Raja Naeem Akram

1.2k total citations
58 papers, 548 citations indexed

About

Raja Naeem Akram is a scholar working on Information Systems, Computer Networks and Communications and Artificial Intelligence. According to data from OpenAlex, Raja Naeem Akram has authored 58 papers receiving a total of 548 indexed citations (citations by other indexed papers that have themselves been cited), including 33 papers in Information Systems, 26 papers in Computer Networks and Communications and 25 papers in Artificial Intelligence. Recurrent topics in Raja Naeem Akram's work include User Authentication and Security Systems (21 papers), Advanced Authentication Protocols Security (13 papers) and Security and Verification in Computing (13 papers). Raja Naeem Akram is often cited by papers focused on User Authentication and Security Systems (21 papers), Advanced Authentication Protocols Security (13 papers) and Security and Verification in Computing (13 papers). Raja Naeem Akram collaborates with scholars based in United Kingdom, France and New Zealand. Raja Naeem Akram's co-authors include Konstantinos Markantonakis, Keith Mayes, Damien Sauveron, Serge Chaumette, Ryan K. L. Ko, Sushil Jajodia, Emmanuel Conchon, Oussama Habachi, Eibe Frank and Hsiao‐Hwa Chen and has published in prestigious journals such as IEEE Access, Information Sciences and Energies.

In The Last Decade

Raja Naeem Akram

55 papers receiving 530 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Raja Naeem Akram United Kingdom 13 256 244 201 132 104 58 548
Lanier Watkins United States 10 254 1.0× 87 0.4× 199 1.0× 90 0.7× 109 1.0× 58 445
Muhammad Tanveer Pakistan 19 614 2.4× 481 2.0× 246 1.2× 197 1.5× 110 1.1× 47 912
Salman Shamshad Pakistan 17 415 1.6× 429 1.8× 161 0.8× 152 1.2× 34 0.3× 39 677
Kijoon Chae South Korea 13 476 1.9× 176 0.7× 242 1.2× 228 1.7× 97 0.9× 77 762
Inshil Doh South Korea 11 296 1.2× 141 0.6× 197 1.0× 139 1.1× 91 0.9× 59 535
Haleh Amintoosi Iran 12 285 1.1× 213 0.9× 197 1.0× 77 0.6× 34 0.3× 40 489
Dawei Li China 12 144 0.6× 267 1.1× 157 0.8× 71 0.5× 36 0.3× 61 432
Simon Pietro Romano Italy 15 573 2.2× 153 0.6× 102 0.5× 196 1.5× 84 0.8× 110 749
Yannis Nikoloudakis Greece 10 433 1.7× 331 1.4× 160 0.8× 171 1.3× 27 0.3× 15 741
Chaosheng Feng China 8 307 1.2× 360 1.5× 316 1.6× 290 2.2× 103 1.0× 26 760

Countries citing papers authored by Raja Naeem Akram

Since Specialization
Citations

This map shows the geographic impact of Raja Naeem Akram's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Raja Naeem Akram with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Raja Naeem Akram more than expected).

Fields of papers citing papers by Raja Naeem Akram

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Raja Naeem Akram. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Raja Naeem Akram. The network helps show where Raja Naeem Akram may publish in the future.

Co-authorship network of co-authors of Raja Naeem Akram

This figure shows the co-authorship network connecting the top 25 collaborators of Raja Naeem Akram. A scholar is included among the top collaborators of Raja Naeem Akram based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Raja Naeem Akram. Raja Naeem Akram is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Markantonakis, Konstantinos, et al.. (2024). CO-TSM: A Flexible Model for Secure Embedded Device Ownership and Management. Smart Cities. 7(5). 2887–2909.
2.
Markantonakis, Konstantinos, et al.. (2024). Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study. IEEE Access. 12. 150372–150386. 1 indexed citations
3.
Bhanumathi, V., et al.. (2021). Multi-Objective Function-Based Node-Disjoint Multipath Routing for Mobile Ad Hoc Networks. Electronics. 10(15). 1781–1781. 12 indexed citations
4.
Markantonakis, Konstantinos, et al.. (2017). Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay. 21–32. 2 indexed citations
5.
Akram, Raja Naeem, et al.. (2017). A secure and trusted protocol for enhancing safety of on-ground airplanes using UAVs. HAL (Le Centre pour la Communication Scientifique Directe). 1–17. 2 indexed citations
6.
Blazy, Olivier, Emmanuel Conchon, Damien Sauveron, et al.. (2017). An Efficient Protocol for UAS Security. HAL (Le Centre pour la Communication Scientifique Directe). 1–21. 17 indexed citations
7.
Chaumette, Serge, Raja Naeem Akram, Konstantinos Markantonakis, et al.. (2017). Security, privacy and safety evaluation of dynamic and static fleets of drones. Research Output (Edinburgh Napier University). 46 indexed citations
8.
Akram, Raja Naeem, et al.. (2017). Preventing relay attacks in mobile transactions using infrared light. 1724–1731. 10 indexed citations
9.
Markantonakis, Konstantinos, et al.. (2016). A secure and trusted boot process for Avionics Wireless Networks. 18. 1C3–1. 7 indexed citations
10.
Akram, Raja Naeem, et al.. (2016). Security and performance comparison of different secure channel protocols for Avionics Wireless Networks. arXiv (Cornell University). 1–8. 2 indexed citations
12.
Akram, Raja Naeem, et al.. (2015). Challenges of security and trust in Avionics Wireless Networks. 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). 4B1–1. 10 indexed citations
13.
Akram, Raja Naeem & Sushil Jajodia. (2015). Information Security Theory and Practice. Lecture notes in computer science. 15 indexed citations
14.
Dusart, Pierre, et al.. (2015). A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags. 2015 IEEE Trustcom/BigDataSE/ISPA. 1. 612–620. 1 indexed citations
15.
Akram, Raja Naeem, et al.. (2014). Consumer-centric protection for online social networks. Research Commons (University of Waikato). 56. 62–67. 1 indexed citations
16.
Akram, Raja Naeem, Konstantinos Markantonakis, & Keith Mayes. (2014). Trusted Platform Module for Smart Cards. 1. 1–5. 9 indexed citations
17.
Akram, Raja Naeem, Konstantinos Markantonakis, & Keith Mayes. (2013). A Secure and Trusted Channel Protocol for the User Centric Smart Card Ownership Model. 12. 336–345. 5 indexed citations
18.
Akram, Raja Naeem, Konstantinos Markantonakis, & Keith Mayes. (2012). A Privacy Preserving Application Acquisition Protocol. Edinburgh Napier Research Repository (Edinburgh Napier University). 21. 383–392. 8 indexed citations
19.
Akram, Raja Naeem, Konstantinos Markantonakis, & Keith Mayes. (2011). Application-Binding Protocol in the User Centric Smart Card Ownership Model. Lecture notes in computer science. 208–225. 3 indexed citations
20.
Akram, Raja Naeem, Konstantinos Markantonakis, & Keith Mayes. (2010). Simulator Problem in User Centric Smart Card Ownership Model. 5932. 679–686. 11 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026