default search action
Günter Müller
Person information
- affiliation: University of Freiburg, Institute of Computer Science and Social Studies
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j51]Nadine Rückeshäuser, Christian Brenig, Günter Müller:
Blockchains als Grundlage digitaler Geschäftsmodelle. Datenschutz und Datensicherheit 41(8): 492-496 (2017) - [j50]Johann Betz, Dirk Westhoff, Günter Müller:
Survey on covert channels in virtual machines and cloud computing. Trans. Emerg. Telecommun. Technol. 28(6) (2017) - [j49]Julius Holderer, Josep Carmona, Farbod Taymouri, Günter Müller:
Log- and Model-Based Techniques for Security-Sensitive Tackling of Obstructed Workflow Executions. Trans. Petri Nets Other Model. Concurr. 12: 43-69 (2017) - 2016
- [c41]Julius Holderer, Josep Carmona, Günter Müller:
Security-Sensitive Tackling of Obstructed Workow Executions. ATAED@Petri Nets/ACSD 2016: 126-137 - [c40]Johana Cabinakova, Christian Zimmermann, Günter Müller:
An Empirical Analysis of Privacy Dashboard Acceptance: the Google Case. ECIS 2016: Research Paper 114 - [c39]Günter Müller, Stefan Sackmann, Richard M. Zahoransky:
Vorwort. MKWI 2016: 1339 - 2015
- [j48]Torsten Eymann, Christine Legner, Manfred Prenzel, Helmut Krcmar, Günter Müller, Peter Liggesmeyer:
Addressing Grand Challenges - Implications for BISE Research. Bus. Inf. Syst. Eng. 57(6): 409-416 (2015) - [c38]Markus Karwe, Günter Müller:
DPIP: A Demand Response Privacy Preserving Interaction Protocol - For Trusted Third Party Involvement. BIS (Workshops) 2015: 224-234 - [c37]Christian Brenig, Rafael Accorsi, Günter Müller:
Economic Analysis of Cryptocurrency Backed Money Laundering. ECIS 2015 - [c36]Julius Holderer, Rafael Accorsi, Günter Müller:
When four-eyes become too much: a survey on the interplay of authorization constraints and workflow resilience. SAC 2015: 1245-1248 - 2014
- [c35]Günter Müller:
Datenschutz: Ein Auslaufmodell? STeP 2014: 3 - [c34]Christian Zimmermann, Rafael Accorsi, Günter Müller:
Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy. ARES 2014: 152-157 - [c33]Günter Müller, Torsten Eymann, Frank Böhr:
Vorwort. MKWI 2014: 1887 - 2013
- [j47]Markus Karwe, Günter Müller:
Transaktionspseudonymität für Demand-Response-Anwendungen. HMD Prax. Wirtsch. 291: 52-59 (2013) - [j46]Günter Müller, Wolfgang Wahlster:
Placing Humans in the Feedback Loop of Social Infrastructures - NII Research Strategies on Cyber-Physical Systems. Inform. Spektrum 36(6): 520-529 (2013) - [j45]Frank Böhr, Linh Thao Ly, Günter Müller:
Business Process Security Analysis - Design Time, Run Time, Audit Time. it Inf. Technol. 55(6): 217-224 (2013) - [c32]Günter Müller, Rafael Accorsi:
Why Are Business Processes Not Secure? Number Theory and Cryptography 2013: 240-254 - [c31]Günter Müller, Thomas G. Koslowski, Rafael Accorsi:
Resilience - A New Research Field in Business Information Systems? BIS (Workshops) 2013: 3-14 - [c30]Rafael Accorsi, Thomas Stocker, Günter Müller:
On the exploitation of process mining for security audits: the process discovery case. SAC 2013: 1462-1468 - [c29]Rafael Accorsi, Günter Müller:
Preventive Inference Control in Data-centric Business Models. IEEE Symposium on Security and Privacy Workshops 2013: 28-33 - [i5]Isao Echizen, Günter Müller, Ryôichi Sasaki, A Min Tjoa:
Privacy by Transparency for Data-Centric Services (NII Shonan Meeting 2013-5). NII Shonan Meet. Rep. 2013 (2013) - 2012
- [j44]Hans Ulrich Buhl, Gilbert Fridgen, Günter Müller, Maximilian Röglinger:
