D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 43 Citations 7,090 215 World Ranking 3972 National Ranking 89

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

His primary areas of investigation include Computer security, Access control, Android, Authorization and Radio-frequency identification. Particularly relevant to Exploit is his body of work in Computer security. His biological study spans a wide range of topics, including Data access, File system and World Wide Web.

His Android research includes elements of Static analysis and Computer engineering. His Authorization study integrates concerns from other disciplines, such as Information Dissemination and Web service. The study incorporates disciplines such as Ubiquitous computing, Security information and event management, Cloud computing security and Information privacy, Privacy software in addition to Radio-frequency identification.

His most cited work include:

  • Internet of Things: A survey on the security of IoT frameworks (322 citations)
  • CRePE: context-related policy enforcement for android (223 citations)
  • Is your cat infected with a computer virus (196 citations)

What are the main themes of his work throughout his whole career to date?

Bruno Crispo spends much of his time researching Computer security, Computer network, Access control, Internet privacy and Encryption. His study on Computer security is mostly dedicated to connecting different topics, such as The Internet. His Computer network research incorporates elements of Scheme and Scalability.

Bruno Crispo combines subjects such as Distributed computing, Relation, Database and Authorization with his study of Access control. Bruno Crispo has researched Encryption in several fields, including Cloud computing and Cryptography. His Malware research incorporates themes from Android and Keystroke logging.

He most often published in these fields:

  • Computer security (67.25%)
  • Computer network (16.72%)
  • Access control (14.98%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (67.25%)
  • Biometrics (11.50%)
  • Attack surface (3.83%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Computer security, Biometrics, Attack surface, Computer network and The Internet. In general Computer security, his work in Exploit is often linked to USable linking many areas of study. The various areas that Bruno Crispo examines in his Biometrics study include Password, Face, Usability, Human–computer interaction and Authentication.

Bruno Crispo combines subjects such as Scalability and Key with his study of Attack surface. Many of his research projects under Computer network are closely connected to Return on investment with Return on investment, tying the diverse disciplines of science together. His The Internet research includes themes of Reliability and Smart device.

Between 2016 and 2021, his most popular works were:

  • Internet of Things: A survey on the security of IoT frameworks (322 citations)
  • Security and privacy in vehicular communications: Challenges and opportunities (38 citations)
  • Security and privacy in vehicular communications: Challenges and opportunities (38 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

Bruno Crispo focuses on Computer security, Biometrics, Usability, Payment and Human–computer interaction. Computer security is a component of his Attack surface and Security properties studies. His Attack surface research is multidisciplinary, incorporating elements of Telecommunications, Virtualization, Key and AUTOSAR.

His Usability research incorporates elements of User authentication and Robustness. His research in Human–computer interaction focuses on subjects like Security analysis, which are connected to Modality. His work carried out in the field of Touchscreen brings together such families of science as Face, Spoofing attack, Authentication and Identification.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Internet of Things: A survey on the security of IoT frameworks

Mahmoud Ammar;Giovanni Russello;Bruno Crispo.
workshop on information security applications (2018)

487 Citations

CRePE: context-related policy enforcement for android

Mauro Conti;Vu Thien Nga Nguyen;Bruno Crispo.
international conference on information security (2010)

366 Citations

The evolution of RFID security

M.R. Rieback;B. Crispo;A.S. Tanenbaum.
IEEE Pervasive Computing (2006)

338 Citations

Is your cat infected with a computer virus

M.R. Rieback;B. Crispo;A.S. Tanenbaum.
ieee international conference on pervasive computing and communications (2006)

293 Citations

RFID guardian: a battery-powered mobile device for RFID privacy management

Melanie R. Rieback;Bruno Crispo;Andrew S. Tanenbaum.
australasian conference on information security and privacy (2005)

270 Citations

A new family of authentication protocols

Ross Anderson;Francesco Bergadano;Bruno Crispo;Jong-Hyeon Lee.
Operating Systems Review (1998)

206 Citations

A DRM security architecture for home networks

Bogdan C. Popescu;Bruno Crispo;Andrew S. Tanenbaum;Frank L.A.J. Kamperman.
digital rights management (2004)

165 Citations

Providing Source Location Privacy in Wireless Sensor Networks: A Survey

Mauro Conti;Jeroen Willemsen;Bruno Crispo.
IEEE Communications Surveys and Tutorials (2013)

165 Citations

Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call

Mauro Conti;Irina Zachia-Zlatea;Bruno Crispo.
computer and communications security (2011)

163 Citations

Safe and private data sharing with turtle: friends team-up and beat the system

Bogdan C Popescu;Bruno Crispo;Andrew S Tanenbaum.
international workshop on security (2004)

147 Citations

Best Scientists Citing Bruno Crispo

Mauro Conti

Mauro Conti

University of Padua

Publications: 57

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 25

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 18

Nitesh Saxena

Nitesh Saxena

University of Alabama at Birmingham

Publications: 17

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 17

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 15

Jacques Klein

Jacques Klein

University of Luxembourg

Publications: 15

Roberto Di Pietro

Roberto Di Pietro

Hamad bin Khalifa University

Publications: 14

Wouter Joosen

Wouter Joosen

KU Leuven

Publications: 14

Dan Lin

Dan Lin

University of Missouri

Publications: 13

Adriana Iamnitchi

Adriana Iamnitchi

University of South Florida

Publications: 13

Tegawendé F. Bissyandé

Tegawendé F. Bissyandé

University of Luxembourg

Publications: 11

Xiaojiang Du

Xiaojiang Du

Temple University

Publications: 11

Alexander Pretschner

Alexander Pretschner

Technical University of Munich

Publications: 10

Kevin Fu

Kevin Fu

University of Michigan–Ann Arbor

Publications: 10

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.