Class information for:
Level 1: DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
37532 55 17.0 42%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
632 2             AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE 13771
37532 1                   DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL 55

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 DENIABLE AUTHENTICATION authKW 5727266 25% 74% 14
2 DENIABLE AUTHENTICATION PROTOCOL authKW 2220779 7% 100% 4
3 E MAIL PROTOCOL authKW 1665585 5% 100% 3
4 ELGAMAL CRYPTOGRAPHY authKW 1665585 5% 100% 3
5 IMPERSONATE ATTACKS authKW 1110390 4% 100% 2
6 PIM ATTACK authKW 1110390 4% 100% 2
7 PERFECT FORWARD SECRECY authKW 908492 11% 27% 6
8 AUTHENTICATION CONFIDENTIALITY authKW 555195 2% 100% 1
9 AUTO ID S J AN address 555195 2% 100% 1
10 CONCURRENT DENIABLE AUTHENTICATION authKW 555195 2% 100% 1

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 Computer Science, Information Systems 1190 38% 0% 21
2 Telecommunications 741 31% 0% 17
3 Computer Science, Hardware & Architecture 273 13% 0% 7
4 Computer Science, Software Engineering 266 16% 0% 9
5 Computer Science, Theory & Methods 184 16% 0% 9
6 Engineering, Electrical & Electronic 32 16% 0% 9
7 Mathematics, Applied 22 9% 0% 5
8 Computer Science, Artificial Intelligence 19 5% 0% 3
9 Materials Science, Textiles 14 2% 0% 1
10 Operations Research & Management Science 11 4% 0% 2

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 AUTO ID S J AN 555195 2% 100% 1
2 INFORMAT SECUR GRP ROYAL HOLLOWAY 555195 2% 100% 1
3 MOBILE NETWORK SECUR TECHNOL 422999 7% 19% 4
4 INFO SEC INFORMAT COMMUN SYST SECUR 277596 2% 50% 1
5 COMP NETWORKS INFORMAT SECUR 72213 7% 3% 4
6 KEIO 69398 2% 13% 1
7 LASEC 61687 2% 11% 1
8 INFORMAT SECUR SYST 30842 2% 6% 1
9 ELECT RUMENTAT TECHNOL 15003 2% 3% 1
10 CYBER ENGN 10092 2% 2% 1

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 COMPUTER STANDARDS & INTERFACES 7150 7% 0% 4
2 FRONTIERS OF COMPUTER SCIENCE IN CHINA 3512 2% 1% 1
3 SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES 3119 4% 0% 2
4 IEEE COMMUNICATIONS LETTERS 3099 11% 0% 6
5 SCIENCE CHINA-INFORMATION SCIENCES 3008 5% 0% 3
6 ENTOMOLOGICAL RESEARCH 2237 2% 0% 1
7 IET INFORMATION SECURITY 1722 2% 0% 1
8 JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 1655 2% 0% 1
9 SECURITY AND COMMUNICATION NETWORKS 1601 4% 0% 2
10 JOURNAL OF INDUSTRIAL TEXTILES 1463 2% 0% 1

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 DENIABLE AUTHENTICATION 5727266 25% 74% 14 Search DENIABLE+AUTHENTICATION Search DENIABLE+AUTHENTICATION
2 DENIABLE AUTHENTICATION PROTOCOL 2220779 7% 100% 4 Search DENIABLE+AUTHENTICATION+PROTOCOL Search DENIABLE+AUTHENTICATION+PROTOCOL
3 E MAIL PROTOCOL 1665585 5% 100% 3 Search E+MAIL+PROTOCOL Search E+MAIL+PROTOCOL
4 ELGAMAL CRYPTOGRAPHY 1665585 5% 100% 3 Search ELGAMAL+CRYPTOGRAPHY Search ELGAMAL+CRYPTOGRAPHY
5 IMPERSONATE ATTACKS 1110390 4% 100% 2 Search IMPERSONATE+ATTACKS Search IMPERSONATE+ATTACKS
6 PIM ATTACK 1110390 4% 100% 2 Search PIM+ATTACK Search PIM+ATTACK
7 PERFECT FORWARD SECRECY 908492 11% 27% 6 Search PERFECT+FORWARD+SECRECY Search PERFECT+FORWARD+SECRECY
8 AUTHENTICATION CONFIDENTIALITY 555195 2% 100% 1 Search AUTHENTICATION+CONFIDENTIALITY Search AUTHENTICATION+CONFIDENTIALITY
9 CONCURRENT DENIABLE AUTHENTICATION 555195 2% 100% 1 Search CONCURRENT+DENIABLE+AUTHENTICATION Search CONCURRENT+DENIABLE+AUTHENTICATION
10 COPTOLABRUS 555195 2% 100% 1 Search COPTOLABRUS Search COPTOLABRUS

