D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 72 Citations 34,221 150 World Ranking 729 National Ranking 445

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer security
  • The Internet

The scientist’s investigation covers issues in Computer security, Cryptography, Authentication, Adversary and Internet privacy. His biological study spans a wide range of topics, including Computer network and Identification. His Cryptography research incorporates themes from ElGamal encryption, Theoretical computer science, Password, Set and Access control.

His studies in Authentication integrate themes in fields like Cipher, Security analysis, Oracle and Digital signature transponder. His research in Adversary intersects with topics in Cloud storage and Artificial neural network, Machine learning, Artificial intelligence, Feature vector. His Internet privacy research includes elements of Lightweight Extensible Authentication Protocol and Multi-factor authentication.

His most cited work include:

  • RFID security and privacy: a research survey (1661 citations)
  • Pors: proofs of retrievability for large files (1478 citations)
  • A fuzzy commitment scheme (1449 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Computer security, Cryptography, Authentication, Password and Computer network. Ari Juels has researched Computer security in several fields, including Scheme and Internet privacy. The study incorporates disciplines such as Adversary, Theoretical computer science, Set and Server in addition to Cryptography.

The concepts of his Authentication study are interwoven with issues in Radio-frequency identification and Identification. His Password research incorporates elements of Cryptographic primitive and Honey Encryption. Ari Juels interconnects Key and Cloud computing in the investigation of issues within Computer network.

He most often published in these fields:

  • Computer security (59.33%)
  • Cryptography (27.75%)
  • Authentication (15.79%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer security (59.33%)
  • Cryptocurrency (7.18%)
  • Confidentiality (6.22%)

In recent papers he was focusing on the following fields of study:

Ari Juels spends much of his time researching Computer security, Cryptocurrency, Confidentiality, Smart contract and Blockchain. His study in the fields of Exploit and Cryptography under the domain of Computer security overlaps with other disciplines such as Profitability index and Delegation. Ari Juels has included themes like Biometrics and Identification in his Cryptography study.

His work in Cryptocurrency tackles topics such as Payment which are related to areas like Risk analysis. His study in Confidentiality is interdisciplinary in nature, drawing from both Oblivious ram, Correctness, Software deployment and Reliability. Ari Juels combines subjects such as Data feed, Side channel attack and Undo with his study of Smart contract.

Between 2015 and 2021, his most popular works were:

  • On Scaling Decentralized Blockchains (594 citations)
  • Stealing machine learning models via prediction APIs (478 citations)
  • Town Crier: An Authenticated Data Feed for Smart Contracts (266 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer security

His primary areas of study are Computer security, Smart contract, Confidentiality, Blockchain and Cryptocurrency. His Computer security research includes themes of Software, World Wide Web and Database transaction. His studies deal with areas such as Utility computing, Identity and Cryptography as well as World Wide Web.

His Confidentiality research is multidisciplinary, incorporating perspectives in Pseudonymity, Key, Software deployment and Fidelity. His work deals with themes such as Overlay network and Scalability, which intersect with Blockchain. His Cryptocurrency study combines topics from a wide range of disciplines, such as Authentication, Anonymity, Internet privacy and Scripting language.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

RFID security and privacy: a research survey

A. Juels.
IEEE Journal on Selected Areas in Communications (2006)

2419 Citations

Pors: proofs of retrievability for large files

Ari Juels;Burton S. Kaliski.
computer and communications security (2007)

2231 Citations

A fuzzy vault scheme

A. Juels;M. Sudan.
international symposium on information theory (2002)

1873 Citations

A fuzzy commitment scheme

Ari Juels;Martin Wattenberg.
computer and communications security (1999)

1817 Citations

The blocker tag: selective blocking of RFID tags for consumer privacy

Ari Juels;Ronald L. Rivest;Michael Szydlo.
computer and communications security (2003)

1299 Citations

HAIL: a high-availability and integrity layer for cloud storage

Kevin D. Bowers;Ari Juels;Alina Oprea.
computer and communications security (2009)

1238 Citations

Authenticating pervasive devices with human protocols

Ari Juels;Stephen A. Weis.
international cryptology conference (2005)

879 Citations

Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.

Ari Juels;John G. Brainard.
network and distributed system security symposium (1999)

856 Citations

On Scaling Decentralized Blockchains

Kyle Croman;Christian Decker;Ittay Eyal;Adem Efe Gencer.
financial cryptography (2016)

833 Citations

Cross-VM side channels and their use to extract private keys

Yinqian Zhang;Ari Juels;Michael K. Reiter;Thomas Ristenpart.
computer and communications security (2012)

805 Citations

Best Scientists Citing Ari Juels

Christoph Busch

Christoph Busch

Norwegian University of Science and Technology

Publications: 49

Peter Y. A. Ryan

Peter Y. A. Ryan

University of Luxembourg

Publications: 47

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 43

Colin Boyd

Colin Boyd

Norwegian University of Science and Technology

Publications: 43

Christian Rathgeb

Christian Rathgeb

Darmstadt University of Applied Sciences

Publications: 42

Hervé Chabanne

Hervé Chabanne

Télécom ParisTech

Publications: 41

Yi Mu

Yi Mu

Fujian Normal University

Publications: 39

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 39

Yingjiu Li

Yingjiu Li

University of Oregon

Publications: 36

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 34

Aggelos Kiayias

Aggelos Kiayias

University of Edinburgh

Publications: 33

Berk Sunar

Berk Sunar

Worcester Polytechnic Institute

Publications: 33

Andrew Beng Jin Teoh

Andrew Beng Jin Teoh

Yonsei University

Publications: 32

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 31

Giuseppe Ateniese

Giuseppe Ateniese

Stevens Institute of Technology

Publications: 31

Kwangjo Kim

Kwangjo Kim

Korea Advanced Institute of Science and Technology

Publications: 30

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.