P. Reynolds

408 total citations
19 papers, 244 citations indexed

About

P. Reynolds is a scholar working on Information Systems, Computer Networks and Communications and Signal Processing. According to data from OpenAlex, P. Reynolds has authored 19 papers receiving a total of 244 indexed citations (citations by other indexed papers that have themselves been cited), including 11 papers in Information Systems, 7 papers in Computer Networks and Communications and 6 papers in Signal Processing. Recurrent topics in P. Reynolds's work include User Authentication and Security Systems (8 papers), Biometric Identification and Security (4 papers) and Advanced Authentication Protocols Security (2 papers). P. Reynolds is often cited by papers focused on User Authentication and Security Systems (8 papers), Biometric Identification and Security (4 papers) and Advanced Authentication Protocols Security (2 papers). P. Reynolds collaborates with scholars based in United Kingdom, Australia and France. P. Reynolds's co-authors include Steven Furnell, Nathan Clarke, Kimmo Raatikainen, Andy Phippen, Peter Sanders, C. T. Stockel, Iman Almomani, Marwan Al‐Akaidi and Bogdan Ghita and has published in prestigious journals such as Australasian Journal of Paramedicine, Computer Communications and Computers & Security.

In The Last Decade

P. Reynolds

16 papers receiving 209 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
P. Reynolds United Kingdom 8 191 120 57 46 44 19 244
Abdulaziz Alzubaidi Saudi Arabia 6 197 1.0× 129 1.1× 30 0.5× 25 0.5× 54 1.2× 14 261
Mona Erfani Joorabchi Canada 5 309 1.6× 142 1.2× 33 0.6× 19 0.4× 97 2.2× 8 406
Zarul Fitri Zaaba Malaysia 11 189 1.0× 69 0.6× 59 1.0× 21 0.5× 52 1.2× 50 328
Sanjay Podder Switzerland 8 141 0.7× 38 0.3× 14 0.2× 30 0.7× 31 0.7× 39 227
Scott Ruoti United States 11 291 1.5× 117 1.0× 154 2.7× 35 0.8× 96 2.2× 33 394
Maximilian Golla Germany 9 224 1.2× 174 1.4× 97 1.7× 35 0.8× 42 1.0× 21 295
Judith Bishop United States 11 215 1.1× 37 0.3× 32 0.6× 27 0.6× 64 1.5× 47 399
Marisa Viveros United States 6 156 0.8× 31 0.3× 32 0.6× 24 0.5× 24 0.5× 7 238
Andreas Biørn-Hansen Norway 7 153 0.8× 24 0.2× 21 0.4× 24 0.5× 51 1.2× 13 236
Ivar Jørstad Norway 9 160 0.8× 37 0.3× 41 0.7× 8 0.2× 139 3.2× 35 237

Countries citing papers authored by P. Reynolds

Since Specialization
Citations

This map shows the geographic impact of P. Reynolds's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by P. Reynolds with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites P. Reynolds more than expected).

Fields of papers citing papers by P. Reynolds

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by P. Reynolds. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by P. Reynolds. The network helps show where P. Reynolds may publish in the future.

Co-authorship network of co-authors of P. Reynolds

This figure shows the co-authorship network connecting the top 25 collaborators of P. Reynolds. A scholar is included among the top collaborators of P. Reynolds based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with P. Reynolds. P. Reynolds is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

19 of 19 papers shown
1.
Furnell, Steven, et al.. (2013). Co-operative user identity verification using an Authentication Aura. Computers & Security. 39. 486–502. 10 indexed citations
2.
Furnell, Steven, et al.. (2011). A preliminary investigation of distributed and cooperative user authentication. Australasian Journal of Paramedicine. 1 indexed citations
3.
Furnell, Steven, et al.. (2011). Authentication Aura - A Distributed Approach to User Authentication. Australasian Journal of Paramedicine. 7 indexed citations
4.
Ghita, Bogdan, et al.. (2010). Optimising Quality of Service through the controlled aggregation of traffic. International Conference for Internet Technology and Secured Transactions. 1–7.
5.
Furnell, Steven, et al.. (2010). A distributed and cooperative user authentication framework. Australasian Journal of Paramedicine. 23. 304–310. 4 indexed citations
6.
Reynolds, P., et al.. (2009). Bill-and-keep and the economics of interconnection in next-generation networks. Telecommunications Policy. 33(5-6). 324–337. 10 indexed citations
7.
Clarke, Nathan, et al.. (2009). Strong Authentication for Web Services using Smartcards. Australasian Journal of Paramedicine.
8.
Furnell, Steven, et al.. (2007). A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head. Computers & Security. 26(7-8). 468–478. 13 indexed citations
9.
Almomani, Iman, et al.. (2006). Architectural framework for wireless mobile ad hoc networks (AF WMANETs). Computer Communications. 30(1). 178–191. 1 indexed citations
10.
Furnell, Steven, et al.. (2003). The effects of audio and video correlation and lip synchronization. Campus-Wide Information Systems. 20(4). 159–166. 2 indexed citations
11.
Clarke, Nathan, et al.. (2003). Keystroke dynamics on a mobile handset: a feasibility study. Information Management & Computer Security. 11(4). 161–166. 30 indexed citations
12.
Reynolds, P.. (2003). A vision of the Internet in 2010. Campus-Wide Information Systems. 20(4). 125–128. 4 indexed citations
13.
Clarke, Nathan, et al.. (2002). Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. Computers & Security. 21(3). 220–228. 45 indexed citations
14.
Reynolds, P.. (2000). Mobility management for the support of handover within a heterogeneous mobile environment. 2000. 341–346. 4 indexed citations
15.
Furnell, Steven, et al.. (2000). Authentication and Supervision: A Survey of User Attitudes. Computers & Security. 19(6). 529–539. 74 indexed citations
16.
Furnell, Steven, et al.. (1999). Computer crime and abuse: A survey of public attitudes and awareness. Computers & Security. 18(8). 715–726. 19 indexed citations
17.
Phippen, Andy, et al.. (1999). Strategies for content migration on the World Wide Web. Internet Research. 9(1). 25–34. 6 indexed citations
18.
Raatikainen, Kimmo, et al.. (1998). Mobility in long-term service architectures and distributed platforms. IEEE Personal Communications. 5(4). 44–55. 13 indexed citations
19.
Reynolds, P., Peter Sanders, & C. T. Stockel. (1995). Uncertainty in telecommunication network design. Expert Systems. 12(3). 219–228. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026