Only Research
My ListExploreExplore NetworksChangelogAbout
Data from OpenAlex (240M+ academic works, CC0 license). Not affiliated with any university.
Filters

Country

All countriesUnited StatesUnited KingdomCanadaGermanyChinaJapanAustraliaFranceNetherlandsSwitzerlandIndiaSouth KoreaSwedenSingaporeIsraelBrazilItalySpainDenmarkNorwayFinlandAustriaBelgiumIrelandNew ZealandHong KongTaiwanPortugalCzech RepublicPolandMexicoArgentinaTurkeySouth AfricaRussiaChileColombiaThailandMalaysiaSaudi ArabiaEgyptPakistanNigeriaGreeceHungaryRomaniaCroatia

Citations

Any100+1k+5k+10k+50k+

Sort

RelevanceMost citedMost works

Country

All countriesUnited StatesUnited KingdomCanadaGermanyChinaJapanAustraliaFranceNetherlandsSwitzerlandIndiaSouth KoreaSweden
Singapore
Israel
Brazil
Italy
Spain
Denmark
Norway
Finland
Austria
Belgium
Ireland
New Zealand
Hong Kong
Taiwan
Portugal
Czech Republic
Poland
Mexico
Argentina
Turkey
South Africa
Russia
Chile
Colombia
Thailand
Malaysia
Saudi Arabia
Egypt
Pakistan
Nigeria
Greece
Hungary
Romania
Croatia

Citations

Any100+1k+5k+10k+50k+

Sort

RelevanceMost citedMost works

Professors in Advanced Authentication Protocols Security

5.3k

Neeraj KumarActive

Siddhartha Medical College — India · Computer Science

h 12963.5kcited1.5kworks

IoT and Edge/Fog Computing, Blockchain Technology Applications and Security, Vehicular Ad Hoc Networks (VANETs), Advanced Authentication Protocols Security, Cryptography and Data Security

Martı́n AbadiActive

Health Information Management — Belgium · Computer Science

h 7653.6kcited285works

Logic, programming, and type systems, Security and Verification in Computing, Advanced Authentication Protocols Security, Cryptography and Data Security, Distributed systems and fault tolerance

Donghoon LeeActive

Allen Institute for Brain Science — United States · Computer Science

h 4942.3kcited275works

Advanced Authentication Protocols Security, Genomics and Chromatin Dynamics, RNA modifications and cancer, Cancer Genomics and Diagnostics, Single-cell and spatial transcriptomics

Ran CanettiActive

Boston University — United States · Computer Science

h 8134.3kcited328works

Cryptography and Data Security, Advanced Authentication Protocols Security, Cryptographic Implementations and Security, Complexity and Algorithms in Graphs, User Authentication and Security Systems

Muhammad Khurram KhanActive

West Virginia University — United States · Computer Science

h 9331.4kcited976works

User Authentication and Security Systems, Advanced Authentication Protocols Security, Cryptography and Data Security, Biometric Identification and Security, Microgrid Control and Optimization

Phillip RogawayActive

University of California, Davis — United States · Computer Science

h 7127.8kcited159works

Cryptographic Implementations and Security, Cryptography and Data Security, Chaos-based Image/Signal Encryption, Coding theory and cryptography, Advanced Authentication Protocols Security

Ashok Kumar DasActive

University of Calcutta — India · Computer Science

h 9025.0kcited576works

Advanced Authentication Protocols Security, User Authentication and Security Systems, Cryptography and Data Security, Blockchain Technology Applications and Security, Security in Wireless Sensor Networks

John C. MitchellActive

The University of Texas MD Anderson Cancer Center — United States · Computer Science

h 8624.3kcited494works

Logic, programming, and type systems, Security and Verification in Computing, Advanced Authentication Protocols Security, User Authentication and Security Systems, Cryptography and Data Security

Robert H. DengActive

Central South University — China · Computer Science

h 8024.2kcited859works

Cryptography and Data Security, Privacy-Preserving Technologies in Data, Cloud Data Security Solutions, Complexity and Algorithms in Graphs, Advanced Authentication Protocols Security

Debiao HeActive

Qilu University of Technology — China · Computer Science

h 7523.3kcited526works

Cryptography and Data Security, Advanced Authentication Protocols Security, Privacy-Preserving Technologies in Data, Blockchain Technology Applications and Security, User Authentication and Security Systems

Ross AndersonActive

University of Cambridge — United Kingdom · Computer Science

h 6422.3kcited298works

Cryptographic Implementations and Security, User Authentication and Security Systems, Advanced Authentication Protocols Security, Advanced Malware Detection Techniques, Information and Cyber Security

Hugo KrawczykActive

Amazon (United States) — United States · Computer Science

h 6522.1kcited184works

Cryptography and Data Security, Advanced Authentication Protocols Security, Cryptographic Implementations and Security, User Authentication and Security Systems, Chaos-based Image/Signal Encryption

Mohammad S. ObaidatActive

Universidad de Valladolid — Spain · Computer Science

h 7121.9kcited1.2kworks

Mobile Ad Hoc Networks, Energy Efficient Wireless Sensor Networks, IoT and Edge/Fog Computing, Advanced Authentication Protocols Security, User Authentication and Security Systems

Whitfield DiffieActive

University of Cambridge — United Kingdom · Computer Science

h 2319.1kcited69works

Chaos-based Image/Signal Encryption, Cryptography and Data Security, Intelligence, Security, War Strategy, Cryptographic Implementations and Security, Advanced Authentication Protocols Security

Jan CamenischActive

Unknown · Computer Science

h 6719.1kcited305works

Cryptography and Data Security, Privacy-Preserving Technologies in Data, Internet Traffic Analysis and Secure E-voting, Advanced Authentication Protocols Security, Complexity and Algorithms in Graphs

David PointchevalActive

Centre National de la Recherche Scientifique — France · Computer Science

h 6118.9kcited341works

Cryptography and Data Security, Cryptographic Implementations and Security, Advanced Authentication Protocols Security, Chaos-based Image/Signal Encryption, Complexity and Algorithms in Graphs

Xiong LiActive

Sinopec (China) — China · Computer Science

h 7217.1kcited660works

Advanced Authentication Protocols Security, User Authentication and Security Systems, Cryptography and Data Security, Privacy-Preserving Technologies in Data, Vehicular Ad Hoc Networks (VANETs)

Xinyi HuangActive

Nanjing University of Chinese Medicine — China · Computer Science

h 6315.4kcited541works

Cryptography and Data Security, Privacy-Preserving Technologies in Data, Cloud Data Security Solutions, Complexity and Algorithms in Graphs, Advanced Authentication Protocols Security

Saru KumariActive

Chitkara University — India · Computer Science

h 6815.1kcited404works

Advanced Authentication Protocols Security, User Authentication and Security Systems, Cryptography and Data Security, Biometric Identification and Security, Blockchain Technology Applications and Security

Hui LiActive

Beijing Union University — China · Computer Science

h 6114.6kcited717works

Cryptography and Data Security, Privacy-Preserving Technologies in Data, Advanced Authentication Protocols Security, User Authentication and Security Systems, Cloud Data Security Solutions

Paul SyversonActive

United States Naval Research Laboratory — United States · Computer Science

h 4813.7kcited188works

Internet Traffic Analysis and Secure E-voting, Cryptography and Data Security, Network Security and Intrusion Detection, Advanced Authentication Protocols Security, User Authentication and Security Systems

David BasinActive

ETH Zurich — Switzerland · Computer Science

h 5013.0kcited503works

Formal Methods in Verification, Logic, programming, and type systems, Advanced Authentication Protocols Security, Security and Verification in Computing, Access Control and Trust

Kenneth G. PatersonActive

ETH Zurich — Switzerland · Computer Science

h 5312.9kcited275works

Cryptography and Data Security, Cryptographic Implementations and Security, Coding theory and cryptography, Advanced Authentication Protocols Security, Chaos-based Image/Signal Encryption

Yi MuActive

Union Hospital — China · Computer Science

h 5312.5kcited682works

Cryptography and Data Security, Privacy-Preserving Technologies in Data, Complexity and Algorithms in Graphs, Cryptographic Implementations and Security, Advanced Authentication Protocols Security

Jian ShenActive

Beijing Institute of Technology — China · Computer Science

h 5912.4kcited492works

Cryptography and Data Security, Cloud Data Security Solutions, Privacy-Preserving Technologies in Data, Advanced Authentication Protocols Security, User Authentication and Security Systems

page 1Next →