Standout Papers

A logic of authentication 1978 2026 1994 2010 1.2k
  1. A logic of authentication (1990)
    Michael T. Burrows, Martı́n Abadi et al. ACM Transactions on Computer Systems
  2. Using encryption for authentication in large networks of computers (1978)
    Roger M. Needham, Michael Schroeder Communications of the ACM

Immediate Impact

2 from Science/Nature 66 standout
Sub-graph 1 of 23

Citing Papers

An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT
2024 Standout
Edge AI: A survey
2023 Standout
6 intermediate papers

Works of Roger M. Needham being referenced

A logic of authentication
1989
Grapevine
1982
and 2 more

Author Peers

Author Last Decade Papers Cites
Roger M. Needham 3001 1585 2038 51 3.6k
Danny Dolev 4288 2035 2160 88 5.3k
Ding Wang 2566 1508 2606 97 3.9k
Gene Tsudik 2553 2040 1390 142 3.9k
Qi Jiang 1969 1207 1977 84 2.8k
SK Hafizul Islam 2818 1766 2556 124 4.0k
Jianying Zhou 1764 1821 1879 188 3.6k
Jeffrey O. Kephart 2393 1468 1734 54 3.9k
William Stallings 1962 1648 1080 80 4.4k
Aviel D. Rubin 1025 1411 1077 47 2.5k
Vanga Odelu 2227 1041 2101 55 2.9k

All Works

Loading papers...

Rankless by CCL
2026