
Jingqiang Lin
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j14]Na Lv
, Tianyu Chen
, Shuangyi Zhu, Jing Yang, Yuan Ma, Jiwu Jing, Jingqiang Lin:
High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators. Secur. Commun. Networks 2020: 4241713:1-4241713:18 (2020) - [j13]Shuangyi Zhu, Yuan Ma, Xusheng Li, Jing Yang, Jingqiang Lin, Jiwu Jing:
On the Analysis and Improvement of Min-Entropy Estimation on Time-Varying Data. IEEE Trans. Inf. Forensics Secur. 15: 1696-1708 (2020) - [c72]Zhaohui Chen, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
Towards Efficient Kyber on FPGAs: A Processor for Vector of Polynomials. ASP-DAC 2020: 247-252 - [c71]Abdulmalik Humayed, Fengjun Li, Jingqiang Lin, Bo Luo
:
CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks. ESORICS (1) 2020: 153-173 - [c70]Tianlin Song, Jingqiang Lin, Wei Wang, Quanwei Cai:
Traceable Revocable Anonymous Registration Scheme with Zero-knowledge Proof on Blockchain. ICC 2020: 1-7 - [c69]Yang Zhang, Dongzheng Jia, Shijie Jia, Limin Liu, Jingqiang Lin:
Splitter: An Efficient Scheme to Determine the Geolocation of Cloud Data Publicly. ICCCN 2020: 1-11 - [c68]Lili Gao, Fangyu Zheng, Niall Emmart, Jiankuo Dong, Jingqiang Lin, Charles C. Weems:
DPF-ECC: Accelerating Elliptic Curve Cryptography with Floating-Point Computing Power of GPUs. IPDPS 2020: 494-504 - [c67]Dongzheng Jia, Yang Zhang, Shijie Jia, Limin Liu, Jingqiang Lin:
DPVGeo: Delay-based Public Verification of Cloud Data Geolocation. ISCC 2020: 1-7 - [c66]Li Zhu, Pingjian Wang, Xiaozhuo Gu, Yuewu Wang, Jingqiang Lin:
PIV4DB: Probabilistic Integrity Verification for Cloud Database. ISCC 2020: 1-7 - [e1]Jianying Zhou
, Mauro Conti
, Chuadhry Mujeeb Ahmed
, Man Ho Au
, Lejla Batina
, Zhou Li
, Jingqiang Lin, Eleonora Losiouk
, Bo Luo, Suryadipta Majumdar
, Weizhi Meng
, Martín Ochoa
, Stjepan Picek
, Georgios Portokalidis
, Cong Wang
, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents]
2010 – 2019
- 2019
- [j12]Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Bo Luo
, Jiwu Jing:
Towards the optimal performance of integrating Warm and Delay against remote cache timing side channels on block ciphers. J. Comput. Secur. 27(5): 547-580 (2019) - [j11]Yuan Ma
, Tianyu Chen
, Jingqiang Lin, Jing Yang
, Jiwu Jing:
Entropy Estimation for ADC Sampling-Based True Random Number Generators. IEEE Trans. Inf. Forensics Secur. 14(11): 2887-2900 (2019) - [c65]Fangjie Jiang, Quanwei Cai, Jingqiang Lin, Bo Luo
, Le Guan, Ziqiang Ma:
TF-BIV: transparent and fine-grained binary integrity verification in the cloud. ACSAC 2019: 57-69 - [c64]Bingyu Li, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Qi Li, Jiwu Jing, Congli Wang:
Certificate Transparency in the Wild: Exploring the Reliability of Monitors. CCS 2019: 2505-2520 - [c63]Kai Wang, Fengkai Yuan, Rui Hou, Jingqiang Lin, Zhenzhou Ji, Dan Meng:
CacheGuard: a security-enhanced directory architecture against continuous attacks. CF 2019: 32-41 - [c62]Bingyu Li, Wei Wang, Lingjia Meng, Jingqiang Lin, Xuezhong Liu, Congli Wang:
Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLS. Inscrypt 2019: 246-259 - [c61]Ziqiang Ma, Quanwei Cai, Jingqiang Lin, Jiwu Jing, Dingfeng Ye, Lingjia Meng:
Evaluating the Cache Side Channel Attacks Against ECDSA. Inscrypt 2019: 325-345 - [c60]Xuhua Bao, Xiaokun Zhang, Jingqiang Lin, Dawei Chu, Qiongxiao Wang, Fengjun Li:
Towards the Trust-Enhancements of Single Sign-On Services. DSC 2019: 1-8 - [c59]Dawei Chu, Kaijie Zhu, Quanwei Cai, Jingqiang Lin, Fengjun Li, Le Guan, Lingchen Zhang:
Secure Cryptography Infrastructures in the Cloud. GLOBECOM 2019: 1-7 - [c58]Maomao Fu, Xiaozhuo Gu, Wenhao Dai, Jingqiang Lin, Han Wang:
Secure Multi-receiver Communications: Models, Proofs, and Implementation. ICA3PP (1) 2019: 689-709 - [c57]Congli Wang, Jingqiang Lin, Bingyu Li, Qi Li, Qiongxiao Wang, Xiaokun Zhang:
