D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 35 Citations 5,195 74 World Ranking 7684 National Ranking 3589

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • Software

Michael F. Angelo focuses on Computer security, Computer network, Embedded system, One-time password and Password. In the field of Computer security, his study on Security system and Data security overlaps with subjects such as Covert channel, Logical security and Action. His work in the fields of Encryption overlaps with other areas such as Multipath I/O.

His Embedded system research includes elements of Keyboard computer, System Management Mode, Systems management, Malware and Form factor. His One-time password research is multidisciplinary, relying on both Security token and S/KEY. Michael F. Angelo has included themes like Hash chain and Smart card in his Security token study.

His most cited work include:

  • System and method for performing secure device communications in a peer-to-peer bus architecture (314 citations)
  • Secure software registration and integrity assessment in a computer system (276 citations)
  • After the fact protection of data in remote personal and wireless devices (191 citations)

What are the main themes of his work throughout his whole career to date?

His scientific interests lie mostly in Computer network, Embedded system, Computer security, Computer hardware and Encryption. Michael F. Angelo focuses mostly in the field of Computer network, narrowing it down to matters related to Hash function and, in some cases, Blockchain. His research in Embedded system intersects with topics in Mode, Global Positioning System and Command and control.

His Password and Security token study in the realm of Computer security connects with subjects such as Warranty and Logical security. His biological study spans a wide range of topics, including Network storage and Operating system. His research integrates issues of Password policy and Syskey in his study of S/KEY.

He most often published in these fields:

  • Computer network (30.00%)
  • Embedded system (27.50%)
  • Computer security (25.00%)

What were the highlights of his more recent work (between 2011-2021)?

  • Computer security (25.00%)
  • Blockchain (5.00%)
  • Authentication (7.50%)

In recent papers he was focusing on the following fields of study:

His main research concerns Computer security, Blockchain, Authentication, Computer network and Encryption. His work in the fields of Computer security, such as Security token, Cyber-attack and Password, overlaps with other areas such as Threshold number and Computing systems. His Authentication research is multidisciplinary, relying on both Session, Embedded system and Mobile device.

His research in the fields of Credential overlaps with other disciplines such as Mobile database. Michael F. Angelo combines subjects such as Virtual machine, Hash function, Cloud computing and Key with his study of Encryption. His study explores the link between Hash function and topics such as Tracking that cross with problems in Operating system.

Between 2011 and 2021, his most popular works were:

  • Techniques for device independent session migration (28 citations)
  • Proximity-based authentication (22 citations)
  • Techniques for secure data extraction in a virtual or cloud environment (14 citations)

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

System and method for performing secure device communications in a peer-to-peer bus architecture

Michael F. Angelo;Sompong P. Olarig;David R. Wooten;Dan J. Driscoll.
(1997)

484 Citations

Secure software registration and integrity assessment in a computer system

Michael F. Angelo.
(1996)

421 Citations

After the fact protection of data in remote personal and wireless devices

Michael Angelo;Manuel Novoa;Sompong Olarig.
(2001)

289 Citations

Smart card with fingerprint image pass-through

Michael F. Angelo;Steve H. Park;Mark B. Tellez.
(1999)

258 Citations

Method for controlling access to a computer system by utilizing an external device containing a hash value representation of a user password

Michael F. Angelo.
(1996)

203 Citations

Hardware theft-protection architecture

Sompong P. Olarig;Michael F. Angelo;Kenneth A. Jansen.
(1997)

199 Citations

Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryption algorithm

Michael F. Angelo.
(1996)

189 Citations

Secure two-piece user authentication in a computer network

Michael F. Houston Angelo;Sompong P. Cypress Olarig.
(1997)

178 Citations

Error detection and correction

Sompong P. Olarig;Michael F. Angelo.
(1996)

164 Citations

Method for securely communicating remote control commands in a computer network

Michel F. Angelo;David L. Collins;Kenneth A. Jansen;Donald D. Kim.
(1998)

153 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Michael F. Angelo

Gilbert Neiger

Gilbert Neiger

Intel (United States)

Publications: 43

Renato J. Recio

Renato J. Recio

IBM (United States)

Publications: 28

Randall Scott Springfield

Randall Scott Springfield

Lenovo (Singapore)

Publications: 27

Herbert A. Little

Herbert A. Little

Blackberry (United States)

Publications: 25

Richard Uhlig

Richard Uhlig

Intel (United States)

Publications: 24

Paul England

Paul England

Microsoft (United States)

Publications: 21

Vincent J. Zimmer

Vincent J. Zimmer

Intel (United States)

Publications: 21

James Peter Ward

James Peter Ward

IBM (United States)

Publications: 19

Neil Patrick Adams

Neil Patrick Adams

Blackberry (United States)

Publications: 19

Michael Kozuch

Michael Kozuch

Intel (United States)

Publications: 18

Howard Locker

Howard Locker

IBM (United States)

Publications: 16

Daryl Carvis Cromer

Daryl Carvis Cromer

IBM (United States)

Publications: 16

David Carroll Challener

David Carroll Challener

Johns Hopkins University

Publications: 16

Steven Mark Thurber

Steven Mark Thurber

IBM (United States)

Publications: 14

Douglas M. Freimuth

Douglas M. Freimuth

IBM (United States)

Publications: 14

Frederick A. Ware

Frederick A. Ware

Rambus (United Kingdom)

Publications: 14

Trending Scientists

Rui Wang

Rui Wang

Tianjin University of Science and Technology

Jinkui Tang

Jinkui Tang

Chinese Academy of Sciences

Bernhard Spengler

Bernhard Spengler

University of Giessen

Sooyeon Hwang

Sooyeon Hwang

Brookhaven National Laboratory

Christine L. Mummery

Christine L. Mummery

Leiden University Medical Center

M. Luke McCormack

M. Luke McCormack

Morton Arboretum

Dong Gun Lee

Dong Gun Lee

Kyungpook National University

Marilyn A. Anderson

Marilyn A. Anderson

La Trobe University

Raymond C. Sowder

Raymond C. Sowder

National Cancer Institute

Nils Olsen

Nils Olsen

Technical University of Denmark

Dirk H.G. Versteeg

Dirk H.G. Versteeg

Utrecht University

Nathan E. Crone

Nathan E. Crone

Johns Hopkins University

Amit X. Garg

Amit X. Garg

University of Western Ontario

Charles B. Eaton

Charles B. Eaton

Brown University

Axel Petzold

Axel Petzold

University College London

Fin Biering-Sørensen

Fin Biering-Sørensen

University of Copenhagen

Something went wrong. Please try again later.