default search action
Apostolos P. Fournaris
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c57]Francesco Regazzoni, Gergely Ács, Albert Zoltan Aszalos, Christos Avgerinos, Nikolaos Bakalos, Josep Lluis Berral, Joppe W. Bos, Marco Brohet, Andrés G. Castillo Sanz, Gareth T. Davies, Stefanos Florescu, Pierre-Elisée Flory, Alberto Gutierrez-Torre, Evangelos Haleplidis, Alice Héliou, Sotirios Ioannidis, Alexander Islam El-Kady, Katarzyna Kapusta, Konstantina Karagianni, Pieter Kruizinga, Kyrian Maat, Zoltán Ádám Mann, Kalliopi Mastoraki, SeoJeong Moon, Maja Nisevic, Balázs Pejó, Kostas Papagiannopoulos, Vassilis Paliouras, Paolo Palmieri, Francesca Palumbo, Juan Carlos Pérez Baun, Péter Pollner, Eduard Porta-Pardo, Luca Pulina, Muhammad Ali Siddiqi, Daniela Spajic, Christos Strydis, Georgios Tasopoulos, Vincent Thouvenot, Christos Tselios, Apostolos P. Fournaris:
SECURED for Health: Scaling Up Privacy to Enable the Integration of the European Health Data Space. DATE 2024: 1-4 - 2023
- [c56]Apostolos P. Fournaris, Christos Tselios, Evangelos Haleplidis, Elias Athanasopoulos, Antreas Dionysiou, Dimitrios Mitropoulos, Panos Louridas, Georgios Christou, Manos Athanatos, George Hatzivasilis, Konstantinos Georgopoulos, Costas Kalogeros, Christos Kotselidis, Simon Vogl, François Hamon, Sotiris Ioannidis:
Providing Security Assurance & Hardening for Open Source Software/Hardware: The SecOPERA approach. CAMAD 2023: 80-86 - [c55]Francesco Regazzoni, Apostolos P. Fournaris:
CCSW '23: Cloud Computing Security Workshop. CCS 2023: 3657-3658 - [c54]George Tasopoulos, Charis Dimopoulos, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld:
Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices. CF 2023: 366-374 - [c53]Apostolos P. Fournaris, George Tasopoulos, Marco Brohet, Francesco Regazzoni:
Running Longer To Slim Down: Post-Quantum Cryptography on Memory-Constrained Devices. COINS 2023: 1-6 - [c52]Alexander El-Kady, Apostolos P. Fournaris, Vassilis Paliouras:
Invited Paper: Dilithium Hardware-Accelerated Application Using OpenCL-Based High-Level Synthesis. ICCAD 2023: 1-7 - [c51]Christos Anagnostopoulos, Georgios Mylonas, Apostolos P. Fournaris, Christos Koulamas:
A Design Approach and Prototype Implementation for Factory Monitoring Based on Virtual and Augmented Reality at the Edge of Industry 4.0. INDIN 2023: 1-8 - [c50]Francesco Regazzoni, Paolo Palmieri, Apostolos P. Fournaris:
Treating a different kind of patient: curing security weaknesses in digital health systems of the future. IWASI 2023: 99-102 - [c49]Thanasis Tsakoulis, Evangelos Haleplidis, Apostolos P. Fournaris:
Run-Time Detection of Malicious Behavior Based on Exploit Decomposition Using Deep Learning: A Feasibility Study on SysJoker. SAMOS 2023: 311-327 - [e3]Francesco Regazzoni, Apostolos P. Fournaris:
Proceedings of the 2023 on Cloud Computing Security Workshop, CCSW 2023, Copenhagen, Denmark, 26 November 2023. ACM 2023 [contents] - [i6]Christos Anagnostopoulos, Georgios Mylonas, Apostolos P. Fournaris, Christos Koulamas:
A Design Approach and Prototype Implementation for Factory Monitoring Based on Virtual and Augmented Reality at the Edge of Industry 4.0. CoRR abs/2306.09692 (2023) - [i5]George Tasopoulos, Charis Dimopoulos, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld:
Energy Consumption Evaluation of Post-Quantum TLS 1.3 for Resource-Constrained Embedded Devices. IACR Cryptol. ePrint Arch. 2023: 506 (2023) - 2022
- [c48]Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong:
Machine-Learning Assisted Side-Channel Attacks on RNS ECC Implementations Using Hybrid Feature Engineering. COSADE 2022: 3-28 - [c47]George Tasopoulos, Jinhui Li, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld:
Performance Evaluation of Post-Quantum TLS 1.3 on Resource-Constrained Embedded Systems. ISPEC 2022: 432-451 - [c46]Alexander El-Kady, Apostolos P. Fournaris, Evangelos Haleplidis, Vassilis Paliouras:
High-Level Synthesis design approach for Number-Theoretic Multiplier. VLSI-SoC 2022: 1-6 - 2021
- [j20]Charis Dimopoulos, Apostolos P. Fournaris, Odysseas G. Koufopavlou:
Machine Learning Attacks and Countermeasures on Hardware Binary Edwards Curve Scalar Multipliers. J. Sens. Actuator Networks 10(3): 56 (2021) - [c45]Davide Bellizia, Nadia El Mrabet, Apostolos P. Fournaris, Simon Pontié, Francesco Regazzoni, François-Xavier Standaert, Élise Tasso, Emanuele Valea:
Post-Quantum Cryptography: Challenges and Opportunities for Robust and Secure HW Design. DFT 2021: 1-6 - [c44]Evangelos Haleplidis, Thanasis Tsakoulis, Alexander El-Kady, Charis Dimopoulos, Odysseas G. Koufopavlou, Apostolos P. Fournaris:
Studying OpenCL-based Number Theoretic Transform for heterogeneous platforms. DSD 2021: 339-346 - [c43]Lidia Pocero Fraile, Apostolos P. Fournaris, Christos Koulamas:
Design and Performance Evaluation of an Embedded EDHOC Module. MECO 2021: 1-6 - [c42]Alexander El-Kady, Apostolos P. Fournaris, Thanasis Tsakoulis, Evangelos Haleplidis, Vassilis Paliouras:
High-Level Synthesis design approach for Number-Theoretic Transform Implementations. VLSI-SoC 2021: 1-6 - [p2]Apostolos P. Fournaris, Athanassios Moschos, Nicolas Sklavos:
Side Channel Assessment Platforms and Tools for Ubiquitous Systems. Security of Ubiquitous Computing Systems 2021: 147-163 - [i4]Stavros Nousias, Nikos Piperigkos, Gerasimos Arvanitis, Apostolos P. Fournaris, Aris S. Lalos, Konstantinos Moustakas:
Empowering cyberphysical systems of systems with intelligence. CoRR abs/2107.02264 (2021) - [i3]George Tasopoulos, Jinhui Li, Apostolos P. Fournaris, Raymond K. Zhao, Amin Sakzad, Ron Steinfeld:
Performance Evaluation of Post-Quantum TLS 1.3 on Embedded Systems. IACR Cryptol. ePrint Arch. 2021: 1553 (2021) - 2020
- [j19]Naila Mukhtar, Apostolos P. Fournaris, Tariq Mahmood Khan, Charis Dimopoulos, Yinan Kong:
Improved Hybrid Approach for Side-Channel Analysis Using Efficient Convolutional Neural Network and Dimensionality Reduction. IEEE Access 8: 184298-184311 (2020) - [j18]Apostolos P. Fournaris, Charis Dimopoulos, Konstantinos Lampropoulos, Odysseas G. Koufopavlou:
Anomaly Detection Trusted Hardware Sensors for Critical Infrastructure Legacy Devices. Sensors 20(11): 3092 (2020) - [j17]Aris S. Lalos, Evangelos Vlachos, Kostas Berberidis, Apostolos P. Fournaris, Christos Koulamas:
Privacy Preservation in Industrial IoT via Fast Adaptive Correlation Matrix Completion. IEEE Trans. Ind. Informatics 16(12): 7765-7773 (2020) - [c41]Georgios Keramidas, Christos P. Antonopoulos, Nikolaos S. Voros, Pekka Jääskeläinen, Marisa Catalán Cid, Evangelia I. Zacharaki, Apostolos P. Fournaris, Aris S. Lalos:
CPSoSaware: Cross-Layer Cognitive Optimization Tools & Methods for the Lifecycle Support of Dependable CPSoS. ISVLSI 2020: 470-475 - [c40]Apostolos P. Fournaris, Aris S. Lalos, Petros Kapsalas, Christos Koulamas:
Decentralized, Secure and Cognitive Architecture for Automotive CyberPhysical System of Systems. MECO 2020: 1-5 - [c39]Apostolos P. Fournaris, Charis Dimopoulos, Odysseas G. Koufopavlou:
Profiling Dilithium Digital Signature Traces for Correlation Differential Side Channel Attacks. SAMOS 2020: 281-294 - [e2]Apostolos P. Fournaris, Manos Athanatos, Konstantinos Lampropoulos, Sotiris Ioannidis, George Hatzivasilis, Ernesto Damiani, Habtamu Abie, Silvio Ranise, Luca Verderame, Alberto Siena, Joaquín García-Alfaro:
Computer Security - ESORICS 2019 International Workshops, IOSec, MSTEC, and FINSEC, Luxembourg City, Luxembourg, September 26-27, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11981, Springer 2020, ISBN 978-3-030-42050-5 [contents] - [i2]Naila Mukhtar, Louiza Papachristodoulou, Apostolos P. Fournaris, Lejla Batina, Yinan Kong:
Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering. IACR Cryptol. ePrint Arch. 2020: 1065 (2020)
2010 – 2019
- 2019
- [j16]Christos Emmanouilidis, Petros Pistofidis, Luka Bertoncelj, Vassilis Katsouros, Apostolos P. Fournaris, Christos Koulamas, Cristobal Ruiz-Carcel:
Enabling the human in the loop: Linked data and knowledge in industrial cyber-physical systems. Annu. Rev. Control. 47: 249-265 (2019) - [j15]Apostolos P. Fournaris, Aris S. Lalos, Dimitrios Serpanos:
Generative Adversarial Networks in AI-Enabled Safety-Critical Systems: Friend or Foe? Computer 52(9): 78-81 (2019) - [j14]Apostolos P. Fournaris, Christos Alexakos, Christos Anagnostopoulos, Christos Koulamas, Athanasios P. Kalogeras:
Introducing Hardware-Based Intelligence and Reconfigurability on Industrial IoT Edge Nodes. IEEE Des. Test 36(4): 15-23 (2019) - [j13]Apostolos P. Fournaris, Charalambos Dimopoulos, Athanassios Moschos, Odysseas G. Koufopavlou:
Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures. Microprocess. Microsystems 64: 73-87 (2019) - [j12]Apostolos P. Fournaris, Lampros Pyrgas, Paris Kitsos:
An efficient multi-parameter approach for FPGA hardware Trojan detection. Microprocess. Microsystems 71 (2019) - [j11]Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina:
Practical Evaluation of Protected Residue Number System Scalar Multiplication. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 259-282 (2019) - [c38]Lidia Pocero Fraile, Apostolos P. Fournaris, Odysseas G. Koufopavlou:
Revisiting Rowhammer Attacks in Embedded Systems. DTIS 2019: 1-6 - [c37]Aris S. Lalos, Evangelos Vlachos, Kostas Berberidis, Apostolos P. Fournaris, Christos Koulamas:
Robust and Efficient Privacy Preservation in Industrial IoT via correlation completion and tracking. INDIN 2019: 1225-1228 - [c36]Apostolos P. Fournaris, Spilios Giannoulis, Christos Koulamas:
Evaluating CoAP End to End Security for Constrained Wireless Sensor Networks. NTMS 2019: 1-5 - [p1]Apostolos P. Fournaris, Andreas Komninos, Aris S. Lalos, Athanasios P. Kalogeras, Christos Koulamas, Dimitrios Serpanos:
Design and Run-Time Aspects of Secure Cyber-Physical Systems. Security and Quality in Cyber-Physical Systems Engineering 2019: 357-382 - [e1]Apostolos P. Fournaris, Konstantinos Lampropoulos, Eva Marín-Tordera:
Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11398, Springer 2019, ISBN 978-3-030-12084-9 [contents] - [i1]Apostolos P. Fournaris, Christos Koulamas:
Components and Tools for Large Scale, Complex Cyber-Physical Systems Based on Industrial Internet of Things Technologies. ERCIM News 2019(119) (2019) - 2018
- [c35]Apostolos P. Fournaris, Lampros Pyrgas, Paris Kitsos:
An FPGA Hardware Trojan Detection Approach Based on Multiple Parameter Analysis. DSD 2018: 516-522 - [c34]Athanassios Moschos, Apostolos P. Fournaris, Odysseas G. Koufopavlou:
A flexible leakage trace collection setup for arbitrary cryptographic IP cores. HOST 2018: 138-142 - [c33]Christos Alexakos, Christos Anagnostopoulos, Apostolos P. Fournaris, Christos Koulamas, Athanasios P. Kalogeras:
IoT Integration for Adaptive Manufacturing. ISORC 2018: 146-151 - [c32]Apostolos P. Fournaris, Konstantinos Lampropoulos, Odysseas G. Koufopavlou:
Trusted hardware sensors for anomaly detection in critical infrastructure systems. MOCAST 2018: 1-4 - 2017
- [c31]Apostolos P. Fournaris, Charalambos Dimopoulos, Odysseas G. Koufopavlou:
