default search action
Mohammad Mannan
Person information
- affiliation: Concordia University, Montreal, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Philippe Mangeard, Bhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef:
WARNE: A stalkerware evidence collection tool. Forensic Sci. Int. Digit. Investig. 48: 301677 (2024) - [j23]Bhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef:
Security Weaknesses in IoT Management Platforms. IEEE Internet Things J. 11(1): 1572-1588 (2024) - [j22]Maryna Kluban, Mohammad Mannan, Amr M. Youssef:
On Detecting and Measuring Exploitable JavaScript Functions in Real-world Applications. ACM Trans. Priv. Secur. 27(1): 8:1-8:37 (2024) - [c59]Abdelrahman Ragab, Mohammad Mannan, Amr M. Youssef:
"Trust Me Over My Privacy Policy": Privacy Discrepancies in Romantic AI Chatbot Apps. EuroS&P Workshops 2024: 484-495 - [c58]Sajjad Pourali, Xiufen Yu, Lianying Zhao, Mohammad Mannan, Amr M. Youssef:
Racing for TLS Certificate Validation: A Hijacker's Guide to the Android TLS Galaxy. USENIX Security Symposium 2024 - 2023
- [j21]Behnam Shobiri, Mohammad Mannan, Amr M. Youssef:
CDNs' Dark Side: Security Problems in CDN-to-Origin Connections. DTRAP 4(1): 3:1-3:22 (2023) - [j20]Moustafa Mahmoud, Mohammad Mannan, Amr M. Youssef:
APTHunter: Detecting Advanced Persistent Threats in Early Stages. DTRAP 4(1): 11:1-11:31 (2023) - [c57]Bhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef:
All Your IoT Devices Are Belong to Us: Security Weaknesses in IoT Management Platforms. CODASPY 2023: 245-250 - [c56]Abdelrahman Ragab, Mohammad Mannan, Amr M. Youssef:
Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android Apps. ESORICS Workshops (1) 2023: 232-248 - [c55]Philippe Mangeard, Xiufen Yu, Mohammad Mannan, Amr M. Youssef:
No Place to Hide: Privacy Exposure in Anti-stalkerware Apps and Support Websites. NordSec 2023: 18-36 - [c54]Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef:
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. RAID 2023: 727-743 - [c53]Jonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan:
"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software. USENIX Security Symposium 2023: 3583-3600 - [c52]Rohan Pagey, Mohammad Mannan, Amr M. Youssef:
All Your Shops Are Belong to Us: Security Weaknesses in E-commerce Platforms. WWW 2023: 2144-2154 - [i18]Supraja Baskaran, Lianying Zhao, Mohammad Mannan, Amr M. Youssef:
Measuring the Leakage and Exploitability of Authentication Secrets in Super-apps: The WeChat Case. CoRR abs/2307.09317 (2023) - [i17]Bhaskar Tejaswi, Mohammad Mannan, Amr M. Youssef:
Security Weaknesses in IoT Management Platforms. CoRR abs/2307.13952 (2023) - 2022
- [j19]Hisham S. Galal, Mohammad Mannan, Amr M. Youssef:
Blindfold: Keeping private keys in PKIs and CDNs out of sight. Comput. Secur. 118: 102731 (2022) - [j18]Fabio Massacci, Antonino Sabetta, Jelena Mirkovic, Toby Murray, Hamed Okhravi, Mohammad Mannan, Anderson Rocha, Eric Bodden, Daniel E. Geer:
"Free" as in Freedom to Protest? IEEE Secur. Priv. 20(5): 16-21 (2022) - [c51]Maryna Kluban, Mohammad Mannan, Amr M. Youssef:
On Measuring Vulnerable JavaScript Functions in the Wild. AsiaCCS 2022: 917-930 - [c50]Sajjad Pourali, Nayanamana Samarasinghe, Mohammad Mannan:
Hidden in Plain Sight: Exploring Encrypted Channels in Android Apps. CCS 2022: 2445-2458 - [c49]Bhaskar Tejaswi, Nayanamana Samarasinghe, Sajjad Pourali, Mohammad Mannan, Amr M. Youssef:
