D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 63 Citations 10,918 167 World Ranking 1265 National Ranking 729

Research.com Recognitions

Awards & Achievements

2008 - ACM Senior Member

Overview

What is she best known for?

The fields of study she is best known for:

  • Operating system
  • Computer network
  • The Internet

Her primary scientific interests are in Computer security, Theoretical computer science, Cryptography, Cryptographic protocol and Database. The study incorporates disciplines such as Scheme and Internet privacy in addition to Computer security. Her Theoretical computer science research incorporates elements of Distributed computing, Reactive system, Formal methods, Security parameter and Symmetric-key algorithm.

Her Cryptography research is multidisciplinary, incorporating perspectives in Communication source, Serviceability and Dining cryptographers problem. The various areas that Birgit Pfitzmann examines in her Cryptographic protocol study include Key exchange and 40-bit encryption, Encryption. Her studies deal with areas such as World Wide Web, Operating system and Information repository as well as Database.

Her most cited work include:

  • Advances in Cryptology-Eurocrypt 2001 (613 citations)
  • A model for asynchronous reactive systems and its application to secure message transmission (373 citations)
  • Composition and integrity preservation of secure reactive systems (288 citations)

What are the main themes of her work throughout her whole career to date?

Her primary areas of study are Computer security, Cryptography, Theoretical computer science, Cryptographic protocol and Database. Her Computer security research is multidisciplinary, incorporating elements of Payment, Protocol and Internet privacy. The study incorporates disciplines such as Random oracle, Secrecy, Probabilistic logic, Encryption and Asynchronous communication in addition to Cryptography.

Her Theoretical computer science study also includes

  • Digital signature, which have a strong connection to Signature,
  • Reactive system that connect with fields like Distributed computing. Her Cryptographic protocol study incorporates themes from Key, Symmetric-key algorithm and Public-key cryptography. Birgit Pfitzmann combines subjects such as Key management and Key exchange with her study of Cryptographic primitive.

She most often published in these fields:

  • Computer security (35.66%)
  • Cryptography (25.19%)
  • Theoretical computer science (21.32%)

What were the highlights of her more recent work (between 2008-2019)?

  • Database (9.69%)
  • Cloud computing (5.04%)
  • Operating system (3.88%)

In recent papers she was focusing on the following fields of study:

Her primary areas of investigation include Database, Cloud computing, Operating system, Distributed computing and Component. Her Database research includes themes of Computer data storage, Information repository and World Wide Web. Her research integrates issues of Computer security, Disaster recovery, Server and Projection in her study of Cloud computing.

Her research on Computer security often connects related topics like Communication source. Her work on Component-based software engineering and Metadata as part of general Operating system research is frequently linked to Test case and Extraction, thereby connecting diverse disciplines of science. Her work deals with themes such as Cryptographic protocol, Software system, Security analysis, Isolation and SIMPLE, which intersect with Distributed computing.

Between 2008 and 2019, her most popular works were:

  • Method and apparatus for automated migration of data among storage centers (157 citations)
  • Application resource manager over a cloud (93 citations)
  • method to automatically map business function level policies to it management policies (85 citations)

In her most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Database, Cloud computing, Data mining, Workload and Operating system are her primary areas of study. Her work carried out in the field of Database brings together such families of science as Graph, World Wide Web, Server and Information repository. Her study in Cloud computing is interdisciplinary in nature, drawing from both Computer security, Distributed computing and Component.

Her research in Distributed computing intersects with topics in Identification and Business agility. Her biological study spans a wide range of topics, including Matching and Multi-image. Her Operating system study deals with Program code intersecting with Computer program.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Advances in Cryptology-Eurocrypt 2001

Birgit Pfitzmann.
(2001)

972 Citations

A model for asynchronous reactive systems and its application to secure message transmission

B. Pfitzmann;M. Waidner.
ieee symposium on security and privacy (2001)

435 Citations

ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead

Andreas Pfitzmann;Birgit Pfitzmann;Michael Waidner.
(1991)

392 Citations

A composable cryptographic library with nested operations

Michael Backes;Birgit Pfitzmann;Michael Waidner.
computer and communications security (2003)

340 Citations

Composition and integrity preservation of secure reactive systems

Birgit Pfitzmann;Michael Waidner.
computer and communications security (2000)

323 Citations

Method and system for attribute exchange in a heterogeneous federated environment

George Blakley;Heather Hinton;Anthony Nadalin;Birgit Pfitzmann.
(2002)

277 Citations

Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer

David Chaum;Eugène van Heijst;Birgit Pfitzmann.
international cryptology conference (1991)

273 Citations

The ESPRIT Project CAFE - High Security Digital Payment Systems

Jean-Paul Boly;Antoon Bosselaers;Ronald Cramer;Rolf Michelsen.
european symposium on research in computer security (1994)

266 Citations

Asymmetric fingerprinting

Birgit Pfitzmann;Matthias Schunter.
theory and application of cryptographic techniques (1996)

255 Citations

Method and apparatus for automated migration of data among storage centers

William R Reohr;Birgit M Pfitzmann;Kevin M Kingsbury;Laura A Richardson.
(2012)

239 Citations

Best Scientists Citing Birgit Pfitzmann

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 46

Ran Canetti

Ran Canetti

Boston University

Publications: 43

David Basin

David Basin

ETH Zurich

Publications: 38

Jan Camenisch

Jan Camenisch

DFINITY

Publications: 37

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 36

Ueli Maurer

Ueli Maurer

ETH Zurich

Publications: 35

Anupam Datta

Anupam Datta

Carnegie Mellon University

Publications: 34

Jonathan Katz

Jonathan Katz

University of Maryland, College Park

Publications: 31

John C. Mitchell

John C. Mitchell

Stanford University

Publications: 29

Colin Boyd

Colin Boyd

Norwegian University of Science and Technology

Publications: 27

Dennis Hofheinz

Dennis Hofheinz

ETH Zurich

Publications: 27

Cédric Fournet

Cédric Fournet

Microsoft (United States)

Publications: 26

Amit Sahai

Amit Sahai

University of California, Los Angeles

Publications: 25

Aggelos Kiayias

Aggelos Kiayias

University of Edinburgh

Publications: 24

Bogdan Warinschi

Bogdan Warinschi

University of Bristol

Publications: 24

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.