D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 30 Citations 5,220 101 World Ranking 10106 National Ranking 614

Overview

What is he best known for?

The fields of study he is best known for:

  • Programming language
  • Computer security
  • Operating system

His primary scientific interests are in Computer security, Cryptographic protocol, Computer security model, Protocol and Protocol. His work on Cryptography as part of general Computer security research is often related to Relation, thus linking different fields of science. The various areas that Cas Cremers examines in his Cryptography study include Bounding overwatch and Resilience.

He interconnects Correctness, Theoretical computer science and Authentication in the investigation of issues within Cryptographic protocol. His Computer security model research incorporates elements of Authenticated Key Exchange, Key exchange, Public-key cryptography and Security service. His Protocol research incorporates elements of Set and State.

His most cited work include:

  • The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols (329 citations)
  • The TAMARIN prover for the symbolic analysis of security protocols (240 citations)
  • Scyther : semantics and verification of security protocols (183 citations)

What are the main themes of his work throughout his whole career to date?

Cas Cremers mainly focuses on Computer security, Cryptographic protocol, Computer security model, Theoretical computer science and Cryptography. As part of one scientific family, Cas Cremers deals mainly with the area of Computer security, narrowing it down to issues related to the Protocol, and often State. His studies in Cryptographic protocol integrate themes in fields like Correctness, Isolation, Adversary model, Authentication and Formal verification.

The Computer security model study combines topics in areas such as Authenticated Key Exchange, Security service, Certificate authority and Scope. His Theoretical computer science research includes themes of Property, Mathematical proof, Operational semantics and Set. His Cryptography research is multidisciplinary, incorporating elements of Security analysis, Secrecy and Coding theory.

He most often published in these fields:

  • Computer security (59.32%)
  • Cryptographic protocol (45.76%)
  • Computer security model (22.88%)

What were the highlights of his more recent work (between 2018-2021)?

  • Computer security (59.32%)
  • Cryptographic protocol (45.76%)
  • Cryptography (21.19%)

In recent papers he was focusing on the following fields of study:

Cas Cremers focuses on Computer security, Cryptographic protocol, Cryptography, Protocol and Key exchange. His work on Data Protection Act 1998 is typically connected to Compromise as part of general Computer security study, connecting several disciplines of science. His work deals with themes such as Formal verification, Server and Hardware security module, which intersect with Cryptographic protocol.

His Cryptography course of study focuses on Security analysis and Computer security model, Authenticated Key Exchange, Encryption, Secrecy and Session. His Protocol research spans across into subjects like Symbolic data analysis, Protocol analysis, Diffie–Hellman key exchange, Gas meter prover and Theoretical computer science. While the research belongs to areas of Symbolic data analysis, he spends his time largely on the problem of Public-key cryptography, intersecting his research to questions surrounding Digital signature and Signature.

Between 2018 and 2021, his most popular works were:

  • Decentralized Privacy-Preserving Proximity Tracing (80 citations)
  • Component-Based Formal Analysis of 5G-AKA: Channel Assumptions and Session Confusion (20 citations)
  • Decentralized Privacy-Preserving Proximity Tracing (18 citations)

In his most recent research, the most cited papers focused on:

  • Programming language
  • Operating system
  • Computer security

His primary areas of investigation include Computer security, Data Protection Act 1998, Upload, Tracing and Protocol. His study in Computer security concentrates on Cryptographic protocol and Public-key cryptography. He has researched Cryptographic protocol in several fields, including Signature, Symbolic data analysis and Digital signature.

