H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 96 Citations 75,960 306 World Ranking 184 National Ranking 9

Research.com Recognitions

Awards & Achievements

2016 - ACM Fellow For contributions in protocols for network and system security.

2012 - ACM Senior Member

2006 - Fellow of Alfred P. Sloan Foundation

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • The Internet

Adrian Perrig spends much of his time researching Computer network, Computer security, Wireless sensor network, Distributed computing and Authentication. His Computer network study incorporates themes from Wireless ad hoc network and Vehicular ad hoc network. Adrian Perrig interconnects The Internet, Denial-of-service attack and Server in the investigation of issues within Computer security.

His Wireless sensor network study combines topics from a wide range of disciplines, such as News aggregator, Sensor node, Key distribution in wireless sensor networks, Node and Secure multi-party computation. His work deals with themes such as Key distribution, Network topology, Key and Packet loss, which intersect with Distributed computing. The concepts of his Authentication study are interwoven with issues in Overhead, Broadcast communication network, Cryptography and Public-key cryptography.

His most cited work include:

  • Random key predistribution schemes for sensor networks (2746 citations)
  • SPINS: security protocols for sensor networks (2566 citations)
  • Practical techniques for searches on encrypted data (2323 citations)

What are the main themes of his work throughout his whole career to date?

Adrian Perrig focuses on Computer security, Computer network, The Internet, Distributed computing and Network packet. His study in Internet privacy extends to Computer security with its themes. Adrian Perrig has included themes like Denial-of-service attack and Cryptography in his Computer network study.

His The Internet research includes elements of Network architecture, Scalability and Flooding. His Distributed computing research includes themes of Link-state routing protocol, Wireless Routing Protocol, Multipath routing and Dynamic Source Routing. His Wireless sensor network study integrates concerns from other disciplines, such as Sensor node, Key distribution in wireless sensor networks and Node.

He most often published in these fields:

  • Computer security (44.13%)
  • Computer network (43.60%)
  • The Internet (21.93%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer network (43.60%)
  • The Internet (21.93%)
  • Network packet (15.40%)

In recent papers he was focusing on the following fields of study:

Adrian Perrig mainly focuses on Computer network, The Internet, Network packet, Computer security and Path. His studies in Computer network integrate themes in fields like Domain Name System and Anonymity. His study in the fields of Denial-of-service attack and Internet architecture under the domain of The Internet overlaps with other disciplines such as Flexibility.

The various areas that Adrian Perrig examines in his Network packet study include Set and Network transparency. As part of his studies on Computer security, he often connects relevant areas like Scalability. Adrian Perrig combines subjects such as GNSS augmentation, GNSS applications, Global Positioning System and Cryptography with his study of Authentication.

Between 2016 and 2021, his most popular works were:

  • SCION: A Secure Internet Architecture (18 citations)
  • The SCION internet architecture (17 citations)
  • BlockPKI: An Automated, Resilient, and Transparent Public-Key Infrastructure (16 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Operating system
  • The Internet

His primary areas of study are Computer network, The Internet, Computer security, World Wide Web and Public key infrastructure. His research integrates issues of Enhanced Data Rates for GSM Evolution and Anonymity in his study of Computer network. His The Internet research focuses on subjects like Network architecture, which are linked to Lightweight Extensible Authentication Protocol and Authentication protocol.

His study in Public-key cryptography and Authentication falls within the category of Computer security. His work deals with themes such as Key management, Cryptography, Denial-of-service attack and Domain Name System, which intersect with Public-key cryptography. He works mostly in the field of Network packet, limiting it down to topics relating to Replay attack and, in certain cases, Distributed computing.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

SPINS: security protocols for sensor networks

Adrian Perrig;Robert Szewczyk;J. D. Tygar;Victor Wen.
Wireless Networks (2002)

5709 Citations

SPINS: security protocols for sensor networks

Adrian Perrig;Robert Szewczyk;Victor Wen;David Culler.
acm/ieee international conference on mobile computing and networking (2001)

4449 Citations

Random key predistribution schemes for sensor networks

Haowen Chan;A. Perrig;D. Song.
ieee symposium on security and privacy (2003)

4135 Citations

Practical techniques for searches on encrypted data

Dawn Xiaoding Song;D. Wagner;A. Perrig.
ieee symposium on security and privacy (2000)

3567 Citations

Ariadne: a secure on-demand routing protocol for ad hoc networks

Yih-Chun Hu;Adrian Perrig;David B. Johnson.
Wireless Networks (2005)

3320 Citations

Packet leashes: a defense against wormhole attacks in wireless networks

Y.-C. Hu;A. Perrig;D.B. Johnson.
international conference on computer communications (2003)

2643 Citations

SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks

Yih Chun Hu;David B. Johnson;Adrian Perrig.
ad hoc networks (2003)

2038 Citations

Security in wireless sensor networks

Adrian Perrig;John Stankovic;David Wagner.
Communications of The ACM (2004)

1980 Citations

The Sybil attack in sensor networks: analysis & defenses

James Newsome;Elaine Shi;Dawn Song;Adrian Perrig.
information processing in sensor networks (2004)

1917 Citations

Efficient authentication and signing of multicast streams over lossy channels

A. Perrig;R. Canetti;J.D. Tygar;Dawn Song.
ieee symposium on security and privacy (2000)

1318 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Adrian Perrig

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 109

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 77

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 73

Peng Ning

Peng Ning

Google (United States)

Publications: 65

Roberto Di Pietro

Roberto Di Pietro

Hamad bin Khalifa University

Publications: 59

Wenjing Lou

Wenjing Lou

Virginia Tech

Publications: 59

Mauro Conti

Mauro Conti

University of Padua

Publications: 58

Nitesh Saxena

Nitesh Saxena

University of Alabama at Birmingham

Publications: 56

Kui Ren

Kui Ren

Zhejiang University

Publications: 56

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 55

Xuemin Shen

Xuemin Shen

University of Waterloo

Publications: 53

Cristina Nita-Rotaru

Cristina Nita-Rotaru

Northeastern University

Publications: 51

Yang Xiao

Yang Xiao

University of Alabama

Publications: 51

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 49

Sencun Zhu

Sencun Zhu

Pennsylvania State University

Publications: 47

Jie Wu

Jie Wu

Temple University

Publications: 46

Something went wrong. Please try again later.