D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 33 Citations 3,973 147 World Ranking 6932 National Ranking 3291

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Computer network
  • Artificial intelligence

His main research concerns Computer security, Computer network, Wireless, Authentication and Pairing. His work on Access control, Key management and Secret sharing as part of general Computer security study is frequently linked to Admission control and Relay attack, bridging the gap between disciplines. The Computer network study combines topics in areas such as Mobile ad hoc network, Wireless ad hoc network and Key.

His work in Key addresses issues such as Secrecy, which are connected to fields such as Password. His Wireless course of study focuses on Usability and Secure channel, Bootstrapping, Evil twin, Man-in-the-middle attack and World Wide Web. His research integrates issues of Trusted third party, Hash function, Secure communication and Public-key cryptography in his study of Authentication.

His most cited work include:

  • Secure device pairing based on a visual channel (217 citations)
  • The pollution attack in P2P live video streaming: measurement results and defenses (105 citations)
  • Admission control in Peer-to-Peer: design and performance evaluation (92 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of study are Computer security, Authentication, Computer network, Usability and Password. Nitesh Saxena undertakes multidisciplinary investigations into Computer security and Relay attack in his work. His biological study deals with issues like Security token, which deal with fields such as Smartwatch.

Nitesh Saxena combines subjects such as Wireless, Mobile ad hoc network, Bluetooth, Wireless ad hoc network and Communication channel with his study of Computer network. The Usability study combines topics in areas such as User experience design, Man-in-the-middle attack and CAPTCHA. His research in Password intersects with topics in Authenticated Key Exchange, Side channel attack and Multi-factor authentication.

He most often published in these fields:

  • Computer security (58.48%)
  • Authentication (29.24%)
  • Computer network (28.07%)

What were the highlights of his more recent work (between 2019-2021)?

  • Password (19.30%)
  • Authentication (29.24%)
  • Computer security (58.48%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Password, Authentication, Computer security, Wearable computer and Voice command device. His study in Password is interdisciplinary in nature, drawing from both Authenticated Key Exchange and Record locking. His Authentication research incorporates themes from Server and Gesture.

His study in Computer security concentrates on Vulnerability and Private information retrieval. His study on Voice command device also encompasses disciplines like

  • Direct voice input which intersects with area such as Replay attack,
  • Human–computer interaction which intersects with area such as Security token,
  • Credit card, which have a strong connection to Speech recognition. His Cryptographic protocol study contributes to a more complete understanding of Computer network.

Between 2019 and 2021, his most popular works were:

  • Voicefox: Leveraging Inbuilt Transcription to Enhance the Security of Machine-Human Speaker Verification against Voice Synthesis Attacks (1 citations)
  • WearID: Wearable-Assisted Low-Effort Authentication to Voice Assistants using Cross-Domain Speech Similarity. (1 citations)
  • Two-factor Password-authenticated Key Exchange with End-to-end Security (0 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Artificial intelligence
  • Computer network

Nitesh Saxena mainly investigates Information sensitivity, Voice command device, Direct voice input, Smartwatch and Human–computer interaction. He has researched Information sensitivity in several fields, including Security token, Wearable computer and Microphone.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Secure device pairing based on a visual channel

Nitesh Saxena;Jan-Erik Ekberg;Kari Kostiainen;N. Asokan.
ieee symposium on security and privacy (2006)

250 Citations

The pollution attack in P2P live video streaming: measurement results and defenses

Prithula Dhungel;Xiaojun Hei;Keith W. Ross;Nitesh Saxena.
Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV (2007)

168 Citations

Estimating age privacy leakage in online social networks

Ratan Dey;Cong Tang;Keith Ross;Nitesh Saxena.
international conference on computer communications (2012)

127 Citations

Admission control in Peer-to-Peer: design and performance evaluation

Nitesh Saxena;Gene Tsudik;Jeong Hyun Yi.
security of ad hoc and sensor networks (2003)

124 Citations

What's in a name: a study of names, gender inference, and gender behavior in facebook

Cong Tang;Keith Ross;Nitesh Saxena;Ruichuan Chen.
database systems for advanced applications (2011)

112 Citations

Secure proximity detection for NFC devices based on ambient sensor data

Tzipora Halevi;Di Ma;Nitesh Saxena;Tuo Xiang.
european symposium on research in computer security (2012)

109 Citations

A comparative study of secure device pairing methods

Arun Kumar;Nitesh Saxena;Gene Tsudik;Ersin Uzun.
Pervasive and Mobile Computing (2009)

101 Citations

Password-protected secret sharing

Ali Bagherzandi;Stanislaw Jarecki;Nitesh Saxena;Yanbin Lu.
computer and communications security (2011)

101 Citations

On the privacy of web search based on query obfuscation: a case study of TrackMeNot

Sai Teja Peddinti;Nitesh Saxena.
privacy enhancing technologies (2010)

97 Citations

Caveat eptor: A comparative study of secure device pairing methods

Arun Kumar;Nitesh Saxena;Gene Tsudik;Ersin Uzun.
ieee international conference on pervasive computing and communications (2009)

95 Citations

Best Scientists Citing Nitesh Saxena

Robert R. Friedlander

Robert R. Friedlander

IBM (United States)

Publications: 25

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 24

Mauro Conti

Mauro Conti

University of Padua

Publications: 19

James R. Kraemer

James R. Kraemer

IBM (United States)

Publications: 16

Nadarajah Asokan

Nadarajah Asokan

University of Waterloo

Publications: 14

David Kotz

David Kotz

Dartmouth College

Publications: 12

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 12

Roberto Di Pietro

Roberto Di Pietro

Hamad bin Khalifa University

Publications: 12

Yuval Elovici

Yuval Elovici

Ben-Gurion University of the Negev

Publications: 11

Shlomi Dolev

Shlomi Dolev

Ben-Gurion University of the Negev

Publications: 11

Kui Ren

Kui Ren

Zhejiang University

Publications: 10

Hugo Krawczyk

Hugo Krawczyk

Algorand Foundation

Publications: 8

Yanchao Zhang

Yanchao Zhang

Arizona State University

Publications: 8

Alfred Kobsa

Alfred Kobsa

University of California, Irvine

Publications: 8

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 8

Patrick Traynor

Patrick Traynor

University of Florida

Publications: 7

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.