default search action
Edward W. Felten
Person information
- affiliation: Princeton University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c81]Mario M. Alvarez, Henry Arneson, Ben Berger, Lee Bousfield, Chris Buckland, Yafah Edelman, Edward W. Felten, Daniel Goldman, Raul Jordan, Mahimna Kelkar, Akaki Mamageishvili, Harry Ng, Aman Sanghi, Victor Shoup, Terence Tsao:
BoLD: Fast and Cheap Dispute Resolution. AFT 2024: 2:1-2:19 - [i11]Mario M. Alvarez, Henry Arneson, Ben Berger, Lee Bousfield, Chris Buckland, Yafah Edelman, Edward W. Felten, Daniel Goldman, Raul Jordan, Mahimna Kelkar, Akaki Mamageishvili, Harry Ng, Aman Sanghi, Victor Shoup, Terence Tsao:
BoLD: Fast and Cheap Dispute Resolution. CoRR abs/2404.10491 (2024) - 2023
- [c80]Akaki Mamageishvili, Mahimna Kelkar, Jan Christoph Schlegel, Edward W. Felten:
Buying Time: Latency Racing vs. Bidding for Transaction Ordering. AFT 2023: 23:1-23:22 - [c79]Akaki Mamageishvili, Edward W. Felten:
Efficient Rollup Batch Posting Strategy on Base Layer. FC Workshops 2023: 355-366 - [c78]Akaki Mamageishvili, Edward W. Felten:
Incentive Schemes for Rollup Validators. MARBLE 2023: 48-61 - [i10]Akaki Mamageishvili, Mahimna Kelkar, Jan Christoph Schlegel, Edward W. Felten:
Buying Time: Latency Racing vs. Bidding in Fair Transaction Ordering. CoRR abs/2306.02179 (2023) - [i9]Akaki Mamageishvili, Edward W. Felten:
Incentive Schemes for Rollup Validators. CoRR abs/2308.02880 (2023) - [i8]Davide Crapis, Edward W. Felten, Akaki Mamageishvili:
EIP-4844 Economics and Rollup Strategies. CoRR abs/2310.01155 (2023) - 2022
- [c77]Ben Burgess, Avi Ginsberg, Edward W. Felten, Shaanan Cohney:
Watching the watchers: bias and vulnerability in remote proctoring software. USENIX Security Symposium 2022: 571-588 - [i7]Ben Burgess, Avi Ginsberg, Edward W. Felten, Shaanan Cohney:
Watching the watchers: bias and vulnerability in remote proctoring software. CoRR abs/2205.03009 (2022) - [i6]Akaki Mamageishvili, Edward W. Felten:
Efficient L2 Batch Posting Strategy on L1. CoRR abs/2212.10337 (2022)
2010 – 2019
- 2019
- [c76]Hooman Mohajeri Moghaddam, Gunes Acar, Ben Burgess, Arunesh Mathur, Danny Yuxing Huang, Nick Feamster, Edward W. Felten, Prateek Mittal, Arvind Narayanan:
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices. CCS 2019: 131-147 - [c75]Edward W. Felten:
When code isn't law: keynote presentation. CSLAW 2019: 1 - 2018
- [j20]Samvit Jain, Edward W. Felten, Steven Goldfeder:
Determining an optimal threshold on the online reserves of a bitcoin exchange. J. Cybersecur. 4(1): tyy003 (2018) - [c74]Harry A. Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, Edward W. Felten:
Arbitrum: Scalable, private smart contracts. USENIX Security Symposium 2018: 1353-1370 - [i5]Sébastien Philippe, Alexander Glaser, Edward W. Felten:
A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification. CoRR abs/1809.04170 (2018) - 2016
- [b2]Arvind Narayanan, Joseph Bonneau, Edward W. Felten, Andrew Miller, Steven Goldfeder:
Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction. Princeton University Press 2016, ISBN 978-0-691-17169-2, pp. I-XXVII, 1-304 - 2015
- [c73]Edward W. Felten:
Keynote Talk. CCS 2015: 3 - [c72]Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IEEE Symposium on Security and Privacy 2015: 104-121 - [c71]Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Edward W. Felten, Michael J. Freedman:
CONIKS: Bringing Key Transparency to End Users. USENIX Security Symposium 2015: 383-398 - [c70]Steven Englehardt, Dillon Reisman, Christian Eubank, Peter Zimmerman, Jonathan R. Mayer, Arvind Narayanan, Edward W. Felten:
Cookies That Give You Away: The Surveillance Implications of Web Tracking. WWW 2015: 289-299 - [i4]Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. IACR Cryptol. ePrint Arch. 2015: 261 (2015) - 2014
- [c69]Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten:
Mixcoin: Anonymity for Bitcoin with Accountable Mixes. Financial Cryptography 2014: 486-504 - [c68]Anne Edmundson, Anna Kornfeld Simpson, Joshua A. Kroll, Edward W. Felten:
Security Audit of Safeplug "Tor in a Box". FOCI 2014 - [i3]Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten:
Mixcoin: Anonymity for Bitcoin with accountable mixes. IACR Cryptol. ePrint Arch. 2014: 77 (2014) - [i2]Marcela S. Melara, Aaron Blankstein, Joseph Bonneau, Michael J. Freedman, Edward W. Felten:
CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication. IACR Cryptol. ePrint Arch. 2014: 1004 (2014) - 2012
- [j19]Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten:
Privacy and Integrity are Possible in the Untrusted Cloud. IEEE Data Eng. Bull. 35(4): 73-82 (2012) - [c67]Ariel J. Feldman, Aaron Blankstein, Michael J. Freedman, Edward W. Felten:
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider. USENIX Security Symposium 2012: 647-662 - [c66]Edward W. Felten:
Toward a healthy wireless privacy ecosystem. WISEC 2012: 1-2 - 2011
- [c65]Joseph A. Calandrino, Ann Kilzer, Arvind Narayanan, Edward W. Felten, Vitaly Shmatikov:
"You Might Also Like: " Privacy Risks of Collaborative Filtering. IEEE Symposium on Security and Privacy 2011: 231-246 - [c64]Joseph A. Calandrino, William Clarkson, Edward W. Felten:
Bubble Trouble: Off-Line De-Anonymization of Bubble Forms. USENIX Security Symposium 2011 - 2010
- [c63]Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, Emmett Witchel:
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs. NDSS 2010 - [c62]Ariel J. Feldman, William P. Zeller, Michael J. Freedman, Edward W. Felten:
SPORC: Group Collaboration using Untrusted Cloud Resources. OSDI 2010: 337-350 - [c61]William P. Zeller, Edward W. Felten:
SVC: Selector-based View Composition for Web Frameworks. WebApps 2010
2000 – 2009
- 2009
- [j18]J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5): 91-98 (2009) - [c60]William Clarkson, Tim Weyrich, Adam Finkelstein, Nadia Heninger, J. Alex Halderman, Edward W. Felten:
Fingerprinting Blank Paper Using Commodity Scanners. SP 2009: 301-314 - [c59]Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, Hovav Shacham:
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage. EVT/WOTE 2009 - [e1]Edward W. Felten, Jana Dittmann, Jessica J. Fridrich, Scott Craver:
Multimedia and Security Workshop, MM&Sec 2009, Princeton, NJ, USA, September 07 - 08, 2009. ACM 2009, ISBN 978-1-60558-492-8 [contents] - 2008
- [c58]Edward W. Felten:
Coping with Outside-the-Box Attacks. CAV 2008: 3-4 - [c57]Joseph A. Calandrino, J. Alex Halderman, Edward W. Felten:
In Defense of Pseudorandom Sample Selection. EVT 2008 - [c56]J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
Lest We Remember: Cold Boot Attacks on Encryption Keys. USENIX Security Symposium 2008: 45-60 - 2007
- [c55]Ariel J. Feldman, J. Alex Halderman, Edward W. Felten:
Security Analysis of the Diebold AccuVote-TS Voting Machine. EVT 2007 - 2006
- [j17]Edward W. Felten, J. Alex Halderman:
Digital Rights Management, Spyware, and Security. IEEE Secur. Priv. 4(1): 18-23 (2006) - [c54]Shirley Gaw, Edward W. Felten, Patricia Fernandez-Kelly:
