAT SCI N3 | 226189 | 1% | 100% | 1 |
7 | COMP COMMUN PLICAT LCA | 113094 | 1% | 50% | 1 |
8 | GEOSCI DIGITAL EARTH GEODEC | 113094 | 1% | 50% | 1 |
9 | PITTSBURGH MIND BODY | 113094 | 1% | 50% | 1 |
10 | DEF PEACE SAFETY SECUR UNIT | 56546 | 1% | 25% | 1 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | PERSONAL AND UBIQUITOUS COMPUTING | 10757 | 5% | 1% | 7 |
2 | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 10244 | 6% | 1% | 8 |
3 | IEEE PERVASIVE COMPUTING | 7825 | 3% | 1% | 4 |
4 | ABACUS-NEW YORK | 5024 | 1% | 2% | 1 |
5 | IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING | 4226 | 2% | 1% | 3 |
6 | PERVASIVE AND MOBILE COMPUTING | 3850 | 2% | 1% | 3 |
7 | ACM TRANSACTIONS ON COMPUTER-HUMAN INTERACTION | 3516 | 1% | 1% | 2 |
8 | HUMAN-COMPUTER INTERACTION | 3182 | 1% | 1% | 2 |
9 | IEEE TRANSACTIONS ON MOBILE COMPUTING | 3104 | 4% | 0% | 5 |
10 | IET INFORMATION SECURITY | 2806 | 1% | 1% | 2 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | DEVICE PAIRING | 1357136 | 4% | 100% | 6 | Search DEVICE+PAIRING | Search DEVICE+PAIRING |
2 | TWO CHANNEL CRYPTOGRAPHY | 678568 | 2% | 100% | 3 | Search TWO+CHANNEL+CRYPTOGRAPHY | Search TWO+CHANNEL+CRYPTOGRAPHY |
3 | DEVICE ASSOCIATION | 452379 | 1% | 100% | 2 | Search DEVICE+ASSOCIATION | Search DEVICE+ASSOCIATION |
4 | OUT OF BAND CHANNEL | 452379 | 1% | 100% | 2 | Search OUT+OF+BAND+CHANNEL | Search OUT+OF+BAND+CHANNEL |
5 | MAN IN THE MIDDLE MITM ATTACKS | 301584 | 1% | 67% | 2 | Search MAN+IN+THE+MIDDLE+MITM+ATTACKS | Search MAN+IN+THE+MIDDLE+MITM+ATTACKS |
6 | ACTIVE READING | 226189 | 1% | 100% | 1 | Search ACTIVE+READING | Search ACTIVE+READING |
7 | AD HOC ACCESS | 226189 | 1% | 100% | 1 | Search AD+HOC+ACCESS | Search AD+HOC+ACCESS |
8 | AD HOC AUTHENTICATION | 226189 | 1% | 100% | 1 | Search AD+HOC+AUTHENTICATION | Search AD+HOC+AUTHENTICATION |
9 | AEROSPACE ENGINEERING DEGREES | 226189 | 1% | 100% | 1 | Search AEROSPACE+ENGINEERING+DEGREES | Search AEROSPACE+ENGINEERING+DEGREES |
10 | AMBIENT INTELLIGENCE ENVIRONMENT | 226189 | 1% | 100% | 1 | Search AMBIENT+INTELLIGENCE+ENVIRONMENT | Search AMBIENT+INTELLIGENCE+ENVIRONMENT |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | MASHATAN, A , STINSON, DR , (2010) PRACTICAL UNCONDITIONALLY SECURE TWO-CHANNEL MESSAGE AUTHENTICATION.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 55. ISSUE 2-3. P. 169 -188 | 10 | 91% | 2 |
2 | MAYRHOFER, R , GELLERSEN, H , CHONG, MK , (2014) A SURVEY OF USER INTERACTION FOR SPONTANEOUS DEVICE ASSOCIATION.ACM COMPUTING SURVEYS. VOL. 47. ISSUE 1. P. - | 13 | 57% | 6 |
3 | KOVACEVIC, T , PERKOVIC, T , CAGALJ, M , (2016) FLASHING DISPLAYS: USER-FRIENDLY SOLUTION FOR BOOTSTRAPPING SECURE ASSOCIATIONS BETWEEN MULTIPLE CONSTRAINED WIRELESS DEVICES.SECURITY AND COMMUNICATION NETWORKS. VOL. 9. ISSUE 10. P. 1050 -1071 | 9 | 82% | 0 |
4 | GRUNTMAN, M , (2014) ADVANCED DEGREES IN ASTRONAUTICAL ENGINEERING FOR THE SPACE INDUSTRY.ACTA ASTRONAUTICA. VOL. 103. ISSUE . P. 92 -105 | 6 | 100% | 0 |
5 | MASHATAN, A , STINSON, DR , (2009) INTERACTIVE TWO-CHANNEL MESSAGE AUTHENTICATION BASED ON INTERACTIVE-COLLISION RESISTANT HASH FUNCTIONS.INTERNATIONAL JOURNAL OF INFORMATION SECURITY. VOL. 8. ISSUE 1. P. 49-60 | 6 | 100% | 1 |
6 | MAYRHOFER, R , FUSS, J , ION, I , (2013) UACAP: A UNIFIED AUXILIARY CHANNEL AUTHENTICATION PROTOCOL.IEEE TRANSACTIONS ON MOBILE COMPUTING. VOL. 12. ISSUE 4. P. 710-721 | 5 | 100% | 0 |
7 | MIRZADEH, S , CRUICKSHANK, H , TAFAZOLLI, R , (2014) SECURE DEVICE PAIRING: A SURVEY.IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. VOL. 16. ISSUE 1. P. 17 -40 | 9 | 50% | 4 |
8 | LI, LJ , ZHAO, XX , XUE, GL , (2016) A PROXIMITY AUTHENTICATION SYSTEM FOR SMARTPHONES.IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING. VOL. 13. ISSUE 6. P. 605 -616 | 4 | 100% | 0 |
9 | LV, XX , MU, Y , LI, H , (2014) NON-INTERACTIVE KEY ESTABLISHMENT FOR BUNDLE SECURITY PROTOCOL OF SPACE DTNS.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 9. ISSUE 1. P. 5-13 | 4 | 100% | 3 |
10 | HUANG, X , CHEN, BD , MARKHAM, A , WANG, QH , YAN, Z , ROSCOE, AW , (2013) HUMAN INTERACTIVE SECURE KEY AND IDENTITY EXCHANGE PROTOCOLS IN BODY SENSOR NETWORKS.IET INFORMATION SECURITY. VOL. 7. ISSUE 1. P. 30 -38 | 6 | 67% | 3 |
Classes with closest relation at Level 1 |