A Design Strategy for Digit Serial Multiplier Based Binary Edwards Curve Scalar Multiplier Architectures. DSD 2017: 221-228 - [c30]Christos Alexakos, Christos Anagnostopoulos, Apostolos P. Fournaris, Athanasios P. Kalogeras, Christos Koulamas:
Production process adaptation to IoT triggered manufacturing resource failure events. ETFA 2017: 1-8 - [c29]Apostolos P. Fournaris, Louiza Papachristodoulou, Nicolas Sklavos:
Secure and Efficient RNS Software Implementation for Elliptic Curve Cryptography. EuroS&P Workshops 2017: 86-93 - [c28]Apostolos P. Fournaris, Konstantinos Lampropoulos, Odysseas G. Koufopavlou:
Hardware Security for Critical Infrastructures - The CIPSEC Project Approach. ISVLSI 2017: 356-361 - 2016
- [c27]Apostolos P. Fournaris, Louiza Papachristodoulou, Lejla Batina, Nicolas Sklavos:
Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography. DTIS 2016: 1-4 - [c26]Apostolos P. Fournaris, Nicolas Sklavos, Christos Koulamas:
A High Speed Scalar Multiplier for Binary Edwards Curves. CS2@HiPEAC 2016: 41-44 - [c25]Ioannis Tzemos, Apostolos P. Fournaris, Nicolas Sklavos:
Security and Efficiency Analysis of One Time Password Techniques. PCI 2016: 67 - 2015
- [j10]Apostolos P. Fournaris, Ioannis Zafeirakis, Paris Kitsos, Odysseas G. Koufopavlou:
Comparing design approaches for elliptic curve point multiplication over GF(2k) with polynomial basis representation. Microprocess. Microsystems 39(8): 1139-1155 (2015) - [c24]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
Affine Coordinate Binary Edwards Curve Scalar Multiplier with Side Channel Attack Resistance. DSD 2015: 431-437 - [c23]Apostolos P. Fournaris, Nicolaos Klaoudatos, Nicolas Sklavos, Christos Koulamas:
Fault and Power Analysis Attack Resistant RNS based Edwards Curve Point Multiplication. CS2@HiPEAC 2015: 43-46 - [c22]Ricardo Chaves, Giorgio Di Natale, Lejla Batina, Shivam Bhasin, Baris Ege, Apostolos P. Fournaris, Nele Mentens, Stjepan Picek, Francesco Regazzoni, Vladimir Rozic, Nicolas Sklavos, Bohan Yang:
Challenges in designing trustworthy cryptographic co-processors. ISCAS 2015: 2009-2012 - [c21]Apostolos P. Fournaris, Ioannis Zafeirakis, Christos Koulamas, Nicolas Sklavos, Odysseas G. Koufopavlou:
Designing efficient elliptic Curve Diffie-Hellman accelerators for embedded systems. ISCAS 2015: 2025-2028 - 2014
- [j9]Apostolos P. Fournaris, Nicolas Sklavos:
Secure embedded system hardware design - A flexible security and trust enhanced approach. Comput. Electr. Eng. 40(1): 121-133 (2014) - [c20]Apostolos P. Fournaris, John Zafeirakis, Odysseas G. Koufopavlou:
Designing and Evaluating High Speed Elliptic Curve Point Multipliers. DSD 2014: 169-174 - 2013
- [j8]Apostolos P. Fournaris:
A Distributed Approach of a Threshold Certificate-Based Encryption Scheme with No Trusted Entities. Inf. Secur. J. A Glob. Perspect. 22(3): 126-139 (2013) - 2012
- [c19]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
CRT RSA Hardware Architecture with Fault and Simple Power Attack Countermeasures. DSD 2012: 661-667 - [c18]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
Protecting CRT RSA against Fault and Power Side Channel Attacks. ISVLSI 2012: 159-164 - [c17]Apostolos P. Fournaris:
Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer. SECRYPT 2012: 314-320 - 2011
- [c16]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
Efficient CRT RSA with SCA Countermeasures. DSD 2011: 593-599 - [c15]Apostolos P. Fournaris:
Distributed Threshold Cryptography Certification with No Trusted Dealer. SECRYPT 2011: 400-404 - 2010
- [j7]Apostolos P. Fournaris:
Trust Ensuring Crisis Management Hardware Module. Inf. Secur. J. A Glob. Perspect. 19(2): 74-83 (2010) - [c14]Apostolos P. Fournaris:
Fault and simple power attack resistant RSA using Montgomery modular multiplication. ISCAS 2010: 1875-1878 - [c13]Apostolos P. Fournaris, Daniel M. Hein:
Trust Management Through Hardware Means: Design Concerns and Optimizations. ISVLSI (Selected papers) 2010: 31-45 - [c12]Apostolos P. Fournaris:
Hardware Module Design for Ensuring Trust. ISVLSI 2010: 155-160
2000 – 2009
- 2009
- [j6]Georgios N. Selimis, Apostolos P. Fournaris, Giorgos Kostopoulos, Odysseas G. Koufopavlou:
Software and Hardware Issues in Smart Card Technology. IEEE Commun. Surv. Tutorials 11(3): 143-152 (2009) - [j5]George N. Selimis, Apostolos P. Fournaris, Harris E. Michail, Odysseas G. Koufopavlou:
Improved throughput bit-serial multiplier for GF(2m) fields. Integr. 42(2): 217-226 (2009) - [j4]Dimitrios M. Schinianakis, Apostolos P. Fournaris, Harris E. Michail, Athanasios P. Kakarountas, Thanos Stouraitis:
An RNS Implementation of an Fp Elliptic Curve Point Multiplier. IEEE Trans. Circuits Syst. I Regul. Pap. 56-I(6): 1202-1213 (2009) - [c11]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
One Dimensional Systolic Inversion Architecture Based on Modified GF(2^k) Extended Euclidean Algorithm. DSD 2009: 736-741 - [c10]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
Low Area Elliptic Curve Arithmetic Unit. ISCAS 2009: 1397-1400 - 2008
- [b1]Apostolos P. Fournaris:
Σχεδιασμός κρυπτογραφικών συστημάτων δημοσίου κλειδιού. University of Patras, Greece, 2008 - [j3]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
Versatile multiplier architectures in GF(2k) fields using the Montgomery multiplication algorithm. Integr. 41(3): 371-384 (2008) - [c9]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
Creating an Elliptic Curve arithmetic unit for use in elliptic curve cryptography. ETFA 2008: 1457-1464 - 2007
- [j2]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
Applying systolic multiplication-inversion architectures based on modified extended Euclidean algorithm for GF(2k) in elliptic curve cryptography. Comput. Electr. Eng. 33(5-6): 333-348 (2007) - [j1]George N. Selimis, Athanasios P. Kakarountas, Apostolos P. Fournaris, Athanasios Milidonis, Odysseas G. Koufopavlou:
A Low Power Design for Sbox Cryptographic Primitive of Advanced Encryption Standard for Mobile End-Users. J. Low Power Electron. 3(3): 327-336 (2007) - 2006
- [c8]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
A Systolic Inversion Architecture Based on Modified Extended Euclidean Algorithm for GF(2K) Fields. ICECS 2006: 1081-1084 - [c7]George N. Selimis, Apostolos P. Fournaris, Odysseas G. Koufopavlou:
Applying Low Power Techniques in AES MixColumn/InvMixColumn Transformations. ICECS 2006: 1089-1092 - [c6]Dimitrios M. Schinianakis, Apostolos P. Fournaris, Athanasios Kakarountas, Thanos Stouraitis:
An RNS architecture of an Fp elliptic curve point multiplier. ISCAS 2006 - 2005
- [c5]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
A systolic trinomial GF(2k) multiplier based on the Montgomery Multiplication Algorithm. ICECS 2005: 1-4 - [c4]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
A novel systolic GF(2k) field Multiplication-Inversion arithmetic unit. ICECS 2005: 1-4 - [c3]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
A new RSA encryption architecture and hardware implementation based on optimized Montgomery multiplication. ISCAS (5) 2005: 4645-4648 - 2004
- [c2]Apostolos P. Fournaris, Odysseas G. Koufopavlou:
GF(2K) multipliers based on Montgomery Multiplication Algorithm. ISCAS (2) 2004: 849-852 - 2003
- [c1]Apostolos P. Fournaris, Nicolas Sklavos, Odysseas G. Koufopavlou:
VLSI architecture and FPGA implementation of ICE encryption algorithm. ICECS 2003: 88-91
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint