| 001 | 993147 | ||
| 005 | 20260129064057.0 | ||
| 024 | 7 | _ | |2 ISSN |a 0926-227X |
| 024 | 7 | _ | |2 ISSN |a 1875-8924 |
| 024 | 7 | _ | |2 SCOPUS |a SCOPUS:2-s2.0-85202702970 |
| 024 | 7 | _ | |2 WOS |a WOS:001316396100002 |
| 024 | 7 | _ | |2 doi |a 10.3233/JCS-230012 |
| 037 | _ | _ | |a RWTH-2024-08639 |
| 041 | _ | _ | |a English |
| 082 | _ | _ | |a 004 |
| 100 | 1 | _ | |0 P:(DE-82)IDM04027 |a Breuer, Malte |b 0 |e Corresponding author |u rwth |
| 245 | _ | _ | |a Prioritization and exchange chains in privacy-preserving kidney exchange |h online, print |
| 260 | _ | _ | |a Amsterdam |b IOS Press |c 2024 |
| 336 | 7 | _ | |0 0 |2 EndNote |a Journal Article |
| 336 | 7 | _ | |0 PUB:(DE-HGF)16 |2 PUB:(DE-HGF) |a Journal Article |b journal |m journal |
| 336 | 7 | _ | |2 BibTeX |a ARTICLE |
| 336 | 7 | _ | |2 DRIVER |a article |
| 336 | 7 | _ | |2 DataCite |a Output Types/Journal article |
| 336 | 7 | _ | |2 ORCID |a JOURNAL_ARTICLE |
| 591 | _ | _ | |a Germany |
| 591 | _ | _ | |a USA |
| 700 | 1 | _ | |0 P:(DE-82)759022 |a Hein, Pascal |b 1 |e Corresponding author |u rwth |
| 700 | 1 | _ | |0 P:(DE-82)853213 |a Pompe, Leonardo |b 2 |e Corresponding author |u rwth |
| 700 | 1 | _ | |0 P:(DE-82)IDM05900 |a Meyer, Ulrike Michaela |b 3 |e Corresponding author |u rwth |
| 700 | 1 | _ | |0 P:(DE-82)124845 |a Wetzel, Susanne |b 4 |e Corresponding author |u rwth |
| 773 | _ | _ | |0 PERI:(DE-600)2069371-0 |a 10.3233/JCS-230012 |n 4 |p 349-404 |t Journal of computer security |v 32 |x 1875-8924 |y 2024 |
| 909 | C | O | |o oai:publications.rwth-aachen.de:993147 |p VDB |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)IDM04027 |a RWTH Aachen |b 0 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)759022 |a RWTH Aachen |b 1 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)853213 |a RWTH Aachen |b 2 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)IDM05900 |a RWTH Aachen |b 3 |k RWTH |
| 910 | 1 | _ | |0 I:(DE-588b)36225-6 |6 P:(DE-82)124845 |a RWTH Aachen |b 4 |k RWTH |
| 914 | 1 | _ | |y 2024 |
| 915 | 1 | _ | |0 StatID:(DE-HGF)0031 |2 StatID |a Peer reviewed article |x 0 |
| 915 | _ | _ | |0 StatID:(DE-HGF)0030 |2 StatID |a Peer Review |b ASC |d 2023-10-24 |
| 915 | _ | _ | |0 StatID:(DE-HGF)0100 |2 StatID |a JCR |b J COMPUT SECUR : 2022 |d 2023-10-24 |
| 915 | _ | _ | |0 StatID:(DE-HGF)0112 |2 StatID |a WoS |b Emerging Sources Citation Index |d 2023-10-24 |
| 915 | _ | _ | |0 StatID:(DE-HGF)0150 |2 StatID |a DBCoverage |b Web of Science Core Collection |d 2023-10-24 |
| 915 | _ | _ | |0 StatID:(DE-HGF)0199 |2 StatID |a DBCoverage |b Clarivate Analytics Master Journal List |d 2023-10-24 |
| 915 | _ | _ | |0 StatID:(DE-HGF)0200 |2 StatID |a DBCoverage |b SCOPUS |d 2023-10-24 |
| 915 | _ | _ | |0 StatID:(DE-HGF)0300 |2 StatID |a DBCoverage |b Medline |d 2023-10-24 |
| 915 | _ | _ | |0 StatID:(DE-HGF)0600 |2 StatID |a DBCoverage |b Ebsco Academic Search |d 2023-10-24 |
| 915 | _ | _ | |0 StatID:(DE-HGF)9900 |2 StatID |a IF < 5 |d 2023-10-24 |
| 920 | 1 | _ | |0 I:(DE-82)123520_20140620 |k 123520 |l Lehr- und Forschungsgebiet IT-Sicherheit |x 0 |
| 920 | 1 | _ | |0 I:(DE-82)120000_20140620 |k 120000 |l Fachgruppe Informatik |x 1 |
| 980 | _ | _ | |a I:(DE-82)120000_20140620 |
| 980 | _ | _ | |a I:(DE-82)123520_20140620 |
| 980 | _ | _ | |a UNRESTRICTED |
| 980 | _ | _ | |a VDB |
| 980 | _ | _ | |a journal |
| Library | Collection | CLSMajor | CLSMinor | Language | Author |
|---|