D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 38 Citations 13,058 84 World Ranking 5068 National Ranking 2486

Research.com Recognitions

Awards & Achievements

2013 - Edward J. McCluskey Technical Achievement Award, IEEE Computer Society For pioneering work and leadership in the area of computer and network security

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • Computer security

Computer security, Computer network, Distributed computing, Wireless sensor network and Cryptography are his primary areas of study. When carried out as part of a general Computer security research project, his work on Authorization is frequently linked to work in Battlefield, therefore connecting diverse disciplines of study. Many of his research projects under Computer network are closely connected to Energy consumption with Energy consumption, tying the diverse disciplines of science together.

Virgil D. Gligor has researched Distributed computing in several fields, including Scalability, State and Concurrency control. Virgil D. Gligor combines subjects such as Key management, Key distribution in wireless sensor networks, Communications protocol, Node and Revocation with his study of Wireless sensor network. His work deals with themes such as Probabilistic logic and Node, which intersect with Key distribution in wireless sensor networks.

His most cited work include:

  • A key-management scheme for distributed sensor networks (3415 citations)
  • Distributed detection of node replication attacks in sensor networks (628 citations)
  • MiniSec: a secure sensor network communication architecture (328 citations)

What are the main themes of his work throughout his whole career to date?

His scientific interests lie mostly in Computer security, Computer network, Distributed computing, Access control and Cryptography. In his study, Mobile ad hoc network is strongly linked to Wireless ad hoc network, which falls under the umbrella field of Computer security. His study in Computer network focuses on Wireless sensor network and Node.

His research investigates the connection between Wireless sensor network and topics such as Key distribution in wireless sensor networks that intersect with issues in Key management. His work in the fields of Role-based access control overlaps with other areas such as Negotiation. His Cryptography research is multidisciplinary, incorporating elements of Theoretical computer science and Encryption.

He most often published in these fields:

  • Computer security (55.15%)
  • Computer network (17.65%)
  • Distributed computing (14.71%)

What were the highlights of his more recent work (between 2003-2014)?

  • Computer security (55.15%)
  • Computer network (17.65%)
  • Wireless ad hoc network (10.29%)

In recent papers he was focusing on the following fields of study:

Virgil D. Gligor mainly focuses on Computer security, Computer network, Wireless ad hoc network, Wireless sensor network and Adversary. His research in Computer security focuses on subjects like The Internet, which are connected to Hacker, Network security, Credential and Data science. His Computer network study typically links adjacent topics like Set.

His work in Wireless sensor network addresses issues such as Key distribution in wireless sensor networks, which are connected to fields such as Key management, Key distribution and Revocation. His studies in Authentication integrate themes in fields like Dimension, Cryptography and Principal. His biological study spans a wide range of topics, including Network topology and Distributed computing.

Between 2003 and 2014, his most popular works were:

  • Distributed detection of node replication attacks in sensor networks (628 citations)
  • MiniSec: a secure sensor network communication architecture (328 citations)
  • On the distribution and revocation of cryptographic keys in sensor networks (179 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • Computer security

Virgil D. Gligor mainly investigates Computer security, Wireless ad hoc network, Computer network, Node and Wireless sensor network. He interconnects Revocation and Set in the investigation of issues within Computer security. His Node research is multidisciplinary, relying on both Replication, Distributed computing, Multicast, Network topology and Key.

His Key research is multidisciplinary, incorporating perspectives in Sensor node and Key distribution in wireless sensor networks. In Wireless sensor network, Virgil D. Gligor works on issues like Data security, which are connected to Cryptography and Authentication. In the field of Cryptography, his study on Wide Mouth Frog protocol overlaps with subjects such as Energy consumption.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A key-management scheme for distributed sensor networks

Laurent Eschenauer;Virgil D. Gligor.
computer and communications security (2002)

5991 Citations

Distributed detection of node replication attacks in sensor networks

B. Parno;A. Perrig;V. Gligor.
ieee symposium on security and privacy (2005)

896 Citations

MiniSec: a secure sensor network communication architecture

Mark Luk;Ghita Mezzour;Adrian Perrig;Virgil Gligor.
information processing in sensor networks (2007)

511 Citations

On Trust Establishment in Mobile Ad-Hoc Networks

Laurent Eschenauer;Virgil D. Gligor;John S. Baras.
international workshop on security (2002)

382 Citations

Method for automatic permission management in role-based access control systems

Serban Gavrila;Virgil Gligor.
(2001)

304 Citations

On the formal definition of separation-of-duty policies and their composition

V.D. Gligor;S.I. Gavrila;D. Ferraiolo.
ieee symposium on security and privacy (1998)

301 Citations

On the distribution and revocation of cryptographic keys in sensor networks

Haowen Chan;V.D. Gligor;A. Perrig;G. Muralidharan.
IEEE Transactions on Dependable and Secure Computing (2005)

273 Citations

Securing Vehicular Communications - Assumptions, Requirements, and Principles

Panagiotis Papadimitratos;Virgil Gligor;Jean-Pierre Hubaux.
Workshop on Embedded Security in Cars (ESCAR) 2006 (2006)

242 Citations

Block encryption method and schemes for data confidentiality and integrity protection

Virgil Dorin Gligor;Pompiliu Donescu.
(2001)

240 Citations

A Guide to Understanding Covert Channel Analysis of Trusted Systems

Shiuh-Pyng Shieh;V. D Gligor.
(1993)

228 Citations

Best Scientists Citing Virgil D. Gligor

Panos Papadimitratos

Panos Papadimitratos

Royal Institute of Technology

Publications: 51

Adrian Perrig

Adrian Perrig

ETH Zurich

Publications: 36

Sushil Jajodia

Sushil Jajodia

George Mason University

Publications: 32

Sencun Zhu

Sencun Zhu

Pennsylvania State University

Publications: 29

Ashok Kumar Das

Ashok Kumar Das

International Institute of Information Technology, Hyderabad

Publications: 29

Radha Poovendran

Radha Poovendran

University of Washington

Publications: 27

Peng Ning

Peng Ning

Google (United States)

Publications: 26

Mauro Conti

Mauro Conti

University of Padua

Publications: 26

Roberto Di Pietro

Roberto Di Pietro

Hamad bin Khalifa University

Publications: 25

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 23

Jean-Pierre Hubaux

Jean-Pierre Hubaux

École Polytechnique Fédérale de Lausanne

Publications: 23

Douglas R. Stinson

Douglas R. Stinson

University of Waterloo

Publications: 22

Ahmed K. Elmagarmid

Ahmed K. Elmagarmid

Qatar Computing Research Institute

Publications: 22

Yanchao Zhang

Yanchao Zhang

Arizona State University

Publications: 21

John S. Baras

John S. Baras

University of Maryland, College Park

Publications: 20

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.