Secrecy, flagging, and paranoia: adoption criteria in encrypted email. CHI 2006: 591-600 - [c53]Shirley Gaw, Edward W. Felten:
Password management strategies for online accounts. SOUPS 2006: 44-55 - [c52]J. Alex Halderman, Edward W. Felten:
Lessons from the Sony CD DRM Episode. USENIX Security Symposium 2006 - 2005
- [j16]Edward W. Felten:
DRM and public policy. Commun. ACM 48(7): 112 (2005) - [c51]J. Alex Halderman, Brent Waters, Edward W. Felten:
A convenient method for securely managing passwords. WWW 2005: 471-479 - 2004
- [c50]Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten:
New client puzzle outsourcing techniques for DoS resistance. CCS 2004: 246-256 - [c49]J. Alex Halderman, Brent R. Waters, Edward W. Felten:
Privacy management for portable recording devices. WPES 2004: 16-24 - 2003
- [j15]Edward W. Felten:
A skeptical view of DRM and fair use. Commun. ACM 46(4): 56-59 (2003) - [j14]Edward W. Felten:
Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks? IEEE Secur. Priv. 1(3): 60-62 (2003) - [j13]Lujo Bauer, Andrew W. Appel, Edward W. Felten:
Mechanisms for secure modular programming in Java. Softw. Pract. Exp. 33(5): 461-480 (2003) - [c48]Brent R. Waters, Edward W. Felten, Amit Sahai:
Receiver anonymity via incomparable public keys. CCS 2003: 112-121 - [c47]Lujo Bauer, Michael A. Schneider, Edward W. Felten, Andrew W. Appel:
Access Control on the Web Using Proof-carrying Authorization. DISCEX (2) 2003: 117-119 - 2002
- [c46]Matthias Jacob, Dan Boneh, Edward W. Felten:
Attacking an Obfuscated Cipher by Injecting Faults. Digital Rights Management Workshop 2002: 16-31 - [c45]Batya Friedman, W. David Hurley, Daniel C. Howe, Helen Nissenbaum, Edward W. Felten:
Users' conceptions of risks and harms on the web: a comparative study. CHI Extended Abstracts 2002: 614-615 - [c44]Batya Friedman, W. David Hurley, Daniel C. Howe, Edward W. Felten, Helen Nissenbaum:
Users' conceptions of web security: a comparative study. CHI Extended Abstracts 2002: 746-747 - [c43]Batya Friedman, Daniel C. Howe, Edward W. Felten:
Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design. HICSS 2002: 247 - [c42]Lujo Bauer, Michael A. Schneider, Edward W. Felten:
A General and Flexible Access-Control System for the Web. USENIX Security Symposium 2002: 93-108 - 2001
- [c41]Lynette I. Millett, Batya Friedman, Edward W. Felten:
Cookies and web browser design: toward realizing informed consent online. CHI 2001: 46-52 - [c40]Min Wu, Scott Craver, Edward W. Felten, Bede Liu:
Analysis of attacks on SDMI audio watermarks. ICASSP 2001: 1369-1372 - [c39]Scott Craver, Min Wu, Bede Liu, Adam Stubblefield, Ben Swartzlander, Dan S. Wallach, Drew Dean, Edward W. Felten:
Reading Between the Lines: Lessons from the SDMI Challenge. USENIX Security Symposium 2001 - [i1]Helen Nissenbaum, Batya Friedman, Edward W. Felten:
Computer Security: Competing Concepts. CoRR cs.CY/0110001 (2001) - 2000
- [j12]Andrew W. Appel, Edward W. Felten:
Technological access control interferes with noninfringing scholarship. Commun. ACM 43(9): 21-23 (2000) - [j11]John Viega, Tom Mutdosch, Gary McGraw, Edward W. Felten:
Statically Scanning Java Code: Finding Security Vulnerabilities. IEEE Softw. 17(5): 68-77 (2000) - [j10]Dan S. Wallach, Andrew W. Appel, Edward W. Felten:
SAFKASI: a security mechanism for language-based systems. ACM Trans. Softw. Eng. Methodol. 9(4): 341-378 (2000) - [c38]Michael A. Schneider, Edward W. Felten:
Efficient Commerce Protocols based on One-Time Pads. ACSAC 2000: 317- - [c37]Edward W. Felten, Michael A. Schneider:
Timing attacks on Web privacy. CCS 2000: 25-32 - [c36]Edward W. Felten:
