
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Data security storage mechanism based on blockchain industrial Internet of Things
Jin Wang, Jiahao Chen, Yongjun Ren, et al.
Computers & Industrial Engineering (2021) Vol. 164, pp. 107903-107903
Closed Access | Times Cited: 57
Jin Wang, Jiahao Chen, Yongjun Ren, et al.
Computers & Industrial Engineering (2021) Vol. 164, pp. 107903-107903
Closed Access | Times Cited: 57
Showing 26-50 of 57 citing articles:
Wire and Cable Quality Traceability System Based on Industrial Internet of Things and Blockchain
Jintao Zhao, Wenlei Sun, Cheng Lu, et al.
Applied Sciences (2024) Vol. 14, Iss. 2, pp. 943-943
Open Access | Times Cited: 2
Jintao Zhao, Wenlei Sun, Cheng Lu, et al.
Applied Sciences (2024) Vol. 14, Iss. 2, pp. 943-943
Open Access | Times Cited: 2
Characteristics of proliferating cryptocurrencies: a comparative study between stable and non-stable cryptocurrencies
Cheuk Hang Au, Gerrard Li, Wen-Shou Hsu, et al.
Enterprise Information Systems (2024) Vol. 18, Iss. 7
Open Access | Times Cited: 2
Cheuk Hang Au, Gerrard Li, Wen-Shou Hsu, et al.
Enterprise Information Systems (2024) Vol. 18, Iss. 7
Open Access | Times Cited: 2
Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities
Alexandr Kuznetsov, Alex Rusnak, Anton Yezhov, et al.
Cryptography (2024) Vol. 8, Iss. 3, pp. 33-33
Open Access | Times Cited: 2
Alexandr Kuznetsov, Alex Rusnak, Anton Yezhov, et al.
Cryptography (2024) Vol. 8, Iss. 3, pp. 33-33
Open Access | Times Cited: 2
SF-LAP: Secure M2M Communication in IIoT with a Single-Factor Lightweight Authentication Protocol
Shahzad Khurram, Masoom Alam, Nadeem Javaid, et al.
Journal of Sensors (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 8
Shahzad Khurram, Masoom Alam, Nadeem Javaid, et al.
Journal of Sensors (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 8
Research on Data Security Model of Environmental Monitoring Based on Blockchain
Manyu Zhao, Wei Liu, He Kai
IEEE Access (2022) Vol. 10, pp. 120168-120180
Open Access | Times Cited: 8
Manyu Zhao, Wei Liu, He Kai
IEEE Access (2022) Vol. 10, pp. 120168-120180
Open Access | Times Cited: 8
Security-Enhanced Operational Architecture for Decentralized Industrial Internet of Things: A Blockchain-Based Approach
Pengchao Yao, Bingjing Yan, Tao Yang, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 11073-11086
Closed Access | Times Cited: 4
Pengchao Yao, Bingjing Yan, Tao Yang, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 6, pp. 11073-11086
Closed Access | Times Cited: 4
A Content Analysis-Based Review of Blockchain Technology’s Contribution to Business Competitive Advantage
Andrei O. J. Kwok, Yin Maythu
(2024), pp. 219-237
Closed Access | Times Cited: 1
Andrei O. J. Kwok, Yin Maythu
(2024), pp. 219-237
Closed Access | Times Cited: 1
Research on Blockchain-Based Cereal and Oil Video Surveillance Abnormal Data Storage
Yuan Zhang, Guangyuan Cui, Hongyi Ge, et al.
Agriculture (2023) Vol. 14, Iss. 1, pp. 23-23
Open Access | Times Cited: 4
Yuan Zhang, Guangyuan Cui, Hongyi Ge, et al.
Agriculture (2023) Vol. 14, Iss. 1, pp. 23-23
Open Access | Times Cited: 4
Blockchain Applications in Smart City: A Survey
Shuo Wang, Zhiqi Lei, Zijun Wang, et al.
Lecture notes in computer science (2023), pp. 485-494
Closed Access | Times Cited: 3
Shuo Wang, Zhiqi Lei, Zijun Wang, et al.
Lecture notes in computer science (2023), pp. 485-494
Closed Access | Times Cited: 3
Transfer Fuzzy Learning enabled Streebog Cryptographic Substitution Permutation based zero trust security in IIOT
Anamika Singh, Rajesh Kumar Dhanaraj, Md. Akkas Ali, et al.
Alexandria Engineering Journal (2023) Vol. 81, pp. 449-459
Open Access | Times Cited: 3
Anamika Singh, Rajesh Kumar Dhanaraj, Md. Akkas Ali, et al.
Alexandria Engineering Journal (2023) Vol. 81, pp. 449-459
Open Access | Times Cited: 3
A multilevel authentication-based blockchain powered medicine anti-counterfeiting for reliable IoT supply chain management
Neetu Sharma, Rajesh Rohilla
The Journal of Supercomputing (2023) Vol. 80, Iss. 4, pp. 4870-4913
Closed Access | Times Cited: 3
Neetu Sharma, Rajesh Rohilla
The Journal of Supercomputing (2023) Vol. 80, Iss. 4, pp. 4870-4913
Closed Access | Times Cited: 3
Access control mechanism in distributed smart power plants based on blockchain and ciphertext updatable functional encryption
Yizhe Zhou, Xianwei Zhu, Ailin Chen, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 3, pp. 1021-1035
Closed Access
Yizhe Zhou, Xianwei Zhu, Ailin Chen, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 3, pp. 1021-1035
Closed Access
Enhancing Industrial IoT Security: Utilizing Blockchain-Assisted Deep Federated Learning for Collaborative Intrusion Detection
Jegatheesan A. Anitha Govindaram
Deleted Journal (2024) Vol. 20, Iss. 2s, pp. 1345-1363
Open Access
Jegatheesan A. Anitha Govindaram
Deleted Journal (2024) Vol. 20, Iss. 2s, pp. 1345-1363
Open Access
Analyzing the blockchain mining strategy in Industrial Internet of Things: A game theoretical approach
Zhuo Chen, Zhe Liu, Yang Zhou
Future Generation Computer Systems (2024) Vol. 159, pp. 51-63
Closed Access
Zhuo Chen, Zhe Liu, Yang Zhou
Future Generation Computer Systems (2024) Vol. 159, pp. 51-63
Closed Access
A Hierarchical Structure Modeling and Relationships Exploration of Supply Chain 5.0 Capabilities
Md Ainul Kabir, Sharfuddin Ahmed Khan, Golam Kabir
IEEE Transactions on Engineering Management (2024) Vol. 71, pp. 11253-11268
Closed Access
Md Ainul Kabir, Sharfuddin Ahmed Khan, Golam Kabir
IEEE Transactions on Engineering Management (2024) Vol. 71, pp. 11253-11268
Closed Access
Intervention of Innovative Technologies for Eradicating Tampering in Digital Forensics: Practicing Intelligent Decision Methodologies
Asmaa Elsayed, Bilal Arain
Deleted Journal (2024) Vol. 4, pp. 53-68
Open Access
Asmaa Elsayed, Bilal Arain
Deleted Journal (2024) Vol. 4, pp. 53-68
Open Access
Research on ZKP Algorithm of Data Asset Security and Privacy Protection Based on Blockchain Technology
Fei Lan, Junjia Yang, Hao Feng, et al.
International Journal of e-Collaboration (2024) Vol. 20, Iss. 1, pp. 1-20
Open Access
Fei Lan, Junjia Yang, Hao Feng, et al.
International Journal of e-Collaboration (2024) Vol. 20, Iss. 1, pp. 1-20
Open Access
Intelligent System for Secure Tamper Protocol Model with IoT BlockchainArchitecture for Data Mitigation
BH. V.V.S.R.K.K. Pavan, Venkata Satish D, B Mounica, et al.
Journal of Computer Allied Intelligence (JCAI). (2024) Vol. 2, Iss. 4, pp. 1-19
Open Access
BH. V.V.S.R.K.K. Pavan, Venkata Satish D, B Mounica, et al.
Journal of Computer Allied Intelligence (JCAI). (2024) Vol. 2, Iss. 4, pp. 1-19
Open Access
Cyber Security Challenges in Industrial Settings with the Internet of Things
Shailaja Salagrama, Amit Garg, J. Logeshwaran, et al.
Communications in computer and information science (2024), pp. 281-290
Closed Access
Shailaja Salagrama, Amit Garg, J. Logeshwaran, et al.
Communications in computer and information science (2024), pp. 281-290
Closed Access
Retrieval Integrity Verification and Multi-System Data Interoperability Mechanism of a Blockchain Oracle for Smart Healthcare with Internet of Things (IoT) Integration
Ziyuan Zhou, Long Chen, Yekang Zhao, et al.
Sensors (2024) Vol. 24, Iss. 23, pp. 7487-7487
Open Access
Ziyuan Zhou, Long Chen, Yekang Zhao, et al.
Sensors (2024) Vol. 24, Iss. 23, pp. 7487-7487
Open Access
Integration of Generative AI System to IoT Based Healthcare Systems 5.0
Janjhyam Venkata Naga Ramesh, Veera Talukdar, Ardhariksa Zukhruf Kurniullah, et al.
Studies in systems, decision and control (2024), pp. 199-217
Closed Access
Janjhyam Venkata Naga Ramesh, Veera Talukdar, Ardhariksa Zukhruf Kurniullah, et al.
Studies in systems, decision and control (2024), pp. 199-217
Closed Access
IoST: Internet of Softwarized Things Networks, Security Challenges and Future Research Directions
Muhammad Adil, Muhammad Attique, Jian Wang, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2022), pp. 269-274
Closed Access | Times Cited: 1
Muhammad Adil, Muhammad Attique, Jian Wang, et al.
2022 IEEE Globecom Workshops (GC Wkshps) (2022), pp. 269-274
Closed Access | Times Cited: 1
Relating the DT Framework in Securing the Healthcare Data using Blockchain
M. Shobana, A. Mukeshkumar, S. Vaishnavi, et al.
2022 International Conference on Computer Communication and Informatics (ICCCI) (2023)
Closed Access
M. Shobana, A. Mukeshkumar, S. Vaishnavi, et al.
2022 International Conference on Computer Communication and Informatics (ICCCI) (2023)
Closed Access
Multimedia IoT Data Compression using Deep Learning Technique
V. Yathavaraj, N. Karthikeyan, A. Kousalya, et al.
(2023), pp. 1-7
Closed Access
V. Yathavaraj, N. Karthikeyan, A. Kousalya, et al.
(2023), pp. 1-7
Closed Access
A Novel Data Flow Security Protection Algorithm for Digital Media in 6G Environment
Linqin Zhang
2022 7th International Conference on Communication and Electronics Systems (ICCES) (2023), pp. 669-673
Closed Access
Linqin Zhang
2022 7th International Conference on Communication and Electronics Systems (ICCES) (2023), pp. 669-673
Closed Access