Class information for:
Level 2: AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE

Basic class information

Class id #P Avg. number of
references
Database coverage
of references
632 13771 23.6 40%



Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
9 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE//COMPUTER SCIENCE, INFORMATION SYSTEMS 1247339
295 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//IEEE TRANSACTIONS ON INFORMATION THEORY 41419
632 2             AUTHENTICATION//CRYPTOGRAPHY//DIGITAL SIGNATURE 13771
414 1                   DIGITAL SIGNATURE//BILINEAR PAIRING//PROXY SIGNATURE 3496
2433 1                   SMART CARD//PASSWORD//KEY AGREEMENT 2246
5759 1                   KEY MANAGEMENT//GROUP KEY MANAGEMENT//KEY PREDISTRIBUTION 1579
7314 1                   ZERO KNOWLEDGE//OBLIVIOUS TRANSFER//JOURNAL OF CRYPTOLOGY 1382
11223 1                   SECURITY PROTOCOLS//FAIR EXCHANGE//CRYPTOGRAPHIC PROTOCOLS 999
11315 1                   VISUAL CRYPTOGRAPHY//SECRET SHARING//VISUAL SECRET SHARING 991
13842 1                   ELECTRONIC VOTING//MIX NET//ANONYMOUS COMMUNICATION 809
18526 1                   CLOUD STORAGE//PROVABLE DATA POSSESSION//PUBLIC AUDITING 548
19425 1                   TRAITOR TRACING//DIGITAL FINGERPRINTING//FRAMEPROOF CODES 506
25699 1                   USER HIERARCHY//KEY ASSIGNMENT//CRYPTOGRAPHIC KEY ASSIGNMENT 274
26871 1                   CONDITIONAL ACCESS SYSTEM//PAY TV//MOBILE PAY TV 243
28772 1                   AUTHENTICATED DATA STRUCTURES//CERTIFICATE REVOCATION//CHAIR MOBILE COMMERCE MULTILATERAL SECUR 200
32726 1                   DEVICE PAIRING//TWO CHANNEL CRYPTOGRAPHY//DEVICE ASSOCIATION 135
33109 1                   SPLITTING AUTHENTICATION CODE//AUTHENTICATION CODE//METERING SCHEME 129
35134 1                   SUBLIMINAL CHANNEL//KEY ESCROW//HBEREICH ANGEW INFORMAT 102
36636 1                   STREAM AUTHENTICATION//MULTIMEDIA AUTHENTICATION//MULTICAST AUTHENTICATION 77
37532 1                   DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL 55

Terms with highest relevance score



rank Term termType Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
1 AUTHENTICATION authKW 768808 7% 38% 915
2 CRYPTOGRAPHY authKW 706098 6% 36% 886
3 DIGITAL SIGNATURE authKW 654293 3% 69% 428
4 BILINEAR PAIRING authKW 571622 2% 92% 281
5 SMART CARD authKW 562350 3% 63% 400
6 SECRET SHARING authKW 555238 2% 74% 337
7 KEY AGREEMENT authKW 459542 2% 90% 230
8 PASSWORD authKW 458572 2% 89% 232
9 PROVABLE SECURITY authKW 451113 2% 76% 267
10 ANONYMITY authKW 405095 3% 44% 419

Web of Science journal categories



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with term
in class
1 Computer Science, Information Systems 310667 39% 3% 5368
2 Computer Science, Theory & Methods 301992 41% 3% 5611
3 Telecommunications 99820 23% 2% 3146
4 Computer Science, Hardware & Architecture 80808 14% 2% 1902
5 Computer Science, Software Engineering 61949 16% 1% 2177
6 Engineering, Electrical & Electronic 22062 25% 0% 3445
7 Mathematics, Applied 5614 9% 0% 1271
8 Computer Science, Artificial Intelligence 4703 5% 0% 744
9 Computer Science, Interdisciplinary Applications 1768 4% 0% 509
10 Medical Informatics 721 1% 0% 143

Address terms



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with term
in class
1 INFORMAT SECUR 171781 2% 25% 312
2 STATE INFORMAT SECUR 153237 2% 26% 267
3 COMP INFORMAT SECUR 114036 1% 61% 84
4 INFORMAT SECUR GRP 109717 1% 44% 112
5 SECUR THEORY ALGORITHM 103676 0% 84% 56
6 COMP SCI INFORMAT ENGN 85716 5% 6% 651
7 COMP NETWORKS INFORMAT SECUR 85692 1% 56% 69
8 COMP SCI 84984 18% 2% 2447
9 INFORMAT TECHNOL COMP SCI 79996 1% 44% 82
10 COMP SCI ENGN 76779 8% 3% 1117

Journals



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with term
in class
1 SECURITY AND COMMUNICATION NETWORKS 312123 3% 32% 442
2 JOURNAL OF CRYPTOLOGY 264423 2% 52% 229
3 LECTURE NOTES IN COMPUTER SCIENCE 238294 22% 4% 3095
4 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 96693 1% 39% 112
5 IET INFORMATION SECURITY 84625 1% 34% 111
6 COMPUTERS & SECURITY 73948 1% 17% 200
7 IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 67091 4% 6% 493
8 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 58152 1% 14% 193
9 COMPUTER STANDARDS & INTERFACES 32777 1% 11% 136
10 DESIGNS CODES AND CRYPTOGRAPHY 31008 1% 9% 156

Author Key Words



Rank Term Chi square Shr. of publ. in
class containing
term
Class's shr. of
term's tot. occurrences
#P with
term in
class
LCSH search Wikipedia search
1 AUTHENTICATION 768808 7% 38% 915 Search AUTHENTICATION Search AUTHENTICATION
2 CRYPTOGRAPHY 706098 6% 36% 886 Search CRYPTOGRAPHY Search CRYPTOGRAPHY
3 DIGITAL SIGNATURE 654293 3% 69% 428 Search DIGITAL+SIGNATURE Search DIGITAL+SIGNATURE
4 BILINEAR PAIRING 571622 2% 92% 281 Search BILINEAR+PAIRING Search BILINEAR+PAIRING
5 SMART CARD 562350 3% 63% 400 Search SMART+CARD Search SMART+CARD
6 SECRET SHARING 555238 2% 74% 337 Search SECRET+SHARING Search SECRET+SHARING
7 KEY AGREEMENT 459542 2% 90% 230 Search KEY+AGREEMENT Search KEY+AGREEMENT
8 PASSWORD 458572 2% 89% 232 Search PASSWORD Search PASSWORD
9 PROVABLE SECURITY 451113 2% 76% 267 Search PROVABLE+SECURITY Search PROVABLE+SECURITY
10 ANONYMITY 405095 3% 44% 419 Search ANONYMITY Search ANONYMITY

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.



Rank Reference # ref.
in cl.
Shr. of ref. in
cl.
Citations
1 FARASH, MS , ATTARI, MA , KUMARI, S , (2017) CRYPTANALYSIS AND IMPROVEMENT OF A THREE-PARTY PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITH USER ANONYMITY USING EXTENDED CHAOTIC MAPS.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - 51 96% 4
2 FARASH, MS , (2017) AN IMPROVED PASSWORD-BASED AUTHENTICATION SCHEME FOR SESSION INITIATION PROTOCOL USING SMART CARDS WITHOUT VERIFICATION TABLE.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - 28 85% 13
3 JIANG, Q , WEI, FS , FU, S , MA, JF , LI, GS , ALELAIWI, A , (2016) ROBUST EXTENDED CHAOTIC MAPS-BASED THREE-FACTOR AUTHENTICATION SCHEME PRESERVING BIOMETRIC TEMPLATE PRIVACY.NONLINEAR DYNAMICS. VOL. 83. ISSUE 4. P. 2085 -2101 45 94% 9
4 WANG, D , WANG, P , (2014) ON THE ANONYMITY OF TWO-FACTOR AUTHENTICATION SCHEMES FOR WIRELESS SENSOR NETWORKS: ATTACKS, PRINCIPLE AND SOLUTIONS.COMPUTER NETWORKS. VOL. 73. ISSUE . P. 41 -57 64 88% 24
5 WANG, D , WANG, N , WANG, P , QING, SH , (2015) PRESERVING PRIVACY FOR FREE: EFFICIENT AND PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME WITH USER ANONYMITY.INFORMATION SCIENCES. VOL. 321. ISSUE . P. 162 -178 56 90% 13
6 DAS, AK , (2017) A SECURE AND EFFECTIVE BIOMETRIC-BASED USER AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS USING SMART CARD AND FUZZY EXTRACTOR.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - 21 72% 8
7 AMIN, R , ISLAM, SKH , BISWAS, GP , KHAN, MK , LI, X , (2015) CRYPTANALYSIS AND ENHANCEMENT OF ANONYMITY PRESERVING REMOTE USER MUTUAL AUTHENTICATION AND SESSION KEY AGREEMENT SCHEME FOR E-HEALTH CARE SYSTEMS.JOURNAL OF MEDICAL SYSTEMS. VOL. 39. ISSUE 11. P. - 55 96% 1
8 AMIN, R , ISLAM, SKH , BISWAS, GP , KHAN, MK , OBAIDAT, MS , (2015) DESIGN AND ANALYSIS OF AN ENHANCED PATIENT-SERVER MUTUAL AUTHENTICATION PROTOCOL FOR TELECARE MEDICAL INFORMATION SYSTEM.JOURNAL OF MEDICAL SYSTEMS. VOL. 39. ISSUE 11. P. - 52 96% 2
9 MISHRA, D , KUMARI, S , KHAN, MK , MUKHOPADHYAY, S , (2017) AN ANONYMOUS BIOMETRIC-BASED REMOTE USER-AUTHENTICATED KEY AGREEMENT SCHEME FOR MULTIMEDIA SYSTEMS.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - 16 100% 5
10 JIANG, Q , KHAN, MK , LU, X , MA, JF , HE, DB , (2016) A PRIVACY PRESERVING THREE-FACTOR AUTHENTICATION PROTOCOL FOR E-HEALTH CLOUDS.JOURNAL OF SUPERCOMPUTING. VOL. 72. ISSUE 10. P. 3826 -3849 41 89% 5

Classes with closest relation at Level 2



Rank Class id link
1 1707 JOURNAL OF SYMBOLIC COMPUTATION//SCALAR MULTIPLICATION//FINITE FIELDS
2 2473 BLOCK CIPHER//STREAM CIPHER//BOOLEAN FUNCTIONS
3 3222 PRIVACY PRESERVING DATA MINING//STATISTICAL DISCLOSURE CONTROL//K ANONYMITY
4 1665 PEER TO PEER//PEER TO PEER NETWORKS//PEER-TO-PEER NETWORKING AND APPLICATIONS
5 2087 STEGANOGRAPHY//WATERMARKING//DIGITAL WATERMARKING
6 1591 COMPUTERS & SECURITY//DIGITAL INVESTIGATION//INTRUSION DETECTION
7 2771 RFID//ANTI COLLISION//RADIO FREQUENCY IDENTIFICATION
8 89 WIRELESS SENSOR NETWORKS//TELECOMMUNICATIONS//COMPUTER SCIENCE, INFORMATION SYSTEMS
9 2543 CLOUD COMPUTING//DATA CENTER//MAPREDUCE
10 4147 IT SECURITY DEVELOPMENT//GENERALIZED NET//GENERALIZED NETS

Go to start page