|
|
Study on the Themes Evolution Relation between Sleeping Beauty Papers and the Field Papers: Taking the Field of Information Security Technology as an Example |
Wang Haiyan1, Ma Zheng1, Gao Jiping1, Zhai Lihua1, Pan Yuntao1, Wu Yishan2 |
1. Institute of Scientific and Technical Information of China (ISTIC), Beijing 100038; 2. Chinese Academy of Science and Technology for Development, Beijing 100038 |
|
|
Abstract Using the field of information security technology as an example the Themes distribution, the occurrence time, and research content of 14265 field papers (“Sleeping Beauty”, uncited, and highly cited papers) published between 1995 and 2004 were studied. The research shows that the distribution of themes of the Sleeping Beauty papers in the field of information security technology is different from that of the other two kinds of literature, and the occurrence time is earlier than that of the same theme time. Regarding advanced content, the research content of Sleeping Beauty theses is earlier than the other two types of paper with the same theme.
|
Received: 04 December 2017
|
|
|
|
[1] Garfield E.Premature discover or delayed recognition—Why?[J]. Current Contents, 1980(21): 5-10. [2] 梁立明, 林晓锦, 钟镇, 等. 迟滞承认:科学中的睡美人现象——以一篇被迟滞承认的超弦理论论文为例[J]. 自然辩证法通讯, 2009 ,31(1): 39-45. [3] Levitt J, Thelwall M.Patterns of annual citation of highly citedarticles and the prediction of their citation ranking: A comparison across subjects[J]. Scientometrics, 2008, 77(1): 41-60. [4] Adams J.Early citation counts correlate with accumulated impact[J]. Scientometrics, 2005, 63(3): 567-581. [5] 王海燕, 马峥, 潘云涛, 等. 高被引论文与“睡美人”论文引用曲线及影响因素研究[J]. 图书情报工作, 2015, 59(16): 83-89. [6] 高继平, 潘云涛, 武夷山. 零被引论文的形成因素分析——以光谱学领域零被引论文的国家、机构和主题分布为例[J]. 科技导报, 2015, 33(8): 112-119. [7] 梁兴琦. 电子商务安全保密技术及应用[M]. 合肥: 合肥工业大学出版社, 2006. [8] Lamport L.Password authentication with insecure communication[J]. Communications of the ACM, 1981, 24(11): 770-772. [9] Hwang M S, Li L H.A new remote user authentication scheme using smart cards[J]. IEEE Transactions on Consumer Electronics, 2000, 46(1): 28-30. [10] Chang C C, Wu T C.Remote password authentication with smart cards[J]. IEE Proceedings E (Computers and Digital Techniques), 1993, 138(3): 165-168. [11] Shim K A.Security flaws of remote user access over insecure networks[J]. Computer Communications, 2006, 30(1): l17-121. [12] Kim S K, Chung M G.More secure remote user authentication scheme[J]. Computer Communications, 2009, 32(6): 1018-1021. [13] Munilla J, Peinado A.Security flaws of Hölbl et a1.’s protocol[J]. Computer Communications, 2009, 32(4): 736-739. [14] Hsiang H C, Shih W K.Weakness and improvements of the Yoon-Ryu-Yoo remote user authentication scheme using smart cards[J]. Computer Communications, 2009, 32(4): 649-652. [15] 王丽娜. 信息安全导论[M]. 武汉: 武汉大学出版社, 2008: 36-54. [16] Das M L, Saxena A, Gulati V P.A dynamic ID-based remote user authentication scheme[J]. IEEE Transactions on Consumer Electronics, 2004, 50(2): 629-631. [17] Wang Y Y, Liu J Y, Xiao F X, et al.A more efficient and secure dynamic ID-based remote user authentication scheme[J]. Computer Communications, 2009, 32(4): 583-585. [18] Khan M K, Kim S K, Alghathbar K.Cryptanalysis and security enhancement of a ‘more efficient&secure dynaiilic ID-based remote user authentication scheme’[J]. Computer Communications, 2011, 34(3): 305-309. [19] He D B, Chen J H, Zhang R.Weaknesses of a dynamic ID-based remote user authentication scheme[J]. International Journal of Electronic Security and Digital Forensics, 2010, 3(4): 355-362. |
|
|
|