Analyzing the Browser Security Warnings on HTTPS Errors. ICC 2019: 1-6 - [c56]Xin Xu, Quanwei Cai, Jingqiang Lin, Shiran Pan, Liangqin Ren:
Enforcing Access Control in Distributed Version Control Systems. ICME 2019: 772-777 - [c55]Dongzheng Jia, Limin Liu, Shijie Jia, Jingqiang Lin:
VoteGeo: An IoT-based Voting Approach to Verify the Geographic Location of Cloud Hosts. IPCCC 2019: 1-9 - [c54]Jinxia Fang, Limin Liu, Jingqiang Lin:
Practical Verification of Data Encryption for Cloud Storage Services. SCC 2019: 16-31 - [c53]Xinying Wu, Yuan Ma, Jing Yang, Tianyu Chen, Jingqiang Lin:
On the Security of TRNGs Based on Multiple Ring Oscillators. SecureComm (2) 2019: 89-107 - [c52]Dawei Chu, Jingqiang Lin, Fengjun Li, Xiaokun Zhang, Qiongxiao Wang, Guangqi Liu:
Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs. SecureComm (1) 2019: 511-531 - [c51]Bingyu Li, Dawei Chu, Jingqiang Lin, Quanwei Cai, Congli Wang, Lingjia Meng:
The Weakest Link of Certificate Transparency: Exploring the TLS/HTTPS Configurations of Third-Party Monitors. TrustCom/BigDataSE 2019: 216-223 - [c50]Le Guan, Chen Cao, Sencun Zhu, Jingqiang Lin, Peng Liu, Yubin Xia, Bo Luo
:
Protecting mobile devices from physical memory attacks with targeted encryption. WiSec 2019: 34-44 - 2018
- [j10]Le Guan, Jingqiang Lin
, Ziqiang Ma, Bo Luo
, Luning Xia, Jiwu Jing:
Copker: A Cryptographic Engine Against Cold-Boot Attacks. IEEE Trans. Dependable Secur. Comput. 15(5): 742-754 (2018) - [c49]Yafei Ji, Luning Xia, Jingqiang Lin, Qiongxiao Wang, Lingguang Lei, Li Song:
Chord: Thwarting Relay Attacks Among Near Field Communications. Inscrypt 2018: 329-348 - [c48]Jiankuo Dong, Fangyu Zheng, Juanjuan Cheng, Jingqiang Lin, Wuqiong Pan, Ziyang Wang:
Towards High-performance X25519/448 Key Agreement in General Purpose GPUs. CNS 2018: 1-9 - [c47]Ze Wang, Jingqiang Lin, Quanwei Cai, Qiongxiao Wang, Jiwu Jing, Daren Zha:
Blockchain-Based Certificate Transparency and Revocation Transparency. Financial Cryptography Workshops 2018: 144-162 - [c46]Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong:
Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation. ICICS 2018: 142-157 - [c45]Huorong Li, Jingqiang Lin, Bingyu Li, Wangzhao Cheng:
PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX. ICICS 2018: 767-777 - [c44]Jiankuo Dong, Fangyu Zheng, Niall Emmart, Jingqiang Lin, Charles C. Weems:
sDPF-RSA: Utilizing Floating-point Computing Power of GPUs for Massive Digital Signature Computations. IPDPS 2018: 599-609 - [c43]Congwu Li, Jingqiang Lin, Quanwei Cai, Bo Luo
:
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 862-869 - [c42]Fangjie Jiang, Quanwei Cai, Le Guan, Jingqiang Lin:
Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine Introspection. ISC 2018: 213-230 - [c41]Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo
, Peng Liu, Ji Xiang, Wenjing Lou:
CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices. RAID 2018: 380-400 - [c40]Jing Yang, Shuangyi Zhu, Tianyu Chen, Yuan Ma, Na Lv, Jingqiang Lin:
Neural Network Based Min-entropy Estimation for Random Number Generators. SecureComm (2) 2018: 231-250 - [c39]Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li:
Building Your Private Cloud Storage on Public Cloud Service Using Embedded GPUs. SecureComm (1) 2018: 512-528 - 2017
- [j9]Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, Bo Luo
:
Cyber-Physical Systems Security - A Survey. IEEE Internet Things J. 4(6): 1802-1831 (2017) - [j8]Jiankuo Dong
, Fangyu Zheng
, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration. Secur. Commun. Networks 2017: 3508786:1-3508786:15 (2017) - [j7]Shuangyi Zhu, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources. IACR Trans. Symmetric Cryptol. 2017(3): 151-168 (2017) - [c38]Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo
, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia:
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. ACSAC 2017: 339-349 - [c37]Yuan Ma, Jingqiang Lin, Jiwu Jing:
On the Entropy of Oscillator-Based True Random Number Generators. CT-RSA 2017: 165-180 - [c36]Huorong Li, Wuqiong Pan, Jingqiang Lin, Wangzhao Cheng, Bingyu Li:
SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS. ICICS 2017: 51-62 - [c35]Wangzhao Cheng, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Huorong Li, Bingyu Li:
High-Performance Symmetric Cryptography Server with GPU Acceleration. ICICS 2017: 529-540 - [c34]Quanwei Cai, Jonathan Lutes, Jingqiang Lin, Bo Luo
:
A-Tor: Accountable Anonymity in Tor. SecureComm 2017: 838-851 - [i4]Abdulmalik Humayed, Jingqiang Lin, Fengjun Li, Bo Luo:
Cyber-Physical Systems Security - A Survey. CoRR abs/1701.04525 (2017) - [i3]Chen Cao, Le Guan, Peng Liu, Neng Gao, Jingqiang Lin, Ji Xiang:
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices. CoRR abs/1706.05779 (2017) - 2016
- [j6]Jingqiang Lin, Bo Luo
, Le Guan, Jiwu Jing:
Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions. IEEE Secur. Priv. 14(6): 63-70 (2016) - [j5]Wen Tao Zhu, Jingqiang Lin:
Generating Correlated Digital Certificates: Framework and Applications. IEEE Trans. Inf. Forensics Secur. 11(6): 1117-1127 (2016) - [c33]Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing:
More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22. ASIACRYPT (1) 2016: 307-329 - [c32]Lei Lei, Quanwei Cai, Bo Chen, Jingqiang Lin:
Towards Efficient Re-encryption for Secure Client-Side Deduplication in Public Clouds. ICICS 2016: 71-84 - [c31]Yuan Ma, Qinglong Zhang, Zongbin Liu, Chenyang Tu, Jingqiang Lin:
Low-Cost Hardware Implementation of Elliptic Curve Cryptography for General Prime Fields. ICICS 2016: 292-306 - [c30]Yuan Zhao, Wuqiong Pan, Jingqiang Lin, Peng Liu, Cong Xue, Fangyu Zheng:
PhiRSA: Exploiting the Computing Power of Vector Instructions on Intel Xeon Phi for RSA. SAC 2016: 482-500 - [c29]Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, Ziqiang Ma:
RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks. SEC 2016: 293-307 - [c28]Jing Yang, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing:
Extracting More Entropy for TRNGs Based on Coherent Sampling. SecureComm 2016: 694-709 - [i2]Shuangyi Zhu, Yuan Ma, Jingqiang Lin, Jia Zhuang, Jiwu Jing:
More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22. IACR Cryptol. ePrint Arch. 2016: 863 (2016) - [i1]Yuan Ma, Jingqiang Lin, Jiwu Jing:
On the Entropy of Oscillator-Based True Random Number Generators. IACR Cryptol. ePrint Arch. 2016: 1091 (2016) - 2015
- [j4]Jingqiang Lin, Wen Tao Zhu, Qiongxiao Wang, Nan Zhang, Jiwu Jing, Neng Gao:
RIKE+ : using revocable identities to support key escrow in public key infrastructures with flexibility. IET Inf. Secur. 9(2): 136-147 (2015) - [j3]Manogna Thimma, Fang Liu, Jingqiang Lin, Bo Luo
:
HyXAC: Hybrid XML Access Control Integrating View-Based and Query-Rewriting Approaches. IEEE Trans. Knowl. Data Eng. 27(8): 2190-2202 (2015) - [c27]Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang:
LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data. ACNS 2015: 215-239 - [c26]Tianyu Chen, Yuan Ma, Jingqiang Lin, Zhan Wang, Jiwu Jing:
An Efficiency Optimization Scheme for the On-the-Fly Statistical Randomness Test. CSCloud 2015: 515-517 - [c25]Wei Wang, Jingqiang Lin, Zhan Wang, Ze Wang, Luning Xia:
vBox: Proactively Establishing Secure Channels Between Wireless Devices Without Prior Knowledge. ESORICS (2) 2015: 332-351 - [c24]Yafei Ji, Luning Xia, Jingqiang Lin, Jian Zhou, Guozhu Zhang, Shijie Jia:
Chameleon: A Lightweight Method for Thwarting Relay Attacks in Near Field Communication. ICICS 2015: 346-355 - [c23]Shijie Jia, Luning Xia, Zhan Wang, Jingqiang Lin, Guozhu Zhang, Yafei Ji:
Extracting Robust Keys from NAND Flash Physical Unclonable Functions. ISC 2015: 437-454 - [c22]Le Guan, Jingqiang Lin, Bo Luo
, Jiwu Jing, Jing Wang:
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory. IEEE Symposium on Security and Privacy 2015: 3-19 - 2014
- [c21]Yuan Ma, Jingqiang Lin, Tianyu Chen, Changwei Xu, Zongbin Liu, Jiwu Jing:
Entropy Evaluation for Oscillator-Based True Random Number Generators. CHES 2014: 544-561 - [c20]Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang:
SEDB: Building Secure Database Services for Sensitive Data. ICICS 2014: 16-30 - [c19]Ming Shang, Jingqiang Lin, Xiaokun Zhang, Changwei Xu:
A game-theory analysis of the rat-group attack in smart grids. ISSNIP 2014: 1-6 - [c18]Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Exploiting the Floating-Point Computing Power of GPUs for RSA. ISC 2014: 198-215 - [c17]Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing:
Copker: Computing with Private Keys without RAM. NDSS 2014 - [c16]Quanwei Cai, Jingqiang Lin, Fengjun Li, Qiongxiao Wang, Daren Zha:
EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty Clients. SecureComm (1) 2014: 305-322 - [c15]Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Exploiting the Potential of GPUs for Modular Multiplication in ECC. WISA 2014: 295-306 - 2013
- [j2]Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang:
Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes. Secur. Commun. Networks 6(5): 612-630 (2013) - 2012
- [j1]Jingqiang Lin, Jiwu Jing, Peng Liu:
Evaluating Intrusion-Tolerant Certification Authority Systems. Qual. Reliab. Eng. Int. 28(8): 825-841 (2012) - [c14]Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao:
RIKE: Using Revocable Identities to Support Key Escrow in PKIs. ACNS 2012: 48-65 - [c13]Jingqiang Lin, Peng Liu, Jiwu Jing:
Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality. GameSec 2012: 118-137 - [c12]Yuan Ma, Luning Xia, Jingqiang Lin, Jiwu Jing, Zongbin Liu, Xingjie Yu:
Hardware Performance Optimization and Evaluation of SM3 Hash Algorithm on FPGA. ICICS 2012: 105-118 - [c11]Jingqiang Lin, Bo Luo
, Jiwu Jing, Xiaokun Zhang:
GRADE: Graceful Degradation in Byzantine Quorum Systems. SRDS 2012: 171-180 - [c10]Cunqing Ma, Jingqiang Lin, Yuewu Wang:
Efficient Missing Tag Detection in a Large RFID System. TrustCom 2012: 185-192 - [c9]Cunqing Ma, Jingqiang Lin, Yuewu Wang, Ming Shang:
Offline RFID Grouping Proofs with Trusted Timestamps. TrustCom 2012: 674-681 - 2011
- [c8]Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian:
An Efficient Group-Based Secret Sharing Scheme. ISPEC 2011: 288-301 - [c7]Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian, Mingli Sun:
Efficient Secret Sharing Schemes. STA 2011: 114-121 - 2010
- [c6]Qiongxiao Wang, Jiwu Jing, Jingqiang Lin:
A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms. CIT 2010: 596-603 - [c5]Daren Zha, Jiwu Jing, Peng Liu, Jingqiang Lin, Xiaoqi Jia:
Proactive Identification and Prevention of Unexpected Future Rule Conflicts in Attribute Based Access Control. ICCSA (4) 2010: 468-481 - [c4]Pingjian Wang, Jingqiang Lin, Jiwu Jing, Yongquan Xie:
Mediated Hierarchical Identity-Based Combined Public Key Schemes. IITSI 2010: 614-618 - [c3]Jingqiang Lin, Peng Liu, Jiwu Jing, Qiongxiao Wang:
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes. SecureComm 2010: 307-325
2000 – 2009
- 2008
- [c2]Jingjing Wu, Jiwu Jing, Jingqiang Lin:
A Decentralized Certification Authority Based on Real World Trust Relationships. CSSE (3) 2008: 1123-1126 - 2007
- [c1]Jingqiang Lin, Jiwu Jing, Peng Liu:
Framework for Intrusion Tolerant Certification Authority System Evaluation. SRDS 2007: 231-241
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-14 22:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint