D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 34 Citations 3,985 113 World Ranking 8242 National Ranking 3810

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

His main research concerns Computer security, Trusted Platform Module, Operating system, Key and Public-key cryptography. Computer security connects with themes related to Data processing system in his study. His research integrates issues of Software and Code in his study of Trusted Platform Module.

In most of his Operating system studies, his work intersects topics such as Real-time computing. His biological study spans a wide range of topics, including Trusted Computing and Human–computer interaction. His study looks at the relationship between Encryption and fields such as Cryptographic protocol, as well as how they intersect with chemical problems.

His most cited work include:

  • Method and system for secure computer moderated voting (160 citations)
  • A Practical Guide to Trusted Computing (159 citations)
  • Encrypted file system using TCPA (146 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer security, Computer hardware, Operating system, Computer network and Password. His study in Public-key cryptography, Encryption, Trusted Platform Module, Trusted Computing and Key falls within the category of Computer security. His work on Key distribution as part of general Public-key cryptography research is frequently linked to Certificate, thereby connecting diverse disciplines of science.

The Computer hardware study combines topics in areas such as Reset, Embedded system and Laptop. His Database research extends to Operating system, which is thematically connected. David Carroll Challener has researched Password in several fields, including Data access and Linkage.

He most often published in these fields:

  • Computer security (29.93%)
  • Computer hardware (21.90%)
  • Operating system (21.90%)

What were the highlights of his more recent work (between 2007-2015)?

  • Computer security (29.93%)
  • Operating system (21.90%)
  • Software (8.76%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Computer security, Operating system, Software, Password and Computer hardware. The study of Computer security is intertwined with the study of Process in a number of ways. In Operating system, David Carroll Challener works on issues like Key, which are connected to Set.

His Software study incorporates themes from Hash function, State, Authorization and Code. His work on Password policy as part of general Password research is frequently linked to Group Policy, bridging the gap between disciplines. His Computer hardware study combines topics in areas such as Battery, One-time password and Laptop.

Between 2007 and 2015, his most popular works were:

  • System and Method to Update Device Driver or Firmware Using a Hypervisor Environment Without System Shutdown (81 citations)
  • A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security (61 citations)
  • Method and system for establishing network connections (19 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

David Carroll Challener mostly deals with Operating system, Computer security, Computer hardware, Software and Cataloging. His research in Operating system intersects with topics in Key and Decodes. His research in the fields of Trusted Platform Module and Code overlaps with other disciplines such as Architecture and Deep dive.

His study in the fields of CPU power dissipation under the domain of Computer hardware overlaps with other disciplines such as Group Policy. The concepts of his Software study are interwoven with issues in Password, Process, Password policy and SIMPLE. His studies deal with areas such as Information retrieval and User requirements document as well as Cataloging.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A Practical Guide to Trusted Computing

David Challener;Kent Yoder;Ryan Catherman;David Safford.
(2007)

254 Citations

Encrypted file system using TCPA

David Carroll Challener;David Robert Safford.
(2002)

208 Citations

Method and system for secure computer moderated voting

David C. Challener;Richard A. Kelley;Palmer E. Newman.
(1997)

185 Citations

System and method for reporting the trusted state of a virtual machine

David Carroll Challener;Mark Charles Davis.
(2007)

154 Citations

Autonomic personal computing

D. F. Bantz;C. Bisdikian;D. Challener;J. P. Karidis.
Ibm Systems Journal (2003)

154 Citations

Method and system for automated migration of user settings to a replacement computer system

Barry Douglas Atkins;David Carroll Challener;Richard Wayne Cheston.
(1998)

137 Citations

Business method for secure installation of a credit authorization key on a remote tcpa compliant system

David Challener.
(2003)

132 Citations

Distributed autonomic backup

David Frederick Bantz;David Carroll Challener;John Peter Karidis.
(2002)

106 Citations

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security

Will Arthur;David Challener.
(2015)

101 Citations

Method and system for password protection of a data processing system that permit a user-selected password to be recovered

David Carroll Challener;Mohammad Peyravian;Russell Alan Resnick.
(1999)

101 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing David Carroll Challener

Gilbert Neiger

Gilbert Neiger

Intel (United States)

Publications: 25

Richard Uhlig

Richard Uhlig

Intel (United States)

Publications: 20

Randall Scott Springfield

Randall Scott Springfield

Lenovo (Singapore)

Publications: 19

Michael D. Swanson

Michael D. Swanson

IBM (United States)

Publications: 18

Paul England

Paul England

Microsoft (United States)

Publications: 17

Galen C. Hunt

Galen C. Hunt

Microsoft (United States)

Publications: 17

Ned M. Smith

Ned M. Smith

Intel (United States)

Publications: 15

Michael Kozuch

Michael Kozuch

Intel (United States)

Publications: 14

Thomas A. Gregg

Thomas A. Gregg

IBM (United States)

Publications: 14

Daryl Carvis Cromer

Daryl Carvis Cromer

IBM (United States)

Publications: 12

Herbert A. Little

Herbert A. Little

Blackberry (United States)

Publications: 12

Howard Locker

Howard Locker

IBM (United States)

Publications: 12

Vincent J. Zimmer

Vincent J. Zimmer

Intel (United States)

Publications: 12

Bradley E. Marshall

Bradley E. Marshall

Amazon (United States)

Publications: 10

Craig William Fellenstein

Craig William Fellenstein

IBM (United States)

Publications: 10

Kevin Kwong-Tai Chung

Kevin Kwong-Tai Chung

Princeton University

Publications: 9

Trending Scientists

David Pisinger

David Pisinger

Technical University of Denmark

Goro Shimura

Goro Shimura

Princeton University

Ehsan Afshari

Ehsan Afshari

University of Michigan–Ann Arbor

Hongzhe Sun

Hongzhe Sun

University of Hong Kong

Peter Schwerdtfeger

Peter Schwerdtfeger

Massey University

Andreas Stasch

Andreas Stasch

University of St Andrews

Amar S. Bhalla

Amar S. Bhalla

The University of Texas at San Antonio

Adam P. Geballe

Adam P. Geballe

Fred Hutchinson Cancer Research Center

Jonathon Howard

Jonathon Howard

Yale University

Robert E. Weaver

Robert E. Weaver

Centers for Disease Control and Prevention

Al. Ramanathan

Al. Ramanathan

Jawaharlal Nehru University

Adrian P. Banning

Adrian P. Banning

University of Oxford

Xavier Jeunemaitre

Xavier Jeunemaitre

Université Paris Cité

Mary Kay Stein

Mary Kay Stein

University of Pittsburgh

Nigel South

Nigel South

University of Essex

Something went wrong. Please try again later.