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 LI, FG , ZHONG, D , TAKAGI, T , (2016) EFFICIENT DENIABLY AUTHENTICATED ENCRYPTION AND ITS APPLICATION TO E-MAIL.IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY. VOL. 11. ISSUE 11. P. 2477 -2486 22 52% 0
2 YOON, EJ , YOO, KY , YEO, SS , LEE, C , (2010) ROBUST DENIABLE AUTHENTICATION PROTOCOL.WIRELESS PERSONAL COMMUNICATIONS. VOL. 55. ISSUE 1. P. 81-90 11 92% 3
3 LI, FG , TAKAGI, T , (2013) CRYPTANALYSIS AND IMPROVEMENT OF ROBUST DENIABLE AUTHENTICATION PROTOCOL.WIRELESS PERSONAL COMMUNICATIONS. VOL. 69. ISSUE 4. P. 1391-1398 9 90% 1
4 YOUN, TY , LEE, C , PARK, YH , (2011) AN EFFICIENT NON-INTERACTIVE DENIABLE AUTHENTICATION SCHEME BASED ON TRAPDOOR COMMITMENT SCHEMES.COMPUTER COMMUNICATIONS. VOL. 34. ISSUE 3. P. 353-357 9 82% 1
5 LU, RX , LIN, XD , CAO, ZF , QIN, LQ , LIANG, XH , (2008) A SIMPLE DENIABLE AUTHENTICATION PROTOCOL BASED ON THE DIFFIE-HELLMAN ALGORITHM.INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS. VOL. 85. ISSUE 9. P. 1315-1323 8 89% 3
6 WANG, B , SONG, ZX , (2009) A NON-INTERACTIVE DENIABLE AUTHENTICATION SCHEME BASED ON DESIGNATED VERIFIER PROOFS.INFORMATION SCIENCES. VOL. 179. ISSUE 6. P. 858-865 9 75% 7
7 SHAO, J , CAO, ZF , LU, RX , (2006) AN IMPROVED DENIABLE AUTHENTICATION PROTOCOL.NETWORKS. VOL. 48. ISSUE 4. P. 179-181 7 100% 6
8 TOORANI, M , (2015) CRYPTANALYSIS OF A NEW PROTOCOL OF WIDE USE FOR EMAIL WITH PERFECT FORWARD SECRECY.SECURITY AND COMMUNICATION NETWORKS. VOL. 8. ISSUE 4. P. 694 -701 7 70% 0
9 LU, RX , CAO, ZF , WANG, SB , BAO, HY , (2007) A NEW ID-BASED DENIABLE AUTHENTICATION PROTOCOL.INFORMATICA. VOL. 18. ISSUE 1. P. 67-78 7 70% 2
10 HSU, CL , CHUANG, YH , HUNG, MT , (2014) AN EFFICIENT DENIABLE AUTHENTICATION PROTOCOL FROM PAIRINGS TO PROTECT USERS' PRIVACY.CHIANG MAI JOURNAL OF SCIENCE. VOL. 41. ISSUE 5.2. P. 1384 -1391 4 100% 0

Classes with closest relation at Level 1



Rank Class id link
1 32726 DEVICE PAIRING//TWO CHANNEL CRYPTOGRAPHY//DEVICE ASSOCIATION
2 2433 SMART CARD//PASSWORD//KEY AGREEMENT
3 414 DIGITAL SIGNATURE//BILINEAR PAIRING//PROXY SIGNATURE
4 26871 CONDITIONAL ACCESS SYSTEM//PAY TV//MOBILE PAY TV
5 36636 STREAM AUTHENTICATION//MULTIMEDIA AUTHENTICATION//MULTICAST AUTHENTICATION
6 11223 SECURITY PROTOCOLS//FAIR EXCHANGE//CRYPTOGRAPHIC PROTOCOLS
7 36111 DYNAMIC SUPERFRAME//CAZAC SEQUENCE//3 LEVEL SCHEDULING
8 29225 72 BIT KEY//ABNORMAL MALICIOUS CODE//ABNORMAL NETWORK CONNECTION
9 33677 AVIAN YOUTH//BLOCK LAYING AND CONCRETING//CONTENTS SHARING
10 30633 APPLICATION LAYERS//AUTOMOTIVE ASSEMBLY PLANT//BITCLOUD

Go to start page