Leaky Kits: The Increased Risk of Data Exposure from Phishing Kits. eCrime 2022: 1-13 - [c48]Nayanamana Samarasinghe, Pranay Kapoor, Mohammad Mannan, Amr M. Youssef:
No Salvation from Trackers: Privacy Analysis of Religious Websites and Mobile Apps. DPM/CBT@ESORICS 2022: 151-166 - [c47]Xiufen Yu, Nayanamana Samarasinghe, Mohammad Mannan, Amr M. Youssef:
Got Sick and Tracked: Privacy Analysis of Hospital Websites. EuroS&P Workshops 2022: 278-286 - [c46]Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:
SAUSAGE: Security Analysis of Unix domain Socket usAGE in Android. EuroS&P 2022: 572-586 - [c45]Mehdi Salehi, Jeremy Clark, Mohammad Mannan:
Not so Immutable: Upgradeability of Smart Contracts on Ethereum. Financial Cryptography Workshops 2022: 539-554 - [c44]Pranay Kapoor, Rohan Pagey, Mohammad Mannan, Amr M. Youssef:
Silver Surfers on the Tech Wave: Privacy Analysis of Android Apps for the Elderly. SecureComm 2022: 673-691 - [c43]Nayanamana Samarasinghe, Aashish Adhikari, Mohammad Mannan, Amr M. Youssef:
Et tu, Brute? Privacy Analysis of Government Websites and Mobile Apps. WWW 2022: 564-575 - [i16]Mounir Elgharabawy, Blas Kojusner, Mohammad Mannan, Kevin R. B. Butler, Byron Williams, Amr M. Youssef:
SAUSAGE: Security Analysis of Unix domain Socket Usage in Android. CoRR abs/2204.01516 (2022) - [i15]Mehdi Salehi, Jeremy Clark, Mohammad Mannan:
Not so immutable: Upgradeability of Smart Contracts on Ethereum. CoRR abs/2206.00716 (2022) - [i14]Hisham S. Galal, Mohammad Mannan, Amr M. Youssef:
Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight. CoRR abs/2207.09335 (2022) - [i13]Jonah Stegman, Patrick J. Trottier, Caroline Hillier, Hassan Khan, Mohammad Mannan:
"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software. CoRR abs/2209.11878 (2022) - [i12]Sajjad Pourali, Nayanamana Samarasinghe, Mohammad Mannan:
Hidden in Plain Sight: Exploring Encrypted Channels in Android apps. CoRR abs/2209.15107 (2022) - 2021
- [j17]Nayanamana Samarasinghe, Mohammad Mannan:
On cloaking behaviors of malicious websites. Comput. Secur. 101: 102114 (2021) - [j16]Sean Peisert, Bruce Schneier, Hamed Okhravi, Fabio Massacci, Terry Benzel, Carl E. Landwehr, Mohammad Mannan, Jelena Mirkovic, Atul Prakash, James Bret Michael:
Perspectives on the SolarWinds Incident. IEEE Secur. Priv. 19(2): 7-13 (2021) - [j15]Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Parental Controls: Safer Internet Solutions or New Pitfalls? IEEE Secur. Priv. 19(6): 36-46 (2021) - [c42]Mehdi Salehi, Jeremy Clark, Mohammad Mannan:
Red-Black Coins: Dai Without Liquidations. Financial Cryptography Workshops 2021: 136-145 - [c41]Md Shahab Uddin, Mohammad Mannan, Amr M. Youssef:
Horus: A Security Assessment Framework for Android Crypto Wallets. SecureComm (2) 2021: 120-139 - [i11]Amir Mohammad Naseri, Walter Lucia, Mohammad Mannan, Amr M. Youssef:
On Securing Cloud-hosted Cyber-physical Systems Using Trusted Execution Environments. CoRR abs/2104.01011 (2021) - 2020
- [j14]Mohammad Mannan, N. Asokan:
Confronting the Limitations of Hardware-Assisted Security. IEEE Secur. Priv. 18(5): 6-7 (2020) - [c40]Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions. ACSAC 2020: 69-83 - [c39]Kuniyasu Suzaki, Akira Tsukamoto, Andy Green, Mohammad Mannan:
Reboot-Oriented IoT: Life Cycle Management in Trusted Execution Environment for Disposable IoT devices. ACSAC 2020: 428-441 - [c38]Elizabeth Stobert, Tina Safaie, Heather Molyneaux, Mohammad Mannan, Amr M. Youssef:
ByPass: Reconsidering the Usability of Password Managers. SecureComm (1) 2020: 446-466 - [c37]Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan:
LURK: Server-Controlled TLS Delegation. TrustCom 2020: 182-193 - [c36]Jiayi Chen, Urs Hengartner, Hassan Khan, Mohammad Mannan:
Chaperone: Real-time Locking and Loss Prevention for Smartphones. USENIX Security Symposium 2020: 325-342 - [i10]Suzan Ali, Mounir Elgharabawy, Quentin Duchaussoy, Mohammad Mannan, Amr M. Youssef:
Betrayed by the Guardian: Security and Privacy Risks of Parental Control Solutions. CoRR abs/2012.06502 (2020) - [i9]Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan:
LURK: Server-Controlled TLS Delegation. IACR Cryptol. ePrint Arch. 2020: 1366 (2020)
2010 – 2019
- 2019
- [j13]Nayanamana Samarasinghe, Mohammad Mannan:
Another look at TLS ecosystems in networked devices vs. Web servers. Comput. Secur. 80: 1-13 (2019) - [j12]Nayanamana Samarasinghe, Mohammad Mannan:
Towards a global perspective on web tracking. Comput. Secur. 87 (2019) - [j11]Sharon Shasha, Moustafa Mahmoud, Mohammad Mannan, Amr M. Youssef:
Playing With Danger: A Taxonomy and Evaluation of Threats to Smart Toys. IEEE Internet Things J. 6(2): 2986-3002 (2019) - [c35]Tousif Osman, Mohammad Mannan, Urs Hengartner, Amr M. Youssef:
AppVeto: mobile application self-defense through resource access veto. ACSAC 2019: 366-377 - [c34]Kuniyasu Suzaki, Yohei Hori, Kazukuni Kobara, Mohammad Mannan:
DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions. DSN 2019: 302-314 - [c33]Suzan Ali, Tousif Osman, Mohammad Mannan, Amr M. Youssef:
On Privacy Risks of Public WiFi Captive Portals. DPM/CBT@ESORICS 2019: 80-98 - [c32]Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark:
One-Time Programs Made Practical. Financial Cryptography 2019: 646-666 - [c31]Lianying Zhao, Mohammad Mannan:
TEE-aided Write Protection Against Privileged Data Tampering. NDSS 2019 - [c30]Amit Maraj, Miguel Vargas Martin, Matthew Shane, Mohammad Mannan:
On the null relationship between personality types and passwords. PST 2019: 1-7 - [i8]Xavier de Carné de Carnavalet, Mohammad Mannan:
Privacy and Security Risks of "Not-a-Virus" Bundled Adware: The Wajam Case. CoRR abs/1905.05224 (2019) - [i7]Lianying Zhao, Mohammad Mannan:
TEE-aided Write Protection Against Privileged Data Tampering. CoRR abs/1905.10723 (2019) - [i6]Lianying Zhao, Joseph I. Choi, Didem Demirag, Kevin R. B. Butler, Mohammad Mannan, Erman Ayday, Jeremy Clark:
One-Time Programs made Practical. CoRR abs/1907.00935 (2019) - [i5]Suzan Ali, Tousif Osman, Mohammad Mannan, Amr M. Youssef:
On Privacy Risks of Public WiFi Captive Portals. CoRR abs/1907.02142 (2019) - 2018
- [c29]Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. ARES 2018: 40:1-40:10 - [c28]Louis Waked, Mohammad Mannan, Amr M. Youssef:
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances. AsiaCCS 2018: 399-412 - [c27]Md Zakir Hossen, Mohammad Mannan:
On Understanding Permission Usage Contextuality in Android Apps. DBSec 2018: 232-242 - [c26]Arseny Kurnikov, Klaudia Krawiecka, Andrew Paverd, Mohammad Mannan, N. Asokan:
Using SafeKeeper to Protect Web Passwords. WWW (Companion Volume) 2018: 159-162 - [c25]Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
SafeKeeper: Protecting Web Passwords using Trusted Execution Environments. WWW 2018: 349-358 - [e7]David Lie, Mohammad Mannan, Michael Backes, XiaoFeng Wang:
