Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
33109 | 129 | 17.4 | 30% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
295 | 3 | CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY | 41419 |
632 | 2 | AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE | 13771 |
33109 | 1 | SPLITTING AUTHENTICATION CODE//AUTHENTICATION CODE//METERING SCHEME | 129 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | SPLITTING AUTHENTICATION CODE | authKW | 1656969 | 5% | 100% | 7 |
2 | AUTHENTICATION CODE | authKW | 1236974 | 14% | 29% | 18 |
3 | METERING SCHEME | authKW | 1183549 | 4% | 100% | 5 |
4 | MULTISENDER AUTHENTICATION CODES | authKW | 946839 | 3% | 100% | 4 |
5 | PSEUDO SYMPLECTIC GEOMETRY | authKW | 946839 | 3% | 100% | 4 |
6 | MULTI RECEIVER AUTHENTICATION CODE | authKW | 757470 | 3% | 80% | 4 |
7 | DISTRIBUTED AUDIT | authKW | 710129 | 2% | 100% | 3 |
8 | SPLITTING BALANCED INCOMPLETE DESIGN | authKW | 710129 | 2% | 100% | 3 |
9 | MULTIRECEIVER AUTHENTICATION CODES | authKW | 473420 | 2% | 100% | 2 |
10 | RESTRICTED STRONG PARTIALLY BALANCED T DESIGNS | authKW | 473420 | 2% | 100% | 2 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Theory & Methods | 4357 | 50% | 0% | 65 |
2 | Computer Science, Information Systems | 1644 | 29% | 0% | 38 |
3 | Mathematics, Applied | 508 | 26% | 0% | 33 |
4 | Computer Science, Hardware & Architecture | 396 | 10% | 0% | 13 |
5 | Telecommunications | 168 | 10% | 0% | 13 |
6 | Computer Science, Software Engineering | 130 | 8% | 0% | 10 |
7 | Engineering, Electrical & Electronic | 125 | 20% | 0% | 26 |
8 | Mathematics | 97 | 13% | 0% | 17 |
9 | Communication | 3 | 1% | 0% | 1 |
10 | Statistics & Probability | 2 | 2% | 0% | 2 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | CTO ADVISORY GRP | 315612 | 2% | 67% | 2 |
2 | ALGORTHMEN KOGNIT SYST | 236710 | 1% | 100% | 1 |
3 | SECURITY SYST | 236710 | 1% | 100% | 1 |
4 | SOOCHOW UNIV | 222780 | 3% | 24% | 4 |
5 | IT CS | 172146 | 3% | 18% | 4 |
6 | MYAMAE KU | 118354 | 1% | 50% | 1 |
7 | SECUR SYST | 94681 | 2% | 20% | 2 |
8 | DCC FC LIACC | 59176 | 1% | 25% | 1 |
9 | COMP COMMUN MEDIA | 52599 | 2% | 11% | 2 |
10 | SOFTWARE INFORMAT SYST | 33808 | 3% | 4% | 4 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | DESIGNS CODES AND CRYPTOGRAPHY | 19759 | 9% | 1% | 12 |
2 | ARS COMBINATORIA | 9214 | 9% | 0% | 12 |
3 | CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 6144 | 2% | 1% | 2 |
4 | JOURNAL OF CRYPTOLOGY | 4847 | 2% | 1% | 3 |
5 | LECTURE NOTES IN COMPUTER SCIENCE | 4722 | 33% | 0% | 42 |
6 | BELL LABS TECHNICAL JOURNAL | 2698 | 2% | 0% | 3 |
7 | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | 2404 | 7% | 0% | 9 |
8 | ACM TRANSACTIONS ON INTERNET TECHNOLOGY | 1320 | 1% | 1% | 1 |
9 | ALTA FREQUENZA | 1306 | 1% | 1% | 1 |
10 | ACTA MATHEMATICAE APPLICATAE SINICA-ENGLISH SERIES | 1270 | 2% | 0% | 2 |
Author Key Words |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | LIANG, M , JIANG, SF , DU, BL , (2016) A NEW CLASS OF 2-FOLD PERFECT 4-SPLITTING AUTHENTICATION CODES.ARS COMBINATORIA. VOL. 128. ISSUE . P. 175 -189 | 9 | 82% | 0 |
2 | LIANG, M , LI, MC , DU, BL , (2014) A CONSTRUCTION FOR T-FOLD PERFECT AUTHENTICATION CODES WITH ARBITRATION.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 73. ISSUE 3. P. 781 -790 | 7 | 100% | 0 |
3 | LIANG, M , DU, BL , (2012) A NEW CLASS OF 3-FOLD PERFECT SPLITTING AUTHENTICATION CODES.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 62. ISSUE 1. P. 109-119 | 9 | 69% | 2 |
4 | CHEN, SD , YANG, CL , (2014) A CONSTRUCTION OF MULTISENDER AUTHENTICATION CODES WITH SEQUENTIAL MODEL FROM SYMPLECTIC GEOMETRY OVER FINITE FIELDS.JOURNAL OF APPLIED MATHEMATICS. VOL. . ISSUE . P. - | 6 | 86% | 0 |
5 | WANG, J , CHENG, XJ , DU, BL , (2016) SPECTRUM OF SPLITTING 3-DESIGNS WITH BLOCK SIZE 3 X 2.UTILITAS MATHEMATICA. VOL. 100. ISSUE . P. 237 -252 | 7 | 70% | 0 |
6 | CHEN, SD , MA, H , (2015) CONSTRUCTION OF AUTHENTICATION CODES WITH DOUBLE ARBITERS OVER SYMPLECTIC GEOMETRY.ACTA MATHEMATICAE APPLICATAE SINICA-ENGLISH SERIES. VOL. 31. ISSUE 4. P. 1141 -1152 | 5 | 100% | 0 |
7 | HUBER, M , (2010) COMBINATORIAL BOUNDS AND CHARACTERIZATIONS OF SPLITTING AUTHENTICATION CODES.CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES. VOL. 2. ISSUE 2. P. 173 -185 | 6 | 86% | 7 |
8 | HANAOKA, G , SHIKATA, J , HANAOKA, Y , IMAI, H , (2004) THE ROLE OF ARBITERS FOR UNCONDITIONALLY SECURE AUTHENTICATION.IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES. VOL. E87A. ISSUE 5. P. 1132 -1140 | 7 | 88% | 0 |
9 | LIN, HA , CAO, ZF , (2010) METERING WITH FINE GRAINED PRICING.JOURNAL OF INTERNET TECHNOLOGY. VOL. 11. ISSUE 6. P. 837-845 | 6 | 86% | 0 |
10 | HANAOKA, G , SHIKATA, J , HANAOKA, Y , IMAI, H , (2003) THE ROLE OF ARBITERS IN ASYMMETRIC AUTHENTICATION SCHEMES.INFORMATION SECURITY, PROCEEDINGS. VOL. 2851. ISSUE . P. 428 -441 | 7 | 88% | 0 |
Classes with closest relation at Level 1 |