Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
414 | 3496 | 22.8 | 45% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Cluster id | Level | Cluster label | #P |
---|---|---|---|
9 | 4 | COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS | 1247339 |
295 | 3 | CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY | 41419 |
632 | 2 | AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE | 13771 |
414 | 1 | DIGITAL SIGNATURE//BILINEAR PAIRING//PROXY SIGNATURE | 3496 |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | DIGITAL SIGNATURE | authKW | 1478244 | 9% | 52% | 324 |
2 | BILINEAR PAIRING | authKW | 1234517 | 6% | 68% | 208 |
3 | PROXY SIGNATURE | authKW | 970879 | 4% | 86% | 130 |
4 | RANDOM ORACLE MODEL | authKW | 821898 | 4% | 75% | 125 |
5 | SIGNCRYPTION | authKW | 674320 | 3% | 83% | 93 |
6 | PROVABLE SECURITY | authKW | 546334 | 4% | 42% | 148 |
7 | ATTRIBUTE BASED ENCRYPTION | authKW | 543854 | 2% | 73% | 85 |
8 | IDENTITY BASED ENCRYPTION | authKW | 543640 | 2% | 76% | 82 |
9 | GROUP SIGNATURE | authKW | 481410 | 2% | 68% | 81 |
10 | PUBLIC KEY ENCRYPTION | authKW | 474831 | 2% | 63% | 86 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Theory & Methods | 101481 | 47% | 1% | 1635 |
2 | Computer Science, Information Systems | 97022 | 43% | 1% | 1509 |
3 | Computer Science, Hardware & Architecture | 25491 | 15% | 1% | 537 |
4 | Computer Science, Software Engineering | 13479 | 15% | 0% | 513 |
5 | Telecommunications | 13105 | 17% | 0% | 581 |
6 | Engineering, Electrical & Electronic | 4282 | 22% | 0% | 778 |
7 | Mathematics, Applied | 1966 | 11% | 0% | 370 |
8 | Computer Science, Artificial Intelligence | 779 | 4% | 0% | 157 |
9 | Computer Science, Interdisciplinary Applications | 555 | 4% | 0% | 141 |
10 | Automation & Control Systems | 59 | 1% | 0% | 44 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | COMP INFORMAT SECUR | 237112 | 2% | 45% | 61 |
2 | STATE INFORMAT SECUR | 116076 | 3% | 11% | 117 |
3 | INFORMAT TECHNOL COMP SCI | 99275 | 1% | 25% | 46 |
4 | INFORMAT SECUR | 95267 | 3% | 9% | 117 |
5 | COMP NETWORKS INFORMAT SECUR | 86920 | 1% | 28% | 35 |
6 | STATE INTEGRATED SERV NETWORKS ISN | 64994 | 1% | 34% | 22 |
7 | COMMUN NETWORK ENGN | 54327 | 1% | 33% | 19 |
8 | INFOCOMM SECUR | 53085 | 0% | 41% | 15 |
9 | INT INFORMAT SECUR | 51359 | 0% | 59% | 10 |
10 | NETWORK SECUR | 46544 | 1% | 27% | 20 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | SECURITY AND COMMUNICATION NETWORKS | 151313 | 4% | 11% | 155 |
2 | LECTURE NOTES IN COMPUTER SCIENCE | 94395 | 28% | 1% | 979 |
3 | JOURNAL OF CRYPTOLOGY | 89181 | 2% | 15% | 67 |
4 | IET INFORMATION SECURITY | 57306 | 1% | 14% | 46 |
5 | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | 56897 | 7% | 3% | 228 |
6 | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 43870 | 1% | 13% | 38 |
7 | INFORMATICA | 23773 | 1% | 7% | 39 |
8 | INFORMATION SCIENCES | 16901 | 3% | 2% | 122 |
9 | JOURNAL OF INFORMATION SCIENCE AND ENGINEERING | 15851 | 2% | 3% | 54 |