His Data Protection Act 1998 research incorporates themes from Process, Identity and Privacy preserving. He combines subjects such as Identifier, Interoperability and Beacon with his study of Upload. He has included themes like Security analysis, Isolation, Gas meter prover and Authentication in his Protocol study.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols

Cas J. Cremers.
computer aided verification (2008)

685 Citations

The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols

Cas J. Cremers.
computer aided verification (2008)

685 Citations

The TAMARIN prover for the symbolic analysis of security protocols

Simon Meier;Benedikt Schmidt;Cas Cremers;David Basin.
computer aided verification (2013)

512 Citations

The TAMARIN prover for the symbolic analysis of security protocols

Simon Meier;Benedikt Schmidt;Cas Cremers;David Basin.
computer aided verification (2013)

512 Citations

A Formal Security Analysis of the Signal Messaging Protocol

Katriel Cohn-Gordon;Cas Cremers;Benjamin Dowling;Luke Garratt.
Journal of Cryptology (2020)

288 Citations

A Formal Security Analysis of the Signal Messaging Protocol

Katriel Cohn-Gordon;Cas Cremers;Benjamin Dowling;Luke Garratt.
Journal of Cryptology (2020)

288 Citations

Scyther : semantics and verification of security protocols

Cjf Cas Cremers.
(2006)

271 Citations

Scyther : semantics and verification of security protocols

Cjf Cas Cremers.
(2006)

271 Citations

Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties

B. Schmidt;S. Meier;C. Cremers;D. Basin.
ieee computer security foundations symposium (2012)

259 Citations

Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties

B. Schmidt;S. Meier;C. Cremers;D. Basin.
ieee computer security foundations symposium (2012)

259 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Cas Cremers

David Basin

David Basin

ETH Zurich

Publications: 33

José Meseguer

José Meseguer

University of Illinois at Urbana-Champaign

Publications: 29

Serge Vaudenay

Serge Vaudenay

École Polytechnique Fédérale de Lausanne

Publications: 24

Joshua Guttman

Joshua Guttman

Worcester Polytechnic Institute

Publications: 22

Catherine Meadows

Catherine Meadows

United States Naval Research Laboratory

Publications: 20

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 19

Sjouke Mauw

Sjouke Mauw

University of Luxembourg

Publications: 18

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 15

Karthikeyan Bhargavan

Karthikeyan Bhargavan

French Institute for Research in Computer Science and Automation - INRIA

Publications: 14

Carolyn L. Talcott

Carolyn L. Talcott

SRI International

Publications: 13

Maode Ma

Maode Ma

Qatar University

Publications: 12

Douglas Stebila

Douglas Stebila

University of Waterloo

Publications: 12

Andre Scedrov

Andre Scedrov

University of Pennsylvania

Publications: 12

Bruno Blanchet

Bruno Blanchet

French Institute for Research in Computer Science and Automation - INRIA

Publications: 11

Marc Fischlin

Marc Fischlin

Technical University of Darmstadt

Publications: 11

Jin Song Dong

Jin Song Dong

National University of Singapore

Publications: 9

Trending Scientists

Christophe Giraud-Carrier

Christophe Giraud-Carrier

Brigham Young University

Yanhong Luo

Yanhong Luo

Chinese Academy of Sciences

Anand Swaroop

Anand Swaroop

National Institutes of Health

Rajinder Kaul

Rajinder Kaul

University of Washington

Izumi Washitani

Izumi Washitani

Chuo University

Lucy J. Sheppard

Lucy J. Sheppard

UK Centre for Ecology & Hydrology

Anthony P. Russell

Anthony P. Russell

University of Calgary

Craig Montell

Craig Montell

University of California, Santa Barbara

Thomas F. Nägler

Thomas F. Nägler

University of Bern

Joris M. Gieskes

Joris M. Gieskes

Scripps Institution of Oceanography

Jun Nishioka

Jun Nishioka

Hokkaido University

Timothy J. Beechie

Timothy J. Beechie

National Oceanic and Atmospheric Administration

Philipp G. Sämann

Philipp G. Sämann

Max Planck Society

Valérie Vilgrain

Valérie Vilgrain

Université Paris Cité

Bryan J. Weiner

Bryan J. Weiner

University of Washington

Carlos E. Cunha

Carlos E. Cunha

Stanford University

Something went wrong. Please try again later.