H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 38 Citations 6,480 219 World Ranking 5119 National Ranking 75

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Programming language
  • Computer security

Computer security, Encryption, Computer network, Wireless sensor network and Programming language are his primary areas of study. His Computer security research is multidisciplinary, relying on both Industrial control system and Protocol. His work on Link layer, Block cipher and Advanced Encryption Standard as part of general Computer network study is frequently linked to Radio jamming and Jamming, therefore connecting diverse disciplines of science.

His Wireless sensor network study incorporates themes from Efficient energy use and Cryptography. His research combines Benchmark and Programming language. The concepts of his Probabilistic encryption study are interwoven with issues in Theoretical computer science and Client-side encryption.

His most cited work include:

  • Survey and benchmark of block ciphers for wireless sensor networks (256 citations)
  • A Survey of Provably Secure Searchable Encryption (189 citations)
  • Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols (172 citations)

What are the main themes of his work throughout his whole career to date?

His scientific interests lie mostly in Computer security, Programming language, Computer network, Encryption and Theoretical computer science. As part of his studies on Computer security, Pieter H. Hartel often connects relevant areas like Internet privacy. The various areas that Pieter H. Hartel examines in his Computer network study include Key and Distributed computing.

His research is interdisciplinary, bridging the disciplines of Scheme and Encryption. His On-the-fly encryption course of study focuses on Probabilistic encryption and Filesystem-level encryption. His Wireless sensor network study integrates concerns from other disciplines, such as Efficient energy use, Block cipher and Cluster analysis.

He most often published in these fields:

  • Computer security (30.68%)
  • Programming language (16.44%)
  • Computer network (10.96%)

What were the highlights of his more recent work (between 2011-2021)?

  • Computer security (30.68%)
  • Smart contract (3.84%)
  • Internet privacy (6.03%)

In recent papers he was focusing on the following fields of study:

His primary scientific interests are in Computer security, Smart contract, Internet privacy, Risk analysis and Social engineering. His Industrial control system research extends to Computer security, which is thematically connected. Pieter H. Hartel has researched Internet privacy in several fields, including Mobile phone, Finance, Personally identifiable information and Upload.

His Risk analysis research includes elements of Risk management, Order, Is security, Audit and Software engineering. His Social engineering study combines topics in areas such as Persuasion and Applied psychology. His research in Cryptography intersects with topics in SCADA and Data mining.

Between 2011 and 2021, his most popular works were:

  • A Survey of Provably Secure Searchable Encryption (189 citations)
  • Through the eye of the PLC: semantic security monitoring for industrial processes (106 citations)
  • Privacy in Recommender Systems (61 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Programming language
  • Computer security

The scientist’s investigation covers issues in Computer security, Homomorphic encryption, Industrial control system, Recommender system and Scheme. His work deals with themes such as SCADA and Phishing, which intersect with Computer security. His Recommender system research focuses on subjects like Social network, which are linked to Information retrieval, Similarity and Differential privacy.

His work carried out in the field of Scheme brings together such families of science as Database, Computer network, Encryption, Computer security model and Search algorithm. His research in Computer network tackles topics such as Private information retrieval which are related to areas like Symmetric-key algorithm. His Encryption research is multidisciplinary, incorporating elements of Document retrieval and Keyword search.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Survey and benchmark of block ciphers for wireless sensor networks

Yee Wei Law;Jeroen Doumen;Pieter Hartel.
ACM Transactions on Sensor Networks (2006)

386 Citations

Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols

Yee Wei Law;Marimuthu Palaniswami;Lodewijk Van Hoesel;Jeroen Doumen.
ACM Transactions on Sensor Networks (2009)

379 Citations

Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application

Luan Ibraimi;Milan Petkovic;Svetla Nikova;Pieter Hartel.
workshop on information security applications (2009)

313 Citations

A Survey of Provably Secure Searchable Encryption

Christoph Bösch;Pieter Hartel;Willem Jonker;Andreas Peter.
ACM Computing Surveys (2014)

299 Citations

Computationally efficient searchable symmetric encryption

Peter Van Liesdonk;Saeed Sedghi;Jeroen Doumen;Pieter Hartel.
very large data bases (2010)

265 Citations

Programming Languages: Implementations, Logics, and Programs

Hugh Glaser;Pieter Hartel;Herbert Kuchen.
(1995)

182 Citations

Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols

Yee Wei Law;Lodewijk van Hoesel;Jeroen Doumen;Pieter Hartel.
security of ad hoc and sensor networks (2005)

178 Citations

Through the eye of the PLC: semantic security monitoring for industrial processes

Dina Hadžiosmanović;Robin Sommer;Emmanuele Zambon;Pieter H. Hartel.
annual computer security applications conference (2014)

170 Citations

Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes

Luan Ibraimi;Qiang Tang;Pieter Hartel;Willem Jonker.
information security practice and experience (2009)

164 Citations

POSEIDON: a 2-tier anomaly-based network intrusion detection system

D. Bolzoni;S. Etalle;P. Hartel.
Fourth IEEE International Workshop on Information Assurance (IWIA'06) (2006)

160 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Pieter H. Hartel

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 20

Raymond N.J. Veldhuis

Raymond N.J. Veldhuis

University of Twente

Publications: 17

Christian Rathgeb

Christian Rathgeb

Darmstadt University of Applied Sciences

Publications: 17

Andreas Uhl

Andreas Uhl

University of Salzburg

Publications: 15

Alvaro A. Cardenas

Alvaro A. Cardenas

University of California, Santa Cruz

Publications: 13

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 12

Jin Li

Jin Li

Guangzhou University

Publications: 11

Yi Mu

Yi Mu

Fujian Normal University

Publications: 11

Cong Wang

Cong Wang

City University of Hong Kong

Publications: 10

Yang Xiao

Yang Xiao

University of Alabama

Publications: 10

Avishai Wool

Avishai Wool

Tel Aviv University

Publications: 10

Michael Steiner

Michael Steiner

Intel (United States)

Publications: 9

Javier Lopez

Javier Lopez

University of Malaga

Publications: 9

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 9

Stanislaw Jarecki

Stanislaw Jarecki

University of California, Irvine

Publications: 9

Something went wrong. Please try again later.