Tom Coffey

551 total citations
33 papers, 314 citations indexed

About

Tom Coffey is a scholar working on Computer Networks and Communications, Information Systems and Artificial Intelligence. According to data from OpenAlex, Tom Coffey has authored 33 papers receiving a total of 314 indexed citations (citations by other indexed papers that have themselves been cited), including 24 papers in Computer Networks and Communications, 21 papers in Information Systems and 19 papers in Artificial Intelligence. Recurrent topics in Tom Coffey's work include Advanced Authentication Protocols Security (21 papers), User Authentication and Security Systems (18 papers) and Cryptographic Implementations and Security (9 papers). Tom Coffey is often cited by papers focused on Advanced Authentication Protocols Security (21 papers), User Authentication and Security Systems (18 papers) and Cryptographic Implementations and Security (9 papers). Tom Coffey collaborates with scholars based in Ireland and United States. Tom Coffey's co-authors include Anca Delia Jurcut, Fan Zhang, Thomas Newe, Ioan Salomie, Abdulhussain E. Mahdi, Dorel Picovici, Peter D. Burrows, Vasile Dădârlat and Weijun Wang and has published in prestigious journals such as ACM SIGCOMM Computer Communication Review, Computer Networks and Electric Power Systems Research.

In The Last Decade

Tom Coffey

30 papers receiving 282 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tom Coffey Ireland 9 248 172 171 37 25 33 314
Gongliang Chen China 11 250 1.0× 203 1.2× 175 1.0× 13 0.4× 52 2.1× 40 388
Jin Sun China 7 142 0.6× 181 1.1× 297 1.7× 15 0.4× 15 0.6× 19 377
Ben Smyth Luxembourg 8 141 0.6× 179 1.0× 162 0.9× 38 1.0× 28 1.1× 23 282
Colin Parris United States 7 370 1.5× 87 0.5× 124 0.7× 32 0.9× 35 1.4× 14 402
Yuanda Cao China 9 230 0.9× 46 0.3× 91 0.5× 20 0.5× 34 1.4× 61 306
Jue‐Sam Chou Taiwan 7 207 0.8× 117 0.7× 161 0.9× 5 0.1× 32 1.3× 22 293
Bob Askwith United Kingdom 9 189 0.8× 89 0.5× 135 0.8× 23 0.6× 41 1.6× 26 281
Sebastian Nanz Switzerland 7 122 0.5× 73 0.4× 83 0.5× 24 0.6× 20 0.8× 20 224
Sandro Rafaeli United Kingdom 7 492 2.0× 281 1.6× 90 0.5× 57 1.5× 39 1.6× 14 579
Jon Inouye United States 6 294 1.2× 100 0.6× 68 0.4× 18 0.5× 68 2.7× 13 399

Countries citing papers authored by Tom Coffey

Since Specialization
Citations

This map shows the geographic impact of Tom Coffey's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tom Coffey with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tom Coffey more than expected).

Fields of papers citing papers by Tom Coffey

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tom Coffey. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tom Coffey. The network helps show where Tom Coffey may publish in the future.

Co-authorship network of co-authors of Tom Coffey

This figure shows the co-authorship network connecting the top 25 collaborators of Tom Coffey. A scholar is included among the top collaborators of Tom Coffey based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tom Coffey. Tom Coffey is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Jurcut, Anca Delia, et al.. (2014). Design requirements to counter parallel session attacks in security protocols. 12. 298–305. 1 indexed citations
2.
Jurcut, Anca Delia, et al.. (2014). Design guidelines for security protocols to prevent replay & parallel session attacks. Computers & Security. 45. 255–273. 11 indexed citations
3.
Coffey, Tom, et al.. (2011). A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications. International Journal of Information Security and Privacy. 5(1). 33–49. 3 indexed citations
4.
5.
Coffey, Tom, et al.. (2005). The HSJ debate. GPs want choose and book--but is the system workable.. PubMed. 115(5943). 20–1. 1 indexed citations
6.
Coffey, Tom, et al.. (2005). The concept of layered proving trees and its application to the automation of security protocol verification. ACM Transactions on Information and System Security. 8(3). 287–311. 13 indexed citations
7.
Coffey, Tom, et al.. (2005). Applying Conditional Linear Cryptanalysis to Ciphers with Key- Dependant Operations.
8.
Salomie, Ioan, et al.. (2004). Application framework development for virtual learning environments. 557–562. 3 indexed citations
9.
Coffey, Tom, et al.. (2004). A Novel Approach to the Automation of Logic-Based Security Protocol Verification.
10.
Coffey, Tom, et al.. (2003). A policy-based security framework for Web-enabled applications. 487–492. 10 indexed citations
11.
Coffey, Tom, et al.. (2003). On the automated implementation of modal logics used to verify security protocols. 329–334. 5 indexed citations
12.
13.
Newe, Thomas & Tom Coffey. (2003). Formal verification logic for hybrid security protocols.. Computer Systems: Science & Engineering. 18. 17–25. 8 indexed citations
14.
Newe, Thomas & Tom Coffey. (2003). Security protocols for 2G and 3G wireless communications. 335–340. 4 indexed citations
15.
Coffey, Tom, et al.. (2003). Analysis of a mobile communication security protocol. 322–328. 1 indexed citations
16.
Coffey, Tom, et al.. (2003). On Different Approaches to Establish the Security of Cryptographic Protocols.. Security and Management. 140(1-2). 637–643. 6 indexed citations
17.
Dădârlat, Vasile, et al.. (2003). A personalized approach for teaching Web-based curriculum in Communications & Computer Networks. 732–737. 3 indexed citations
18.
Picovici, Dorel, et al.. (2003). The cascade induction machine: a reliable and controllable motor or generator. Electric Power Systems Research. 68(3). 193–207. 8 indexed citations
19.
Coffey, Tom, et al.. (1996). Non-repudiation with mandatory proof of receipt. ACM SIGCOMM Computer Communication Review. 26(1). 6–17. 71 indexed citations
20.
Wang, Weijun & Tom Coffey. (1992). Network Security: Design of a Global Secure Link. 101–111. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026