D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 63 Citations 19,975 136 World Ranking 1714 National Ranking 940

Research.com Recognitions

Awards & Achievements

2013 - Member of the National Academy of Engineering For contributions to security of computer systems, and for impact on public policy.

2011 - Fellow of the American Academy of Arts and Sciences

2007 - ACM Fellow For contributions to security and the public policy of information technology.

1997 - Fellow of Alfred P. Sloan Foundation

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer security

Edward W. Felten mainly focuses on Computer security, World Wide Web, Cryptography, Internet privacy and Operating system. His Computer security research is multidisciplinary, relying on both Scheme and Motherboard. His work on The Internet as part of general World Wide Web study is frequently connected to Business process reengineering and Timing attack, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.

His research investigates the connection between Cryptography and topics such as Key that intersect with issues in Electronic money and Random access memory. His Internet privacy study combines topics in areas such as Cryptocurrency, Password management, Anonymity and Digital currency. His work is dedicated to discovering how Encryption, Dram are connected with Embedded system and other disciplines.

His most cited work include:

  • Lest we remember: cold-boot attacks on encryption keys (727 citations)
  • SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (660 citations)
  • Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction (504 citations)

What are the main themes of his work throughout his whole career to date?

Edward W. Felten mostly deals with Computer security, Internet privacy, Operating system, World Wide Web and Software. His Computer security study typically links adjacent topics like Audit. His biological study spans a wide range of topics, including Transparency and Access control.

The Network interface, Real time Java, Java and Latency research he does as part of his general Operating system study is frequently linked to other disciplines of science, such as Shrimp, therefore creating a link between diverse domains of science. His Web page, Web navigation, The Internet and Web application security study in the realm of World Wide Web interacts with subjects such as Value sensitive design. His work in Anonymity addresses issues such as Cryptocurrency, which are connected to fields such as Protocol.

He most often published in these fields:

  • Computer security (42.95%)
  • Internet privacy (16.11%)
  • Operating system (14.09%)

What were the highlights of his more recent work (between 2013-2021)?

  • Computer security (42.95%)
  • Internet privacy (16.11%)
  • Cryptocurrency (4.03%)

In recent papers he was focusing on the following fields of study:

His scientific interests lie mostly in Computer security, Internet privacy, Cryptocurrency, Anonymity and Artificial intelligence. While the research belongs to areas of Computer security, Edward W. Felten spends his time largely on the problem of Upload, intersecting his research to questions surrounding Consistency. His Internet privacy research incorporates elements of Biometrics, Password, Mobile device and Audit.

In his study, Scheme, Payment and Exploit is strongly linked to Protocol, which falls under the umbrella field of Cryptocurrency. His research in Anonymity intersects with topics in Emerging technologies, The Internet, Need to know and Digital currency. In the subject of general Key, his work in Key management is often linked to Mediation, thereby combining diverse domains of study.

Between 2013 and 2021, his most popular works were:

  • SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies (660 citations)
  • Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction (504 citations)
  • Mixcoin: Anonymity for Bitcoin with Accountable Mixes (230 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer security

His main research concerns Internet privacy, Computer security, Cryptocurrency, Anonymity and De-identification. Edward W. Felten has included themes like Web server, End user, Encryption, Communications system and Transparency in his Internet privacy study. In his study, Edward W. Felten carries out multidisciplinary Computer security and BitTorrent tracker research.

His Cryptocurrency study combines topics from a wide range of disciplines, such as Scheme, Payment and Protocol. His Anonymity research is multidisciplinary, incorporating elements of Key management, Key, Cryptography and Electronic money. His work carried out in the field of De-identification brings together such families of science as No Silver Bullet and Law and economics.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction

Arvind Narayanan;Joseph Bonneau;Edward Felten;Andrew Miller.
(2016)

