This map shows the geographic impact of Kent Seamons's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Kent Seamons with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Kent Seamons more than expected).
This network shows the impact of papers produced by Kent Seamons. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Kent Seamons. The network helps show where Kent Seamons may publish in the future.
Co-authorship network of co-authors of Kent Seamons
This figure shows the co-authorship network connecting the top 25 collaborators of Kent Seamons.
A scholar is included among the top collaborators of Kent Seamons based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Kent Seamons. Kent Seamons is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Zappala, Daniel, et al.. (2019). "Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal. Symposium On Usable Privacy and Security. 137–153.5 indexed citations
7.
Cameron, J. R., et al.. (2019). A Usability Study of Five Two-Factor Authentication Methods.. Symposium On Usable Privacy and Security. 357–370.51 indexed citations
8.
Clark, Jeremy, Paul C. van Oorschot, Scott Ruoti, Kent Seamons, & Daniel Zappala. (2018). Securing Email. arXiv (Cornell University).3 indexed citations
9.
O'Neill, Mark, Kent Seamons, & Daniel Zappala. (2018). The Secure Socket API: TLS as an Operating System Service.. USENIX Security Symposium. 43. 799–816.3 indexed citations
10.
O'Neill, Mark, et al.. (2017). Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications. Symposium On Usable Privacy and Security. 29–47.16 indexed citations
11.
Ruoti, Scott, et al.. (2017). Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture.. Symposium On Usable Privacy and Security. 211–228.26 indexed citations
12.
O'Neill, Mark, et al.. (2017). TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication. USENIX Security Symposium. 609–624.6 indexed citations
13.
Ruoti, Scott, et al.. (2016). Strengthening Password-based Authentication. Symposium On Usable Privacy and Security.7 indexed citations
14.
Ruoti, Scott & Kent Seamons. (2016). Standard Metrics and Scenarios for Usable Authentication. Symposium On Usable Privacy and Security.4 indexed citations
15.
O'Neill, Mark, et al.. (2016). Social Authentication for End-to-End Encryption.. Symposium On Usable Privacy and Security.3 indexed citations
16.
Seamons, Kent, et al.. (2008). Proceedings of the 7th symposium on Identity and trust on the Internet.8 indexed citations
17.
Hess, Adam, et al.. (2002). Advanced Client/Server Authentication in TLS.. Network and Distributed System Security Symposium.45 indexed citations
18.
Seamons, Kent, Marianne Winslett, & Ting Yu. (2001). Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.. Network and Distributed System Security Symposium.108 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.