D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 34 Citations 5,047 133 World Ranking 8147 National Ranking 3789

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • Operating system
  • The Internet

His primary areas of investigation include Computer security, Computer network, Key management, Credential and Public-key cryptography. The Encryption, Chip Authentication Program and Multi-factor authentication research Mark Buer does as part of his general Computer security study is frequently linked to other disciplines of science, such as Boundary and Business, therefore creating a link between diverse domains of science. The various areas that Mark Buer examines in his Encryption study include Controller, Key, Data transmission and Wireless network.

His Computer network study combines topics from a wide range of disciplines, such as Mobile device and Network interface. The concepts of his Key management study are interwoven with issues in Stateless protocol, Routing, Hardware security module, Communications system and Information sensitivity. As part of one scientific family, he deals mainly with the area of Credential, narrowing it down to issues related to the Security token, and often Service, Resource and Identity.

His most cited work include:

  • Secure processing environment (192 citations)
  • Universal authentication token (183 citations)
  • Proximity authentication system (158 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer network, Computer security, Mobile device, Computer hardware and Wireless. Mark Buer usually deals with Computer network and limits it to topics linked to Bluetooth and Wireless access point. His research in the fields of Public-key cryptography, Encryption, Credential and Multi-factor authentication overlaps with other disciplines such as Security association.

His work carried out in the field of Mobile device brings together such families of science as GNSS applications, Controller, Wi-Fi array and Real-time computing. His Computer hardware study integrates concerns from other disciplines, such as Embedded system, Cryptography and Parallel computing. Mark Buer interconnects Identity, Task and Biometrics in the investigation of issues within Wireless.

He most often published in these fields:

  • Computer network (36.76%)
  • Computer security (20.59%)
  • Mobile device (18.38%)

What were the highlights of his more recent work (between 2011-2015)?

  • Computer network (36.76%)
  • Embedded system (13.24%)
  • Computer hardware (15.44%)

In recent papers he was focusing on the following fields of study:

Computer network, Embedded system, Computer hardware, Host and Near field communication are his primary areas of study. His study in Wireless extends to Computer network with its themes. His Wireless research is multidisciplinary, incorporating elements of GNSS augmentation and Identity.

His Embedded system research includes themes of Non-volatile memory, Mobile device, Fault, Countermeasure and Replay attack. His Computer hardware research incorporates themes from Interface, Multi interface and Encryption. His studies in Host integrate themes in fields like Controller, Mobile payment, State and Code.

Between 2011 and 2015, his most popular works were:

  • System and method for authentication via a proximate device (95 citations)
  • System and Method for Securely Provisioning and Generating One-Time-Passwords in a Remote Device (71 citations)
  • Hardware Isolated Secure Processing System Within A Secure Element (38 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Operating system
  • The Internet

Mark Buer mainly focuses on Embedded system, Computer network, Computer security, Near field communication and Host. Mark Buer has researched Computer network in several fields, including Input device and Mobile database. In general Computer security, his work in One-time password is often linked to Enforcement linking many areas of study.

His Near field communication research integrates issues from Controller, Mobile payment, Encryption and Code. His research in Encryption focuses on subjects like Mobile device, which are connected to Network Access Device. Mark Buer merges Host with Binary large object in his research.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Secure processing environment

Mark Buer.
(2005)

289 Citations

Universal authentication token

Mark Buer.
(2006)

287 Citations

Tagging mechanism for data path security processing

Mark L. Buer;Scott S. McDaniel.
(2003)

278 Citations

Proximity authentication system

Mark Buer;Ed Frank;Nambi Seshadri.
(2004)

242 Citations

Multi-Factor Authentication Using A Smartcard

Mark Buer.
(2006)

200 Citations

Data path security processing

Mark L. Buer;Scott S. McDaniel;Uri Elzur;Joseph J. Tardo.
(2009)

180 Citations

Method and system for an atomizing function of a mobile device

Arya Behzad;Mark Buer;Jeyhan Karaoguz;Alexander MacInnis.
(2007)

176 Citations

Proximity authentication system

Mark Buer;Edward H. Frank;Nambirajan Seshadri.
(2004)

164 Citations

Key management system and method

Mark L. Buer;Joseph J. Tardo.
(2002)

162 Citations

Key management system and method

Mark Buer;Joseph J. Tardo.
(2002)

157 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Mark Buer

Gregory G. Raleigh

Gregory G. Raleigh

New Enterprise Associates

Publications: 69

G. Glenn Henry

G. Glenn Henry

Centaur Technology

Publications: 23

Mark A. Malamud

Mark A. Malamud

Microsoft (United States)

Publications: 13

Robert W. Lord

Robert W. Lord

IBM (United States)

Publications: 13

Richard T. Lord

Richard T. Lord

Microsoft (United States)

Publications: 13

Royce A. Levien

Royce A. Levien

Fortress Invention

Publications: 13

Clarence T. Tegreene

Clarence T. Tegreene

Microsoft (United States)

Publications: 13

Marc Davis

Marc Davis

Yahoo (United Kingdom)

Publications: 11

Matthew A. Calman

Matthew A. Calman

GDI Experts

Publications: 11

Erik Stephen Ross

Erik Stephen Ross

Bank of America

Publications: 11

Ned M. Smith

Ned M. Smith

Intel (United States)

Publications: 11

Roderick A. Hyde

Roderick A. Hyde

University of California, Berkeley

Publications: 11

Xuedong Huang

Xuedong Huang

Microsoft (United States)

Publications: 8

Jonathan P. Bowen

Jonathan P. Bowen

London South Bank University

Publications: 7

Stephen William Edge

Stephen William Edge

Qualcomm (United Kingdom)

Publications: 7

Gilbert Wolrich

Gilbert Wolrich

Intel (United States)

Publications: 7

Trending Scientists

Li Yu

Li Yu

Zhejiang University of Technology

Raya Al-Dadah

Raya Al-Dadah

University of Birmingham

Norman Kerle

Norman Kerle

University of Twente

Mohammad S. Alam

Mohammad S. Alam

Texas A&M University – Kingsville

Alain Buléon

Alain Buléon

INRAE : Institut national de recherche pour l'agriculture, l'alimentation et l'environnement

Jacek Waluk

Jacek Waluk

Polish Academy of Sciences

Harold L. Drake

Harold L. Drake

University of Bayreuth

Giovanni Gaudino

Giovanni Gaudino

University of Hawaii at Manoa

Andrew Hooper

Andrew Hooper

University of Leeds

Thomas P. Kurosu

Thomas P. Kurosu

Jet Propulsion Lab

Emilio Salinas

Emilio Salinas

Wake Forest University

Weiping Zou

Weiping Zou

University of Michigan–Ann Arbor

Hans Popper

Hans Popper

Icahn School of Medicine at Mount Sinai

Melissa Wake

Melissa Wake

University of Melbourne

Jane Green

Jane Green

Memorial University of Newfoundland

David Bergqvist

David Bergqvist

Uppsala University

Something went wrong. Please try again later.