H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 61 Citations 16,999 164 World Ranking 1447 National Ranking 51

Research.com Recognitions

Awards & Achievements

2008 - ACM Distinguished Member

2004 - IEEE Fellow For contributions to the theory and practice of information security, privacy and cryptography.

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Operating system
  • Computer network

Computer security, Cryptography, Cryptographic protocol, Distributed computing and Encryption are his primary areas of study. His Computer security research is multidisciplinary, relying on both Optimistic fair exchange, Payment, Software deployment and Internet privacy. His Cryptography research incorporates themes from Theoretical computer science, Digital signature, The Internet, Authentication and Key.

His work in Theoretical computer science tackles topics such as Key exchange which are related to areas like Key distribution, Hash-based message authentication code, Computational hardness assumption and Security of cryptographic hash functions. The Distributed computing study combines topics in areas such as Reactive system, Formal verification, Diffie–Hellman key exchange and Concrete security. His research integrates issues of Telecommunications network and Traffic analysis in his study of Encryption.

His most cited work include:

  • Diffie-Hellman key distribution extended to group communication (677 citations)
  • Key agreement in dynamic peer groups (550 citations)
  • Optimistic fair exchange of digital signatures (467 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, The Internet, Cryptography, Theoretical computer science and Internet privacy. He specializes in Computer security, namely Authentication. His work carried out in the field of The Internet brings together such families of science as Computer network and Man-in-the-middle attack.

His study in Cryptography is interdisciplinary in nature, drawing from both Key, Distributed computing, Encryption and Asynchronous communication. He interconnects Reactive system, Hash function and Formal methods in the investigation of issues within Theoretical computer science. His Cryptographic protocol study incorporates themes from Message authentication code, Hash-based message authentication code and Key exchange.

He most often published in these fields:

  • Computer security (49.00%)
  • The Internet (19.92%)
  • Cryptography (19.12%)

What were the highlights of his more recent work (between 2014-2020)?

  • Computer security (49.00%)
  • The Internet (19.92%)
  • Server (5.58%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer security, The Internet, Server, Computer network and DNS spoofing. Computer security and Denial-of-service attack are commonly linked in his work. He has researched The Internet in several fields, including Networking hardware, Cryptography and Internet privacy.

The concepts of his Internet privacy study are interwoven with issues in Security framework, Key and Industrial control system. His work on Name server as part of general Server study is frequently linked to Path MTU Discovery, bridging the gap between disciplines. Michael Waidner works mostly in the field of Computer network, limiting it down to topics relating to Round-robin DNS and, in certain cases, Internet users, Network topology, End user and Distributed computing.

Between 2014 and 2020, his most popular works were:

  • Security and privacy challenges in industrial internet of things (462 citations)
  • Domain Validation++ For MitM-Resilient PKI (29 citations)
  • Security in industrie 4.0 - challenges and solutions for the fourth industrial revolution (24 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Operating system
  • Computer network

His primary areas of investigation include Computer security, The Internet, Server, Computer network and DNS spoofing. As part of his studies on Computer security, Michael Waidner frequently links adjacent subjects like Internet privacy. His biological study spans a wide range of topics, including Key and Industrial control system.

The Internet and Cryptography are frequently intertwined in his study. He has included themes like Networking hardware, OpenFlow, Robustness and Router in his Cryptography study. The various areas that Michael Waidner examines in his DNS spoofing study include Domain and Man-in-the-middle attack, Authentication.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Diffie-Hellman key distribution extended to group communication

Michael Steiner;Gene Tsudik;Michael Waidner.
computer and communications security (1996)

1096 Citations

Key agreement in dynamic peer groups

M. Steiner;G. Tsudik;M. Waidner.
IEEE Transactions on Parallel and Distributed Systems (2000)

826 Citations

Optimistic protocols for fair exchange

N. Asokan;Matthias Schunter;Michael Waidner.
computer and communications security (1997)

675 Citations

Security and privacy challenges in industrial internet of things

Ahmad-Reza Sadeghi;Christian Wachsmann;Michael Waidner.
design automation conference (2015)

616 Citations

CLIQUES: a new approach to group key agreement

Michael J. Steiner;Gene Tsudik;Michael Waidner.
international conference on distributed computing systems (1998)

544 Citations

Asynchronous protocols for optimistic fair exchange

N. Asokan;V. Shoup;M. Waidner.
ieee symposium on security and privacy (1998)

486 Citations

Optimistic fair exchange of digital signatures

N. Asokan;V. Shoup;M. Waidner.
IEEE Journal on Selected Areas in Communications (2000)

467 Citations

A model for asynchronous reactive systems and its application to secure message transmission

B. Pfitzmann;M. Waidner.
ieee symposium on security and privacy (2001)

435 Citations

Refinement and extension of encrypted key exchange

Michael Steiner;Gene Tsudik;Michael Waidner.
Operating Systems Review (1995)

407 Citations

State of the art in electronic payment systems

N. Asokan;Philippe A. Janson;Michael Steiner;Michael Waidner.
Advances in Computers (2000)

406 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Michael Waidner

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 52

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 51

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 49

Jan Camenisch

Jan Camenisch

DFINITY

Publications: 44

Birgit Pfitzmann

Birgit Pfitzmann

IBM (United States)

Publications: 43

Ran Canetti

Ran Canetti

Boston University

Publications: 39

Ueli Maurer

Ueli Maurer

ETH Zurich

Publications: 33

John C. Mitchell

John C. Mitchell

Stanford University

Publications: 33

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 28

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 28

Jianying Zhou

Jianying Zhou

Singapore University of Technology and Design

Publications: 27

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 26

Andre Scedrov

Andre Scedrov

University of Pennsylvania

Publications: 26

Colin Boyd

Colin Boyd

Norwegian University of Science and Technology

Publications: 25

Yi Mu

Yi Mu

Fujian Normal University

Publications: 25

Something went wrong. Please try again later.