D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 56 Citations 17,288 257 World Ranking 2638 National Ranking 1413

Research.com Recognitions

Awards & Achievements

2001 - Member of the National Academy of Engineering For contributions to network applications and security.

Overview

What is he best known for?

The fields of study he is best known for:

  • The Internet
  • Computer network
  • Law

Steven M. Bellovin spends much of his time researching Computer security, Computer network, The Internet, Encryption and Internet privacy. His research combines Root name server and Computer security. Steven M. Bellovin combines subjects such as Internet Protocol and Denial-of-service attack with his study of Computer network.

The various areas that Steven M. Bellovin examines in his The Internet study include Internet security, SIMPLE and Network socket. His study looks at the intersection of Encryption and topics like Bloom filter with Construct, Censorship, Order and Anonymity. His Internet privacy research includes elements of Pseudonym, Identity and Access control.

His most cited work include:

  • Encrypted key exchange: password-based protocols secure against dictionary attacks (1305 citations)
  • Controlling high bandwidth aggregates in the network (706 citations)
  • Firewalls and Internet Security: Repelling the Wily Hacker (572 citations)

What are the main themes of his work throughout his whole career to date?

Steven M. Bellovin mostly deals with Computer security, Computer network, The Internet, Internet privacy and Encryption. In his study, which falls under the umbrella issue of Computer security, Computer security model is strongly linked to Cloud computing security. The concepts of his Computer network study are interwoven with issues in Internet Protocol, Denial-of-service attack and Implementation.

His research integrates issues of Law and Law enforcement in his study of The Internet. Steven M. Bellovin mostly deals with Information privacy in his studies of Internet privacy. Steven M. Bellovin specializes in Cryptography, namely Cryptographic protocol.

He most often published in these fields:

  • Computer security (53.44%)
  • Computer network (21.37%)
  • The Internet (19.47%)

What were the highlights of his more recent work (between 2014-2021)?

  • Computer security (53.44%)
  • Internet privacy (15.65%)
  • The Internet (19.47%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer security, Internet privacy, The Internet, Law enforcement and Cryptography. He interconnects Software and Software deployment in the investigation of issues within Computer security. Many of his research projects under Internet privacy are closely connected to Set with Set, tying the diverse disciplines of science together.

His The Internet study incorporates themes from Law and Mandate. His biological study spans a wide range of topics, including Theoretical computer science, Cyber-security regulation, Focus and Arithmetic. His work deals with themes such as Key and Usability, which intersect with Encryption.

Between 2014 and 2021, his most popular works were:

  • Automated analysis of privacy requirements for mobile apps (69 citations)
  • Keys under doormats: mandating insecurity by requiring government access to all data and communications (61 citations)
  • Malicious-Client Security in Blind Seer: A Scalable Private DBMS (57 citations)

In his most recent research, the most cited papers focused on:

  • The Internet
  • Computer network
  • Operating system

His main research concerns Law enforcement, The Internet, Computer security, Internet privacy and Mandate. His study in Law enforcement is interdisciplinary in nature, drawing from both Social network, Web service, Discriminative model and Personalization. His studies deal with areas such as Statutory law, Statute, Metadata and Third-party doctrine as well as The Internet.

Steven M. Bellovin has researched Computer security in several fields, including Software deployment and Specific-information. His Internet privacy research incorporates themes from Government, Enforcement, Key escrow and Social cost. His studies in Data Protection Act 1998 integrate themes in fields like Scalability, Database, Cryptography, Set and Authorization.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Encrypted key exchange: password-based protocols secure against dictionary attacks

S.M. Bellovin;M. Merritt.
ieee symposium on security and privacy (1992)

2102 Citations

Encrypted key exchange: password-based protocols secure against dictionary attacks

S.M. Bellovin;M. Merritt.
ieee symposium on security and privacy (1992)

2102 Citations

Firewalls and Internet Security: Repelling the Wily Hacker

William R. Cheswick;Steven M. Bellovin;Aviel D. Rubin.
(2003)

1866 Citations

Firewalls and Internet Security: Repelling the Wily Hacker

William R. Cheswick;Steven M. Bellovin;Aviel D. Rubin.
(2003)

1866 Citations

Security problems in the TCP/IP protocol suite

S. M. Bellovin.
acm special interest group on data communication (1989)

1133 Citations

Security problems in the TCP/IP protocol suite

S. M. Bellovin.
acm special interest group on data communication (1989)

1133 Citations

Controlling high bandwidth aggregates in the network

Ratul Mahajan;Steven M. Bellovin;Sally Floyd;John Ioannidis.
acm special interest group on data communication (2002)

1118 Citations

Controlling high bandwidth aggregates in the network

Ratul Mahajan;Steven M. Bellovin;Sally Floyd;John Ioannidis.
acm special interest group on data communication (2002)

1118 Citations

ICMP Traceback Messages

Tom Taylor;Marcus Leech;Steven Bellovin.
Internet Draft: draft-bellovin-itrace-00. txt (2003)

1081 Citations

ICMP Traceback Messages

Tom Taylor;Marcus Leech;Steven Bellovin.
Internet Draft: draft-bellovin-itrace-00. txt (2003)

1081 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Steven M. Bellovin

Angelos D. Keromytis

Angelos D. Keromytis

Georgia Institute of Technology

Publications: 56

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 43

Amir Herzberg

Amir Herzberg

University of Connecticut

Publications: 34

Dongho Won

Dongho Won

Sungkyunkwan University

Publications: 31

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 30

Michel Abdalla

Michel Abdalla

École Normale Supérieure

Publications: 26

Patrick McDaniel

Patrick McDaniel

Pennsylvania State University

Publications: 25

Angelos Stavrou

Angelos Stavrou

Virginia Tech

Publications: 24

Michael K. Reiter

Michael K. Reiter

Duke University

Publications: 24

Hideki Imai

Hideki Imai

Chuo University

Publications: 23

Chin-Chen Chang

Chin-Chen Chang

Feng Chia University

Publications: 22

Martín Abadi

Martín Abadi

Google (United States)

Publications: 21

Vijay Varadharajan

Vijay Varadharajan

University of Newcastle Australia

Publications: 20

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 20

Lixia Zhang

Lixia Zhang

University of California, Los Angeles

Publications: 19

Dan S. Wallach

Dan S. Wallach

Rice University

Publications: 18

Trending Scientists

Cao-Thang Dinh

Cao-Thang Dinh

Queen's University

Miqin Zhang

Miqin Zhang

University of Washington

Shunichi Takeda

Shunichi Takeda

Kyoto University

Harold J. Evans

Harold J. Evans

Oregon State University

Lars Bohlin

Lars Bohlin

Uppsala University

Edward H. Leiter

Edward H. Leiter

University of Florida

James C. Bathurst

James C. Bathurst

Newcastle University

Wei Nie

Wei Nie

Nanjing University

Zhou Xing

Zhou Xing

McMaster University

Matthias Berking

Matthias Berking

University of Erlangen-Nuremberg

Michael T. Willoughby

Michael T. Willoughby

Research Triangle Park Foundation

Boadie W. Dunlop

Boadie W. Dunlop

Emory University

William Mandy

William Mandy

University College London

Charles Steenbergen

Charles Steenbergen

Johns Hopkins University

Andreas Kotsadam

Andreas Kotsadam

University of Oslo

Silvia Zane

Silvia Zane

University College London

Something went wrong. Please try again later.