Stephen Kent

1.9k total citations · 1 hit paper
25 papers, 1.3k citations indexed

About

Stephen Kent is a scholar working on Computer Networks and Communications, Artificial Intelligence and Electrical and Electronic Engineering. According to data from OpenAlex, Stephen Kent has authored 25 papers receiving a total of 1.3k indexed citations (citations by other indexed papers that have themselves been cited), including 16 papers in Computer Networks and Communications, 11 papers in Artificial Intelligence and 9 papers in Electrical and Electronic Engineering. Recurrent topics in Stephen Kent's work include IPv6, Mobility, Handover, Networks, Security (9 papers), Mobile Agent-Based Network Management (8 papers) and Advanced Authentication Protocols Security (7 papers). Stephen Kent is often cited by papers focused on IPv6, Mobility, Handover, Networks, Security (9 papers), Mobile Agent-Based Network Management (8 papers) and Advanced Authentication Protocols Security (7 papers). Stephen Kent collaborates with scholars based in United States, Canada and Germany. Stephen Kent's co-authors include Christine E. Jones, Fabrice Tchakountio, Craig Partridge, Alex C. Snoeren, Luis A. Sanchez, W. Timothy Strayer, Charles Lynn, Karen Seo, Isidro Castiñeyra and John K. Zao and has published in prestigious journals such as Communications of the ACM, ACM Computing Surveys and ACM SIGCOMM Computer Communication Review.

In The Last Decade

Stephen Kent

24 papers receiving 1.1k citations

Hit Papers

Hash-based IP traceback 2001 2026 2009 2017 2001 100 200 300 400 500

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Stephen Kent United States 11 1.1k 886 306 200 196 25 1.3k
S. Kent United States 11 829 0.7× 675 0.8× 265 0.9× 122 0.6× 104 0.5× 14 964
Greg Kroah-Hartman United States 8 529 0.5× 507 0.6× 256 0.8× 336 1.7× 243 1.2× 17 955
Jason Franklin United States 13 872 0.8× 471 0.5× 247 0.8× 375 1.9× 661 3.4× 23 1.3k
Kostas G. Anagnostakis United States 22 1.3k 1.1× 700 0.8× 296 1.0× 615 3.1× 364 1.9× 45 1.5k
Marc E. Fiuczynski United States 13 1.5k 1.3× 635 0.7× 552 1.8× 187 0.9× 827 4.2× 25 1.8k
Jochen Liedtke United States 17 1.1k 1.0× 766 0.9× 974 3.2× 280 1.4× 351 1.8× 45 1.6k
James W. O’Toole United States 13 1.8k 1.6× 531 0.6× 684 2.2× 146 0.7× 439 2.2× 27 2.1k
Robert Wahbe United States 8 764 0.7× 901 1.0× 457 1.5× 502 2.5× 250 1.3× 11 1.2k
T.Y.C. Woo United States 16 1.1k 1.0× 608 0.7× 213 0.7× 92 0.5× 427 2.2× 40 1.4k
David Golub United States 16 1.5k 1.3× 481 0.5× 1.1k 3.7× 100 0.5× 317 1.6× 29 1.8k

Countries citing papers authored by Stephen Kent

Since Specialization
Citations

This map shows the geographic impact of Stephen Kent's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Stephen Kent with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Stephen Kent more than expected).

Fields of papers citing papers by Stephen Kent

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Stephen Kent. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Stephen Kent. The network helps show where Stephen Kent may publish in the future.

Co-authorship network of co-authors of Stephen Kent

This figure shows the co-authorship network connecting the top 25 collaborators of Stephen Kent. A scholar is included among the top collaborators of Stephen Kent based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Stephen Kent. Stephen Kent is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Kent, Stephen. (2014). Opportunistic Security as a Countermeasure to Pervasive Monitoring.
2.
Kent, Stephen, et al.. (2009). Traceable Anonymous Certificate. RFC. 5636. 1–31. 5 indexed citations
3.
Huston, Geoff, et al.. (2009). Resource Certification - A Public Key Infrastructure for IP Addresses and AS's. 6. 1–6. 5 indexed citations
4.
Partridge, Craig, et al.. (2007). Information Assurance and the Transition to IP Version 6 (IPv6). 1–8. 1 indexed citations
5.
Kent, Stephen, Charles Lynn, & Karen Seo. (2004). X.509 Extensions for IP Addresses and AS Identifiers. RFC. 3779. 1–27. 15 indexed citations
6.
Kent, Stephen, et al.. (2002). What's Trust Got to Do with It?. 398–399. 4 indexed citations
7.
Snoeren, Alex C., Craig Partridge, Luis A. Sanchez, et al.. (2001). Hash-based IP traceback. ACM SIGCOMM Computer Communication Review. 31(4). 3–14. 164 indexed citations
8.
Kent, Stephen, et al.. (2000). Secure Border Gateway Protocol (S-BGP) — Real World Performance and Deployment Issues. Network and Distributed System Security Symposium. 99 indexed citations
9.
Kent, Stephen, Charles Lynn, & Karen Seo. (2000). Secure Border Gateway Protocol (Secure-BGP). 92 indexed citations
10.
Zao, John K., et al.. (1999). A public‐key based secure Mobile IP. Wireless Networks. 5(5). 373–390. 27 indexed citations
11.
Zao, John K., et al.. (1997). A public-key based secure mobile IP. 173–184. 22 indexed citations
12.
Brickell, Ernest F., et al.. (1995). SKIPJACK review: interim report. Springer eBooks. 119–130. 7 indexed citations
13.
Kent, Stephen. (1995). Internet Privacy Enhanced Mail. Springer eBooks. 51–75. 30 indexed citations
14.
Landau, Susan, Stephen Kent, Dorothy E. Denning, et al.. (1994). Crypto policy perspectives. Communications of the ACM. 37(8). 115–121. 8 indexed citations
15.
Kent, Stephen. (1994). Internet security standards. 2(2). 78–85. 1 indexed citations
16.
Kent, Stephen, et al.. (1985). Security mechanisms in a transport layer protocol. Computers & Security. 4(4). 325–341. 2 indexed citations
17.
Kent, Stephen, et al.. (1983). Security Mechanisms in High-Level Network Protocols. ACM Computing Surveys. 15(2). 135–171. 180 indexed citations
18.
Kent, Stephen. (1981). Some Cryptographic Techniques for File Protection.. 80. 1 indexed citations
19.
Kent, Stephen, et al.. (1980). Technical correspondence. Communications of the ACM. 23(1). 35–40. 1 indexed citations
20.
Kent, Stephen. (1977). Encryption-based protection for interactive user/computer communication. 5.7–5.13. 15 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026