This map shows the geographic impact of Eric Rescorla's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Eric Rescorla with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Eric Rescorla more than expected).
This network shows the impact of papers produced by Eric Rescorla. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Eric Rescorla. The network helps show where Eric Rescorla may publish in the future.
Co-authorship network of co-authors of Eric Rescorla
This figure shows the co-authorship network connecting the top 25 collaborators of Eric Rescorla.
A scholar is included among the top collaborators of Eric Rescorla based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Eric Rescorla. Eric Rescorla is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
All Works
20 of 20 papers shown
1.
Barnes, Richard, Zakir Durumeric, Peter Eckersley, et al.. (2019). Let's Encrypt. 2473–2487.65 indexed citations
2.
Wustrow, Eric, et al.. (2014). Security analysis of a full-body scanner. 369–384.10 indexed citations
3.
Rescorla, Eric, et al.. (2013). Measuring the practical impact of DNSSEC deployment. USENIX Security Symposium. 573–588.39 indexed citations
4.
Checkoway, Stephen, Hovav Shacham, & Eric Rescorla. (2010). Are text-only data formats safe? or, use this LATEX class file to Pwn your computer. 9–9.3 indexed citations
Quisquater, Jean-Jacques, et al.. (2010). Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections.1 indexed citations
7.
Rescorla, Eric, et al.. (2010). A Survey of Authentication Mechanisms.3 indexed citations
8.
Rescorla, Eric. (2009). Understanding the security properties of ballot-based verification techniques. 7–7.6 indexed citations
9.
Rescorla, Eric. (2009). On the security of election audits with low entropy randomness. 16–16.3 indexed citations
10.
Sturton, Cynthia, Eric Rescorla, & David Wagner. (2009). Weight, weight, don't tell me: using scales to select ballots for auditing. 14–14.5 indexed citations
11.
Jennings, Cullen, Salman Baset, Henning Schulzrinne, Bruce Lowekamp, & Eric Rescorla. (2008). REsource LOcation And Discovery (RELOAD).34 indexed citations
12.
Handley, Mark & Eric Rescorla. (2006). RFC 4732: Internet Denial-of-Service Considerations. UCL Discovery (University College London).6 indexed citations
13.
Rescorla, Eric & Nagendra Modadugu. (2006). Extensions for Datagram Transport Layer Security (TLS) in Low Bandwidth Environments.1 indexed citations
14.
Bellovin, Steven M. & Eric Rescorla. (2005). Deploying a New Hash Algorithm. Columbia Academic Commons (Columbia University).18 indexed citations
Modadugu, Nagendra & Eric Rescorla. (2004). The Design and Implementation of Datagram TLS.. Network and Distributed System Security Symposium.73 indexed citations
Rescorla, Eric, et al.. (2002). SSLACC: A Clustered SSL Accelerator. USENIX Security Symposium. 229–246.10 indexed citations
19.
Rescorla, Eric. (2001). An introduction to OpenSSL programming, part II of II. Linux journal. 2001(92). 23.1 indexed citations
20.
Rescorla, Eric, et al.. (2001). TLS over SCTP.
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.