D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 37 Citations 5,566 347 World Ranking 6857 National Ranking 3250

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • Computer security

His primary areas of investigation include Computer security, Authentication, Embedded system, Operating system and Computer network. His Computer security study incorporates themes from Identifier and Service provider. His Authentication study integrates concerns from other disciplines, such as Credential, Key, Role-based access control and Biometrics.

His work deals with themes such as Security policy, Kernel, System software and Partition, which intersect with Embedded system. His Computer network research is multidisciplinary, incorporating perspectives in Communication channel and Personalization. His Trusted Platform Module research integrates issues from Trusted Computing, Direct Anonymous Attestation, Trusted Network Connect, Virtual machine and Encryption.

His most cited work include:

  • Providing Integrity Verification And Attestation In A Hidden Execution Environment (140 citations)
  • System and method for combining user and platform authentication in negotiated channel security protocols (101 citations)
  • Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains (93 citations)

What are the main themes of his work throughout his whole career to date?

His primary scientific interests are in Computer network, Computer security, Operating system, Authentication and Key. His Computer network research incorporates elements of Enhanced Data Rates for GSM Evolution and Edge computing. His biological study spans a wide range of topics, including Service provider, Database transaction and Protocol.

His research integrates issues of Computer hardware and Embedded system in his study of Operating system. His studies in Authentication integrate themes in fields like Security token and Credential. His research in Trusted Platform Module intersects with topics in Trusted Network Connect and Direct Anonymous Attestation.

He most often published in these fields:

  • Computer network (37.89%)
  • Computer security (29.47%)
  • Operating system (12.63%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer network (37.89%)
  • Enhanced Data Rates for GSM Evolution (5.96%)
  • Edge computing (5.26%)

In recent papers he was focusing on the following fields of study:

Ned M. Smith mainly focuses on Computer network, Enhanced Data Rates for GSM Evolution, Edge computing, Computer security and Node. His study in the fields of Network packet, Encryption, Identifier and Authentication under the domain of Computer network overlaps with other disciplines such as Onboarding. His work on Encryption is being expanded to include thematically relevant topics such as Key.

Ned M. Smith usually deals with Authentication and limits it to topics linked to Security token and Request–response, Name server, Access control list and Credential. His Computer security study is mostly concerned with Blockchain and Cryptography. In his study, Digital economy is strongly linked to Cloud computing, which falls under the umbrella field of Node.

Between 2017 and 2021, his most popular works were:

  • DECENTRALIZED DATA STORAGE AND PROCESSING FOR IoT DEVICES (20 citations)
  • Methods and apparatus to facilitate blockchain-based boot tracking (16 citations)
  • QUALITY OF SERVICE (QoS) MANAGEMENT IN EDGE COMPUTING ENVIRONMENTS (13 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Ned M. Smith mostly deals with Computer network, Enhanced Data Rates for GSM Evolution, Edge computing, Blockchain and Computer security. His work carried out in the field of Computer network brings together such families of science as Communication interface, Hash function, Cloud computing and Identification. The various areas that Ned M. Smith examines in his Enhanced Data Rates for GSM Evolution study include Identifier, Application lifecycle management, Distributed Computing Environment and Authorization.

His study on Edge computing also encompasses disciplines like

  • Multi access which connect with User equipment, Routing, Wireless and User agent,
  • Edge device which connect with Quality of service and Resource allocation,
  • Service which intersects with area such as Computer hardware and Access network. The concepts of his Blockchain study are interwoven with issues in Trusted Computing, Interoperability and Survivability. His work on Multi-factor authentication as part of general Computer security study is frequently linked to Business data processing, therefore connecting diverse disciplines of science.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Hardware-based device authentication

Vincent Edward Von Bokern;Purushottam Goel;Sven Schrecker;Ned McArthur Smith.
(2012)

297 Citations

Hardware-based device authentication

Vincent Edward Von Bokern;Purushottam Goel;Sven Schrecker;Ned McArthur Smith.
(2012)

297 Citations

Providing Integrity Verification And Attestation In A Hidden Execution Environment

Ned M. Smith;Vedvyas Shanbhogue;Arvind Kumar;Purushottam Goel.
(2010)

174 Citations

Providing Integrity Verification And Attestation In A Hidden Execution Environment

Ned M. Smith;Vedvyas Shanbhogue;Arvind Kumar;Purushottam Goel.
(2010)

174 Citations

Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains

Thomas Hardjono;Ned Smith.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (2016)

166 Citations

Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains

Thomas Hardjono;Ned Smith.
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security (2016)

166 Citations

System and method for combining user and platform authentication in negotiated channel security protocols

Ned M. Smith.
(2009)

153 Citations

System and method for combining user and platform authentication in negotiated channel security protocols

Ned M. Smith.
(2009)

153 Citations

Protected device management

Smit Ned M;Mur Viktorija K;Grobmehn Stiven L.
(2010)

140 Citations

Protected device management

Ned M. Smith;Victoria C. Moore;Steven L. Grobman.
(2010)

140 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Ned M. Smith

Irwin Gerszberg

Irwin Gerszberg

AT&T (United States)

Publications: 117

Paul Shala Henry

Paul Shala Henry

AT&T (United States)

Publications: 115

Robert Bennett

Robert Bennett

AT&T (United States)

Publications: 113

Farhad Barzegar

Farhad Barzegar

AT&T (United States)

Publications: 69

Eric Jason Brandwine

Eric Jason Brandwine

Amazon (United States)

Publications: 19

G. Glenn Henry

G. Glenn Henry

Centaur Technology

Publications: 16

Vincent J. Zimmer

Vincent J. Zimmer

Intel (United States)

Publications: 14

Ethan L. Miller

Ethan L. Miller

University of California, Santa Cruz

Publications: 12

Marcel van Os

Marcel van Os

Apple (United States)

Publications: 9

Randall Scott Springfield

Randall Scott Springfield

Lenovo (Singapore)

Publications: 7

David M. Durham

David M. Durham

Intel (United States)

Publications: 7

Stephane H. Maes

Stephane H. Maes

Hewlett-Packard (United States)

Publications: 7

Michael A. Rothman

Michael A. Rothman

Intel (United States)

Publications: 7

Valentina Salapura

Valentina Salapura

Advanced Micro Devices (United States)

Publications: 6

Selim Aissi

Selim Aissi

ICE Mortgage Technology

Publications: 6

Inhyok Cha

Inhyok Cha

CJ Olivenetworks

Publications: 6

Trending Scientists

Mary Shaw

Mary Shaw

Carnegie Mellon University

Stephen Tallman

Stephen Tallman

University of Richmond

Bruno Cassiman

Bruno Cassiman

KU Leuven

Bede Liu

Bede Liu

Princeton University

Min Zhou

Min Zhou

Georgia Institute of Technology

Yuefeng Ji

Yuefeng Ji

Beijing University of Posts and Telecommunications

Masaki Otagiri

Masaki Otagiri

Sojo University

Elsa Lundanes

Elsa Lundanes

University of Oslo

Barbara J. Garrison

Barbara J. Garrison

Pennsylvania State University

Raphael Lamed

Raphael Lamed

Tel Aviv University

Leonard W. Seymour

Leonard W. Seymour

University of Oxford

David Archer

David Archer

University of Chicago

Danny H Natawidjaja

Danny H Natawidjaja

Indonesian Institute of Sciences

Albert M. Galaburda

Albert M. Galaburda

Beth Israel Deaconess Medical Center

Henk J. Blom

Henk J. Blom

Erasmus MC

Scott N. Gettinger

Scott N. Gettinger

Yale University

Something went wrong. Please try again later.