Göran Selander

721 total citations
27 papers, 306 citations indexed

About

Göran Selander is a scholar working on Computer Networks and Communications, Artificial Intelligence and Electrical and Electronic Engineering. According to data from OpenAlex, Göran Selander has authored 27 papers receiving a total of 306 indexed citations (citations by other indexed papers that have themselves been cited), including 16 papers in Computer Networks and Communications, 11 papers in Artificial Intelligence and 9 papers in Electrical and Electronic Engineering. Recurrent topics in Göran Selander's work include Access Control and Trust (7 papers), Cryptography and Data Security (6 papers) and IPv6, Mobility, Handover, Networks, Security (6 papers). Göran Selander is often cited by papers focused on Access Control and Trust (7 papers), Cryptography and Data Security (6 papers) and IPv6, Mobility, Handover, Networks, Security (6 papers). Göran Selander collaborates with scholars based in Sweden, France and Germany. Göran Selander's co-authors include Lüdwig Seitz, Shahid Raza, Christian Gehrmann, Mats Näslund, Elena Dubrova, Yi Cheng, John Mattsson, Abdelkarim Cherkaoui, Mališa Vučinić and Thomas Watteyne and has published in prestigious journals such as IEEE Access, Computer and IEEE Transactions on Automation Science and Engineering.

In The Last Decade

Göran Selander

25 papers receiving 295 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Göran Selander Sweden 9 228 120 115 70 50 27 306
Stefaan Seys Belgium 8 233 1.0× 89 0.7× 159 1.4× 86 1.2× 71 1.4× 13 361
Hassan Jameel Asghar Australia 9 82 0.4× 122 1.0× 118 1.0× 41 0.6× 63 1.3× 33 247
Adesh Kumari India 7 187 0.8× 213 1.8× 105 0.9× 42 0.6× 39 0.8× 11 288
Haomeng Xie China 8 178 0.8× 124 1.0× 138 1.2× 66 0.9× 28 0.6× 10 312
Chang-Seop Park South Korea 9 182 0.8× 110 0.9× 90 0.8× 52 0.7× 26 0.5× 28 259
Frank Cangialosi United States 9 173 0.8× 83 0.7× 84 0.7× 52 0.7× 27 0.5× 13 257
Hai‐Duong Le Taiwan 5 304 1.3× 284 2.4× 113 1.0× 41 0.6× 69 1.4× 14 382
Sangjukta Das India 6 117 0.5× 142 1.2× 125 1.1× 25 0.4× 33 0.7× 11 271
Youcef Begriche France 7 162 0.7× 92 0.8× 82 0.7× 64 0.9× 55 1.1× 14 249

Countries citing papers authored by Göran Selander

Since Specialization
Citations

This map shows the geographic impact of Göran Selander's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Göran Selander with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Göran Selander more than expected).

Fields of papers citing papers by Göran Selander

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Göran Selander. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Göran Selander. The network helps show where Göran Selander may publish in the future.

Co-authorship network of co-authors of Göran Selander

This figure shows the co-authorship network connecting the top 25 collaborators of Göran Selander. A scholar is included among the top collaborators of Göran Selander based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Göran Selander. Göran Selander is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Selander, Göran, et al.. (2024). EDHOC Is a New Security Handshake Standard: An Overview of Security Analysis. Computer. 57(9). 101–110. 2 indexed citations
2.
Tiloca, Marco, et al.. (2024). Secure Communication for the IoT: EDHOC and (Group) OSCORE Protocols. IEEE Access. 12. 49865–49877. 2 indexed citations
3.
Höglund, Joel, et al.. (2024). AutoPKI: public key infrastructure for IoT with automated trust transfer. International Journal of Information Security. 23(3). 1859–1875. 3 indexed citations
4.
Dubrova, Elena, et al.. (2018). Lightweight Message Authentication for Constrained Devices. 196–201. 2 indexed citations
5.
Raza, Shahid, et al.. (2017). Enrollment with Application Layer Security. 2 indexed citations
6.
Dubrova, Elena, Mats Näslund, Göran Selander, & Karl Norrman. (2016). Error-Correcting Message Authentication for 5G. 149–158. 2 indexed citations
7.
Raza, Shahid, et al.. (2016). S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment for the Internet of Things. IEEE Transactions on Automation Science and Engineering. 13(3). 1270–1280. 84 indexed citations
8.
Raza, Shahid, Simon Duquennoy, & Göran Selander. (2016). Compression of IPsec AH and ESP Headers for 6LoWPAN Networks. 1 indexed citations
9.
Dubrova, Elena, Mats Näslund, & Göran Selander. (2015). CRC-Based Message Authentication for 5G Mobile Technology. 1. 1186–1191. 12 indexed citations
10.
Seitz, Lüdwig, et al.. (2015). Authorization for the Internet of Things using OAuth 2.0. 8 indexed citations
11.
Dubrova, Elena, Mats Näslund, & Göran Selander. (2015). CRC-Based Message Authentication for 5G Mobile Technology. 2015 IEEE Trustcom/BigDataSE/ISPA. 1186–1191. 16 indexed citations
12.
Seitz, Lüdwig & Göran Selander. (2015). Problem Description for Authorization in Constrained Environments. 4 indexed citations
13.
Seitz, Lüdwig, et al.. (2014). ACE use cases. 2 indexed citations
14.
Dubrova, Elena, Mats Näslund, & Göran Selander. (2014). Secure and efficient LBIST for feedback shift register-based cryptographic systems. 1–6. 6 indexed citations
15.
Seitz, Lüdwig, Göran Selander, & Mohit Sethi. (2014). Access Control Framework for Constrained Environments. 3 indexed citations
16.
Seitz, Lüdwig & Göran Selander. (2014). Design Considerations for Security Protocols in Constrained Environments. 1 indexed citations
17.
Seitz, Lüdwig, Göran Selander, & Christian Gehrmann. (2013). Authorization framework for the Internet-of-Things. KTH Publication Database DiVA (KTH Royal Institute of Technology). 1–6. 74 indexed citations
18.
Seitz, Lüdwig, et al.. (2008). Decentralized Access Control Management for Network Configuration. Journal of Network and Systems Management. 16(3). 303–316.
19.
Campos, Rui, et al.. (2007). Ambient Network Attachment. Portuguese National Funding Agency for Science, Research and Technology (RCAAP Project by FCT). rfc 3748. 1–5. 4 indexed citations
20.
Raza, Shahid, et al.. (1999). CBOR Encoding of X.509 Certificates (CBOR Certificates). 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026