Jason E. Holt

536 total citations
7 papers, 268 citations indexed

About

Jason E. Holt is a scholar working on Information Systems, Artificial Intelligence and Sociology and Political Science. According to data from OpenAlex, Jason E. Holt has authored 7 papers receiving a total of 268 indexed citations (citations by other indexed papers that have themselves been cited), including 4 papers in Information Systems, 4 papers in Artificial Intelligence and 3 papers in Sociology and Political Science. Recurrent topics in Jason E. Holt's work include Cryptography and Data Security (4 papers), Access Control and Trust (3 papers) and Blockchain Technology Applications and Security (2 papers). Jason E. Holt is often cited by papers focused on Cryptography and Data Security (4 papers), Access Control and Trust (3 papers) and Blockchain Technology Applications and Security (2 papers). Jason E. Holt collaborates with scholars based in United States. Jason E. Holt's co-authors include Kent Seamons, Robert Bradshaw, Hilarie Orman, Adam Hess, Lina Yu, Tat Y. Chan, B. Smith, Ryan Jarvis, Ting Yu and Marianne Winslett and has published in prestigious journals such as ACM Transactions on Information and System Security and IACR Cryptology ePrint Archive.

In The Last Decade

Jason E. Holt

6 papers receiving 243 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Jason E. Holt United States 5 217 131 108 46 22 7 268
Bernard Stépien Canada 9 120 0.6× 87 0.7× 59 0.5× 70 1.5× 44 2.0× 25 204
Somchart Fugkeaw Thailand 10 199 0.9× 231 1.8× 52 0.5× 78 1.7× 10 0.5× 60 317
David Núñez Spain 8 165 0.8× 131 1.0× 33 0.3× 57 1.2× 19 0.9× 17 222
Sonia Jahid United States 4 237 1.1× 99 0.8× 96 0.9× 97 2.1× 15 0.7× 5 289
T. C. Ting United States 8 135 0.6× 86 0.7× 112 1.0× 54 1.2× 4 0.2× 27 201
Mohamed Mejri Canada 9 126 0.6× 108 0.8× 28 0.3× 117 2.5× 14 0.6× 52 187
Jianghua Liu China 7 236 1.1× 221 1.7× 22 0.2× 73 1.6× 17 0.8× 16 312
Tomasz Truderung Germany 12 295 1.4× 150 1.1× 73 0.7× 119 2.6× 19 0.9× 20 357
Sigrid Gürgens Germany 8 81 0.4× 68 0.5× 24 0.2× 62 1.3× 16 0.7× 19 137
Marina Egea Spain 7 101 0.5× 119 0.9× 68 0.6× 41 0.9× 9 0.4× 14 184

Countries citing papers authored by Jason E. Holt

Since Specialization
Citations

This map shows the geographic impact of Jason E. Holt's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jason E. Holt with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jason E. Holt more than expected).

Fields of papers citing papers by Jason E. Holt

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jason E. Holt. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jason E. Holt. The network helps show where Jason E. Holt may publish in the future.

Co-authorship network of co-authors of Jason E. Holt

This figure shows the co-authorship network connecting the top 25 collaborators of Jason E. Holt. A scholar is included among the top collaborators of Jason E. Holt based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jason E. Holt. Jason E. Holt is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

7 of 7 papers shown
1.
Holt, Jason E., et al.. (2005). Logcrypt: Forward Security and Public Verification for Secure Audit Logs.. IACR Cryptology ePrint Archive. 2005. 2–211. 70 indexed citations
2.
Seamons, Kent, Tat Y. Chan, Adam Hess, et al.. (2004). TrustBuilder: negotiating trust in dynamic coalitions. 2. 49–51. 10 indexed citations
3.
Seamons, Kent, Marianne Winslett, Ting Yu, et al.. (2004). Trust Negotiation in Dynamic Coalitions. 2. 240–245. 2 indexed citations
4.
Bradshaw, Robert, Jason E. Holt, & Kent Seamons. (2004). Concealing complex policies with hidden credentials. 146–157. 81 indexed citations
5.
Hess, Adam, et al.. (2004). Content-triggered trust negotiation. ACM Transactions on Information and System Security. 7(3). 428–456. 13 indexed citations
6.
Yu, Ting, Marianne Winslett, & Jason E. Holt. (2003). Two Security Symposia. 1(4). 50–52. 1 indexed citations
7.
Holt, Jason E., Robert Bradshaw, Kent Seamons, & Hilarie Orman. (2003). Hidden Credentials. 1–8. 91 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026