Class information for:
Level 1: DIGITAL SIGNATURE//BILINEAR PAIRING//PROXY SIGNATURE

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
414 3496 22.8 45%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
632 2             AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE 13771
414 1                   DIGITAL SIGNATURE//BILINEAR PAIRING//PROXY SIGNATURE 3496

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 DIGITAL SIGNATURE authKW 1478244 9% 52% 324
2 BILINEAR PAIRING authKW 1234517 6% 68% 208
3 PROXY SIGNATURE authKW 970879 4% 86% 130
4 RANDOM ORACLE MODEL authKW 821898 4% 75% 125
5 SIGNCRYPTION authKW 674320 3% 83% 93
6 PROVABLE SECURITY authKW 546334 4% 42% 148
7 ATTRIBUTE BASED ENCRYPTION authKW 543854 2% 73% 85
8 IDENTITY BASED ENCRYPTION authKW 543640 2% 76% 82
9 GROUP SIGNATURE authKW 481410 2% 68% 81
10 PUBLIC KEY ENCRYPTION authKW 474831 2% 63% 86

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with term
in class
1 Computer Science, Theory & Methods 101481 47% 1% 1635
2 Computer Science, Information Systems 97022 43% 1% 1509
3 Computer Science, Hardware & Architecture 25491 15% 1% 537
4 Computer Science, Software Engineering 13479 15% 0% 513
5 Telecommunications 13105 17% 0% 581
6 Engineering, Electrical & Electronic 4282 22% 0% 778
7 Mathematics, Applied 1966 11% 0% 370
8 Computer Science, Artificial Intelligence 779 4% 0% 157
9 Computer Science, Interdisciplinary Applications 555 4% 0% 141
10 Automation & Control Systems 59 1% 0% 44

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 COMP INFORMAT SECUR 237112 2% 45% 61
2 STATE INFORMAT SECUR 116076 3% 11% 117
3 INFORMAT TECHNOL COMP SCI 99275 1% 25% 46
4 INFORMAT SECUR 95267 3% 9% 117
5 COMP NETWORKS INFORMAT SECUR 86920 1% 28% 35
6 STATE INTEGRATED SERV NETWORKS ISN 64994 1% 34% 22
7 COMMUN NETWORK ENGN 54327 1% 33% 19
8 INFOCOMM SECUR 53085 0% 41% 15
9 INT INFORMAT SECUR 51359 0% 59% 10
10 NETWORK SECUR 46544 1% 27% 20

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 SECURITY AND COMMUNICATION NETWORKS 151313 4% 11% 155
2 LECTURE NOTES IN COMPUTER SCIENCE 94395 28% 1% 979
3 JOURNAL OF CRYPTOLOGY 89181 2% 15% 67
4 IET INFORMATION SECURITY 57306 1% 14% 46
5 IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 56897 7% 3% 228
6 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 43870 1% 13% 38
7 INFORMATICA 23773 1% 7% 39
8 INFORMATION SCIENCES 16901 3% 2% 122
9 JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 15851 2% 3% 54
10 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 14765 1% 3% 49

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 DIGITAL SIGNATURE 1478244 9% 52% 324 Search DIGITAL+SIGNATURE Search DIGITAL+SIGNATURE
2 BILINEAR PAIRING 1234517 6% 68% 208 Search BILINEAR+PAIRING Search BILINEAR+PAIRING
3 PROXY SIGNATURE 970879 4% 86% 130 Search PROXY+SIGNATURE Search PROXY+SIGNATURE
4 RANDOM ORACLE MODEL 821898 4% 75% 125 Search RANDOM+ORACLE+MODEL Search RANDOM+ORACLE+MODEL
5 SIGNCRYPTION 674320 3% 83% 93 Search SIGNCRYPTION Search SIGNCRYPTION
6 PROVABLE SECURITY 546334 4% 42% 148 Search PROVABLE+SECURITY Search PROVABLE+SECURITY
7 ATTRIBUTE BASED ENCRYPTION 543854 2% 73% 85 Search ATTRIBUTE+BASED+ENCRYPTION Search ATTRIBUTE+BASED+ENCRYPTION
8 IDENTITY BASED ENCRYPTION 543640 2% 76% 82 Search IDENTITY+BASED+ENCRYPTION Search IDENTITY+BASED+ENCRYPTION
9 GROUP SIGNATURE 481410 2% 68% 81 Search GROUP+SIGNATURE Search GROUP+SIGNATURE
10 PUBLIC KEY ENCRYPTION 474831 2% 63% 86 Search PUBLIC+KEY+ENCRYPTION Search PUBLIC+KEY+ENCRYPTION

