Josh Benaloh

3.7k total citations
30 papers, 1.0k citations indexed

About

Josh Benaloh is a scholar working on Artificial Intelligence, Information Systems and Computer Vision and Pattern Recognition. According to data from OpenAlex, Josh Benaloh has authored 30 papers receiving a total of 1.0k indexed citations (citations by other indexed papers that have themselves been cited), including 24 papers in Artificial Intelligence, 8 papers in Information Systems and 7 papers in Computer Vision and Pattern Recognition. Recurrent topics in Josh Benaloh's work include Cryptography and Data Security (17 papers), Internet Traffic Analysis and Secure E-voting (15 papers) and Privacy-Preserving Technologies in Data (6 papers). Josh Benaloh is often cited by papers focused on Cryptography and Data Security (17 papers), Internet Traffic Analysis and Secure E-voting (15 papers) and Privacy-Preserving Technologies in Data (6 papers). Josh Benaloh collaborates with scholars based in United States, United Kingdom and Australia. Josh Benaloh's co-authors include Eric Horvitz, Kristin Lauter, Melissa Chase, Ronald L. Rivest, Philip B. Stark, Ross Anderson, Susan Landau, Whitfield Diffie, Peter G. Neumann and Steven M. Bellovin and has published in prestigious journals such as Communications of the ACM, IEEE Transactions on Information Forensics and Security and Lecture notes in computer science.

In The Last Decade

Josh Benaloh

28 papers receiving 922 citations

Peers

Josh Benaloh
A. Ghafoor United States
Keith B. Frikken United States
Adam Bender United States
Marco Casassa Mont United States
Jeffrey I. Schiller United States
Yosi Mass Israel
Melissa Chase United States
A. Ghafoor United States
Josh Benaloh
Citations per year, relative to Josh Benaloh Josh Benaloh (= 1×) peers A. Ghafoor

Countries citing papers authored by Josh Benaloh

Since Specialization
Citations

This map shows the geographic impact of Josh Benaloh's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Josh Benaloh with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Josh Benaloh more than expected).

Fields of papers citing papers by Josh Benaloh

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Josh Benaloh. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Josh Benaloh. The network helps show where Josh Benaloh may publish in the future.

Co-authorship network of co-authors of Josh Benaloh

This figure shows the co-authorship network connecting the top 25 collaborators of Josh Benaloh. A scholar is included among the top collaborators of Josh Benaloh based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Josh Benaloh. Josh Benaloh is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Russinovich, Mark, et al.. (2024). Confidential Computing Proofs. Queue. 22(4). 73–100.
2.
Abelson, Harold, Ross Anderson, Steven M. Bellovin, et al.. (2024). Bugs in our pockets: the risks of client-side scanning. arXiv (Cornell University). 10(1). 3 indexed citations
3.
Benaloh, Josh, et al.. (2021). VAULT-Style Risk-Limiting Audits and the Inyo County Pilot. IEEE Security & Privacy. 19(4). 8–18.
4.
Benaloh, Josh. (2014). Topics in cryptology - CT-RSA 2014 : the Cryptographer's Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014 : proceedings. Springer eBooks. 5 indexed citations
5.
Benaloh, Josh. (2014). Topics in Cryptology – CT-RSA 2014. Lecture notes in computer science. 20 indexed citations
6.
Benaloh, Josh. (2013). Rethinking Voter Coercion: The Realities Imposed by Technology.. 7 indexed citations
7.
Bell, Susan, Josh Benaloh, Michael D. Byrne, et al.. (2013). STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System. DIAL (Catholic University of Leuven). 1(1). 18–37. 48 indexed citations
8.
Benaloh, Josh, et al.. (2011). SOBA: Secrecy-preserving Observable Ballot-level Audit. arXiv (Cornell University). 13–13. 13 indexed citations
9.
Feldman, Ariel J. & Josh Benaloh. (2010). On Subliminal Channels in Encrypt-on-Cast Voting Systems. 3 indexed citations
10.
Chaum, David, et al.. (2010). Towards Trustworthy Elections: new Directions in Electronic Voting. DIAL (Catholic University of Leuven). 15 indexed citations
11.
Benaloh, Josh, Melissa Chase, Eric Horvitz, & Kristin Lauter. (2009). Patient Controlled Encryption: Patient Privacy in Electronic Medical Records. 7 indexed citations
12.
Benaloh, Josh, Melissa Chase, Eric Horvitz, & Kristin Lauter. (2009). Patient controlled encryption. 103–114. 224 indexed citations
13.
Benaloh, Josh. (2008). Administrative and public verifiability: can we have both?. 5. 10 indexed citations
14.
Benaloh, Josh. (2007). Ballot casting assurance via voter-initiated poll station auditing. 14–14. 43 indexed citations
15.
Benaloh, Josh. (2006). Simple verifiable elections. 5–5. 66 indexed citations
16.
Douceur, John R., Atul Adya, Josh Benaloh, William J. Bolosky, & G. Yuval. (2003). A secure directory service based on exclusive encryption. 172–182. 2 indexed citations
17.
Benaloh, Josh. (2001). Key Compression and its Application to Digital Fingerprinting. 9 indexed citations
18.
Benaloh, Josh. (1999). Dense Probabilistic Encryption. 144 indexed citations
19.
Benaloh, Josh, et al.. (1994). Receipt-free secret-ballot elections (extended abstract). 544–553. 205 indexed citations
20.
Benaloh, Josh, et al.. (1993). One-way Accumulators: A Decentralized Alternative to Digital Signatures (Extended Abstract). 274–285. 44 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026