Study on the Themes Evolution Relation between Sleeping Beauty Papers and the Field Papers: Taking the Field of Information Security Technology as an Example
Wang Haiyan1, Ma Zheng1, Gao Jiping1, Zhai Lihua1, Pan Yuntao1, Wu Yishan2
1. Institute of Scientific and Technical Information of China (ISTIC), Beijing 100038; 2. Chinese Academy of Science and Technology for Development, Beijing 100038
王海燕, 马峥, 高继平, 翟丽华, 潘云涛, 武夷山. “睡美人”论文与领域主题演变关系研究——以信息安全技术领域睡美人论文为例[J]. 情报学报, 2018, 37(10): 989-996.
Wang Haiyan, Ma Zheng, Gao Jiping, Zhai Lihua, Pan Yuntao, Wu Yishan. Study on the Themes Evolution Relation between Sleeping Beauty Papers and the Field Papers: Taking the Field of Information Security Technology as an Example. 情报学报, 2018, 37(10): 989-996.
[1] Garfield E.Premature discover or delayed recognition—Why?[J]. Current Contents, 1980(21): 5-10. [2] 梁立明, 林晓锦, 钟镇, 等. 迟滞承认:科学中的睡美人现象——以一篇被迟滞承认的超弦理论论文为例[J]. 自然辩证法通讯, 2009 ,31(1): 39-45. [3] Levitt J, Thelwall M.Patterns of annual citation of highly citedarticles and the prediction of their citation ranking: A comparison across subjects[J]. Scientometrics, 2008, 77(1): 41-60. [4] Adams J.Early citation counts correlate with accumulated impact[J]. Scientometrics, 2005, 63(3): 567-581. [5] 王海燕, 马峥, 潘云涛, 等. 高被引论文与“睡美人”论文引用曲线及影响因素研究[J]. 图书情报工作, 2015, 59(16): 83-89. [6] 高继平, 潘云涛, 武夷山. 零被引论文的形成因素分析——以光谱学领域零被引论文的国家、机构和主题分布为例[J]. 科技导报, 2015, 33(8): 112-119. [7] 梁兴琦. 电子商务安全保密技术及应用[M]. 合肥: 合肥工业大学出版社, 2006. [8] Lamport L.Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24(11): 770-772. [9] Hwang M S, Li L H.A new remote user authentication scheme using smart cards[J]. IEEE Transactions on Consumer Electronics, 2000, 46(1): 28-30. [10] Chang C C, Wu T C.Remote password authentication with smart cards[J]. IEE Proceedings E (Computers and Digital Techniques), 1993, 138(3): 165-168. [11] Shim K A.Security flaws of remote user access over insecure networks[J]. Computer Communications, 2006, 30(1): l17-121. [12] Kim S K, Chung M G.More secure remote user authentication scheme[J]. Computer Communications, 2009, 32(6): 1018-1021. [13] Munilla J, Peinado A.Security flaws of Hölbl et a1.’s protocol[J]. Computer Communications, 2009, 32(4): 736-739. [14] Hsiang H C, Shih W K.Weakness and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards[J]. Computer Communications, 2009, 32(4): 649-652. [15] 王丽娜. 信息安全导论[M]. 武汉: 武汉大学出版社, 2008: 36-54. [16] Das M L, Saxena A, Gulati V P.A dynamic ID-based remote user authentication scheme[J]. IEEE Transactions on Consumer Electronics, 2004, 50(2): 629-631. [17] Wang Y Y, Liu J Y, Xiao F X, et al.A more efficient and secure dynamic ID-based remote user authentication scheme[J]. Computer Communications, 2009, 32(4): 583-585. [18] Khan M K, Kim S K, Alghathbar K.Cryptanalysis and security enhancement of a ‘more efficient&secure dynaiilic ID-based remote user authentication scheme’[J]. Computer Communications, 2011, 34(3): 305-309. [19] He D B, Chen J H, Zhang R.Weaknesses of a dynamic ID-based remote user authentication scheme[J]. International Journal of Electronic Security and Digital Forensics, 2010, 3(4): 355-362.