On Dinosaurs, Measurement Ideologists, Separatists, and Happy Souls - Proposing and Justifying a Way to Make the Global IS/BISE Community Happy. Bus. Inf. Syst. Eng. 4(6): 307-315 (2012) - [j43]Hans Ulrich Buhl, Günter Müller, Gilbert Fridgen, Maximilian Röglinger:
Business and Information Systems Engineering: A Complementary Approach to Information Systems - What We Can Learn from the Past and May Conclude from Present Reflection on the Future. J. Assoc. Inf. Syst. 13(4): 3 (2012) - [j42]Hans Ulrich Buhl, Gilbert Fridgen, Günter Müller, Maximilian Röglinger:
Von Dinosauriern, Tonnenideologen, Separatisten und glücklichen Seelen - Vorschlag und Begründung eines Wegs, um die weltweite IS/WI-Community glücklich zu machen. Wirtschaftsinf. 54(6): 293-302 (2012) - [c28]Christian Flender, Günter Müller:
Type Indeterminacy in Privacy Decisions: The Privacy Paradox Revisited. QI 2012: 148-159 - 2011
- [j41]Günter Müller, Noboru Sonehara, Isao Echizen, Sven Wohlgemuth:
Sustainable Cloud Computing. Bus. Inf. Syst. Eng. 3(3): 129-131 (2011) - [j40]Hans Ulrich Buhl, Robert Winter, Günter Müller, Martin Bichler, Armin Heinzl:
BISE - Call for Papers - BISE Workshop Within the MKWI 2012. Bus. Inf. Syst. Eng. 3(4): 253 (2011) - [j39]Sebastian Haas, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
Aspects of privacy for electronic health records. Int. J. Medical Informatics 80(2): e26-e31 (2011) - [j38]Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking. J. Inf. Hiding Multim. Signal Process. 2(3): 270-281 (2011) - [j37]Günter Müller, Noboru Sonehara, Isao Echizen, Sven Wohlgemuth:
Nachhaltiges Computing in Clouds. Wirtschaftsinf. 53(3): 123-125 (2011) - [j36]Hans Ulrich Buhl, Robert Winter, Günter Müller, Martin Bichler, Armin Heinzl:
WI - Call for Papers - BISE-Workshop im Rahmen der MKWI 2012. Wirtschaftsinf. 53(4): 249 (2011) - [j35]Günter Müller, Arnt Syirng, Holger Eggs, Stefan Wenzel:
Risikomanagement und Vertrauensbildung im Cloud Computing. Wirtschaftsinformatik Manag. 3(5): 66-73 (2011) - [c27]Axel Schröpfer, Florian Kerschbaum, Günter Müller:
L1 - An Intermediate Language for Mixed-Protocol Secure Computation. COMPSAC 2011: 298-307 - 2010
- [j34]Hans Ulrich Buhl, Günter Müller:
The "Transparent Citizen" in Web 2.0 - Challenges of the "Virtual Striptease". Bus. Inf. Syst. Eng. 2(4): 203-206 (2010) - [j33]Günter Müller, Rafael Accorsi, Sebastian Höhn, Stefan Sackmann:
Sichere Nutzungskontrolle für mehr Transparenz in Finanzmärkten. Inform. Spektrum 33(1): 3-13 (2010) - [j32]Sven Wohlgemuth, Isao Echizen, Günter Müller, Noboru Sonehara:
Privacy-compliant Disclosure of Personal Data to Third Parties (Schutz der Privatsphäre bei der Weitergabe persönlicher Daten an Dritte). it Inf. Technol. 52(6): 350-355 (2010) - [j31]Hans Ulrich Buhl, Günter Müller:
Der "gläserne Bürger" im Web 2.0 - Herausforderungen des "virtuellen Striptease". Wirtschaftsinf. 52(4): 193-197 (2010) - [c26]Jérémie Tharaud, Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller, Pascal Lafourcade:
Privacy by Data Provenance with Digital Watermarking - A Proof-of-Concept Implementation for Medical Services with Electronic Health Records. IIH-MSP 2010: 510-513 - [c25]Günter Müller, Dennis Kundisch, Stefan Sackmann, Frank Romeike:
Vorwort. MKWI 2010: 2123-2124 - [c24]Sebastian Haas, Ralph Herkenhöner, Denis Royer, Ammar Alkassar, Hermann de Meer, Günter Müller:
Supporting Semi-automated Compliance Control by a System Design Based on the Concept of Separation of Concerns. PrimeLife 2010: 120-129 - [c23]Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
Tagging Disclosures of Personal Data to Third Parties to Preserve Privacy. SEC 2010: 241-252 - [i4]Rafael Accorsi, Günter Müller:
FORTES: Forensic Information Flow Analysis of Business Processes. Distributed Usage Control 2010 - [i3]Axel Schröpfer, Florian Kerschbaum, Günter Müller:
L1 - An Intermediate Language for Mixed-Protocol Secure Computation. IACR Cryptol. ePrint Arch. 2010: 578 (2010)
2000 – 2009
- 2009
- [j30]Günter Müller:
Was the Internet the Only Option? Which Way Should Business and Information Systems Engineering Go? Bus. Inf. Syst. Eng. 1(1): 46-52 (2009) - [j29]Frank Land, Claudia Loebbecke, Albert A. Angehrn, Eric K. Clemons, Alan R. Hevner, Günter Müller:
ICIS 2008 Panel Report: Design Science in Information Systems: Hegemony, Bandwagon, or New Wave? Commun. Assoc. Inf. Syst. 24: 29 (2009) - [j28]Günter Müller:
War Internet die einzige Option? Welchen Weg soll die Wirtschaftsinformatik gehen? Wirtschaftsinf. 51(1): 53-60 (2009) - [c22]Sven Wohlgemuth, Günter Müller, Noboru Sonehara, Isao Echizen:
On Observable Delegation of Personal Data by Watermarking. CCNC 2009: 1-5 - [c21]Claus Wonnemann, Rafael Accorsi, Günter Müller:
On Information Flow Forensics in Business Application Scenarios. COMPSAC (2) 2009: 324-328 - [c20]Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
On Privacy in Business Processes - Observing Delegation of Personal Data by using Digital Watermarking. ICE-B 2009: 27-32 - [c19]Sven Wohlgemuth, Isao Echizen, Noboru Sonehara, Günter Müller:
On Privacy-aware Delegation of Personal Data using Digital Watermarking. IIH-MSP 2009: 56-59 - 2008
- [j27]Günter Müller:
WI - Für Sie gelesen. Wirtschaftsinf. 50(2): 133-135 (2008) - [j26]Günter Müller:
WI - Für Sie gelesen. Wirtschaftsinf. 50(4): 322-323 (2008) - [j25]Günter Müller, Orestis Terzidis:
IT-Compliance und IT-Governance. Wirtschaftsinf. 50(5): 341-343 (2008) - [j24]Günter Müller:
WI - Für Sie gelesen. Wirtschaftsinf. 50(6): 508-509 (2008) - [c18]Frank Land, Claudia Loebbecke, Albert A. Angehrn, Eric K. Clemons, Alan R. Hevner, Günter Müller:
Design Science in Information Systems: Hegemony, Bandwagon, or New Wave? ICIS 2008: 1 - [c17]Günter Müller, Wolfgang König:
Vorwort: IT-Risikomangement: IT-Projekte und IT-Compliance. Multikonferenz Wirtschaftsinformatik 2008 - [c16]Jens Strüker, Rafael Accorsi, Günter Müller:
On Providing One-to-One Marketing with Customers' Privacy in Stationary Retail. CEC/EEE 2008: 44-49 - [c15]Martin Kähmer, Maike Gilliot, Günter Müller:
Automating Privacy Compliance with ExPDT. CEC/EEE 2008: 87-94 - [e7]Ran Canetti, Shafi Goldwasser, Günter Müller, Rainer Steinwandt:
Theoretical Foundations of Practical Information Security, 30.11. - 05.12.2008. Dagstuhl Seminar Proceedings 08491, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2008 [contents] - [i2]Ran Canetti, Shafi Goldwasser, Günter Müller, Rainer Steinwandt:
08491 Abstracts Collection - Theoretical Foundations of Practical Information Security. Theoretical Foundations of Practical Information Security 2008 - [i1]Ran Canetti, Shafi Goldwasser, Günter Müller, Rainer Steinwandt:
08491 Executive Summary - Theoretical Foundations of Practical Information Security. Theoretical Foundations of Practical Information Security 2008 - 2007
- [j23]Günter Müller, Stefan Sackmann, Oliver Günther, Sarah Spiekermann:
Personalisierung und informationelle Selbstbestimmung Ein unauflösbarer Widerspruch? Wirtschaftsinf. 49(1): 1-2 (2007) - [j22]Daniel Weiß, Jörn Kaack, Stefan Kirn, Maike Gilliot, Lutz Lowis, Günter Müller, Andrea Herrmann, Carsten Binnig, Timea Illes, Barbara Paech, Donald Kossmann:
Die SIKOSA-Methodik. Wirtschaftsinf. 49(3): 188-198 (2007) - [c14]Günter Müller:
Enforceable Privacy Promises. CEC/EEE 2007: 6 - 2006
- [j21]Günter Müller:
Introduction. Commun. ACM 49(9): 28-31 (2006) - [j20]Günter Müller:
Grid allein oder Vertrauen in Fremde wird teuer. Wirtschaftsinf. 48(1): 74-75 (2006) - [j19]Günter Müller:
Budgeting process for information security expenditures. Wirtschaftsinf. 48(4): 286-288 (2006) - [c13]Sven Wohlgemuth, Günter Müller:
Privacy with Delegation of Rights by Identity Management. ETRICS 2006: 175-190 - [p4]Torsten Eymann, Günter Müller, Moritz Strasser:
Self-Organized Scheduling in Hospitals by Connecting Agents and Mobile Devices. Multiagent Engineering 2006: 319-337 - [e6]Günter Müller:
Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings. Lecture Notes in Computer Science 3995, Springer 2006, ISBN 3-540-34640-6 [contents] - 2005
- [j18]Günter Müller:
Die FG - Berichte aus den Instituten. Prax. Inf.verarb. Kommun. 28(1): 60-61 (2005) - [j17]Günter Müller:
Success factors and impacts of mobile business applications: Results from a mobile e-procurement study. Wirtschaftsinf. 47(4): 298-299 (2005) - 2004
- [c12]Günter Müller, Torsten Eymann, Norbert Nopper, Sven Seuken:
EMIKA system: architecture and prototypic realization. SMC (6) 2004: 5621-5626 - [c11]Jens Strüker, Stefan Sackmann, Günter Müller:
Case Study on Retail Customer Communication Applying Ubiquitous Computing. CEC 2004: 42-48 - [e5]Dieter Hutter, Günter Müller, Werner Stephan, Markus Ullmann:
Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers. Lecture Notes in Computer Science 2802, Springer 2004, ISBN 3-540-20887-9 [contents] - 2003
- [j16]Sven Wohlgemuth, Daniela Gerd tom Markotten, Uwe Jendricke, Günter Müller:
DFG-Schwerpunktprogramm "Sicherheit in der Informations- und Kommunikationstechnik". it Inf. Technol. 45(1): 46-54 (2003) - [j15]Günter Müller, Claudia Eckert:
Sicherheit an der Schnittstelle zum Nutzer. Prax. Inf.verarb. Kommun. 26(1): 2-4 (2003) - [j14]Daniela Gerd tom Markotten, Sven Wohlgemuth, Günter Müller:
Mit Sicherheit zukunftsfähig. DFG-Schwerpunktprogramm "Sicherheit in der Informations-und Kommunikationstechnik". Prax. Inf.verarb. Kommun. 26(1): 5-14 (2003) - [j13]Torsten Eymann, Stefan Sackmann, Günter Müller:
Hayeks Katallaxie - Ein zukunftsweisendes Konzept für die Wirtschaftsinformatik? Wirtschaftsinf. 45(5): 491-496 (2003) - [c10]Torsten Eymann, Stefan Sackmann, Günter Müller, Ingo Pippow:
Hayek's Catallaxy: A Forward-Looking Concept for Information Systems? AMCIS 2003: 234 - [c9]Günter Müller, Sven Wohlgemuth:
Sichere IT-Systeme. GI Jahrestagung (1) 2003: 87-90 - [c8]Alf Zugenmaier, Michael Kreutzer, Günter Müller:
The Freiburg Privacy Diamond: An Attacker Model for a Mobile Computing Environment. KiVS Kurzbeiträge 2003: 131-141 - 2002
- [c7]Stefan Sackmann, Torsten Eymann, Günter Müller:
EMIKA - Real-Time Controlled Mobile Information Systems in Health Care Applications. Mobile Computing in Medicine 2002: 151-158 - [p3]Holger Eggs, Stefan Sackmann, Torsten Eymann, Günter Müller:
Vertrauen und Reputation in P2P-Netzwerken. Peer-to-Peer: Ökonomische, technische und juristische Perspektiven 2002: 229-254 - 2001
- [j12]Günter Müller, Michael Kreutzer:
Erst die neue Technologie, danach die Sicherheit! Informationstechnik Tech. Inform. 43(5): 225-226 (2001) - [c6]Torsten Eymann, Günter Müller:
Decentralized Electronic Markets - Economic Coordination of Multi-Agent Systems. GI Jahrestagung (2) 2001: 981-990 - [p2]Günter Müller:
Security in E-Commerce. Lectures in E-Commerce 2001: 149-162 - 2000