1917 Citations

Lest we remember: cold-boot attacks on encryption keys

J. Alex Halderman;Seth D. Schoen;Nadia Heninger;William Clarkson.
Communications of The ACM (2009)

1635 Citations

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies

Joseph Bonneau;Joseph Bonneau;Joseph Bonneau;Andrew Miller;Jeremy Clark;Arvind Narayanan.
ieee symposium on security and privacy (2015)

1331 Citations

The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries

Joshua A. Kroll;Ian C. Davey;Edward W. Felten.
(2013)

689 Citations

Lest we remember: cold boot attacks on encryption keys

J. Alex Halderman;Seth D. Schoen;Nadia Heninger;William Clarkson.
usenix security symposium (2008)

520 Citations

A study of integrated prefetching and caching strategies

Pei Cao;Edward W. Felten;Anna R. Karlin;Kai Li.
measurement and modeling of computer systems (1995)

495 Citations

Large-step Markov chains for the Traveling Salesman Problem

Olivier C. Martin;Steve W. Otto;Edward W. Felten.
Complex Systems (1991)

494 Citations

Password management strategies for online accounts

Shirley Gaw;Edward W. Felten.
symposium on usable privacy and security (2006)

484 Citations

Java security: from HotJava to Netscape and beyond

D. Dean;E.W. Felten;D.S. Wallach.
ieee symposium on security and privacy (1996)

457 Citations

Mixcoin: Anonymity for Bitcoin with accountable mixes.

Joseph Bonneau;Arvind Narayanan;Andrew Miller;Jeremy Clark.
IACR Cryptology ePrint Archive (2014)

452 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Edward W. Felten

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 38

Lujo Bauer

Lujo Bauer

Carnegie Mellon University

Publications: 35

Tadayoshi Kohno

Tadayoshi Kohno

University of Washington

Publications: 27

Dan Boneh

Dan Boneh

Stanford University

Publications: 25

Sean W. Smith

Sean W. Smith

Dartmouth College

Publications: 25

Liviu Iftode

Liviu Iftode

Rutgers, The State University of New Jersey

Publications: 24

Joseph M. Jeddeloh

Joseph M. Jeddeloh

Micron (United States)

Publications: 24

John C. Mitchell

John C. Mitchell

Stanford University

Publications: 24

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 23

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 23

Thomas Stützle

Thomas Stützle

Université Libre de Bruxelles

Publications: 22

Lorrie Faith Cranor

Lorrie Faith Cranor

Carnegie Mellon University

Publications: 22

Dhabaleswar K. Panda

Dhabaleswar K. Panda

The Ohio State University

Publications: 21

Jaswinder Pal Singh

Jaswinder Pal Singh

Princeton University

Publications: 20

Dan S. Wallach

Dan S. Wallach

Rice University

Publications: 20

Junyi Li

Junyi Li

Qualcomm (United States)

Publications: 20

Trending Scientists

Demetrios G. Sampson

Demetrios G. Sampson

University of Piraeus

Myra B. Cohen

Myra B. Cohen

Iowa State University

Ganapati Panda

Ganapati Panda

C. V. Raman Global University

Sameer Pradhan

Sameer Pradhan

Vassar College

Mohamed Gabsi

Mohamed Gabsi

École Normale Supérieure Paris-Saclay

Himanshu Thapliyal

Himanshu Thapliyal

University of Kentucky

Huizhou Liu

Huizhou Liu

Chinese Academy of Sciences

Isao Noda

Isao Noda

University of Delaware

Edith Mäder

Edith Mäder

Leibniz Association

Kazuhiko Takeuchi

Kazuhiko Takeuchi

University of Tokyo

Adriano Nunes-Nesi

Adriano Nunes-Nesi

Universidade Federal de Viçosa

Adam Grundhoff

Adam Grundhoff

Heinrich-Pette-Institute

Robin J. Shattock

Robin J. Shattock

Imperial College London

Roberto Badaró

Roberto Badaró

Federal University of Bahia

Susanne M. Jaeggi

Susanne M. Jaeggi

University of California, Irvine

Brigitte Dreno

Brigitte Dreno

University of Nantes

Something went wrong. Please try again later.