D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 31 Citations 3,891 121 World Ranking 9911 National Ranking 87

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • Computer security

His primary scientific interests are in Computer network, Authentication, Computer security, Network packet and Node. His work deals with themes such as Network Access Device and Mobile database, which intersect with Computer network. His biological study spans a wide range of topics, including Trusted third party, Terminal and Secure communication.

His study focuses on the intersection of Computer security and fields such as Mobile device with connections in the field of Isolation, Password, Trusted Computing, Service provider and Provisioning. Jan-Erik Ekberg has researched Network packet in several fields, including Session key, Replay attack, Shared secret and Ring network. His study in Node is interdisciplinary in nature, drawing from both Computer program, Layer, Distributed computing and Directory service.

His most cited work include:

  • Implementation of charging in a telecommunications system (372 citations)
  • Authentication in a packet data network (313 citations)
  • Implementation of access service (220 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer network, Computer security, Authentication, Computer program and Embedded system. His Computer network research is multidisciplinary, incorporating elements of Network Access Control and Network Access Device. The concepts of his Computer security study are interwoven with issues in Usability and Mobile device.

His work carried out in the field of Authentication brings together such families of science as Payment, Smart card and Public-key cryptography. His Computer program research focuses on Distributed computing and how it relates to Layer and Key. His Embedded system research is multidisciplinary, incorporating perspectives in Terminal, Software and Hardware security module.

He most often published in these fields:

  • Computer network (40.71%)
  • Computer security (32.14%)
  • Authentication (19.29%)

What were the highlights of his more recent work (between 2012-2020)?

  • Computer security (32.14%)
  • Computer network (40.71%)
  • Software (12.14%)

In recent papers he was focusing on the following fields of study:

Jan-Erik Ekberg mainly investigates Computer security, Computer network, Software, Authentication and Software deployment. His work deals with themes such as Mobile device and Mobile computing, which intersect with Computer security. His study looks at the intersection of Computer network and topics like Cloud computing with Information privacy.

His work is dedicated to discovering how Software, Embedded system are connected with Hardware security module and other disciplines. The concepts of his Authentication study are interwoven with issues in Port, Call stack and Access control. The study incorporates disciplines such as User space, Instrumentation, Metadata and Microcontroller in addition to Software deployment.

Between 2012 and 2020, his most popular works were:

  • C-FLAT: Control-Flow Attestation for Embedded Systems Software (107 citations)
  • The Untapped Potential of Trusted Execution Environments on Mobile Devices (69 citations)
  • Trusted execution environments on mobile devices (44 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • Computer security

Jan-Erik Ekberg mostly deals with Computer security, Hardware security module, Software, Embedded system and Authentication. Jan-Erik Ekberg interconnects Identity and Mobile computing in the investigation of issues within Computer security. Jan-Erik Ekberg combines subjects such as Network security, Malware, Cloud computing, Enterprise information security architecture and Information privacy with his study of Hardware security module.

In the subject of general Software, his work in Memory corruption is often linked to Indirect branch, thereby combining diverse domains of study. Within one scientific family, Jan-Erik Ekberg focuses on topics pertaining to Source code under Embedded system, and may sometimes address concerns connected to Direct Anonymous Attestation. His Authentication research includes themes of Compiler and Microarchitecture.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Implementation of charging in a telecommunications system

Phillip Ginzboorg;Jan-Erik Ekberg;Antti Yla-Jaaski.
(1997)

434 Citations

Authentication in a packet data network

Antti Kuikka;Henry Haverinen;Jan-Erik Ekberg;Juha Ala-Laurila.
(2001)

313 Citations

Content distribution & communication system for enhancing service distribution in short range radio environment

Outi Markki;Jan-Erik Ekberg;Heikki Kokkinenh;Mika Kuoppala.
(2006)

282 Citations

Implementation of access service

Philip Ginzboorg;Jan-Erik Gustav Ekberg;Pekka Johannes Laitinen;Antti Ylä-J{umlaut over }ski.
(1998)

265 Citations

Secure device pairing based on a visual channel

Nitesh Saxena;Jan-Erik Ekberg;Kari Kostiainen;N. Asokan.
ieee symposium on security and privacy (2006)

250 Citations

C-FLAT: Control-Flow Attestation for Embedded Systems Software

Tigist Abera;N. Asokan;Lucas Davi;Jan-Erik Ekberg.
computer and communications security (2016)

216 Citations

System and method for authentication in a mobile communications system

Ekberg Jan-Erik.
(1999)

187 Citations

Administration of wireless local area networks

Nadarajah Asokan;Philip Ginzboorg;Seamus Moloney;Kari Ti. Kostiainen.
(2005)

174 Citations

Electronic payment schemes in a mobile environment for short-range transactions

Sampo Sovio;Jan-Erik Ekberg;Nadarajah Asokan;Pekka Lahtinen.
(2005)

166 Citations

Device detection and service discovery system and method for a mobile ad hoc communications network

Jan-Erik Ekberg;Pekka Lahtinen;Jaakko Lipasti.
(2003)

153 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Jan-Erik Ekberg

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 47

Nadarajah Asokan

Nadarajah Asokan

University of Waterloo

Publications: 40

Lyle W. Paczkowski

Lyle W. Paczkowski

Sprint (United States)

Publications: 34

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 28

Nitesh Saxena

Nitesh Saxena

University of Alabama at Birmingham

Publications: 28

Kent K. Leung

Kent K. Leung

Cisco Systems (United States)

Publications: 26

Jukka Reunamäki

Jukka Reunamäki

Nokia (Finland)

Publications: 18

Mark Zdeblick

Mark Zdeblick

Stanford University

Publications: 15

Siva G. Narendra

Siva G. Narendra

Tyfone, Inc.

Publications: 15

Vincent D. Park

Vincent D. Park

Qualcomm (United States)

Publications: 15

Rajiv Laroia

Rajiv Laroia

Qualcomm (United States)

Publications: 13

Lucas Davi

Lucas Davi

University of Duisburg-Essen

Publications: 11

Mauro Conti

Mauro Conti

University of Padua

Publications: 11

Tom Richardson

Tom Richardson

Qualcomm (United States)

Publications: 9

Kiran M. Rege

Kiran M. Rege

Nokia (United States)

Publications: 9

Zheng Yan

Zheng Yan

Xidian University

Publications: 8

Trending Scientists

David R. Millen

David R. Millen

IBM (United States)

Johannes V. Barth

Johannes V. Barth

Technical University of Munich

Neeraj Kumar

Neeraj Kumar

Council for Scientific and Industrial Research

Claude Lévy-Clément

Claude Lévy-Clément

Centre national de la recherche scientifique, CNRS

Erle C. Ellis

Erle C. Ellis

University of Maryland, Baltimore County

Steven C. Pennings

Steven C. Pennings

University of Houston

Daniel J. Salkeld

Daniel J. Salkeld

Colorado State University

Yao Huang

Yao Huang

Chinese Academy of Sciences

Carmen Lluch

Carmen Lluch

University of Granada

Andrew E. Allen

Andrew E. Allen

J. Craig Venter Institute

Teh-Lung Ku

Teh-Lung Ku

University of Southern California

Barkley C. Sive

Barkley C. Sive

National Park Service

Tamsin Ford

Tamsin Ford

University of Cambridge

Isabelle Salmon

Isabelle Salmon

Université Libre de Bruxelles

Lauren B. Resnick

Lauren B. Resnick

University of Pittsburgh

Benjamin O. Fordham

Benjamin O. Fordham

Binghamton University

Something went wrong. Please try again later.