Class information for:
Level 1: BROADCAST ENCRYPTION//GROUP KEY MANAGEMENT//GROUP KEY AGREEMENT

Basic class information

Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
12 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE 1181119
449 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//DIGITAL SIGNATURE 26889
483 2             AUTHENTICATION//DIGITAL SIGNATURE//SMART CARD 15986
10282 1                   BROADCAST ENCRYPTION//GROUP KEY MANAGEMENT//GROUP KEY AGREEMENT 1107

Terms with highest relevance score



rank Category termType chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 BROADCAST ENCRYPTION authKW 1281302 6% 63% 71
2 GROUP KEY MANAGEMENT authKW 1205706 5% 71% 60
3 GROUP KEY AGREEMENT authKW 1150727 4% 84% 48
4 KEY MANAGEMENT authKW 997435 10% 30% 116
5 SECURE GROUP COMMUNICATION authKW 708751 3% 66% 38
6 USER HIERARCHY authKW 663614 2% 90% 26
7 KEY ASSIGNMENT authKW 602398 2% 92% 23
8 SECURE MULTICAST authKW 576482 2% 75% 27
9 MULTICAST SECURITY authKW 470613 2% 72% 23
10 KEY TREE authKW 455502 1% 100% 16

Web of Science journal categories



chi_square_rank Category chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 Computer Science, Information Systems 30719 44% 0% 482
2 Telecommunications 15849 32% 0% 357
3 Computer Science, Theory & Methods 15580 33% 0% 362
4 Computer Science, Hardware & Architecture 9441 17% 0% 184
5 Computer Science, Software Engineering 3828 14% 0% 154
6 Engineering, Electrical & Electronic 2135 27% 0% 302
7 Mathematics, Applied 272 7% 0% 83
8 Computer Science, Artificial Intelligence 246 5% 0% 50
9 Computer Science, Interdisciplinary Applications 38 2% 0% 25
10 Logic 11 0% 0% 3

Address terms



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 BACKBONE NETWORK TEAM 56938 0% 100% 2
2 MANAGEMENT SCI ENGINEER 51242 0% 60% 3
3 PENINSULA COMP INFORMAT TECHNOL 45545 0% 40% 4
4 INFORMAT MANAGEMENT SECUR CIST 37957 0% 67% 2
5 ADV COMP ALGORITHM CRYPTOG 28469 0% 100% 1
6 ARBEITSGRP QUANTUM COMP PROF BETH 28469 0% 100% 1
7 BROADBAND MULTIMEDIA INTERNET SECUR 28469 0% 100% 1
8 CITYU JOINT 28469 0% 100% 1
9 EAGE COMP INFORMAT ENGN 28469 0% 100% 1
10 ELEC ENG INFO SCI 28469 0% 100% 1

Journals



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 COMPUTERS & SECURITY 35536 4% 3% 40
2 SECURITY AND COMMUNICATION NETWORKS 20816 3% 2% 34
3 LECTURE NOTES IN COMPUTER SCIENCE 14158 19% 0% 211
4 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 9076 1% 3% 10
5 COMPUTER COMMUNICATIONS 7597 3% 1% 35
6 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 6565 1% 2% 11
7 IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES 5265 4% 0% 39
8 IET INFORMATION SECURITY 3916 1% 2% 7
9 COMPUTER STANDARDS & INTERFACES 3716 1% 1% 13
10 COMPUTER SYSTEMS SCIENCE AND ENGINEERING 3687 1% 1% 10

Author Key Words



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass LCSH search Wikipedia search
1 BROADCAST ENCRYPTION 1281302 6% 63% 71 Search BROADCAST+ENCRYPTION Search BROADCAST+ENCRYPTION
2 GROUP KEY MANAGEMENT 1205706 5% 71% 60 Search GROUP+KEY+MANAGEMENT Search GROUP+KEY+MANAGEMENT
3 GROUP KEY AGREEMENT 1150727 4% 84% 48 Search GROUP+KEY+AGREEMENT Search GROUP+KEY+AGREEMENT
4 KEY MANAGEMENT 997435 10% 30% 116 Search KEY+MANAGEMENT Search KEY+MANAGEMENT
5 SECURE GROUP COMMUNICATION 708751 3% 66% 38 Search SECURE+GROUP+COMMUNICATION Search SECURE+GROUP+COMMUNICATION
6 USER HIERARCHY 663614 2% 90% 26 Search USER+HIERARCHY Search USER+HIERARCHY
7 KEY ASSIGNMENT 602398 2% 92% 23 Search KEY+ASSIGNMENT Search KEY+ASSIGNMENT
8 SECURE MULTICAST 576482 2% 75% 27 Search SECURE+MULTICAST Search SECURE+MULTICAST
9 MULTICAST SECURITY 470613 2% 72% 23 Search MULTICAST+SECURITY Search MULTICAST+SECURITY
10 KEY TREE 455502 1% 100% 16 Search KEY+TREE Search KEY+TREE

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.

Classes with closest relation at Level 1



rank cluster_id2 link
1 38147 STREAM AUTHENTICATION//MULTIMEDIA AUTHENTICATION//MULTICAST AUTHENTICATION
2 30107 CONDITIONAL ACCESS SYSTEM//PAY TV//MOBILE PAY TV
3 3347 SMART CARD//PASSWORD//KEY AGREEMENT
4 2873 ATTRIBUTE BASED ENCRYPTION//IDENTITY BASED ENCRYPTION//SIGNCRYPTION
5 18528 TRAITOR TRACING//DIGITAL FINGERPRINTING//FRAMEPROOF CODES
6 8906 KEY PREDISTRIBUTION//KEY MANAGEMENT//WIRELESS SENSOR NETWORKS
7 2696 DIGITAL SIGNATURE//PROXY SIGNATURE//FAIR EXCHANGE
8 12415 WORMHOLE ATTACK//MOBILE AD HOC NETWORKS//SECURE ROUTING
9 28723 SPLITTING AUTHENTICATION CODE//AUTHENTICATION CODE//METERING SCHEME
10 36819 DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL

Go to start page