Kent Seamons

4.3k total citations
91 papers, 2.3k citations indexed

About

Kent Seamons is a scholar working on Information Systems, Sociology and Political Science and Artificial Intelligence. According to data from OpenAlex, Kent Seamons has authored 91 papers receiving a total of 2.3k indexed citations (citations by other indexed papers that have themselves been cited), including 54 papers in Information Systems, 44 papers in Sociology and Political Science and 38 papers in Artificial Intelligence. Recurrent topics in Kent Seamons's work include User Authentication and Security Systems (29 papers), Access Control and Trust (28 papers) and Privacy, Security, and Data Protection (18 papers). Kent Seamons is often cited by papers focused on User Authentication and Security Systems (29 papers), Access Control and Trust (28 papers) and Privacy, Security, and Data Protection (18 papers). Kent Seamons collaborates with scholars based in United States, Germany and Ireland. Kent Seamons's co-authors include Marianne Winslett, Ting Yu, William H. Winsborough, Dik Lun Lee, H. S. Chuang, Scott Ruoti, Jason E. Holt, Robert Bradshaw, B. Smith and Yunmin Chen and has published in prestigious journals such as Theriogenology, IEEE Software and Computers & Security.

In The Last Decade

Kent Seamons

88 papers receiving 2.1k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Kent Seamons United States 22 1.3k 1.3k 1.1k 822 217 91 2.3k
Matt Blaze United States 19 1.2k 1.0× 649 0.5× 1.3k 1.2× 1.1k 1.3× 103 0.5× 71 2.5k
Jan Camenisch Switzerland 28 2.1k 1.6× 705 0.6× 1.1k 1.0× 731 0.9× 40 0.2× 97 2.7k
Mario Schlösser Germany 13 1.7k 1.3× 2.1k 1.6× 1.3k 1.2× 2.7k 3.3× 23 0.1× 25 3.9k
Hassan Takabi United States 20 944 0.7× 348 0.3× 1.2k 1.1× 637 0.8× 20 0.1× 50 1.8k
David F. Ferraiolo United States 10 2.0k 1.6× 2.2k 1.8× 1.4k 1.3× 743 0.9× 27 0.1× 24 2.9k
William Yurcik United States 23 513 0.4× 165 0.1× 531 0.5× 933 1.1× 186 0.9× 117 1.7k
Dennis Kafura United States 22 661 0.5× 181 0.1× 1.2k 1.1× 610 0.7× 160 0.7× 96 2.0k
Evangelos P. Markatos Greece 27 1.0k 0.8× 253 0.2× 933 0.9× 2.0k 2.4× 788 3.6× 144 2.7k
Charles E. Youman United States 5 2.6k 2.0× 2.9k 2.3× 1.6k 1.5× 997 1.2× 22 0.1× 6 3.6k
Andy Oram 12 369 0.3× 178 0.1× 516 0.5× 1.3k 1.5× 482 2.2× 23 1.9k

Countries citing papers authored by Kent Seamons

Since Specialization
Citations

This map shows the geographic impact of Kent Seamons's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Kent Seamons with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Kent Seamons more than expected).

Fields of papers citing papers by Kent Seamons

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Kent Seamons. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Kent Seamons. The network helps show where Kent Seamons may publish in the future.

Co-authorship network of co-authors of Kent Seamons

This figure shows the co-authorship network connecting the top 25 collaborators of Kent Seamons. A scholar is included among the top collaborators of Kent Seamons based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Kent Seamons. Kent Seamons is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Snow, Gregory L., et al.. (2025). Choose From a List. 1–20.
3.
Seamons, Kent, et al.. (2022). Passwords and Cryptwords. 75–89. 1 indexed citations
4.
Herzberg, Amir, et al.. (2020). Secure Messaging Authentication Ceremonies Are Broken. IEEE Security & Privacy. 19(2). 29–37. 8 indexed citations
5.
Ruoti, Scott & Kent Seamons. (2019). Johnny's Journey Toward Usable Secure Email. IEEE Security & Privacy. 17(6). 72–76. 14 indexed citations
6.
Zappala, Daniel, et al.. (2019). "Something isn't secure, but I'm not sure how that translates into a problem": Promoting autonomy by designing for understanding in Signal. Symposium On Usable Privacy and Security. 137–153. 5 indexed citations
7.
Cameron, J. R., et al.. (2019). A Usability Study of Five Two-Factor Authentication Methods.. Symposium On Usable Privacy and Security. 357–370. 51 indexed citations
8.
Clark, Jeremy, Paul C. van Oorschot, Scott Ruoti, Kent Seamons, & Daniel Zappala. (2018). Securing Email. arXiv (Cornell University). 3 indexed citations
9.
O'Neill, Mark, Kent Seamons, & Daniel Zappala. (2018). The Secure Socket API: TLS as an Operating System Service.. USENIX Security Symposium. 43. 799–816. 3 indexed citations
10.
O'Neill, Mark, et al.. (2017). Is that you, Alice? A Usability Study of the Authentication Ceremony of Secure Messaging Applications. Symposium On Usable Privacy and Security. 29–47. 16 indexed citations
11.
Ruoti, Scott, et al.. (2017). Weighing Context and Trade-offs: How Suburban Adults Selected Their Online Security Posture.. Symposium On Usable Privacy and Security. 211–228. 26 indexed citations
12.
O'Neill, Mark, et al.. (2017). TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication. USENIX Security Symposium. 609–624. 6 indexed citations
13.
Ruoti, Scott, et al.. (2016). Strengthening Password-based Authentication. Symposium On Usable Privacy and Security. 7 indexed citations
14.
Ruoti, Scott & Kent Seamons. (2016). Standard Metrics and Scenarios for Usable Authentication. Symposium On Usable Privacy and Security. 4 indexed citations
15.
O'Neill, Mark, et al.. (2016). Social Authentication for End-to-End Encryption.. Symposium On Usable Privacy and Security. 3 indexed citations
16.
Seamons, Kent, et al.. (2008). Proceedings of the 7th symposium on Identity and trust on the Internet. 8 indexed citations
17.
Hess, Adam, et al.. (2002). Advanced Client/Server Authentication in TLS.. Network and Distributed System Security Symposium. 45 indexed citations
18.
Seamons, Kent, Marianne Winslett, & Ting Yu. (2001). Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.. Network and Distributed System Security Symposium. 108 indexed citations
19.
Seamons, Kent & Marianne Winslett. (1994). An efficient abstract interface for multidimensional array I/O. 650–650. 1 indexed citations
20.
Seamons, Kent & Marianne Winslett. (1994). An efficient abstract interface for multidimensional array I/O. Conference on High Performance Computing (Supercomputing). 650–659. 24 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026