Class information for:
Level 1: SECURITY PROTOCOLS//CRYPTOGRAPHIC PROTOCOLS//APPLIED PI CALCULUS

Basic class information

Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
12 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE 1181119
449 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//DIGITAL SIGNATURE 26889
483 2             AUTHENTICATION//DIGITAL SIGNATURE//SMART CARD 15986
13692 1                   SECURITY PROTOCOLS//CRYPTOGRAPHIC PROTOCOLS//APPLIED PI CALCULUS 850

Terms with highest relevance score



rank Category termType chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 SECURITY PROTOCOLS authKW 1271878 10% 42% 82
2 CRYPTOGRAPHIC PROTOCOLS authKW 569889 7% 27% 56
3 APPLIED PI CALCULUS authKW 273019 1% 82% 9
4 DOLEV YAO MODEL authKW 227096 1% 88% 7
5 STRAND SPACES authKW 190681 1% 86% 6
6 COMPUTATIONAL SOUNDNESS authKW 185386 1% 100% 5
7 AUTHENTICATION PROTOCOLS authKW 177228 2% 34% 14
8 SECURITY PROTOCOL ANALYSIS authKW 165157 1% 64% 7
9 DOLEV YAO INTRUDER authKW 148309 0% 100% 4
10 SPI CALCULUS authKW 148305 1% 67% 6

Web of Science journal categories



chi_square_rank Category chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 Computer Science, Theory & Methods 40137 59% 0% 504
2 Computer Science, Software Engineering 15758 32% 0% 268
3 Computer Science, Information Systems 8623 27% 0% 226
4 Logic 2594 4% 0% 33
5 Computer Science, Hardware & Architecture 1974 9% 0% 75
6 Computer Science, Artificial Intelligence 1253 11% 0% 90
7 Telecommunications 1005 10% 0% 83
8 Engineering, Electrical & Electronic 185 11% 0% 95
9 Mathematics, Applied 172 7% 0% 59
10 Computer Science, Interdisciplinary Applications 6 1% 0% 12

Address terms



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 LSV 133395 4% 12% 31
2 LOG SECUR 74154 0% 100% 2
3 PROSECCO 74154 0% 100% 2
4 TEAM LILAC 74154 0% 100% 2
5 UMR 8643 68087 2% 14% 13
6 SECSI 66736 0% 60% 3
7 UGBS 66736 0% 60% 3
8 FUTURS PROJET 49435 0% 67% 2
9 LORIA INRIA 49435 0% 67% 2
10 UCL CS 49435 0% 67% 2

Journals



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 LECTURE NOTES IN COMPUTER SCIENCE 42488 37% 0% 318
2 INTERNATIONAL JOURNAL OF INFORMATION SECURITY 34202 2% 5% 17
3 FORMAL ASPECTS OF COMPUTING 15221 2% 3% 13
4 ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY 9599 1% 4% 7
5 JOURNAL OF AUTOMATED REASONING 8775 2% 2% 13
6 INFORMATION AND COMPUTATION 8222 3% 1% 22
7 COMPUTERS & SECURITY 5654 2% 1% 14
8 JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING 5475 1% 2% 7
9 ACM TRANSACTIONS ON COMPUTATIONAL LOGIC 5177 1% 2% 7
10 THEORETICAL COMPUTER SCIENCE 4613 4% 0% 37

Author Key Words



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass LCSH search Wikipedia search
1 SECURITY PROTOCOLS 1271878 10% 42% 82 Search SECURITY+PROTOCOLS Search SECURITY+PROTOCOLS
2 CRYPTOGRAPHIC PROTOCOLS 569889 7% 27% 56 Search CRYPTOGRAPHIC+PROTOCOLS Search CRYPTOGRAPHIC+PROTOCOLS
3 APPLIED PI CALCULUS 273019 1% 82% 9 Search APPLIED+PI+CALCULUS Search APPLIED+PI+CALCULUS
4 DOLEV YAO MODEL 227096 1% 88% 7 Search DOLEV+YAO+MODEL Search DOLEV+YAO+MODEL
5 STRAND SPACES 190681 1% 86% 6 Search STRAND+SPACES Search STRAND+SPACES
6 COMPUTATIONAL SOUNDNESS 185386 1% 100% 5 Search COMPUTATIONAL+SOUNDNESS Search COMPUTATIONAL+SOUNDNESS
7 AUTHENTICATION PROTOCOLS 177228 2% 34% 14 Search AUTHENTICATION+PROTOCOLS Search AUTHENTICATION+PROTOCOLS
8 SECURITY PROTOCOL ANALYSIS 165157 1% 64% 7 Search SECURITY+PROTOCOL+ANALYSIS Search SECURITY+PROTOCOL+ANALYSIS
9 DOLEV YAO INTRUDER 148309 0% 100% 4 Search DOLEV+YAO+INTRUDER Search DOLEV+YAO+INTRUDER
10 SPI CALCULUS 148305 1% 67% 6 Search SPI+CALCULUS Search SPI+CALCULUS

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.

Classes with closest relation at Level 1



rank cluster_id2 link
1 8458 PI CALCULUS//PROCESS CALCULI//SESSION TYPES
2 3347 SMART CARD//PASSWORD//KEY AGREEMENT
3 37694 DISPOSABLE CREDIT CARD NUMBERS//ACADEMICA LIBRARY//ACCOUNT INFORMATION SERVICE
4 6556 ZERO KNOWLEDGE//OBLIVIOUS TRANSFER//JOURNAL OF CRYPTOLOGY
5 27568 HIMALIS//SINGLE SIGN ON//IDENTITY MANAGEMENT
6 25205 RETURN ORIENTED PROGRAMMING//GATE LEVEL INFORMATION FLOW TRACKING//PROBABILISTIC MEMORY SAFETY
7 2696 DIGITAL SIGNATURE//PROXY SIGNATURE//FAIR EXCHANGE
8 28910 AUTHENTICATED DATA STRUCTURES//CHAIR MOBILE COMMERCE MULTILATERAL SECUR//BRIDGE CERTIFICATE AUTHORITY
9 36819 DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL
10 10275 ACCESS CONTROL//RBAC//ROLE BASED ACCESS CONTROL

Go to start page