Ben Smyth

1.2k total citations
23 papers, 282 citations indexed

About

Ben Smyth is a scholar working on Artificial Intelligence, Computer Networks and Communications and Sociology and Political Science. According to data from OpenAlex, Ben Smyth has authored 23 papers receiving a total of 282 indexed citations (citations by other indexed papers that have themselves been cited), including 15 papers in Artificial Intelligence, 6 papers in Computer Networks and Communications and 6 papers in Sociology and Political Science. Recurrent topics in Ben Smyth's work include Internet Traffic Analysis and Secure E-voting (13 papers), Cryptography and Data Security (12 papers) and Privacy, Security, and Data Protection (5 papers). Ben Smyth is often cited by papers focused on Internet Traffic Analysis and Secure E-voting (13 papers), Cryptography and Data Security (12 papers) and Privacy, Security, and Data Protection (5 papers). Ben Smyth collaborates with scholars based in Luxembourg, United Kingdom and France. Ben Smyth's co-authors include Bruno Blanchet, Véronique Cortier, Peter Y. A. Ryan, Feng Hao, Dalia Khader, Vincent Cheval, Elizabeth A. Quaglia, Tom Chothia, Joeri de Ruiter and Mark Ryan and has published in prestigious journals such as Theoretical Computer Science, Information Processing Letters and Science of Computer Programming.

In The Last Decade

Ben Smyth

21 papers receiving 277 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Ben Smyth Luxembourg 8 179 162 141 38 28 23 282
Petr Dzurenda Czechia 9 169 0.9× 105 0.6× 80 0.6× 22 0.6× 29 1.0× 43 247
Thyla van der Merwe United Kingdom 5 119 0.7× 98 0.6× 122 0.9× 15 0.4× 20 0.7× 9 188
Nitish Andola India 9 133 0.7× 213 1.3× 126 0.9× 19 0.5× 27 1.0× 21 285
Mohamed Dâfir Ech-Cherif El Kettani Morocco 8 105 0.6× 106 0.7× 120 0.9× 17 0.4× 15 0.5× 26 225
Tom Coffey Ireland 9 172 1.0× 171 1.1× 248 1.8× 37 1.0× 25 0.9× 33 314
Ning Shang United States 9 333 1.9× 236 1.5× 149 1.1× 57 1.5× 29 1.0× 22 435
Daniel S. Dantas United States 7 172 1.0× 133 0.8× 116 0.8× 25 0.7× 21 0.8× 10 277
Ioana Boureanu United Kingdom 8 104 0.6× 73 0.5× 91 0.6× 25 0.7× 44 1.6× 32 185
William T. Polk United States 8 133 0.7× 127 0.8× 112 0.8× 32 0.8× 35 1.3× 20 265
Po-Wen Chi Taiwan 7 93 0.5× 91 0.6× 178 1.3× 12 0.3× 59 2.1× 28 267

Countries citing papers authored by Ben Smyth

Since Specialization
Citations

This map shows the geographic impact of Ben Smyth's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Ben Smyth with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Ben Smyth more than expected).

Fields of papers citing papers by Ben Smyth

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Ben Smyth. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Ben Smyth. The network helps show where Ben Smyth may publish in the future.

Co-authorship network of co-authors of Ben Smyth

This figure shows the co-authorship network connecting the top 25 collaborators of Ben Smyth. A scholar is included among the top collaborators of Ben Smyth based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Ben Smyth. Ben Smyth is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Smyth, Ben, et al.. (2024). DAO Governance Protocols and their Vulnerabilities. 1–2. 1 indexed citations
2.
Smyth, Ben & Michael R. Clarkson. (2022). Surveying definitions of election verifiability. Information Processing Letters. 177. 106267–106267.
3.
Smyth, Ben. (2021). Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios. Journal of Computer Security. 29(6). 551–611. 3 indexed citations
4.
Smyth, Ben. (2020). Surveying global verifiability. Information Processing Letters. 163. 106000–106000. 1 indexed citations
5.
Smyth, Ben, et al.. (2019). Non-malleable encryption with proofs of plaintext knowledge and applications to voting. International Journal of Security and Networks. 14(4). 191–191. 1 indexed citations
6.
Smyth, Ben, et al.. (2019). Non-malleable encryption with proofs of plaintext knowledge and applications to voting. International Journal of Security and Networks. 14(4). 191–191. 1 indexed citations
7.
Quaglia, Elizabeth A. & Ben Smyth. (2018). Secret, verifiable auctions from elections. Theoretical Computer Science. 730. 44–92. 4 indexed citations
8.
Chothia, Tom, Joeri de Ruiter, & Ben Smyth. (2018). Modelling and Analysis of a Hierarchy of Distance Bounding Attacks. Open Repository and Bibliography (University of Luxembourg). 1563–1580. 10 indexed citations
9.
Smyth, Ben, et al.. (2018). Exploiting re-voting in the Helios election system. Information Processing Letters. 143. 14–19. 5 indexed citations
10.
Leguay, Jérémie, Georgios S. Paschos, Elizabeth A. Quaglia, & Ben Smyth. (2017). CryptoCache: Network caching with confidentiality. 9 indexed citations
11.
Smyth, Ben, Mark Ryan, & Liqun Chen. (2015). Formal analysis of privacy in Direct Anonymous Attestation schemes. Science of Computer Programming. 111. 300–317. 8 indexed citations
12.
Smyth, Ben. (2014). Forget Me Do: Empowering user privacy on social network sites. 1 indexed citations
13.
Khader, Dalia, Ben Smyth, Peter Y. A. Ryan, & Feng Hao. (2012). A Fair and Robust Voting System by Broadcast. Open Repository and Bibliography (University of Luxembourg). 205. 285–299. 34 indexed citations
14.
Bernhard, David, Véronique Cortier, Olivier Pereira, Ben Smyth, & Bogdan Warinschi. (2011). European Symposium on Research in Computer Security - ESORICS 2011. 5 indexed citations
15.
Blanchet, Bruno & Ben Smyth. (2011). ProVerif 1.86pl2: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial. 2 indexed citations
16.
Blanchet, Bruno & Ben Smyth. (2011). ProVerif 1.85: Automatic Cryptographic Protocol Verifier, User Manual and Tutorial. 107 indexed citations
17.
Smyth, Ben & Véronique Cortier. (2011). A note on replay attacks that violate privacy in electronic voting schemes. HAL (Le Centre pour la Communication Scientifique Directe). 4 indexed citations
18.
Cortier, Véronique & Ben Smyth. (2011). Attacking and Fixing Helios: An Analysis of Ballot Secrecy. HAL (Le Centre pour la Communication Scientifique Directe). 297–311. 31 indexed citations
19.
Smyth, Ben. (2010). Privacy vs. Usability: A failure of Barclays online banking?. 1 indexed citations
20.
Smyth, Ben, et al.. (2009). Election verifiability in electronic voting protocols ? (Preliminary version ?? ). 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026