D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 40 Citations 7,041 262 World Ranking 5790 National Ranking 141

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

His primary areas of investigation include Computer security, Access control, Android, Authorization and Radio-frequency identification. Particularly relevant to Exploit is his body of work in Computer security. His biological study spans a wide range of topics, including Data access, File system and World Wide Web.

His Android research includes elements of Static analysis and Computer engineering. His Authorization study integrates concerns from other disciplines, such as Information Dissemination and Web service. The study incorporates disciplines such as Ubiquitous computing, Security information and event management, Cloud computing security and Information privacy, Privacy software in addition to Radio-frequency identification.

His most cited work include:

  • Internet of Things: A survey on the security of IoT frameworks (322 citations)
  • CRePE: context-related policy enforcement for android (223 citations)
  • Is your cat infected with a computer virus (196 citations)

What are the main themes of his work throughout his whole career to date?

Bruno Crispo spends much of his time researching Computer security, Computer network, Access control, Internet privacy and Encryption. His study on Computer security is mostly dedicated to connecting different topics, such as The Internet. His Computer network research incorporates elements of Scheme and Scalability.

Bruno Crispo combines subjects such as Distributed computing, Relation, Database and Authorization with his study of Access control. Bruno Crispo has researched Encryption in several fields, including Cloud computing and Cryptography. His Malware research incorporates themes from Android and Keystroke logging.

He most often published in these fields:

  • Computer security (67.25%)
  • Computer network (16.72%)
  • Access control (14.98%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (67.25%)
  • Biometrics (11.50%)
  • Attack surface (3.83%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Computer security, Biometrics, Attack surface, Computer network and The Internet. In general Computer security, his work in Exploit is often linked to USable linking many areas of study. The various areas that Bruno Crispo examines in his Biometrics study include Password, Face, Usability, Human–computer interaction and Authentication.

Bruno Crispo combines subjects such as Scalability and Key with his study of Attack surface. Many of his research projects under Computer network are closely connected to Return on investment with Return on investment, tying the diverse disciplines of science together. His The Internet research includes themes of Reliability and Smart device.

Between 2016 and 2021, his most popular works were:

  • Internet of Things: A survey on the security of IoT frameworks (322 citations)
  • Security and privacy in vehicular communications: Challenges and opportunities (38 citations)
  • Security and privacy in vehicular communications: Challenges and opportunities (38 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Bruno Crispo focuses on Computer security, Biometrics, Usability, Payment and Human–computer interaction. Computer security is a component of his Attack surface and Security properties studies. His Attack surface research is multidisciplinary, incorporating elements of Telecommunications, Virtualization, Key and AUTOSAR.

His Usability research incorporates elements of User authentication and Robustness. His research in Human–computer interaction focuses on subjects like Security analysis, which are connected to Modality. His work carried out in the field of Touchscreen brings together such families of science as Face, Spoofing attack, Authentication and Identification.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Internet of Things: A survey on the security of IoT frameworks

Mahmoud Ammar;Giovanni Russello;Bruno Crispo.
workshop on information security applications (2018)

641 Citations

The evolution of RFID security

M.R. Rieback;B. Crispo;A.S. Tanenbaum.
IEEE Pervasive Computing (2006)

368 Citations

CRePE: context-related policy enforcement for android

Mauro Conti;Vu Thien Nga Nguyen;Bruno Crispo.
international conference on information security (2010)

367 Citations

Is your cat infected with a computer virus

M.R. Rieback;B. Crispo;A.S. Tanenbaum.
ieee international conference on pervasive computing and communications (2006)

305 Citations

RFID guardian: a battery-powered mobile device for RFID privacy management

Melanie R. Rieback;Bruno Crispo;Andrew S. Tanenbaum.
australasian conference on information security and privacy (2005)

282 Citations

A new family of authentication protocols

Ross Anderson;Francesco Bergadano;Bruno Crispo;Jong-Hyeon Lee.
Operating Systems Review (1998)

208 Citations

Providing Source Location Privacy in Wireless Sensor Networks: A Survey

Mauro Conti;Jeroen Willemsen;Bruno Crispo.
IEEE Communications Surveys and Tutorials (2013)

184 Citations

Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call

Mauro Conti;Irina Zachia-Zlatea;Bruno Crispo.
computer and communications security (2011)

165 Citations

A DRM security architecture for home networks

Bogdan C. Popescu;Bruno Crispo;Andrew S. Tanenbaum;Frank L.A.J. Kamperman.
digital rights management (2004)

164 Citations

Safe and private data sharing with turtle: Friends team-up and beat the system

Bogdan C Popescu;Bruno Crispo;Andrew S Tanenbaum.
Lecture Notes in Computer Science (2004)

153 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Bruno Crispo

Mauro Conti

Mauro Conti

University of Padua

Publications: 57

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 25

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 18

Nitesh Saxena

Nitesh Saxena

University of Alabama at Birmingham

Publications: 17

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 17

Jacques Klein

Jacques Klein

University of Luxembourg

Publications: 15

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 15

Wouter Joosen

Wouter Joosen

KU Leuven

Publications: 14

Roberto Di Pietro

Roberto Di Pietro

Hamad bin Khalifa University

Publications: 14

Michael Backes

Michael Backes

University of Oxford

Publications: 13

Adriana Iamnitchi

Adriana Iamnitchi

Maastricht University

Publications: 13

Dan Lin

Dan Lin

University of Missouri

Publications: 13

Tegawendé F. Bissyandé

Tegawendé F. Bissyandé

University of Luxembourg

Publications: 11

Xiaojiang Du

Xiaojiang Du

Temple University

Publications: 11

Alexander Pretschner

Alexander Pretschner

Technical University of Munich

Publications: 10

Ravi Sandhu

Ravi Sandhu

The University of Texas at San Antonio

Publications: 10

Trending Scientists

Assaf Naor

Assaf Naor

Princeton University

Steve Zelditch

Steve Zelditch

Northwestern University

Sameer Pradhan

Sameer Pradhan

Vassar College

Binlin Dou

Binlin Dou

University of Shanghai for Science and Technology

Raghavan B. Sunoj

Raghavan B. Sunoj

Indian Institute of Technology Bombay

Koki Takanashi

Koki Takanashi

Tohoku University

Phillip S. Levin

Phillip S. Levin

University of Washington

Christian Giaume

Christian Giaume

Collège de France

Frans B. L. Hogervorst

Frans B. L. Hogervorst

Antoni van Leeuwenhoek Hospital

Alex MacKenzie

Alex MacKenzie

Children's Hospital of Eastern Ontario

Yan Chen

Yan Chen

University of Orléans

Gianluca Valensise

Gianluca Valensise

National Institute of Geophysics and Volcanology

Stefan Krause

Stefan Krause

University of Birmingham

Hedy L. Kindler

Hedy L. Kindler

University of Chicago

Sana M. Al-Khatib

Sana M. Al-Khatib

Duke University

Yu Chen

Yu Chen

Capital Medical University

Something went wrong. Please try again later.