Dr. Felton Goes to Washington: A Personal View of the Microsoft Antitrust Case. LISA 2000
1990 – 1999
- 1999
- [c35]Andrew W. Appel, Edward W. Felten:
Proof-Carrying Authentication. CCS 1999: 52-62 - [c34]Dirk Balfanz, Edward W. Felten:
Hand-Held Computers Can Be Better Smart Cards. USENIX Security Symposium 1999 - 1998
- [j9]Gary McGraw, Edward W. Felten:
Mobile Code and Security - Guest Editors' Introduction. IEEE Internet Comput. 2(6): 26-29 (1998) - [c33]Bin Wei, Douglas W. Clark, Edward W. Felten, Kai Li:
Performance Issues of a Distributed Frame Buffer on a Multicomputer. Workshop on Graphics Hardware 1998: 87-96 - [c32]Matthias A. Blumrich, Kai Li, Richard Alpert, Cezary Dubnicki, Edward W. Felten, Jonathan Sandberg:
Retrospective: Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. 25 Years ISCA: Retrospectives and Reprints 1998: 92-94 - [c31]Matthias A. Blumrich, Richard Alpert, Yuqun Chen, Douglas W. Clark, Stefanos N. Damianakis, Cezary Dubnicki, Edward W. Felten, Liviu Iftode, Kai Li, Margaret Martonosi, Robert A. Shillner:
Design Choices in the SHRIMP System: An Empirical Study. ISCA 1998: 330-341 - [c30]Matthias A. Blumrich, Kai Li, Richard Alpert, Cezary Dubnicki, Edward W. Felten, Jonathan Sandberg:
Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. 25 Years ISCA: Retrospectives and Reprints 1998: 473-484 - [c29]Minwen Ji, Edward W. Felten, Kai Li:
Performance Measurements for Multithreaded Programs. SIGMETRICS 1998: 161-170 - [c28]Dan S. Wallach, Edward W. Felten:
Understanding Java Stack Inspection. S&P 1998: 52-63 - 1997
- [b1]Gary McGraw, Edward W. Felten:
Java security - hostile applets, holes and antidotes: what every netscape and internet explorer user needs to know. Wiley 1997, ISBN 978-0-471-17842-2, pp. I-XIV, 1-192 - [j8]Edward W. Felten:
Webware Security. Commun. ACM 40(4): 130 (1997) - [j7]Angelos Bilas, Edward W. Felten:
Fast RPC on the SHRIMP Virtual Memory Mapped Network Interface. J. Parallel Distributed Comput. 40(1): 138-146 (1997) - [j6]Stefanos N. Damianakis, Angelos Bilas, Cezary Dubnicki, Edward W. Felten:
Client-server computing on Shrimp. IEEE Micro 17(1): 8-18 (1997) - [c27]Stefanos N. Damianakis, Cezary Dubnicki, Edward W. Felten:
Stream Sockets on SHRIMP. CANPC 1997: 16-30 - [c26]Stefanos N. Damianakis, Yuqun Chen, Edward W. Felten:
Reducing Waiting Costs in User-Level Communication. IPPS 1997: 381-387 - [c25]Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten:
Extensible Security Architecture for Java. SOSP 1997: 116-128 - 1996
- [j5]Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li:
Implementation and Performance of Integrated Application-Controlled File Caching, Prefetching, and Disk Scheduling. ACM Trans. Comput. Syst. 14(4): 311-343 (1996) - [c24]Dan S. Wallach, Jim A. Roskind, Edward W. Felten:
Flexible, extensible Java security using digital signatures. Network Threats 1996: 59-74 - [c23]Liviu Iftode, Cezary Dubnicki, Edward W. Felten, Kai Li:
Improving Release-Consistent Shared Virtual Memory Using Automatic Update. HPCA 1996: 14-25 - [c22]Matthias A. Blumrich, Cezary Dubnicki, Edward W. Felten, Kai Li:
Protected, User-Level DMA for the SHRIMP Network Interface. HPCA 1996: 154-165 - [c21]Richard Alpert, Cezary Dubnicki, Edward W. Felten, Kai Li:
Design and Implementation of NX Message Passing Using Shrimp Virtual Memory Mapped Communication. ICPP, Vol. 1 1996: 111-119 - [c20]Cezary Dubnicki, Liviu Iftode, Edward W. Felten, Kai Li:
Software Support for Virtual Memory-Mapped Communication. IPPS 1996: 372-281 - [c19]Edward W. Felten, Richard Alpert, Angelos Bilas, Matthias A. Blumrich, Douglas W. Clark, Stefanos N. Damianakis, Cezary Dubnicki, Liviu Iftode, Kai Li:
Early Experience with Message-Passing on the SHRIMP Multicomputer. ISCA 1996: 296-307 - [c18]Tracy Kimbrel, Andrew Tomkins, R. Hugo Patterson, Brian N. Bershad, Pei Cao, Edward W. Felten, Garth A. Gibson, Anna R. Karlin, Kai Li:
A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching. OSDI 1996: 19-34 - [c17]Tracy Kimbrel, Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li:
Integrating Parallel Prefetching and Caching. SIGMETRICS 1996: 262-263 - [c16]Drew Dean, Edward W. Felten, Dan S. Wallach:
Java Security: From HotJava to Netscape and Beyond. S&P 1996: 190-200 - 1995
- [j4]Matthias A. Blumrich, Cezary Dubnicki, Edward W. Felten, Kai Li, Malena R. Mesarina:
Virtual-Memory-Mapped Network Interfaces. IEEE Micro 15(1): 21-28 (1995) - [c15]Gordon Stoll, Bin Wei, Douglas W. Clark, Edward W. Felten, Kai Li, Pat Hanrahan:
Evaluating Multi-Port Frame Buffer Designs for a Mesh-Connected Multicomputer. ISCA 1995: 96-105 - [c14]Bin Wei, Gordon Stoll, Douglas W. Clark, Edward W. Felten, Kai Li, Patrick M. Hanrahan:
Synchronization for a multi-port frame buffer on a mesh-connected multicomputer. PRS 1995: 81-88 - [c13]Pei Cao, Edward W. Felten, Anna R. Karlin, Kai Li:
A Study of Integrated Prefetching and Caching Strategies. SIGMETRICS 1995: 188-197 - 1994
- [c12]Matthias A. Blumrich, Douglas W. Clark, Cezary Dubnicki, Edward W. Felten, Kai Li, Malena R. Mesarina:
Two virtual memory mapped network interface designs. Hot Interconnects 1994: 209-217 - [c11]Matthias A. Blumrich, Kai Li, Richard Alpert, Cezary Dubnicki, Edward W. Felten, Jonathan Sandberg:
Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer. ISCA 1994: 142-153 - [c10]Pei Cao, Edward W. Felten, Kai Li:
Implementation and Performance of Application-Controlled File Caching. OSDI 1994: 165-177 - [c9]Pei Cao, Edward W. Felten, Kai Li:
Application-Controlled File Caching Policies. USENIX Summer 1994: 171-182 - 1992
- [j3]Olivier C. Martin, Steve W. Otto, Edward W. Felten:
Large-step markov chains for the TSP incorporating local search heuristics. Oper. Res. Lett. 11(4): 219-224 (1992) - [c8]Juan Alemany, Edward W. Felten:
Performance Issues in Non-blocking Synchronization on Shared-memory Multiprocessors. PODC 1992: 125-134 - 1991
- [j2]Olivier C. Martin, Steve W. Otto, Edward W. Felten:
Large-Step Markov Chains for the Traveling Salesman Problem. Complex Syst. 5(3) (1991) - 1990
- [j1]Paul Messina, Clive F. Baillie, Edward W. Felten, Paul G. Hipes, Ray Williams, Arnold Alagar, Anke Kamrath, Robert H. Leary, Wayne Pfeiffer, Jack M. Rogers, David W. Walker:
Benchmarking Advanced Architecture Computers. Concurr. Pract. Exp. 2(3): 195-255 (1990)
1980 – 1989
- 1988
- [c7]Edward W. Felten, Steve W. Otto:
Coherent parallel C. C³P 1988: 440-450 - [c6]Edward W. Felten, Steve W. Otto:
A safe vertex. C³P 1988: 560-564 - [c5]Edward W. Felten:
Generalized signals: an interrupt-based communication system for hypercubes. C³P 1988: 563-568 - [c4]Edward W. Felten, Steve W. Otto:
Chess on a hypercube. C³P 1988: 1329-1341 - [c3]Edward W. Felten:
Best-first branch-and bound on a hypercube. C³P 1988: 1500-1504 - [c2]Edward W. Felten, Steve W. Otto:
A Highly Parallel Chess Program. FGCS 1988: 1001-1009 - 1985
- [c1]Edward W. Felten, Steve W. Otto, Scott Karlin:
The Traveling Salesman Problem on a Hypercubic, MIMD Computer. ICPP 1985: 6-10
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint