H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 30 Citations 4,116 92 World Ranking 8369 National Ranking 75

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • Computer security

His primary scientific interests are in Computer network, Authentication, Computer security, Network packet and Node. His work deals with themes such as Network Access Device and Mobile database, which intersect with Computer network. His biological study spans a wide range of topics, including Trusted third party, Terminal and Secure communication.

His study focuses on the intersection of Computer security and fields such as Mobile device with connections in the field of Isolation, Password, Trusted Computing, Service provider and Provisioning. Jan-Erik Ekberg has researched Network packet in several fields, including Session key, Replay attack, Shared secret and Ring network. His study in Node is interdisciplinary in nature, drawing from both Computer program, Layer, Distributed computing and Directory service.

His most cited work include:

  • Implementation of charging in a telecommunications system (372 citations)
  • Authentication in a packet data network (313 citations)
  • Implementation of access service (220 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer network, Computer security, Authentication, Computer program and Embedded system. His Computer network research is multidisciplinary, incorporating elements of Network Access Control and Network Access Device. The concepts of his Computer security study are interwoven with issues in Usability and Mobile device.

His work carried out in the field of Authentication brings together such families of science as Payment, Smart card and Public-key cryptography. His Computer program research focuses on Distributed computing and how it relates to Layer and Key. His Embedded system research is multidisciplinary, incorporating perspectives in Terminal, Software and Hardware security module.

He most often published in these fields:

  • Computer network (40.71%)
  • Computer security (32.14%)
  • Authentication (19.29%)

What were the highlights of his more recent work (between 2012-2020)?

  • Computer security (32.14%)
  • Computer network (40.71%)
  • Software (12.14%)

In recent papers he was focusing on the following fields of study:

Jan-Erik Ekberg mainly investigates Computer security, Computer network, Software, Authentication and Software deployment. His work deals with themes such as Mobile device and Mobile computing, which intersect with Computer security. His study looks at the intersection of Computer network and topics like Cloud computing with Information privacy.

His work is dedicated to discovering how Software, Embedded system are connected with Hardware security module and other disciplines. The concepts of his Authentication study are interwoven with issues in Port, Call stack and Access control. The study incorporates disciplines such as User space, Instrumentation, Metadata and Microcontroller in addition to Software deployment.

Between 2012 and 2020, his most popular works were:

  • C-FLAT: Control-Flow Attestation for Embedded Systems Software (107 citations)
  • The Untapped Potential of Trusted Execution Environments on Mobile Devices (69 citations)
  • Trusted execution environments on mobile devices (44 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • Computer security

Jan-Erik Ekberg mostly deals with Computer security, Hardware security module, Software, Embedded system and Authentication. Jan-Erik Ekberg interconnects Identity and Mobile computing in the investigation of issues within Computer security. Jan-Erik Ekberg combines subjects such as Network security, Malware, Cloud computing, Enterprise information security architecture and Information privacy with his study of Hardware security module.

In the subject of general Software, his work in Memory corruption is often linked to Indirect branch, thereby combining diverse domains of study. Within one scientific family, Jan-Erik Ekberg focuses on topics pertaining to Source code under Embedded system, and may sometimes address concerns connected to Direct Anonymous Attestation. His Authentication research includes themes of Compiler and Microarchitecture.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Implementation of charging in a telecommunications system

Phillip Ginzboorg;Jan-Erik Ekberg;Antti Yla-Jaaski.
(1997)

434 Citations

Authentication in a packet data network

Antti Kuikka;Henry Haverinen;Jan-Erik Ekberg;Juha Ala-Laurila.
(2001)

313 Citations

Content distribution & communication system for enhancing service distribution in short range radio environment

Outi Markki;Jan-Erik Ekberg;Heikki Kokkinenh;Mika Kuoppala.
(2006)

282 Citations

Implementation of access service

Philip Ginzboorg;Jan-Erik Gustav Ekberg;Pekka Johannes Laitinen;Antti Ylä-J{umlaut over }ski.
(1998)

265 Citations

Secure device pairing based on a visual channel

Nitesh Saxena;Jan-Erik Ekberg;Kari Kostiainen;N. Asokan.
ieee symposium on security and privacy (2006)

250 Citations

System and method for authentication in a mobile communications system

Ekberg Jan-Erik.
(1999)

187 Citations

Administration of wireless local area networks

Nadarajah Asokan;Philip Ginzboorg;Seamus Moloney;Kari Ti. Kostiainen.
(2005)

173 Citations

Electronic payment schemes in a mobile environment for short-range transactions

Sampo Sovio;Jan-Erik Ekberg;Nadarajah Asokan;Pekka Lahtinen.
(2005)

162 Citations

C-FLAT: Control-Flow Attestation for Embedded Systems Software

Tigist Abera;N. Asokan;Lucas Davi;Jan-Erik Ekberg.
computer and communications security (2016)

155 Citations

Device detection and service discovery system and method for a mobile ad hoc communications network

Jan-Erik Ekberg;Pekka Lahtinen;Jaakko Lipasti.
(2003)

153 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Jan-Erik Ekberg

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 47

Nadarajah Asokan

Nadarajah Asokan

University of Waterloo

Publications: 40

Lyle W. Paczkowski

Lyle W. Paczkowski

Sprint (United States)

Publications: 34

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 28

Nitesh Saxena

Nitesh Saxena

University of Alabama at Birmingham

Publications: 28

Kent K. Leung

Kent K. Leung

Cisco Systems (China)

Publications: 26

Jukka Reunamäki

Jukka Reunamäki

Nokia (Finland)

Publications: 18

Mark Zdeblick

Mark Zdeblick

Stanford University

Publications: 15

Siva G. Narendra

Siva G. Narendra

Tyfone, Inc.

Publications: 15

Vincent D. Park

Vincent D. Park

Qualcomm (United Kingdom)

Publications: 15

Rajiv Laroia

Rajiv Laroia

Qualcomm (United Kingdom)

Publications: 13

Lucas Davi

Lucas Davi

University of Duisburg-Essen

Publications: 11

Mauro Conti

Mauro Conti

University of Padua

Publications: 11

Tom Richardson

Tom Richardson

Qualcomm (United Kingdom)

Publications: 9

Kiran M. Rege

Kiran M. Rege

Nokia (United States)

Publications: 9

Something went wrong. Please try again later.