10 | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 14765 | 1% | 3% | 49 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | DIGITAL SIGNATURE | 1478244 | 9% | 52% | 324 | Search DIGITAL+SIGNATURE | Search DIGITAL+SIGNATURE |
2 | BILINEAR PAIRING | 1234517 | 6% | 68% | 208 | Search BILINEAR+PAIRING | Search BILINEAR+PAIRING |
3 | PROXY SIGNATURE | 970879 | 4% | 86% | 130 | Search PROXY+SIGNATURE | Search PROXY+SIGNATURE |
4 | RANDOM ORACLE MODEL | 821898 | 4% | 75% | 125 | Search RANDOM+ORACLE+MODEL | Search RANDOM+ORACLE+MODEL |
5 | SIGNCRYPTION | 674320 | 3% | 83% | 93 | Search SIGNCRYPTION | Search SIGNCRYPTION |
6 | PROVABLE SECURITY | 546334 | 4% | 42% | 148 | Search PROVABLE+SECURITY | Search PROVABLE+SECURITY |
7 | ATTRIBUTE BASED ENCRYPTION | 543854 | 2% | 73% | 85 | Search ATTRIBUTE+BASED+ENCRYPTION | Search ATTRIBUTE+BASED+ENCRYPTION |
8 | IDENTITY BASED ENCRYPTION | 543640 | 2% | 76% | 82 | Search IDENTITY+BASED+ENCRYPTION | Search IDENTITY+BASED+ENCRYPTION |
9 | GROUP SIGNATURE | 481410 | 2% | 68% | 81 | Search GROUP+SIGNATURE | Search GROUP+SIGNATURE |
10 | PUBLIC KEY ENCRYPTION | 474831 | 2% | 63% | 86 | Search PUBLIC+KEY+ENCRYPTION | Search PUBLIC+KEY+ENCRYPTION |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | XIONG, H , QIN, ZG , LI, FG , (2013) A TAXONOMY OF RING SIGNATURE SCHEMES: THEORY AND APPLICATIONS.IETE JOURNAL OF RESEARCH. VOL. 59. ISSUE 4. P. 376 -382 | 50 | 96% | 1 |
2 | BOSCH, C , HARTEL, P , JONKER, W , PETER, A , (2015) A SURVEY OF PROVABLY SECURE SEARCHABLE ENCRYPTION.ACM COMPUTING SURVEYS. VOL. 47. ISSUE 2. P. - | 44 | 86% | 2 |
3 | TIWARI, N , PADHYE, S , (2013) ANALYSIS ON THE GENERALIZATION OF PROXY SIGNATURE.SECURITY AND COMMUNICATION NETWORKS. VOL. 6. ISSUE 5. P. 549 -566 | 41 | 95% | 2 |
4 | HWANG, MS , LEE, CC , TZENG, SF , (2013) A NEW PROXY SIGNATURE SCHEME FOR A SPECIFIED GROUP OF VERIFIERS.INFORMATION SCIENCES. VOL. 227. ISSUE . P. 102-115 | 36 | 90% | 4 |
5 | GU, K , JIA, WJ , JIANG, CL , (2015) EFFICIENT IDENTITY-BASED PROXY SIGNATURE IN THE STANDARD MODEL.COMPUTER JOURNAL. VOL. 58. ISSUE 4. P. 792 -807 | 29 | 100% | 4 |
6 | GU, K , WANG, Y , WEN, S , (2017) TRACEABLE THRESHOLD PROXY SIGNATURE.JOURNAL OF INFORMATION SCIENCE AND ENGINEERING. VOL. 33. ISSUE 1. P. 63 -79 | 28 | 100% | 0 |
7 | ASAAR, MR , SALMASIZADEH, M , SUSILO, W , (2016) A SHORT ID-BASED PROXY SIGNATURE SCHEME.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 29. ISSUE 5. P. 859 -873 | 28 | 93% | 1 |
8 | SHAHANDASHTI, SF , SAFAVI-NAINI, R , (2009) GENERIC CONSTRUCTIONS FOR UNIVERSAL DESIGNATED-VERIFIER SIGNATURES AND IDENTITY-BASED SIGNATURES FROM STANDARD SIGNATURES.IET INFORMATION SECURITY. VOL. 3. ISSUE 4. P. 152-176 | 34 | 89% | 3 |
9 | YU, Y , AU, MH , MU, Y , SUSILO, W , WU, H , (2015) SECURE DELEGATION OF SIGNING POWER FROM FACTORIZATION.COMPUTER JOURNAL. VOL. 58. ISSUE 4. P. 867 -877 | 27 | 96% | 1 |
10 | PARK, JH , LEE, DH , (2016) AN EFFICIENT IBE SCHEME WITH TIGHT SECURITY REDUCTION IN THE RANDOM ORACLE MODEL.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 79. ISSUE 1. P. 63 -85 | 21 | 100% | 3 |
Classes with closest relation at Level 1 |