Jörg Schwenk

4.0k total citations · 1 hit paper
101 papers, 1.5k citations indexed

About

Jörg Schwenk is a scholar working on Information Systems, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Jörg Schwenk has authored 101 papers receiving a total of 1.5k indexed citations (citations by other indexed papers that have themselves been cited), including 63 papers in Information Systems, 54 papers in Artificial Intelligence and 46 papers in Computer Networks and Communications. Recurrent topics in Jörg Schwenk's work include Advanced Authentication Protocols Security (29 papers), Security and Verification in Computing (25 papers) and User Authentication and Security Systems (21 papers). Jörg Schwenk is often cited by papers focused on Advanced Authentication Protocols Security (29 papers), Security and Verification in Computing (25 papers) and User Authentication and Security Systems (21 papers). Jörg Schwenk collaborates with scholars based in Germany, United Kingdom and United States. Jörg Schwenk's co-authors include Meiko Jensen, Luigi Lo Iacono, Nils Gruschka, Juraj Somorovsky, Christian Mainka, Mario Heiderich, Kurt Huber, Sebastian Gajek, Tibor Jager and Thorsten Holz and has published in prestigious journals such as SHILAP Revista de lepidopterología, Electronics Letters and Journal of Cryptology.

In The Last Decade

Jörg Schwenk

93 papers receiving 1.3k citations

Hit Papers

On Technical Security Issues in Cloud Computing 2009 2026 2014 2020 2009 100 200 300

Peers

Jörg Schwenk
Markulf Kohlweiss United Kingdom
Karthikeyan Bhargavan United Kingdom
Stuart G. Stubblebine United States
Catherine Meadows United States
Eric Rescorla United States
David Adrian United States
Pasquale Malacaria United Kingdom
Joshua D. Guttman United States
Paul A. Karger United States
Jörg Schwenk
Citations per year, relative to Jörg Schwenk Jörg Schwenk (= 1×) peers Matteo Maffei

Countries citing papers authored by Jörg Schwenk

Since Specialization
Citations

This map shows the geographic impact of Jörg Schwenk's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jörg Schwenk with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jörg Schwenk more than expected).

Fields of papers citing papers by Jörg Schwenk

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jörg Schwenk. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jörg Schwenk. The network helps show where Jörg Schwenk may publish in the future.

Co-authorship network of co-authors of Jörg Schwenk

This figure shows the co-authorship network connecting the top 25 collaborators of Jörg Schwenk. A scholar is included among the top collaborators of Jörg Schwenk based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jörg Schwenk. Jörg Schwenk is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Müller, Jens, et al.. (2021). ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication. USENIX Security Symposium. 4293–4310. 2 indexed citations
2.
Schwenk, Jörg, et al.. (2020). T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction. SHILAP Revista de lepidopterología. 2 indexed citations
3.
Müller, Jens, et al.. (2020). Office Document Security and Privacy. USENIX Security Symposium. 5 indexed citations
4.
Aschermann, Cornelius, Ali Abbasi, Thorsten Holz, et al.. (2019). AntiFuzz: Impeding Fuzzing Audits of Binary Executables. USENIX Security Symposium. 1931–1947. 14 indexed citations
5.
Schwenk, Jörg, et al.. (2018). The Dangers of Key Reuse: Practical Attacks on IPsec IKE.. USENIX Security Symposium. 567–583. 12 indexed citations
6.
Mainka, Christian, et al.. (2017). SoK: Single Sign-On Security — An Evaluation of OpenID Connect. 251–266. 31 indexed citations
7.
Schwenk, Jörg, et al.. (2017). Same-Origin Policy: Evaluation in Modern Browsers. USENIX Security Symposium. 713–727. 20 indexed citations
8.
Mainka, Christian, et al.. (2015). Automatic recognition, processing and attacking of single sign-on protocols with burp suite.. 119–131. 2 indexed citations
9.
Somorovsky, Juraj, et al.. (2014). Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks. TUbilio (Technical University of Darmstadt). 41 indexed citations
10.
Mayer, Andreas, et al.. (2014). On the Security of Holder-of-Key Single Sign-On.. 65–77. 2 indexed citations
11.
Mainka, Christian, et al.. (2013). A new approach for WS-Policy Intersection using Partial Ordered Sets.. 45–48.
12.
Wieland, Thomas, et al.. (2012). On the design and implementation of the Open eCard App. TUbilio (Technical University of Darmstadt). 95–110. 4 indexed citations
13.
Somorovsky, Juraj, Mario Heiderich, Meiko Jensen, et al.. (2011). All your clouds are belong to us. Publication Server of Bonn-Rhein-Sieg University of Applied Sciences (Bonn-Rhein-Sieg University of Applied Sciences). 1 indexed citations
14.
Kohlar, Florian, et al.. (2010). Security Analysis of OpenID.. 68(4). 329–340. 10 indexed citations
15.
Schwenk, Jörg, et al.. (2009). SAMLizing the European Citizen Card.. 105–116. 3 indexed citations
16.
Gajek, Sebastian, et al.. (2009). Analysis of Signature Wrapping Attacks and Countermeasures. University of Southern Denmark Research Portal (University of Southern Denmark). 575–582. 32 indexed citations
17.
Oppliger, Rolf, et al.. (2008). Protecting Code Voting Against Vote Selling.. 193–204. 4 indexed citations
18.
Schwenk, Jörg, et al.. (2008). TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management.. 93–104. 8 indexed citations
19.
Gajek, Sebastian, Jörg Schwenk, & Christoph Wegener. (2006). SSL-VA-Authentifizierung als Schutz von Phishing und Pharming.. 6–17. 1 indexed citations
20.
Martín, Tobías, et al.. (2001). Tree-based Key Agreement for Multicast. International Conference on Communications. 31. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026