John P. A. Ioannidis
#182,905
Most Influential Person Now
John P. A. Ioannidis's AcademicInfluence.com Rankings
John P. A. Ioannidismathematics Degrees
Mathematics
#8240
World Rank
#11188
Historical Rank
Statistics
#1181
World Rank
#1288
Historical Rank

John P. A. Ioannidisphilosophy Degrees
Philosophy
#11578
World Rank
#15971
Historical Rank
Logic
#8391
World Rank
#10497
Historical Rank

Download Badge
Mathematics Philosophy
Why Is John P. A. Ioannidis Influential?
(Suggest an Edit or Addition)John P. A. Ioannidis's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Quantitative Synthesis in Systematic Reviews (1997) (2441)
- Controlling high bandwidth aggregates in the network (2002) (875)
- The KeyNote Trust-Management System Version 2 (1999) (782)
- Implementing Pushback: Router-Based Defense Against DDoS Attacks (2002) (656)
- IP-based protocols for mobile internetworking (1991) (468)
- Using the Fluhrer, Mantin, and Shamir Attack to Break WEP (2002) (455)
- The KeyNote trust management system version2, IETF RFC 2704 (1999) (381)
- Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing (2003) (250)
- The Synthesis Kernel (1988) (208)
- The KeyNote Trust-Management System (1998) (186)
- The Design and Implementation of a Mobile Internetworking Architecture (1999) (164)
- Just fast keying: Key agreement in a hostile internet (2004) (150)
- A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP) (2004) (147)
- Origin authentication in interdomain routing (2003) (142)
- CryptoGraphics: Secret Key Cryptography Using Graphics Cards (2005) (107)
- Trust management for IPsec (2002) (90)
- Experience with the KeyNote Trust Management System: Applications and Future Directions (2003) (84)
- Fileteller: Paying and Getting Paid for File Storage (2002) (70)
- Efficient packet monitoring for network management (2002) (69)
- xPF: packet filtering for low-cost network monitoring (2002) (56)
- Controlling High Bandwidth Aggregates in the Network (Extended Version) (2001) (56)
- Offline Micropayments without Trusted Hardware (2002) (56)
- Fighting Spam by Encapsulating Policy in Email Addresses (2003) (54)
- On the Use of Stream Control Transmission Protocol (SCTP) with IPsec (2003) (49)
- Trust Management and Network Layer Security Protocols (1999) (40)
- Implementing IPsec (1997) (38)
- Secure and Flexible Global File Sharing (2003) (37)
- An Email Worm Vaccine Architecture (2005) (31)
- Protocols for mobile internetworking (1993) (29)
- The CryptoGraphic Disk Driver (2003) (27)
- Implementing remote fork() with checkpoint/restart (1989) (27)
- The Architecture and Implementation of Network Layer Security in UNIX (1993) (26)
- Design and implementation of virtual private services (2003) (21)
- Information Security Management System (2014) (21)
- Anonymity in Wireless Broadcast Networks (2009) (19)
- WAR: Wireless Anonymous Routing (2003) (18)
- Diffie-Hellman Key Exchange (2011) (17)
- Iso/iec 27001 (2011) (16)
- Distributed Trust (2004) (15)
- TAPI: Transactions for Accessing Public Infrastructure (2003) (14)
- A Pay-per-Use DoS Protection Mechanism for the Web (2004) (11)
- WebDAVA: An administrator-free approach to Web file-sharing (2003) (11)
- DSA and RSA Key and Signature Encoding for the KeyNote Trust Management System (2000) (11)
- Aggregate-Based Congestion Control (2002) (11)
- Secret Key Cryptography Using Graphics Cards (2004) (9)
- Coherent File Distribution Protocol (1991) (9)
- Aggregate congestion control (2002) (9)
- Adapting and accelerating the Stream Cipher Algorithm " RC 4 " using " Ultra Gridsec " and " HIMAN " and use it to secure " HIMAN " Data (2013) (8)
- Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications (2007) (8)
- Porting AIX onto the student electronic notebook (1991) (7)
- Protocols for anonymity in wireless networks (2003) (7)
- Notes on the Implementation of a Remote Fork Mechanism (1988) (5)
- Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings (2005) (5)
- Trust Management for IPsec. (2001) (5)
- Denial of Service - Panel Discussion (2000) (5)
- PIP-1: A Personal Information Portal with wireless access to an information infrastructure (1990) (4)
- Trust Management and Network Security Protocols (1999) (4)
- What we can learn from API security: (Transcript of discussion) (2005) (3)
- gore: Routing-Assisted Defense Against DDoS Attacks (2005) (3)
- The Coherent Trivial File Transfer Protocol (1990) (2)
- Network security and IPsec (tutorial) (2000) (2)
- Decentralized Trust Management (2011) (2)
- Information Integrity (2011) (1)
- Contractual access control. Discussion (2003) (1)
- A protocol's life after attacks... Commentary. Authors' reply (2005) (0)
- Identity Proof (2011) (0)
- Micro-management of Risk in a Trust-Based Billing System (Transcript of Discussion) (2000) (0)
- Extracted data and code (2021) (0)
- Thwarting timing attacks using ATM networks. Discussion (2002) (0)
- Is entity authentication necessary? Discussion (2003) (0)
- Limitations of IPsec policy mechanisms. Commentary. Discussion (2005) (0)
- Towards a framework for autonomic security protocols. Commentary. Authors' reply (2005) (0)
- O ine Micropayments without Trusted Hardware (2001) (0)
- WAR: Wireless Anonymous Routing. Commentary. Authors' reply (2005) (0)
- Panel session: Is protocol modelling finished? (transcript of discussion). Discussion (2005) (0)
- Reviewer Acknowledgment (2005) (0)
- Safety and Performance in an Open Packet Monitoring Architecture (2002) (0)
- AFFECT THE GAINS OF MINORITY SHAREHOLDERS IN FREEZE-OUT TRANSACTIONS ? A RE-EXAMINATION (2013) (0)
- DoS Pushback (2011) (0)
This paper list is powered by the following services: