This map shows the geographic impact of Roel Verdult's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Roel Verdult with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Roel Verdult more than expected).
This network shows the impact of papers produced by Roel Verdult. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Roel Verdult. The network helps show where Roel Verdult may publish in the future.
Co-authorship network of co-authors of Roel Verdult
This figure shows the co-authorship network connecting the top 25 collaborators of Roel Verdult.
A scholar is included among the top collaborators of Roel Verdult based on the total number of
citations received by their joint publications. Widths of edges
represent the number of papers authors have co-authored together.
Node borders
signify the number of papers an author published with Roel Verdult. Roel Verdult is excluded from
the visualization to improve readability, since they are connected to all nodes in the network.
Verdult, Roel & Flavio D. Garcia. (2015). Cryptanalysis of the Megamos Crypto Automotive Immobilizer. University of Birmingham Research Portal (University of Birmingham). 40.3 indexed citations
3.
Verdult, Roel, et al.. (2015). Scrutinizing WPA2 password generating algorithms in wireless routers. Data Archiving and Networked Services (DANS). 10–10.7 indexed citations
4.
Cojocar, Lucian, Jonas Zaddach, Roel Verdult, et al.. (2015). PIE. Radboud Repository (Radboud University). 251–260.17 indexed citations
Verdult, Roel, et al.. (2015). Defeating IMSI Catchers. University of Birmingham Research Portal (University of Birmingham). 340–351.48 indexed citations
7.
Garcia, Flavio D., Gerhard de Koning Gans, & Roel Verdult. (2014). Wirelessly lockpicking a smart card reader. International Journal of Information Security. 13(5). 403–420.2 indexed citations
8.
Verdult, Roel, Flavio D. Garcia, & Barış Ege. (2013). Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer. University of Birmingham Research Portal (University of Birmingham). 703–718.57 indexed citations
9.
Verdult, Roel, et al.. (2012). Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research : Tutorial at 8th Workshop on RFID Security and Privacy (RFIDSec 2012). Data Archiving and Networked Services (DANS).1 indexed citations
10.
Garcia, Flavio D., Gerhard de Koning Gans, & Roel Verdult. (2012). Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research.8 indexed citations
11.
Verdult, Roel, Flavio D. Garcia, & Josep Balasch. (2012). Gone in 360 seconds: Hijacking with Hitag2. Data Archiving and Networked Services (DANS). 37–37.53 indexed citations
12.
Verdult, Roel, Gerhard de Koning Gans, & Flavio D. Garcia. (2012). A Toolbox for RFID Protocol Analysis. Data Archiving and Networked Services (DANS). 9. 27–34.9 indexed citations
Garcia, Flavio D., Gerhard de Koning Gans, & Roel Verdult. (2011). Exposing iClass key diversification. Radboud Repository (Radboud University). 14–14.6 indexed citations
15.
Garcia, Flavio D., Peter van Rossum, Roel Verdult, & Ronny Wichers Schreur. (2010). Dismantling SecureMemory, CryptoMemory and CryptoRF. Radboud Repository (Radboud University). 3. 250–259.11 indexed citations
16.
Garcia, Flavio D., Peter van Rossum, Roel Verdult, & Ronny Wichers Schreur. (2009). Wirelessly Pickpocketing a Mifare Classic Card. Radboud Repository (Radboud University).56 indexed citations
17.
Schreur, Ronny Wichers, Peter van Rossum, Flavio D. Garcia, et al.. (2008). Security Flaw in MIFARE Classic.5 indexed citations
Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive
bibliographic database. While OpenAlex provides broad and valuable coverage of the global
research landscape, it—like all bibliographic datasets—has inherent limitations. These include
incomplete records, variations in author disambiguation, differences in journal indexing, and
delays in data updates. As a result, some metrics and network relationships displayed in
Rankless may not fully capture the entirety of a scholar's output or impact.