H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 39 Citations 10,792 230 World Ranking 4813 National Ranking 220

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

Stefan Katzenbeisser mainly investigates Computer security, Cryptography, Theoretical computer science, Encryption and Digital watermarking. His Computer security research includes themes of Mathematical proof, Computer network and Steganography. His Cryptography research is multidisciplinary, incorporating perspectives in Variety, Image, Key and Computer security model.

His Theoretical computer science research is multidisciplinary, relying on both Programming language, Software, Source code and Secure multi-party computation. He is studying Digital Watermarking Alliance, which is a component of Digital watermarking. His Digital Watermarking Alliance research includes elements of Cipher, Information hiding, Steganography tools, Steganalysis and Data Protection Act 1998.

His most cited work include:

  • Information Hiding Techniques for Steganography and Digital Watermarking (1676 citations)
  • Privacy-Preserving Face Recognition (421 citations)
  • PUFs: myth, fact or busted? a security evaluation of physically unclonable functions (PUFs) cast in silicon (187 citations)

What are the main themes of his work throughout his whole career to date?

Computer security, Cryptography, Encryption, Digital watermarking and Theoretical computer science are his primary areas of study. In his study, which falls under the umbrella issue of Computer security, Information hiding is strongly linked to Steganography. Cryptography is often connected to Embedded system in his work.

All of his Encryption and Homomorphic encryption and Public-key cryptography investigations are sub-components of the entire Encryption study. His work is dedicated to discovering how Homomorphic encryption, Secure multi-party computation are connected with Source code and other disciplines. The various areas that Stefan Katzenbeisser examines in his Digital watermarking study include Watermark and Multimedia.

He most often published in these fields:

  • Computer security (36.86%)
  • Cryptography (16.29%)
  • Encryption (15.43%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (36.86%)
  • Embedded system (10.86%)
  • Cryptography (16.29%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer security, Embedded system, Cryptography, Computer network and Dram. Stefan Katzenbeisser combines topics linked to Implementation with his work on Computer security. His work deals with themes such as Physical unclonable function, Software and Robustness, which intersect with Embedded system.

Stefan Katzenbeisser has researched Cryptography in several fields, including Timestamp and State. His research integrates issues of Hash function and Transmission in his study of Computer network. In his study, which falls under the umbrella issue of Encryption, Homomorphic encryption is strongly linked to Secure two-party computation.

Between 2016 and 2021, his most popular works were:

  • Depreciating Motivation and Empirical Security Analysis of Chaos-Based Image and Video Encryption (88 citations)
  • HyCC: Compilation of Hybrid Protocols for Practical Secure Computation (27 citations)
  • SCAPI: a scalable attestation protocol to detect software and physical attacks (27 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

His primary areas of study are Computer security, Cryptography, Embedded system, Dram and Computer network. His studies in Computer security integrate themes in fields like Component and Implementation. The Cryptography study combines topics in areas such as Scheme, State and Encryption.

His studies deal with areas such as Physical unclonable function and Network topology as well as Embedded system. His research investigates the link between Dram and topics such as Cryptographic protocol that cross with problems in Compiler and Secure multi-party computation. His Computer network research is multidisciplinary, incorporating elements of Hash function and Robustness.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Information Hiding Techniques for Steganography and Digital Watermarking

Stefan Katzenbeisser;Fabien A. Petitcolas.
(1999)

3389 Citations

Privacy-Preserving Face Recognition

Zekeriya Erkin;Martin Franz;Jorge Guajardo;Stefan Katzenbeisser.
privacy enhancing technologies (2009)

659 Citations

Distributed Attribute-Based Encryption

Sascha Müller;Stefan Katzenbeisser;Claudia Eckert.
international conference on information security and cryptology (2009)

274 Citations

Structure and Anonymity of the Bitcoin Transaction Graph

Micha Ober;Stefan Katzenbeisser;Kay Hamacher.
Future Internet (2013)

267 Citations

PUFs: myth, fact or busted? a security evaluation of physically unclonable functions (PUFs) cast in silicon

Stefan Katzenbeisser;Ünal Kocabaş;Vladimir Rožić;Ahmad-Reza Sadeghi.
cryptographic hardware and embedded systems (2012)

265 Citations

Privacy preserving error resilient dna searching through oblivious automata

Juan Ramón Troncoso-Pastoriza;Stefan Katzenbeisser;Mehmet Celik.
computer and communications security (2007)

241 Citations

Detecting malicious code by model checking

Johannes Kinder;Stefan Katzenbeisser;Christian Schallhart;Helmut Veith.
international conference on detection of intrusions and malware and vulnerability assessment (2005)

222 Citations

Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing

Zekeriya Erkin;Alessandro Piva;Stefan Katzenbeisser;R. L. Lagendijk.
Eurasip Journal on Information Security (2007)

205 Citations

Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs

Anthony Van Herrewege;Stefan Katzenbeisser;Roel Maes;Roel Peeters.
financial cryptography (2012)

165 Citations

Physically uncloneable functions in the universal composition framework

Christina Brzuska;Marc Fischlin;Heike Schröder;Stefan Katzenbeisser.
international cryptology conference (2011)

147 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Stefan Katzenbeisser

Thomas Schneider

Thomas Schneider

TU Darmstadt

Publications: 40

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 40

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 33

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 32

Mauro Barni

Mauro Barni

University of Siena

Publications: 29

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 28

Zheng Yan

Zheng Yan

Shanghai Jiao Tong University

Publications: 25

Farinaz Koushanfar

Farinaz Koushanfar

University of California, San Diego

Publications: 24

Jean-Pierre Hubaux

Jean-Pierre Hubaux

École Polytechnique Fédérale de Lausanne

Publications: 22

Alessandro Piva

Alessandro Piva

University of Florence

Publications: 22

Jiwu Huang

Jiwu Huang

Shenzhen University

Publications: 19

Mikhail J. Atallah

Mikhail J. Atallah

Purdue University West Lafayette

Publications: 19

Kui Ren

Kui Ren

Zhejiang University

Publications: 18

Mauro Conti

Mauro Conti

University of Padua

Publications: 16

Xinpeng Zhang

Xinpeng Zhang

Shanghai University

Publications: 16

Something went wrong. Please try again later.