David Balenson

575 total citations
20 papers, 352 citations indexed

About

David Balenson is a scholar working on Information Systems, Computer Networks and Communications and Artificial Intelligence. According to data from OpenAlex, David Balenson has authored 20 papers receiving a total of 352 indexed citations (citations by other indexed papers that have themselves been cited), including 10 papers in Information Systems, 8 papers in Computer Networks and Communications and 5 papers in Artificial Intelligence. Recurrent topics in David Balenson's work include Advanced Authentication Protocols Security (4 papers), Information and Cyber Security (4 papers) and Cryptography and Data Security (4 papers). David Balenson is often cited by papers focused on Advanced Authentication Protocols Security (4 papers), Information and Cyber Security (4 papers) and Cryptography and Data Security (4 papers). David Balenson collaborates with scholars based in United States, Netherlands and Germany. David Balenson's co-authors include Alan T. Sherman, David McGrew, Carl Ellison, Steven B. Lipner, Douglas Maughan, Ulf Lindqvist, Tom Longstaff, Peter Kruus, Erin Kenneally and James F. Dray and has published in prestigious journals such as Communications of the ACM, IEEE Communications Magazine and Computers & Security.

In The Last Decade

David Balenson

17 papers receiving 278 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
David Balenson United States 7 240 174 75 54 45 20 352
A. Freier 3 260 1.1× 171 1.0× 153 2.0× 53 1.0× 32 0.7× 3 365
Warwick Ford Canada 7 193 0.8× 145 0.8× 187 2.5× 90 1.7× 24 0.5× 20 334
Ralf Hauser Switzerland 9 322 1.3× 235 1.4× 195 2.6× 47 0.9× 31 0.7× 16 444
Michael W. Bigrigg United States 8 190 0.8× 95 0.5× 82 1.1× 24 0.4× 16 0.4× 21 280
Ionut Trestian United States 8 222 0.9× 104 0.6× 55 0.7× 26 0.5× 21 0.5× 10 296
Cristian Hesselman Netherlands 11 300 1.3× 171 1.0× 102 1.4× 53 1.0× 41 0.9× 48 375
Ahmet Uyar United States 11 222 0.9× 90 0.5× 179 2.4× 63 1.2× 34 0.8× 40 368
Peeter Laud Estonia 12 156 0.7× 367 2.1× 139 1.9× 39 0.7× 30 0.7× 48 417
Norbert Luttenberger Germany 11 176 0.7× 114 0.7× 144 1.9× 27 0.5× 21 0.5× 26 286
Neil Daswani United States 7 418 1.7× 183 1.1× 145 1.9× 72 1.3× 28 0.6× 20 523

Countries citing papers authored by David Balenson

Since Specialization
Citations

This map shows the geographic impact of David Balenson's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by David Balenson with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites David Balenson more than expected).

Fields of papers citing papers by David Balenson

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by David Balenson. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by David Balenson. The network helps show where David Balenson may publish in the future.

Co-authorship network of co-authors of David Balenson

This figure shows the co-authorship network connecting the top 25 collaborators of David Balenson. A scholar is included among the top collaborators of David Balenson based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with David Balenson. David Balenson is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Mirković, Jelena, David Balenson, Terry Benzel, et al.. (2024). Poster: Security and Privacy Heterogeneous Environment for Reproducible Experimentation (SPHERE). Zenodo (CERN European Organization for Nuclear Research). 5051–5053.
2.
Al-Momani, Ala’a M., David Balenson, Zoltán Ádám Mann, et al.. (2024). Navigating Privacy Patterns in the Era of Robotaxis. UvA-DARE (University of Amsterdam). 32–39.
3.
Balenson, David, et al.. (2022). Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts. 65–70. 3 indexed citations
4.
Kenneally, Erin, et al.. (2018). Cyber Risk Economics Capability Gaps Research Strategy. 1–6. 6 indexed citations
5.
Maughan, Douglas, et al.. (2015). Government-Funded R&D to Drive Cybersecurity Technologies. IT Professional. 17(4). 62–65. 1 indexed citations
6.
Maughan, Douglas, et al.. (2013). Crossing the "Valley of Death": Transitioning Cybersecurity Research into Practice. IEEE Security & Privacy. 11(2). 14–23. 13 indexed citations
7.
Longstaff, Tom, et al.. (2010). Barriers to science in security. 127–129. 9 indexed citations
8.
Sterne, D., et al.. (2006). Integrating Intrusion Detection and Fault Localization in Manets. 53. 1–7. 3 indexed citations
9.
Branstad, Dennis K. & David Balenson. (2002). Policy-based cryptographic key management: experience with the KRP project. 1. 103–114. 3 indexed citations
10.
Balenson, David, et al.. (2002). Trading off strength and performance in network authentication: experience with the ACSA project. 1. 127–139. 3 indexed citations
11.
Balenson, David, et al.. (2002). Policy-based security management for large dynamic groups: an overview of the DCCM project. 1. 64–73. 20 indexed citations
12.
Balenson, David, David McGrew, & Alan T. Sherman. (2000). Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. 161 indexed citations
13.
Balenson, David, et al.. (2000). ISAKMP Key Recovery Extensions. Computers & Security. 19(1). 91–99. 3 indexed citations
14.
Lipner, Steven B., et al.. (1996). Commercial key recovery. Communications of the ACM. 39(3). 41–47. 24 indexed citations
15.
Balenson, David, et al.. (1995). A new approach to software key escrow encryption. Springer eBooks. 180–207. 3 indexed citations
16.
Dray, James F. & David Balenson. (1993). An Overview of the Advanced Smartcard Access Control System (ASACS). 125–133. 3 indexed citations
17.
Balenson, David. (1993). Privacy Enhancement for Internet Electronic Mail: Part III: Algorithms, Modes, and Identifiers. RFC. 1423. 1–14. 46 indexed citations
18.
Balenson, David. (1993). Privacy Enhancement for Internet Electronic Mail: Part III. 44 indexed citations
19.
Galvin, James M. & David Balenson. (1992). Security Aspects of a {UNIX} {PEM} Implementation. 2 indexed citations
20.
Balenson, David. (1985). Automated distribution of cryptographic keys using the financial institution key management standard. IEEE Communications Magazine. 23(9). 41–46. 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026