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018. ACM 2018, ISBN 978-1-4503-5693-0 [contents] - [e6]David Lie, Mohammad Mannan:
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018. ACM 2018, ISBN 978-1-4503-5992-4 [contents] - [e5]Marco Carvalho, Matt Bishop, Anil Somayaji, Wolter Pieters, Mohammad Mannan:
Proceedings of the New Security Paradigms Workshop, NSPW 2018, Windsor, UK, August 28-31, 2018. ACM 2018, ISBN 978-1-4503-6597-0 [contents] - [e4]David Lie, Mohammad Mannan, Aaron Johnson:
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, WPES@CCS 2018, Toronto, ON, Canada, October 15-19, 2018. ACM 2018, ISBN 978-1-4503-5989-4 [contents] - [i4]Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. CoRR abs/1804.08569 (2018) - [i3]Sharon Shasha, Moustafa Mahmoud, Mohammad Mannan, Amr M. Youssef:
Smart But Unsafe: Experimental Evaluation of Security and Privacy Practices in Smart Toys. CoRR abs/1809.05556 (2018) - [i2]Louis Waked, Mohammad Mannan, Amr M. Youssef:
The Sorry State of TLS Security in Enterprise Interception Appliances. CoRR abs/1809.08729 (2018) - 2017
- [c24]Nayanamana Samarasinghe, Mohammad Mannan:
Short Paper: TLS Ecosystems in Networked Devices vs. Web Servers. Financial Cryptography 2017: 533-541 - [c23]Moustafa Mahmoud, Md Zakir Hossen, Hesham Barakat, Mohammad Mannan, Amr M. Youssef:
Towards a comprehensive analytical framework for smart toy privacy practices. STAST 2017: 64-75 - [i1]Klaudia Krawiecka, Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan:
Protecting Web Passwords from Rogue Servers using Trusted Execution Environments. CoRR abs/1709.01261 (2017) - 2016
- [j10]Vladimir Rabotka, Mohammad Mannan:
An evaluation of recent secure deduplication proposals. J. Inf. Secur. Appl. 27-28: 3-18 (2016) - [j9]Lianying Zhao, Mohammad Mannan:
Deceptive Deletion Triggers Under Coercion. IEEE Trans. Inf. Forensics Secur. 11(12): 2763-2776 (2016) - [c22]Lianying Zhao, Mohammad Mannan:
Hypnoguard: Protecting Secrets across Sleep-wake Cycles. CCS 2016: 945-957 - [c21]Long Lu, Mohammad Mannan:
Sixth Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2016). CCS 2016: 1873-1874 - [c20]Xavier de Carné de Carnavalet, Mohammad Mannan:
Killed by Proxy: Analyzing Client-end TLS Interce. NDSS 2016 - [e3]Long Lu, Mohammad Mannan:
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016. ACM 2016, ISBN 978-1-4503-4564-4 [contents] - [e2]Carrie Gates, Rainer Böhme, Mohammad Mannan, Serge Egelman:
Proceedings of the 2016 New Security Paradigms Workshop, NSPW 2016, Granby, Colorado, USA, September 26-29, 2016. ACM 2016, ISBN 978-1-4503-4813-3 [contents] - 2015
- [j8]Xavier de Carné de Carnavalet, Mohammad Mannan:
A Large-Scale Evaluation of High-Impact Password Strength Meters. ACM Trans. Inf. Syst. Secur. 18(1): 1:1-1:32 (2015) - [c19]Lianying Zhao, Mohammad Mannan:
Gracewipe: Secure and Verifiable Deletion under Coercion. NDSS 2015 - [c18]Mohammad Mannan, Arash Shahkar, Atieh Saberi Pirouz, Vladimir Rabotka:
Peace vs. Privacy: Leveraging Conflicting Jurisdictions for Email Security. NSPW 2015: 124-136 - [e1]Anil Somayaji, Paul C. van Oorschot, Mohammad Mannan, Rainer Böhme:
Proceedings of the 2015 New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8-11, 2015. ACM 2015, ISBN 978-1-4503-3754-0 [contents] - 2014
- [j7]Adam Skillen, Mohammad Mannan:
Mobiflage: Deniable Storage Encryptionfor Mobile Devices. IEEE Trans. Dependable Secur. Comput. 11(3): 224-237 (2014) - [c17]Xavier de Carné de Carnavalet, Mohammad Mannan:
Challenges and implications of verifiable builds for security-critical open-source software. ACSAC 2014: 16-25 - [c16]A. Mert Kara, Hamad Binsalleeh, Mohammad Mannan, Amr M. Youssef, Mourad Debbabi:
Detection of malicious payload distribution channels in DNS. ICC 2014: 853-858 - [c15]Xavier de Carné de Carnavalet, Mohammad Mannan:
From Very Weak to Very Strong: Analyzing Password-Strength Meters. NDSS 2014 - 2013
- [c14]Adam Skillen, Mohammad Mannan:
On Implementing Deniable Storage Encryption for Mobile Devices. NDSS 2013 - [c13]Lianying Zhao, Mohammad Mannan:
Explicit authentication response considered harmful. NSPW 2013: 77-86 - 2012
- [j6]Mansour Alsaleh, Mohammad Mannan, Paul C. van Oorschot:
Revisiting Defenses against Large-Scale Online Password Guessing Attacks. IEEE Trans. Dependable Secur. Comput. 9(1): 128-141 (2012) - [j5]Mohammad Mannan, Paul C. van Oorschot:
Passwords for Both Mobile and Desktop Computers: ObPwd for Firefox and Android. login Usenix Mag. 37(4) (2012) - [j4]Mohammad Mannan, Paul C. van Oorschot:
Passwords for Both Mobile and Desktop Computers Appendix. login Usenix Mag. 37(4) (2012) - [c12]Eric Lin, John Aycock, Mohammad Mannan:
Lightweight Client-Side Methods for Detecting Email Forgery. WISA 2012: 254-269 - 2011
- [j3]Mohammad Mannan, Paul C. van Oorschot:
Leveraging personal devices for stronger password authentication from untrusted computers. J. Comput. Secur. 19(4): 703-750 (2011) - [j2]Robert Biddle, Mohammad Mannan, Paul C. van Oorschot, Tara Whalen:
User Study, Analysis, and Usable Security of Passwords Based on Digital Objects. IEEE Trans. Inf. Forensics Secur. 6(3-2): 970-979 (2011) - [c11]Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali, David Lie:
Unicorn: two-factor attestation for data security. CCS 2011: 17-28 - [c10]Mohammad Mannan, David Barrera, Carson D. Brown, David Lie, Paul C. van Oorschot:
Mercury: Recovering Forgotten Passwords Using Personal Devices. Financial Cryptography 2011: 315-330
2000 – 2009
- 2009
- [j1]Mohammad Mannan, Paul C. van Oorschot:
Reducing threats from flawed security APIs: The banking PIN case. Comput. Secur. 28(6): 410-420 (2009) - 2008
- [c9]Mohammad Mannan, Paul C. van Oorschot:
Weighing Down "The Unbearable Lightness of PIN Cracking". Financial Cryptography 2008: 176-181 - [c8]Mohammad Mannan, Paul C. van Oorschot:
Localization of credential information to address increasingly inevitable data breaches. NSPW 2008: 13-21 - [c7]Mohammad Mannan, Paul C. van Oorschot:
Digital Objects as Passwords. HotSec 2008 - [c6]Mohammad Mannan, Paul C. van Oorschot:
Privacy-enhanced sharing of personal content on the web. WWW 2008: 487-496 - 2007
- [c5]Mohammad Mannan, Paul C. van Oorschot:
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. Financial Cryptography 2007: 88-103 - [c4]Mohammad Mannan, Paul C. van Oorschot:
Security and usability: the gap in real-world online banking. NSPW 2007: 1-14 - 2006
- [c3]Mohammad Mannan, Paul C. van Oorschot:
A Protocol for Secure Public Instant Messaging. Financial Cryptography 2006: 20-35 - 2005
- [c2]Mohammad Mannan, Paul C. van Oorschot:
On instant messaging worms, analysis and countermeasures. WORM 2005: 2-11 - 2004
- [c1]Mohammad Mannan, Paul C. van Oorschot:
Secure Public Instant Messaging. PST 2004: 69-77
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint