Influential Security Papers

This webpage is an attempt to assemble a ranking of top-cited papers from the area of computer security. The ranking has been created based on citations of papers published at the four tier-1 security conferences, also known as the system security circus:

In addition, the following security conferences are also considered for generating the ranking:

The citations for each paper have been determined by carefully crawling the DBLP service and Google Scholar. As both services limit crawling activity, the update interval for the ranking is very large, such that citation counts change at most every two months, if at all.

Top of the Notch

Top-cited papers from 1981 to 2017 ⌄

  1. 1
    Mihir Bellare, Phillip Rogaway:
    Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
    ACM Conference on Computer and Communications Security (CCS), 1993
    4572 cites at Google Scholar
    4674% above average of year
    Last visited: Nov-2017
  2. 2
    Dorothy E. Denning:
    An Intrusion-Detection Model.
    IEEE Symposium on Security and Privacy, 1986
    4376 cites at Google Scholar
    1715% above average of year
    Last visited: Aug-2017
  3. 3
    Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
    Random Key Predistribution Schemes for Sensor Networks.
    IEEE Symposium on Security and Privacy, 2003
    3696 cites at Google Scholar
    2144% above average of year
    Last visited: Nov-2017
  4. 4
    Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
    Attribute-based encryption for fine-grained access control of encrypted data.
    ACM Conference on Computer and Communications Security (CCS), 2006
    3628 cites at Google Scholar
    3861% above average of year
    Last visited: Nov-2017
  5. 5
    Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
    Provable data possession at untrusted stores.
    ACM Conference on Computer and Communications Security (CCS), 2007
    2292 cites at Google Scholar
    2178% above average of year
    Last visited: Sep-2017

→  Check out the top-100 ranking

Absolute citations are not necessarily a good indicator for the impact of a paper, as the number of citations usually grows with the age of a paper. The following list shows an alternative ranking, where the citations are normalized by the age of each paper.

Top-cited papers normalized by age ⌄

  1. 1
    Nicholas Carlini, David A. Wagner:
    Towards Evaluating the Robustness of Neural Networks.
    IEEE Symposium on Security and Privacy, 2017
    65 cites at Google Scholar
    4905% above average of year
    Last visited: Oct-2017
  2. 2
    Mihir Bellare, Phillip Rogaway:
    Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
    ACM Conference on Computer and Communications Security (CCS), 1993
    4572 cites at Google Scholar
    4674% above average of year
    Last visited: Nov-2017
  3. 3
    Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
    Attribute-based encryption for fine-grained access control of encrypted data.
    ACM Conference on Computer and Communications Security (CCS), 2006
    3628 cites at Google Scholar
    3861% above average of year
    Last visited: Nov-2017
  4. 4
    D. F. C. Brewer, Michael J. Nash:
    The Chinese Wall Security Policy.
    IEEE Symposium on Security and Privacy, 1989
    1290 cites at Google Scholar
    3765% above average of year
    Last visited: Nov-2017
  5. 5
    Steven M. Bellovin, Michael Merritt:
    Encrypted key exchange: password-based protocols secure against dictionary attacks.
    IEEE Symposium on Security and Privacy, 1992
    1709 cites at Google Scholar
    3308% above average of year
    Last visited: Nov-2017

→  Check out the normalized top-100 ranking

The last Decades

If you are interested in a more detailed breakdown. Here are also rankings of top-cited papers for the last four decades:

1980 – 1990
1990 – 2000
2000 – 2010
2010 – now

Contact

As with any ranking, the presented results do not necessarily reflect the true impact of a paper. Moreover, the underlying data may contain errors or missing information. Errare humanum est.

If you have questions, comments or ideas how to improve this webpage, feel free to drop an e-mail.