H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 62 Citations 13,389 237 World Ranking 1340 National Ranking 54

Research.com Recognitions

Awards & Achievements

2018 - ACM Fellow For contributions to systems security and privacy, especially of mobile systems

2017 - IEEE Fellow For contributions to system security and privacy

2015 - ACM Distinguished Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

The scientist’s investigation covers issues in Computer security, Computer network, Authentication, Digital signature and Context. He studies Cryptography, a branch of Computer security. His Computer network study incorporates themes from Key and Network Access Device.

His studies deal with areas such as Gateway, Cellular digital packet data, Computer program, GSM and Alias as well as Authentication. While the research belongs to areas of Digital signature, he spends his time largely on the problem of Public-key cryptography, intersecting his research to questions surrounding Certificate. His Context research is multidisciplinary, incorporating elements of Security policy, Delay-tolerant networking, Identity and Bootstrapping.

His most cited work include:

  • Optimistic protocols for fair exchange (453 citations)
  • Key agreement in ad hoc networks (404 citations)
  • Authentication in a packet data network (313 citations)

What are the main themes of his work throughout his whole career to date?

Nadarajah Asokan mainly focuses on Computer security, Computer network, Authentication, Mobile device and Software. His Computer security research integrates issues from Context and Usability. The concepts of his Computer network study are interwoven with issues in Wireless, Bluetooth and Cloud computing.

His Authentication research is multidisciplinary, relying on both Smart card and Cryptography. Mobile device and Trusted Computing are frequently intertwined in his study. His studies in Password integrate themes in fields like Phishing and Server.

He most often published in these fields:

  • Computer security (51.57%)
  • Computer network (23.93%)
  • Authentication (20.51%)

What were the highlights of his more recent work (between 2015-2021)?

  • Computer security (51.57%)
  • Authentication (20.51%)
  • Computer network (23.93%)

In recent papers he was focusing on the following fields of study:

Nadarajah Asokan mostly deals with Computer security, Authentication, Computer network, Cloud computing and Software. His work carried out in the field of Computer security brings together such families of science as Phishing and World Wide Web. The study incorporates disciplines such as Class, Context, Usability and Access control in addition to Authentication.

His research integrates issues of Trusted Computing and Wireless in his study of Computer network. The various areas that he examines in his Cloud computing study include Latency, Service, Artificial neural network, Data loss and Key distribution. Nadarajah Asokan has researched Software in several fields, including Instrumentation, Software deployment, Pointer, Embedded system and Control flow.

Between 2015 and 2021, his most popular works were:

  • Oblivious Neural Network Predictions via MiniONN Transformations (253 citations)
  • IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT (229 citations)
  • Practical attacks against privacy and availability in 4G/LTE mobile communication systems (115 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

His scientific interests lie mostly in Computer security, Software, Computer network, Malware and Cloud computing. His Computer security research incorporates themes from Scheme, Phishing and Identification. His Software study integrates concerns from other disciplines, such as Security service, Instrumentation and Embedded system.

Nadarajah Asokan conducts interdisciplinary study in the fields of Computer network and Service provider through his research. His study in Malware is interdisciplinary in nature, drawing from both Context, Intrusion detection system, Internet privacy and Training set. Nadarajah Asokan combines subjects such as Quality of service, Latency, Secure two-party computation and Network security with his study of Cloud computing.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Optimistic protocols for fair exchange

N. Asokan;Matthias Schunter;Michael Waidner.
computer and communications security (1997)

675 Citations

Key agreement in ad hoc networks

N Asokan;P Ginzboorg.
Computer Communications (2000)

671 Citations

Asynchronous protocols for optimistic fair exchange

N. Asokan;V. Shoup;M. Waidner.
ieee symposium on security and privacy (1998)

486 Citations

State of the art in electronic payment systems

N. Asokan;Philippe A. Janson;Michael Steiner;Michael Waidner.
Advances in Computers (2000)

406 Citations

The state of the art in electronic payment systems

N. Asokan;P.A. Janson;M. Steiner;M. Waidner.
IEEE Computer (1997)

405 Citations

Man-in-the-middle in tunnelled authentication protocols

N. Asokan.
international workshop on security (2003)

354 Citations

Authentication in a packet data network

Antti Kuikka;Henry Haverinen;Jan-Erik Ekberg;Juha Ala-Laurila.
(2001)

313 Citations

Oblivious Neural Network Predictions via MiniONN Transformations

Jian Liu;Mika Juuti;Yao Lu;N. Asokan.
computer and communications security (2017)

310 Citations

Fairness in electronic commerce

N. Asokan.
(1998)

288 Citations

Protecting the Computation Results of Free-Roaming Agents

Günter Karjoth;N. Asokan;Ceki Gülcü.
Lecture Notes in Computer Science (1998)

269 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Nadarajah Asokan

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 64

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 55

Nitesh Saxena

Nitesh Saxena

University of Alabama at Birmingham

Publications: 45

Mauro Conti

Mauro Conti

University of Padua

Publications: 40

Lyle W. Paczkowski

Lyle W. Paczkowski

Sprint (United States)

Publications: 36

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 32

Jianying Zhou

Jianying Zhou

Singapore University of Technology and Design

Publications: 31

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 27

John D. Rinaldo

John D. Rinaldo

SEARETE LLC

Publications: 20

Royce A. Levien

Royce A. Levien

Fortress Invention

Publications: 20

Robert W. Lord

Robert W. Lord

Microsoft (United States)

Publications: 20

Edward K. Y. Jung

Edward K. Y. Jung

Nortel (Canada)

Publications: 20

Mark A. Malamud

Mark A. Malamud

Microsoft (United States)

Publications: 20

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 20

Helger Lipmaa

Helger Lipmaa

University of Tartu

Publications: 18

Something went wrong. Please try again later.