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 XIONG, H , QIN, ZG , LI, FG , (2013) A TAXONOMY OF RING SIGNATURE SCHEMES: THEORY AND APPLICATIONS.IETE JOURNAL OF RESEARCH. VOL. 59. ISSUE 4. P. 376 -382 50 96% 1
2 BOSCH, C , HARTEL, P , JONKER, W , PETER, A , (2015) A SURVEY OF PROVABLY SECURE SEARCHABLE ENCRYPTION.ACM COMPUTING SURVEYS. VOL. 47. ISSUE 2. P. - 44 86% 2
3 TIWARI, N , PADHYE, S , (2013) ANALYSIS ON THE GENERALIZATION OF PROXY SIGNATURE.SECURITY AND COMMUNICATION NETWORKS. VOL. 6. ISSUE 5. P. 549 -566 41 95% 2
4 HWANG, MS , LEE, CC , TZENG, SF , (2013) A NEW PROXY SIGNATURE SCHEME FOR A SPECIFIED GROUP OF VERIFIERS.INFORMATION SCIENCES. VOL. 227. ISSUE . P. 102-115 36 90% 4
5 GU, K , JIA, WJ , JIANG, CL , (2015) EFFICIENT IDENTITY-BASED PROXY SIGNATURE IN THE STANDARD MODEL.COMPUTER JOURNAL. VOL. 58. ISSUE 4. P. 792 -807 29 100% 4
6 GU, K , WANG, Y , WEN, S , (2017) TRACEABLE THRESHOLD PROXY SIGNATURE.JOURNAL OF INFORMATION SCIENCE AND ENGINEERING. VOL. 33. ISSUE 1. P. 63 -79 28 100% 0
7 ASAAR, MR , SALMASIZADEH, M , SUSILO, W , (2016) A SHORT ID-BASED PROXY SIGNATURE SCHEME.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 29. ISSUE 5. P. 859 -873 28 93% 1
8 SHAHANDASHTI, SF , SAFAVI-NAINI, R , (2009) GENERIC CONSTRUCTIONS FOR UNIVERSAL DESIGNATED-VERIFIER SIGNATURES AND IDENTITY-BASED SIGNATURES FROM STANDARD SIGNATURES.IET INFORMATION SECURITY. VOL. 3. ISSUE 4. P. 152-176 34 89% 3
9 YU, Y , AU, MH , MU, Y , SUSILO, W , WU, H , (2015) SECURE DELEGATION OF SIGNING POWER FROM FACTORIZATION.COMPUTER JOURNAL. VOL. 58. ISSUE 4. P. 867 -877 27 96% 1
10 PARK, JH , LEE, DH , (2016) AN EFFICIENT IBE SCHEME WITH TIGHT SECURITY REDUCTION IN THE RANDOM ORACLE MODEL.DESIGNS CODES AND CRYPTOGRAPHY. VOL. 79. ISSUE 1. P. 63 -85 21 100% 3

Classes with closest relation at Level 1



Rank Class id link
1 35134 SUBLIMINAL CHANNEL//KEY ESCROW//HBEREICH ANGEW INFORMAT
2 7314 ZERO KNOWLEDGE//OBLIVIOUS TRANSFER//JOURNAL OF CRYPTOLOGY
3 37532 DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL
4 13842 ELECTRONIC VOTING//MIX NET//ANONYMOUS COMMUNICATION
5 18526 CLOUD STORAGE//PROVABLE DATA POSSESSION//PUBLIC AUDITING
6 2433 SMART CARD//PASSWORD//KEY AGREEMENT
7 28772 AUTHENTICATED DATA STRUCTURES//CERTIFICATE REVOCATION//CHAIR MOBILE COMMERCE MULTILATERAL SECUR
8 14836 COPPERSMITHS METHOD//LATTICE BASIS REDUCTION//NTRU
9 11223 SECURITY PROTOCOLS//FAIR EXCHANGE//CRYPTOGRAPHIC PROTOCOLS
10 25699 USER HIERARCHY//KEY ASSIGNMENT//CRYPTOGRAPHIC KEY ASSIGNMENT

Go to start page