D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 54 Citations 16,839 149 World Ranking 2295 National Ranking 1242

Research.com Recognitions

Awards & Achievements

2012 - Fellow of the American Association for the Advancement of Science (AAAS)

2001 - ACM Fellow For foundational and highly influential contributions to cryptographic complexity theory, authorization and trust management, massive-data-stream computation, and algorithmic mechanism design.

Overview

What is she best known for?

The fields of study she is best known for:

  • The Internet
  • Computer network
  • Operating system

Joan Feigenbaum mainly focuses on Trust management, Computer security, Theoretical computer science, Discrete mathematics and Combinatorics. Her Trust management research integrates issues from The Internet, Knowledge management and Public-key cryptography. Her study on Computer security is mostly dedicated to connecting different topics, such as Internet privacy.

The study incorporates disciplines such as Programming language, Computation, Distributed algorithmic mechanism design and Multicast in addition to Theoretical computer science. Her Discrete mathematics research includes elements of Function and Computational complexity theory. Her Security policy research is multidisciplinary, incorporating elements of Security information and event management and Cryptography.

Her most cited work include:

  • Decentralized trust management (1911 citations)
  • The KeyNote Trust-Management System Version 2 (555 citations)
  • The role of trust management in distributed systems security (489 citations)

What are the main themes of her work throughout her whole career to date?

Her primary areas of investigation include Computer security, Discrete mathematics, Theoretical computer science, Combinatorics and Computer network. Her work deals with themes such as The Internet and Internet privacy, which intersect with Computer security. She combines subjects such as Function, Set and Computational complexity theory with her study of Discrete mathematics.

Joan Feigenbaum has included themes like Space and Secure multi-party computation, Computation in her Theoretical computer science study. Her Combinatorics research is multidisciplinary, relying on both PSPACE and Probabilistic logic. Her studies examine the connections between Computer network and genetics, as well as such issues in Distributed computing, with regards to Distributed algorithmic mechanism design.

She most often published in these fields:

  • Computer security (32.47%)
  • Discrete mathematics (17.32%)
  • Theoretical computer science (12.99%)

What were the highlights of her more recent work (between 2011-2020)?

  • Computer security (32.47%)
  • Computer network (11.69%)
  • Encryption (8.23%)

In recent papers she was focusing on the following fields of study:

The scientist’s investigation covers issues in Computer security, Computer network, Encryption, Internet privacy and Anonymity. In her study, Network security is strongly linked to The Internet, which falls under the umbrella field of Computer security. Her Encryption study integrates concerns from other disciplines, such as Secure multi-party computation, Computation, Cryptography, Key and Communications protocol.

She has included themes like Database and Intellectual property in her Cryptography study. Her biological study spans a wide range of topics, including Control, Information sensitivity, World Wide Web and Revenue. Her work deals with themes such as Probabilistic analysis of algorithms and A priori and a posteriori, which intersect with Anonymity.

Between 2011 and 2020, her most popular works were:

  • A new approach to interdomain routing based on secure multi-party computation (39 citations)
  • Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values (36 citations)
  • Probabilistic analysis of onion routing in a black-box model (35 citations)

In her most recent research, the most cited papers focused on:

  • The Internet
  • Computer network
  • Operating system

Joan Feigenbaum spends much of her time researching Computer security, Secure multi-party computation, Computer network, Computation and Adversary. As part of her studies on Computer security, she frequently links adjacent subjects like The Internet. Joan Feigenbaum interconnects Network element, Information assurance and Internet privacy in the investigation of issues within The Internet.

The study incorporates disciplines such as Field, Guard, Theoretical computer science and Boolean circuit in addition to Secure multi-party computation. Her study looks at the intersection of Computation and topics like Distributed computing with Secure two-party computation and Encryption. Joan Feigenbaum usually deals with Adversary and limits it to topics linked to Autonomous system and Network simulation, Path, Network security and Network architecture.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Decentralized trust management

Matt Blaze;Joan Feigenbaum;Jack Lacy.
ieee symposium on security and privacy (1996)

3332 Citations

The KeyNote Trust-Management System Version 2

M. Blaze;J. Feigenbaum;J. Ioannidis;A. Keromytis.
RFC (1999)

1089 Citations

The role of trust management in distributed systems security

Matt Blaze;Joan Feigenbaum;John Ioannidis;Angelos D. Keromytis.
Secure Internet programming (2001)

744 Citations

Delegation logic: A logic-based approach to distributed authorization

Ninghui Li;Benjamin N. Grosof;Joan Feigenbaum.
ACM Transactions on Information and System Security (2003)

580 Citations

Distributed algorithmic mechanism design: recent results and future directions

Joan Feigenbaum;Scott Shenker.
international workshop on discrete algorithms and methods for mobile computing and communications (2002)

571 Citations

The KeyNote trust management system version2, IETF RFC 2704

Matt Blaze;Joan Feigenbaum;John Ioannidis;Angelos D. Keromytis.
(1999)

570 Citations

Sharing the Cost of Multicast Transmissions

Joan Feigenbaum;Christos H. Papadimitriou;Scott Shenker.
Journal of Computer and System Sciences (2001)

562 Citations

A BGP-based mechanism for lowest-cost routing

Joan Feigenbaum;Christos Papadimitriou;Rahul Sami;Scott Shenker.
Distributed Computing (2005)

531 Citations

Information accountability

Daniel J. Weitzner;Harold Abelson;Tim Berners-Lee;Joan Feigenbaum.
Communications of The ACM (2008)

509 Citations

REFEREE: trust management for Web applications

Yang-Hua Chu;Joan Feigenbaum;Brian LaMacchia;Paul Resnick.
the web conference (1997)

484 Citations

Best Scientists Citing Joan Feigenbaum

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 50

Yuval Ishai

Yuval Ishai

Technion – Israel Institute of Technology

Publications: 42

Lalana Kagal

Lalana Kagal

MIT

Publications: 36

Andrew McGregor

Andrew McGregor

University of Massachusetts Amherst

Publications: 34

Graham Cormode

Graham Cormode

University of Warwick

Publications: 34

Jonathan M. Smith

Jonathan M. Smith

University of Pennsylvania

Publications: 34

Eyal Kushilevitz

Eyal Kushilevitz

Technion – Israel Institute of Technology

Publications: 32

Vijay Varadharajan

Vijay Varadharajan

University of Newcastle Australia

Publications: 31

Sudipto Guha

Sudipto Guha

University of Pennsylvania

Publications: 31

Michael Schapira

Michael Schapira

Hebrew University of Jerusalem

Publications: 30

Tim Finin

Tim Finin

University of Maryland, Baltimore County

Publications: 29

Marianne Winslett

Marianne Winslett

University of Illinois at Urbana-Champaign

Publications: 25

Fabio Massacci

Fabio Massacci

Vrije Universiteit Amsterdam

Publications: 25

Ninghui Li

Ninghui Li

Purdue University West Lafayette

Publications: 25

David C. Parkes

David C. Parkes

Harvard University

Publications: 25

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.