- [j11]Gerti Kappel, Günter Müller, Franz Schober:
Themenheft: Electronic Commerce - Editorial. Inform. Forsch. Entwickl. 15(4): 181 (2000) - [j10]Günter Müller, Daniela Gerd tom Markotten:
Sicherheit in der Kommunikations- und Informationstechnik. Wirtschaftsinf. 42(6): 487-488 (2000) - [j9]Günter Müller, Kevin S. McCurley:
Interview. Wirtschaftsinf. 42(6): 547-549 (2000)
1990 – 1999
- 1999
- [j8]Günter Müller, Kai Rannenberg:
Sicherheit in der Informations- und Kommunikationstechnik - Ein neues DFG-Schwerpunktprogramm. Inform. Forsch. Entwickl. 14(1): 46-48 (1999) - [j7]Detlef Schoder, Günter Müller:
Potentiale und Hürden des Electronic Commerce: Eine Momentaufnahme. Inform. Spektrum 22(4): 252-260 (1999) - [j6]S. Gold, Dirk O. Keck, Paul J. Kühn, Günter Müller:
Sichere Telekommunikationsdienste mit intelligenten Netzen. Prax. Inf.verarb. Kommun. 22(2): 71-76 (1999) - [j5]Günter Müller, Kai Rannenberg:
Sicherheit, auch das noch!?! Prax. Inf.verarb. Kommun. 22(3): 138-139 (1999) - [j4]Günter Müller:
Vernetzte kleine und mittlere Unternhemen. Wirtschaftsinf. 41(4): 305-306 (1999) - 1997
- [c5]Detlef Schoder, Thomas Hummel, Günter Müller:
Interdisziplinäre Modelle für Entwurf und Einsatz telematischer Systeme: Grundsätzliche Probleme diskutiert am Beispiel des "Freiburger Schichtenmodells der Telematik". GI Jahrestagung 1997: 277-286 - [e4]Günter Müller, Kai Rannenberg, Manfred Reitenspieß, Helmut Stiegler:
Verläßliche IT-Systeme - Zwischen Key Escrow und elektronischem Geld. DuD-Fachbeiträge, Vieweg+Teubner Verlag 1997, ISBN 978-3-528-05594-3 [contents] - 1996
- [j3]Günter Müller, Herbert Bunz:
Sicherheit in der Kommunikationstechnik. Informationstechnik Tech. Inform. 38(4): 5-6 (1996) - [j2]Kai Rannenberg, Andreas Pfitzmann, Günter Müller:
Sicherheit, insbesondere mehrseitige IT-Sicherheit. Informationstechnik Tech. Inform. 38(4): 7-10 (1996) - [j1]Günter Müller, Frank Stoll:
Der Freiburger Kommunikationsassistent. Prax. Inf.verarb. Kommun. 19(4): 189-197 (1996) - [c4]Ralf E. Strauss, Detlef Schoder, Günter Müller:
Wired cities - opportunities for small and medium sized cities on the information highway. IFIP World Conference on IT Tools 1996: 3-10 - 1992
- [c3]Günter Müller:
Einführung. Informatik cui bono? 1992: 144 - [e3]Werner Langenheder, Günter Müller, Britta Schinzel:
Informatik cui bono? GI-FB 8 Fachtagung, Freiburg, 23.-26. September 1992, Proceedings. Informatik Aktuell, Springer 1992, ISBN 3-540-55957-4 [contents] - 1991
- [c2]Günter Müller:
Current Trends in Distributed Systems. New Results and New Trends in Computer Science 1991: 204-224 - [e2]Wolfgang Effelsberg, Hans Werner Meuer, Günter Müller:
Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb, GI/ITG-Fachtagung, Mannheim, 20.-22. Februar 1991, Proceedings. Informatik-Fachberichte 267, Springer 1991, ISBN 3-540-53721-X [contents]
1980 – 1989
- 1987
- [p1]Albrecht Blaser, Matthias Jarke, Hein Lehmann, Günter Müller:
Datenbanksprachen und Datenbankbenutzung. Datenbankhandbuch 1987: 559-635 - [e1]Günter Müller, Robert P. Blanc:
Networking in Open Systems, International Seminar, Oberlech, Austria, August 18-22, 1986, Proceedings. Lecture Notes in Computer Science 248, Springer 1987, ISBN 3-540-17707-8 [contents] - 1986
- [b1]Günter Müller:
Projektierungsstrategie für Mikrorechner-Automatisierungsanlagen. Otto-von-Guericke University Magdeburg, Germany, 1986 - [c1]Günter Müller:
ENC - IBM European Networking Center. Networking in Open Systems 1986: 437-440
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint