Class information for:
Level 1: DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL

Basic class information

Bar chart of Publication_year

Last years might be incomplete

Hierarchy of classes

The table includes all classes above and classes immediately below the current class.



Cluster id Level Cluster label #P
12 4 COMPUTER SCIENCE, THEORY & METHODS//COMPUTER SCIENCE, INFORMATION SYSTEMS//COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE 1181119
449 3       CRYPTOGRAPHY//COMPUTER SCIENCE, THEORY & METHODS//DIGITAL SIGNATURE 26889
483 2             AUTHENTICATION//DIGITAL SIGNATURE//SMART CARD 15986
36819 1                   DENIABLE AUTHENTICATION//DENIABLE AUTHENTICATION PROTOCOL//E MAIL PROTOCOL 92

Terms with highest relevance score



rank Category termType chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 DENIABLE AUTHENTICATION authKW 4056827 16% 79% 15
2 DENIABLE AUTHENTICATION PROTOCOL authKW 1370308 4% 100% 4
3 E MAIL PROTOCOL authKW 1027731 3% 100% 3
4 ELGAMAL CRYPTOGRAPHY authKW 1027731 3% 100% 3
5 CONTRACT RBAC authKW 685154 2% 100% 2
6 IMPERSONATE ATTACKS authKW 685154 2% 100% 2
7 NEGOTIATION BASED RBAC authKW 685154 2% 100% 2
8 PIM ATTACK authKW 685154 2% 100% 2
9 PERFECT FORWARD SECRECY authKW 560572 7% 27% 6
10 3D INDOOR LOCATION VIEWER authKW 342577 1% 100% 1

Web of Science journal categories



chi_square_rank Category chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 Computer Science, Information Systems 1231 30% 0% 28
2 Computer Science, Artificial Intelligence 968 27% 0% 25
3 Telecommunications 586 22% 0% 20
4 Computer Science, Software Engineering 383 15% 0% 14
5 Computer Science, Hardware & Architecture 265 10% 0% 9
6 Computer Science, Theory & Methods 192 13% 0% 12
7 Engineering, Electrical & Electronic 24 12% 0% 11
8 Mathematics, Applied 23 8% 0% 7
9 Computer Science, Interdisciplinary Applications 9 3% 0% 3
10 Materials Science, Textiles 8 1% 0% 1

Address terms



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 AUDIO COMP 342577 1% 100% 1
2 AUTO ID S J AN 342577 1% 100% 1
3 INFORMAT SECUR GRP ROYAL HOLLOWAY 342577 1% 100% 1
4 VISUALWARE PLANNING 342577 1% 100% 1
5 MOBILE NETWORK SECUR TECHNOL 261005 4% 19% 4
6 INFO SEC INFORMAT COMMUN SYST SECUR 171288 1% 50% 1
7 COMP NETWORKS INFORMAT SECUR 44555 4% 3% 4
8 KEIO 42820 1% 13% 1
9 LASEC 38062 1% 11% 1
10 MOBILE DISTRIBUTED SYST GRP 38062 1% 11% 1

Journals



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass
1 INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL 53467 22% 1% 20
2 COMPUTER SCIENCE AND INFORMATION SYSTEMS 6075 3% 1% 3
3 COMPUTER GRAPHICS-US 5708 1% 2% 1
4 COMPUTER STANDARDS & INTERFACES 4254 4% 0% 4
5 SCIENCE CHINA-INFORMATION SCIENCES 3034 4% 0% 4
6 FRONTIERS OF COMPUTER SCIENCE IN CHINA 2166 1% 1% 1
7 SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES 1923 2% 0% 2
8 IEEE COMMUNICATIONS LETTERS 1791 7% 0% 6
9 INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES 1782 1% 1% 1
10 ENTOMOLOGICAL RESEARCH 1253 1% 0% 1

Author Key Words



chi_square_rank term chi_square shrOfCwithTerm shrOfTermInClass termInClass LCSH search Wikipedia search
1 DENIABLE AUTHENTICATION 4056827 16% 79% 15 Search DENIABLE+AUTHENTICATION Search DENIABLE+AUTHENTICATION
2 DENIABLE AUTHENTICATION PROTOCOL 1370308 4% 100% 4 Search DENIABLE+AUTHENTICATION+PROTOCOL Search DENIABLE+AUTHENTICATION+PROTOCOL
3 E MAIL PROTOCOL 1027731 3% 100% 3 Search E+MAIL+PROTOCOL Search E+MAIL+PROTOCOL
4 ELGAMAL CRYPTOGRAPHY 1027731 3% 100% 3 Search ELGAMAL+CRYPTOGRAPHY Search ELGAMAL+CRYPTOGRAPHY
5 CONTRACT RBAC 685154 2% 100% 2 Search CONTRACT+RBAC Search CONTRACT+RBAC
6 IMPERSONATE ATTACKS 685154 2% 100% 2 Search IMPERSONATE+ATTACKS Search IMPERSONATE+ATTACKS
7 NEGOTIATION BASED RBAC 685154 2% 100% 2 Search NEGOTIATION+BASED+RBAC Search NEGOTIATION+BASED+RBAC
8 PIM ATTACK 685154 2% 100% 2 Search PIM+ATTACK Search PIM+ATTACK
9 PERFECT FORWARD SECRECY 560572 7% 27% 6 Search PERFECT+FORWARD+SECRECY Search PERFECT+FORWARD+SECRECY
10 3D INDOOR LOCATION VIEWER 342577 1% 100% 1 Search 3D+INDOOR+LOCATION+VIEWER Search 3D+INDOOR+LOCATION+VIEWER

Core articles

The table includes core articles in the class. The following variables is taken into account for the relevance score of an article in a cluster c:
(1) Number of references referring to publications in the class.
(2) Share of total number of active references referring to publications in the class.
(3) Age of the article. New articles get higher score than old articles.
(4) Citation rate, normalized to year.

Classes with closest relation at Level 1



rank cluster_id2 link
1 3347 SMART CARD//PASSWORD//KEY AGREEMENT
2 2696 DIGITAL SIGNATURE//PROXY SIGNATURE//FAIR EXCHANGE
3 37694 DISPOSABLE CREDIT CARD NUMBERS//ACADEMICA LIBRARY//ACCOUNT INFORMATION SERVICE
4 30107 CONDITIONAL ACCESS SYSTEM//PAY TV//MOBILE PAY TV
5 35437 DRUG DOCKING//HOPFIELD STYLE NETWORK//AUTOMAT CAD
6 36764 CIEMCIES MATEMAT INFORMAT//CONSERVATION OF MONEY//E COMMERCE TRANSACTIONS PROCESSING
7 28541 TRAFFIC SIGN RECOGNITION//TRAFFIC SIGN DETECTION//ROAD SIGN RECOGNITION
8 31069 INERTIA PARAMETERS//INERTIA PROPERTIES//CRUSH MEASUREMENT
9 31528 CRYPTOG COGNIT INFORMAT GRP//COGNITIVE INFORMATION SYSTEMS//SYNTACTIC PATTERN RECOGNITION
10 22496 AMBIENT MEDIA//PUBLIC DISPLAYS//DEVICE PAIRING

Go to start page