default search action
Hovav Shacham
Person information
- affiliation: University of Texas at Austin, USA
- affiliation (former): University of California, San Diego, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c59]Yingchen Wang, Riccardo Paccagnella, Zhao Gang, Willy R. Vasquez, David Kohlbrenner, Hovav Shacham, Christopher W. Fletcher:
GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression. SP 2024: 3716-3734 - [c58]Sioli O'Connell, Lishay Aben Sour, Ron Magen, Daniel Genkin, Yossi Oren, Hovav Shacham, Yuval Yarom:
Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome. USENIX Security Symposium 2024 - 2023
- [j11]Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner:
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. IEEE Micro 43(4): 19-27 (2023) - [c57]Yingchen Wang, Riccardo Paccagnella, Alan Wandke, Zhao Gang, Grant Garrett-Grossman, Christopher W. Fletcher, David Kohlbrenner, Hovav Shacham:
DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data. SP 2023: 2306-2320 - [c56]Willy R. Vasquez, Stephen Checkoway, Hovav Shacham:
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders. USENIX Security Symposium 2023: 6647-6664 - [c55]Andrew Kwong, Walter Wang, Jason Kim, Jonathan Berger, Daniel Genkin, Eyal Ronen, Hovav Shacham, Riad S. Wahby, Yuval Yarom:
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol. USENIX Security Symposium 2023: 7107-7124 - [i22]Garrett Gu, Hovav Shacham:
Constant-Time Wasmtime, for Real This Time: End-to-End Verified Zero-Overhead Constant-Time Programming for the Web and Beyond. CoRR abs/2311.14246 (2023) - 2022
- [c54]Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner:
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. USENIX Security Symposium 2022: 679-697 - 2021
- [c53]Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean M. Tullsen, Deian Stefan:
Swivel: Hardening WebAssembly against Spectre. USENIX Security Symposium 2021: 1433-1450 - [i21]Shravan Narayan, Craig Disselkoen, Daniel Moghimi, Sunjay Cauligi, Evan Johnson, Zhao Gang, Anjo Vahldiek-Oberwagner, Ravi Sahita, Hovav Shacham, Dean M. Tullsen, Deian Stefan:
Swivel: Hardening WebAssembly against Spectre. CoRR abs/2102.12730 (2021) - 2020
- [j10]Shankara Pailoor, Xinyu Wang, Hovav Shacham, Isil Dillig:
Automated policy synthesis for system call sandboxing. Proc. ACM Program. Lang. 4(OOPSLA): 135:1-135:26 (2020) - [j9]Tal Garfinkel, Shravan Narayan, Craig Disselkoen, Hovav Shacham, Deian Stefan:
The Road to Less Trusted Code: Lowering the Barrier to In-Process Sandboxing. login Usenix Mag. 45(4) (2020) - [c52]Fraser Brown, John Renner, Andres Nötzli, Sorin Lerner, Hovav Shacham, Deian Stefan:
Towards a verified range analysis for JavaScript JITs. PLDI 2020: 135-150 - [c51]Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian Stefan:
Retrofitting Fine Grain Isolation in the Firefox Renderer. USENIX Security Symposium 2020: 699-716 - [i20]Shravan Narayan, Craig Disselkoen, Tal Garfinkel, Nathan Froyd, Eric Rahm, Sorin Lerner, Hovav Shacham, Deian Stefan:
Retrofitting Fine Grain Isolation in the Firefox Renderer (Extended Version). CoRR abs/2003.00572 (2020) - [i19]Garrett Gu, Hovav Shacham:
Return-Oriented Programming in RISC-V. CoRR abs/2007.14995 (2020)
2010 – 2019
- 2019
- [i18]Shravan Narayan, Tal Garfinkel, Sorin Lerner, Hovav Shacham, Deian Stefan:
Gobi: WebAssembly as a Practical Path to Library Sandboxing. CoRR abs/1912.02285 (2019) - 2018
- [j8]Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham:
Where did I leave my keys?: lessons from the Juniper Dual EC incident. Commun. ACM 61(11): 148-155 (2018) - [c50]Hovav Shacham:
Short Unique Signatures from RSA with a Tight Security Reduction (in the Random Oracle Model). Financial Cryptography 2018: 61-79 - [e9]Hovav Shacham, Alexandra Boldyreva:
Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I. Lecture Notes in Computer Science 10991, Springer 2018, ISBN 978-3-319-96883-4 [contents] - [e8]Hovav Shacham, Alexandra Boldyreva:
Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II. Lecture Notes in Computer Science 10992, Springer 2018, ISBN 978-3-319-96880-3 [contents] - [e7]Hovav Shacham, Alexandra Boldyreva:
Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part III. Lecture Notes in Computer Science 10993, Springer 2018, ISBN 978-3-319-96877-3 [contents] - 2017
- [c49]Wilson Lian, Hovav Shacham, Stefan Savage:
A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations. NDSS 2017 - [c48]David Kohlbrenner, Hovav Shacham:
On the effectiveness of mitigations against floating-point timing channels. USENIX Security Symposium 2017: 69-81 - [e6]Jonathan Katz, Hovav Shacham:
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10401, Springer 2017, ISBN 978-3-319-63687-0 [contents] - [e5]Jonathan Katz, Hovav Shacham:
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10402, Springer 2017, ISBN 978-3-319-63714-3 [contents] - [e4]Jonathan Katz, Hovav Shacham:
Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III. Lecture Notes in Computer Science 10403, Springer 2017, ISBN 978-3-319-63696-2 [contents] - 2016
- [j7]Steven Hill, Zhimin Zhou, Lawrence K. Saul, Hovav Shacham:
On the (In)effectiveness of Mosaicing and Blurring as Tools for Document Redaction. Proc. Priv. Enhancing Technol. 2016(4): 403-417 (2016) - [c47]Ashish Venkat, Sriskanda Shamasunder, Hovav Shacham, Dean M. Tullsen:
HIPStR: Heterogeneous-ISA Program State Relocation. ASPLOS 2016: 727-741 - [c46]Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, Hovav Shacham:
A Systematic Analysis of the Juniper Dual EC Incident. CCS 2016: 468-479 - [c45]David Kohlbrenner, Hovav Shacham:
Trusted Browsers for Uncertain Times. USENIX Security Symposium 2016: 463-480 - [i17]Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, Ralf-Philipp Weinmann:
A Systematic Analysis of the Juniper Dual EC Incident. IACR Cryptol. ePrint Arch. 2016: 376 (2016) - 2015
- [c44]Wilson Lian, Hovav Shacham, Stefan Savage:
Too LeJIT to Quit: Extending JIT Spraying to ARM. NDSS 2015 - [c43]Marc Andrysco, David Kohlbrenner, Keaton Mowery, Ranjit Jhala, Sorin Lerner, Hovav Shacham:
On Subnormal Floating Point and Abnormal Timing. IEEE Symposium on Security and Privacy 2015: 623-639 - 2014
- [c42]Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, Brent Waters:
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions. CT-RSA 2014: 349-366 - [c41]Stephen Checkoway, Ruben Niederhagen, Adam Everspaugh, Matthew Green, Tanja Lange, Thomas Ristenpart, Daniel J. Bernstein, Jake Maskiewicz, Hovav Shacham, Matthew Fredrikson:
On the Practical Exploitability of Dual EC in TLS Implementations. USENIX Security Symposium 2014: 319-335 - [c40]Keaton Mowery, Eric Wustrow, Tom Wypych, Corey Singleton, Chris Comfort, Eric Rescorla, J. Alex Halderman, Hovav Shacham, Stephen Checkoway:
Security Analysis of a Full-Body Scanner. USENIX Security Symposium 2014: 369-384 - [c39]Jacob Maskiewicz, Benjamin Ellis, James Mouradian, Hovav Shacham:
Mouse Trap: Exploiting Firmware Updates in USB Peripherals. WOOT 2014 - 2013
- [j6]Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles. J. Cryptol. 26(2): 340-373 (2013) - [j5]Hovav Shacham, Brent Waters:
Compact Proofs of Retrievability. J. Cryptol. 26(3): 442-483 (2013) - [c38]Stephen Checkoway, Hovav Shacham:
Iago attacks: why the system call API is a bad untrusted RPC interface. ASPLOS 2013: 253-264 - [c37]Karyn Benson, Hovav Shacham, Brent Waters:
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions. CT-RSA 2013: 310-325 - [c36]Keaton Mowery, Michael Yung Chung Wei, David Kohlbrenner, Hovav Shacham, Steven Swanson:
Welcome to the Entropics: Boot-Time Entropy in Embedded Devices. IEEE Symposium on Security and Privacy 2013: 589-603 - [c35]Wilson Lian, Eric Rescorla, Hovav Shacham, Stefan Savage:
Measuring the Practical Impact of DNSSEC Deployment. USENIX Security Symposium 2013: 573-588 - [i16]Sarah Meiklejohn, Hovav Shacham:
New Trapdoor Projection Maps for Composite-Order Bilinear Groups. IACR Cryptol. ePrint Arch. 2013: 657 (2013) - 2012
- [j4]Ryan Roemer, Erik Buchanan, Hovav Shacham, Stefan Savage:
Return-Oriented Programming: Systems, Languages, and Applications. ACM Trans. Inf. Syst. Secur. 15(1): 2:1-2:34 (2012) - [c34]Keaton Mowery, Sriram Keelveedhi, Hovav Shacham:
Are AES x86 cache timing attacks still feasible? CCSW 2012: 19-24 - [i15]Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek:
Hedged Public-key Encryption: How to Protect against Bad Randomness. IACR Cryptol. ePrint Arch. 2012: 220 (2012) - [i14]Karyn Benson, Hovav Shacham, Brent Waters:
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions. IACR Cryptol. ePrint Arch. 2012: 687 (2012) - 2011
- [c33]Bhanu Chandra Vattikonda, Sambit Das, Hovav Shacham:
Eliminating fine grained timers in Xen. CCSW 2011: 41-46 - [c32]Karyn Benson, Rafael Dowsley, Hovav Shacham:
Do you know where your cloud files are? CCSW 2011: 73-82 - [c31]Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton:
Careful with Composition: Limitations of the Indifferentiability Framework. EUROCRYPT 2011: 487-506 - [c30]Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno:
Comprehensive Experimental Analyses of Automotive Attack Surfaces. USENIX Security Symposium 2011 - [c29]Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham:
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion. USENIX Security Symposium 2011 - [e3]Hovav Shacham, Vanessa Teague:
2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, EVT/WOTE '11, San Francisco, CA, USA, August 8-9, 2011. USENIX Association 2011 [contents] - [i13]Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton:
Careful with Composition: Limitations of Indifferentiability and Universal Composability. IACR Cryptol. ePrint Arch. 2011: 339 (2011) - 2010
- [j3]Stephen Checkoway, Hovav Shacham, Eric Rescorla:
Don't Take LaTeX Files from Strangers. login Usenix Mag. 35(4) (2010) - [c28]Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman:
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures. ASIACRYPT 2010: 519-538 - [c27]Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav Shacham:
An empirical study of privacy-violating information flows in JavaScript web applications. CCS 2010: 270-283 - [c26]Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, Marcel Winandy:
Return-oriented programming without returns. CCS 2010: 559-572 - [c25]Stephen Checkoway, Hovav Shacham, Eric Rescorla:
Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer. LEET 2010 - [c24]Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak N. Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
Experimental Security Analysis of a Modern Automobile. IEEE Symposium on Security and Privacy 2010: 447-462 - [c23]Kai Wang, Eric Rescorla, Hovav Shacham, Serge J. Belongie:
OpenScan: A Fully Transparent Optical Scan Voting System. EVT/WOTE 2010 - [e2]Charlie Miller, Hovav Shacham:
4th USENIX Workshop on Offensive Technologies, WOOT '10, Washington, D.C., USA, August 9, 2010. USENIX Association 2010 [contents] - [i12]Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman:
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures. IACR Cryptol. ePrint Arch. 2010: 474 (2010)
2000 – 2009
- 2009
- [c22]Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas Ristenpart, Gil Segev, Hovav Shacham, Scott Yilek:
Hedged Public-Key Encryption: How to Protect against Bad Randomness. ASIACRYPT 2009: 232-249 - [c21]Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. CCS 2009: 199-212 - [c20]Nadia Heninger, Hovav Shacham:
Reconstructing RSA Private Keys from Random Key Bits. CRYPTO 2009: 1-17 - [c19]Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham:
Randomizable Proofs and Delegatable Anonymous Credentials. CRYPTO 2009: 108-125 - [c18]Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage:
When private keys are public: results from the 2008 Debian OpenSSL vulnerability. Internet Measurement Conference 2009: 15-27 - [c17]Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, Hovav Shacham:
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage. EVT/WOTE 2009 - [e1]Hovav Shacham, Brent Waters:
Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings. Lecture Notes in Computer Science 5671, Springer 2009, ISBN 978-3-642-03297-4 [contents] - 2008
- [c16]Hovav Shacham, Brent Waters:
Compact Proofs of Retrievability. ASIACRYPT 2008: 90-107 - [c15]Erik Buchanan, Ryan Roemer, Hovav Shacham, Stefan Savage:
When good instructions go bad: generalizing return-oriented programming to RISC. CCS 2008: 27-38 - [c14]J. Alex Halderman, Eric Rescorla, Hovav Shacham, David A. Wagner:
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems. EVT 2008 - [i11]Hovav Shacham, Brent Waters:
Compact Proofs of Retrievability. IACR Cryptol. ePrint Arch. 2008: 73 (2008) - [i10]Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham:
Delegatable Anonymous Credentials. IACR Cryptol. ePrint Arch. 2008: 428 (2008) - [i9]Nadia Heninger, Hovav Shacham:
Reconstructing RSA Private Keys from Random Key Bits. IACR Cryptol. ePrint Arch. 2008: 510 (2008) - 2007
- [c13]Hovav Shacham:
The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86). CCS 2007: 552-561 - [c12]Hovav Shacham, Brent Waters:
Efficient Ring Signatures Without Random Oracles. Public Key Cryptography 2007: 166-180 - [i8]Hovav Shacham:
A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants. IACR Cryptol. ePrint Arch. 2007: 74 (2007) - [i7]Hovav Shacham:
The BBG HIBE Has Limited Delegation. IACR Cryptol. ePrint Arch. 2007: 201 (2007) - 2006
- [b1]Hovav Shacham:
New paradigms in signature schemes. Stanford University, USA, 2006 - [c11]Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters:
Forward-secure signatures with untrusted update. CCS 2006: 191-200 - [c10]Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures and Multisignatures Without Random Oracles. EUROCRYPT 2006: 465-485 - [i6]Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures and Multisignatures without Random Oracles. IACR Cryptol. ePrint Arch. 2006: 96 (2006) - [i5]Hovav Shacham, Brent Waters:
Efficient Ring Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2006: 289 (2006) - [i4]Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters:
Forward-Secure Signatures with Untrusted Update. IACR Cryptol. ePrint Arch. 2006: 297 (2006) - 2004
- [j2]Dan Boneh, Ben Lynn, Hovav Shacham:
Short Signatures from the Weil Pairing. J. Cryptol. 17(4): 297-319 (2004) - [j1]Hovav Shacham, Dan Boneh, Eric Rescorla:
Client-side caching for TLS. ACM Trans. Inf. Syst. Secur. 7(4): 553-575 (2004) - [c9]Dan Boneh, Hovav Shacham:
Group signatures with verifier-local revocation. CCS 2004: 168-177 - [c8]Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh:
On the effectiveness of address-space randomization. CCS 2004: 298-307 - [c7]Dan Boneh, Xavier Boyen, Hovav Shacham:
Short Group Signatures. CRYPTO 2004: 41-55 - [c6]Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham:
Sequential Aggregate Signatures from Trapdoor Permutations. EUROCRYPT 2004: 74-90 - [i3]Dan Boneh, Xavier Boyen, Hovav Shacham:
Short Group Signatures. IACR Cryptol. ePrint Arch. 2004: 174 (2004) - 2003
- [c5]Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham:
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. EUROCRYPT 2003: 416-432 - [c4]Eu-Jin Goh, Hovav Shacham, Nagendra Modadugu, Dan Boneh:
SiRiUS: Securing Remote Untrusted Storage. NDSS 2003 - [i2]Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham:
Sequential Aggregate Signatures from Trapdoor Permutations. IACR Cryptol. ePrint Arch. 2003: 91 (2003) - 2002
- [c3]Hovav Shacham, Dan Boneh:
Fast-Track Session Establishment for TLS. NDSS 2002 - [i1]Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham:
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. IACR Cryptol. ePrint Arch. 2002: 175 (2002) - 2001
- [c2]Dan Boneh, Ben Lynn, Hovav Shacham:
Short Signatures from the Weil Pairing. ASIACRYPT 2001: 514-532 - [c1]Hovav Shacham, Dan Boneh:
Improving SSL Handshake Performance via Batching. CT-RSA 2001: 28-43
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 23:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint