Countries citing papers authored by Nikos Triandopoulos
Since
Specialization
Citations
This map shows the geographic impact of Nikos Triandopoulos's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Nikos Triandopoulos with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Nikos Triandopoulos more than expected).
Fields of papers citing papers by Nikos Triandopoulos
This network shows the impact of papers produced by Nikos Triandopoulos. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Nikos Triandopoulos. The network helps show where Nikos Triandopoulos may publish in the future.
Co-authorship network of co-authors of Nikos Triandopoulos
This figure shows the co-authorship network connecting the top 25 collaborators of Nikos Triandopoulos.
A scholar is included among the top collaborators of Nikos Triandopoulos based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Nikos Triandopoulos. Nikos Triandopoulos is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Papadopoulos, Dimitrios, Stavros Papadopoulos, & Nikos Triandopoulos. (2014). Taking Authenticated Range Queries to Arbitrary Dimensions. Rare & Special e-Zone (The Hong Kong University of Science and Technology). 819–830.27 indexed citations
8.
Kosba, Ahmed E., et al.. (2014). TrueSet: Faster Verifiable Set Computations. Rare & Special e-Zone (The Hong Kong University of Science and Technology).24 indexed citations
Dijk, Marten van, Ari Juels, Alina Oprea, et al.. (2012). Hourglass schemes. 265–280.33 indexed citations
11.
Dijk, Marten van, Ari Juels, Alina Oprea, et al.. (2012). Hourglass schemes: how to prove that cloud files are encrypted. DSpace@MIT (Massachusetts Institute of Technology).4 indexed citations
Lysyanskaya, Anna & Nikos Triandopoulos. (2006). Rationality and Adversarial Behavior in Multi-party Computation (Extended Abstract).2 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.