Class information for: |
Basic class information |
Class id | #P | Avg. number of references |
Database coverage of references |
---|---|---|---|
632 | 13771 | 23.6 | 40% |
Hierarchy of classes |
The table includes all classes above and classes immediately below the current class. |
Terms with highest relevance score |
rank | Term | termType | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|---|
1 | AUTHENTICATION | authKW | 768808 | 7% | 38% | 915 |
2 | CRYPTOGRAPHY | authKW | 706098 | 6% | 36% | 886 |
3 | DIGITAL SIGNATURE | authKW | 654293 | 3% | 69% | 428 |
4 | BILINEAR PAIRING | authKW | 571622 | 2% | 92% | 281 |
5 | SMART CARD | authKW | 562350 | 3% | 63% | 400 |
6 | SECRET SHARING | authKW | 555238 | 2% | 74% | 337 |
7 | KEY AGREEMENT | authKW | 459542 | 2% | 90% | 230 |
8 | PASSWORD | authKW | 458572 | 2% | 89% | 232 |
9 | PROVABLE SECURITY | authKW | 451113 | 2% | 76% | 267 |
10 | ANONYMITY | authKW | 405095 | 3% | 44% | 419 |
Web of Science journal categories |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | Computer Science, Information Systems | 310667 | 39% | 3% | 5368 |
2 | Computer Science, Theory & Methods | 301992 | 41% | 3% | 5611 |
3 | Telecommunications | 99820 | 23% | 2% | 3146 |
4 | Computer Science, Hardware & Architecture | 80808 | 14% | 2% | 1902 |
5 | Computer Science, Software Engineering | 61949 | 16% | 1% | 2177 |
6 | Engineering, Electrical & Electronic | 22062 | 25% | 0% | 3445 |
7 | Mathematics, Applied | 5614 | 9% | 0% | 1271 |
8 | Computer Science, Artificial Intelligence | 4703 | 5% | 0% | 744 |
9 | Computer Science, Interdisciplinary Applications | 1768 | 4% | 0% | 509 |
10 | Medical Informatics | 721 | 1% | 0% | 143 |
Address terms |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | INFORMAT SECUR | 171781 | 2% | 25% | 312 |
2 | STATE INFORMAT SECUR | 153237 | 2% | 26% | 267 |
3 | COMP INFORMAT SECUR | 114036 | 1% | 61% | 84 |
4 | INFORMAT SECUR GRP | 109717 | 1% | 44% | 112 |
5 | SECUR THEORY ALGORITHM | 103676 | 0% | 84% | 56 |
6 | COMP SCI INFORMAT ENGN | 85716 | 5% | 6% | 651 |
7 | COMP NETWORKS INFORMAT SECUR | 85692 | 1% | 56% | 69 |
8 | COMP SCI | 84984 | 18% | 2% | 2447 |
9 | INFORMAT TECHNOL COMP SCI | 79996 | 1% | 44% | 82 |
10 | COMP SCI ENGN | 76779 | 8% | 3% | 1117 |
Journals |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
---|---|---|---|---|---|
1 | SECURITY AND COMMUNICATION NETWORKS | 312123 | 3% | 32% | 442 |
2 | JOURNAL OF CRYPTOLOGY | 264423 | 2% | 52% | 229 |
3 | LECTURE NOTES IN COMPUTER SCIENCE | 238294 | 22% | 4% | 3095 |
4 | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 96693 | 1% | 39% | 112 |
5 | IET INFORMATION SECURITY | 84625 | 1% | 34% | 111 |
6 | COMPUTERS & SECURITY | 73948 | 1% | 17% | 200 |
7 | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | 67091 | 4% | 6% | 493 |
8 | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | 58152 | 1% | 14% | 193 |
9 | COMPUTER STANDARDS & INTERFACES | 32777 | 1% | 11% | 136 |
10 | DESIGNS CODES AND CRYPTOGRAPHY | 31008 | 1% | 9% | 156 |
Author Key Words |
Rank | Term | Chi square | Shr. of publ. in class containing term |
Class's shr. of term's tot. occurrences |
#P with term in class |
LCSH search | Wikipedia search |
---|---|---|---|---|---|---|---|
1 | AUTHENTICATION | 768808 | 7% | 38% | 915 | Search AUTHENTICATION | Search AUTHENTICATION |
2 | CRYPTOGRAPHY | 706098 | 6% | 36% | 886 | Search CRYPTOGRAPHY | Search CRYPTOGRAPHY |
3 | DIGITAL SIGNATURE | 654293 | 3% | 69% | 428 | Search DIGITAL+SIGNATURE | Search DIGITAL+SIGNATURE |
4 | BILINEAR PAIRING | 571622 | 2% | 92% | 281 | Search BILINEAR+PAIRING | Search BILINEAR+PAIRING |
5 | SMART CARD | 562350 | 3% | 63% | 400 | Search SMART+CARD | Search SMART+CARD |
6 | SECRET SHARING | 555238 | 2% | 74% | 337 | Search SECRET+SHARING | Search SECRET+SHARING |
7 | KEY AGREEMENT | 459542 | 2% | 90% | 230 | Search KEY+AGREEMENT | Search KEY+AGREEMENT |
8 | PASSWORD | 458572 | 2% | 89% | 232 | Search PASSWORD | Search PASSWORD |
9 | PROVABLE SECURITY | 451113 | 2% | 76% | 267 | Search PROVABLE+SECURITY | Search PROVABLE+SECURITY |
10 | ANONYMITY | 405095 | 3% | 44% | 419 | Search ANONYMITY | Search ANONYMITY |
Core articles |
The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c: (1) Number of references referring to publications in the class. (2) Share of total number of active references referring to publications in the class. (3) Age of the article. New articles get higher score than old articles. (4) Citation rate, normalized to year. |
Rank | Reference | # ref. in cl. |
Shr. of ref. in cl. |
Citations |
---|---|---|---|---|
1 | FARASH, MS , ATTARI, MA , KUMARI, S , (2017) CRYPTANALYSIS AND IMPROVEMENT OF A THREE-PARTY PASSWORD-BASED AUTHENTICATED KEY EXCHANGE PROTOCOL WITH USER ANONYMITY USING EXTENDED CHAOTIC MAPS.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - | 51 | 96% | 4 |
2 | FARASH, MS , (2017) AN IMPROVED PASSWORD-BASED AUTHENTICATION SCHEME FOR SESSION INITIATION PROTOCOL USING SMART CARDS WITHOUT VERIFICATION TABLE.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - | 28 | 85% | 13 |
3 | JIANG, Q , WEI, FS , FU, S , MA, JF , LI, GS , ALELAIWI, A , (2016) ROBUST EXTENDED CHAOTIC MAPS-BASED THREE-FACTOR AUTHENTICATION SCHEME PRESERVING BIOMETRIC TEMPLATE PRIVACY.NONLINEAR DYNAMICS. VOL. 83. ISSUE 4. P. 2085 -2101 | 45 | 94% | 9 |
4 | WANG, D , WANG, P , (2014) ON THE ANONYMITY OF TWO-FACTOR AUTHENTICATION SCHEMES FOR WIRELESS SENSOR NETWORKS: ATTACKS, PRINCIPLE AND SOLUTIONS.COMPUTER NETWORKS. VOL. 73. ISSUE . P. 41 -57 | 64 | 88% | 24 |
5 | WANG, D , WANG, N , WANG, P , QING, SH , (2015) PRESERVING PRIVACY FOR FREE: EFFICIENT AND PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME WITH USER ANONYMITY.INFORMATION SCIENCES. VOL. 321. ISSUE . P. 162 -178 | 56 | 90% | 13 |
6 | DAS, AK , (2017) A SECURE AND EFFECTIVE BIOMETRIC-BASED USER AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS USING SMART CARD AND FUZZY EXTRACTOR.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - | 21 | 72% | 8 |
7 | AMIN, R , ISLAM, SKH , BISWAS, GP , KHAN, MK , LI, X , (2015) CRYPTANALYSIS AND ENHANCEMENT OF ANONYMITY PRESERVING REMOTE USER MUTUAL AUTHENTICATION AND SESSION KEY AGREEMENT SCHEME FOR E-HEALTH CARE SYSTEMS.JOURNAL OF MEDICAL SYSTEMS. VOL. 39. ISSUE 11. P. - | 55 | 96% | 1 |
8 | AMIN, R , ISLAM, SKH , BISWAS, GP , KHAN, MK , OBAIDAT, MS , (2015) DESIGN AND ANALYSIS OF AN ENHANCED PATIENT-SERVER MUTUAL AUTHENTICATION PROTOCOL FOR TELECARE MEDICAL INFORMATION SYSTEM.JOURNAL OF MEDICAL SYSTEMS. VOL. 39. ISSUE 11. P. - | 52 | 96% | 2 |
9 | MISHRA, D , KUMARI, S , KHAN, MK , MUKHOPADHYAY, S , (2017) AN ANONYMOUS BIOMETRIC-BASED REMOTE USER-AUTHENTICATED KEY AGREEMENT SCHEME FOR MULTIMEDIA SYSTEMS.INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS. VOL. 30. ISSUE 1. P. - | 16 | 100% | 5 |
10 | JIANG, Q , KHAN, MK , LU, X , MA, JF , HE, DB , (2016) A PRIVACY PRESERVING THREE-FACTOR AUTHENTICATION PROTOCOL FOR E-HEALTH CLOUDS.JOURNAL OF SUPERCOMPUTING. VOL. 72. ISSUE 10. P. 3826 -3849 | 41 | 89% | 5 |
Classes with closest relation at Level 2 |