Tom Roeder

1.7k total citations · 1 hit paper
11 papers, 1.1k citations indexed

About

Tom Roeder is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Tom Roeder has authored 11 papers receiving a total of 1.1k indexed citations (citations by other indexed papers that have themselves been cited), including 10 papers in Artificial Intelligence, 6 papers in Computer Networks and Communications and 4 papers in Information Systems. Recurrent topics in Tom Roeder's work include Security and Verification in Computing (7 papers), Cloud Data Security Solutions (4 papers) and Cryptography and Data Security (3 papers). Tom Roeder is often cited by papers focused on Security and Verification in Computing (7 papers), Cloud Data Security Solutions (4 papers) and Cryptography and Data Security (3 papers). Tom Roeder collaborates with scholars based in United States and United Kingdom. Tom Roeder's co-authors include Seny Kamara, Charalampos Papamanthou, Fred B. Schneider, Úlfar Erlingsson, Stephen Checkoway, Geoff Pike, Peter Collingbourne, Rimon Barr, Emin Gün Sirer and Kevin Walsh and has published in prestigious journals such as ACM Transactions on Computer Systems, ACM SIGOPS Operating Systems Review and Journal of Cryptology.

In The Last Decade

Tom Roeder

11 papers receiving 1.0k citations

Hit Papers

Dynamic searchable symmetric encryption 2012 2026 2016 2021 2012 200 400 600

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tom Roeder United States 9 878 406 282 184 174 11 1.1k
Xuhua Ding Singapore 17 797 0.9× 518 1.3× 344 1.2× 95 0.5× 111 0.6× 57 1.1k
Flemming Friche Rodler Denmark 7 382 0.4× 153 0.4× 599 2.1× 93 0.5× 153 0.9× 7 888
Deian Stefan United States 17 519 0.6× 246 0.6× 197 0.7× 59 0.3× 49 0.3× 57 749
Andreas Rossberg Germany 14 559 0.6× 191 0.5× 238 0.8× 198 1.1× 41 0.2× 29 769
J.-J. Quisquater Belgium 13 696 0.8× 389 1.0× 217 0.8× 86 0.5× 402 2.3× 29 1.0k
Xiangyao Yu United States 22 803 0.9× 658 1.6× 1.1k 3.8× 161 0.9× 134 0.8× 55 1.8k
Mike Hamburg United States 8 615 0.7× 255 0.6× 237 0.8× 24 0.1× 49 0.3× 12 786
Daniel Demmler Germany 12 675 0.8× 196 0.5× 109 0.4× 116 0.6× 66 0.4× 18 792
Eu-Jin Goh United States 6 746 0.8× 365 0.9× 431 1.5× 27 0.1× 26 0.1× 7 908
Keval Vora United States 13 338 0.4× 263 0.6× 252 0.9× 39 0.2× 552 3.2× 32 660

Countries citing papers authored by Tom Roeder

Since Specialization
Citations

This map shows the geographic impact of Tom Roeder's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tom Roeder with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tom Roeder more than expected).

Fields of papers citing papers by Tom Roeder

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tom Roeder. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tom Roeder. The network helps show where Tom Roeder may publish in the future.

Co-authorship network of co-authors of Tom Roeder

This figure shows the co-authorship network connecting the top 25 collaborators of Tom Roeder. A scholar is included among the top collaborators of Tom Roeder based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tom Roeder. Tom Roeder is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

11 of 11 papers shown
1.
Roeder, Tom, et al.. (2014). Enforcing forward-edge control-flow integrity in GCC & LLVM. 941–955. 154 indexed citations
2.
Manferdelli, John, Tom Roeder, & Fred B. Schneider. (2013). The CloudProxy Tao for Trusted Computing. 7 indexed citations
3.
Kamara, Seny, Charalampos Papamanthou, & Tom Roeder. (2012). Dynamic searchable symmetric encryption. 965–976. 654 indexed citations breakdown →
4.
Roeder, Tom, Rafael Pass, & Fred B. Schneider. (2011). Multi-Verifier Signatures. Journal of Cryptology. 25(2). 310–348. 2 indexed citations
5.
Kamara, Seny, Charalampos Papamanthou, & Tom Roeder. (2011). CS2: A Searchable Cryptographic Cloud Storage System. 42 indexed citations
6.
Roeder, Tom & Fred B. Schneider. (2010). Proactive obfuscation. ACM Transactions on Computer Systems. 28(2). 1–54. 45 indexed citations
7.
Yotov, Kamen, Tom Roeder, Keshav Pingali, John A. Gunnels, & Fred G. Gustavson. (2007). An experimental comparison of cache-oblivious and cache-conscious programs. 93–104. 55 indexed citations
8.
Spear, Michael, Tom Roeder, Orion Hodson, Galen Hunt, & Steven Levi. (2006). Solving the starting problem. 45–57. 27 indexed citations
9.
Spear, Michael, Tom Roeder, Orion Hodson, Galen Hunt, & Steven Levi. (2006). Solving the starting problem. ACM SIGOPS Operating Systems Review. 40(4). 45–57. 8 indexed citations
10.
Erlingsson, Úlfar, Tom Roeder, & Ted Wobber. (2005). Virtual Environments for Unreliable Extensions. Statistics and Its Interface. 8(3). 10–365. 8 indexed citations
11.
Liu, Hongzhou, Tom Roeder, Kevin Walsh, Rimon Barr, & Emin Gün Sirer. (2005). Design and implementation of a single system image operating system for ad hoc networks. 149–162. 67 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026