
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions
Moustafa Mamdouh, Ali Ismail Awad, Ashraf A. M. Khalaf, et al.
Computers & Security (2021) Vol. 111, pp. 102491-102491
Open Access | Times Cited: 83
Moustafa Mamdouh, Ali Ismail Awad, Ashraf A. M. Khalaf, et al.
Computers & Security (2021) Vol. 111, pp. 102491-102491
Open Access | Times Cited: 83
Showing 26-50 of 83 citing articles:
Sistema Web para la Dinamización de la Gestión de DNI en Entidades Gubernamentales Basado en SCRUM
Christian Stephano Castañeda Rodríguez, Edisson Alejandro Gálvez Mori, Percy Olivarez Gerónimo Dionicio, et al.
INGENIO (2025) Vol. 8, Iss. 1, pp. 5-16
Open Access
Christian Stephano Castañeda Rodríguez, Edisson Alejandro Gálvez Mori, Percy Olivarez Gerónimo Dionicio, et al.
INGENIO (2025) Vol. 8, Iss. 1, pp. 5-16
Open Access
A user-adaptive privacy-preserving authentication of IoMT using zero knowledge proofs with ECC
Garima Misra, Bramah Hazela, Brijesh Kumar Chaurasia
Multimedia Tools and Applications (2025)
Closed Access
Garima Misra, Bramah Hazela, Brijesh Kumar Chaurasia
Multimedia Tools and Applications (2025)
Closed Access
Maximizing healthcare security outcomes through AI/ML multi-label classification approach on IoHT devices
Emmanuel Song Shombot, Gilles Dusserre, Robert Bešťák, et al.
Health and Technology (2025)
Closed Access
Emmanuel Song Shombot, Gilles Dusserre, Robert Bešťák, et al.
Health and Technology (2025)
Closed Access
A Secure Certificateless Signcryption Scheme Without Pairing for Internet of Medical Things
Xin Chen, Debiao He, Muhammad Khurram Khan, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 10, pp. 9136-9147
Closed Access | Times Cited: 19
Xin Chen, Debiao He, Muhammad Khurram Khan, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 10, pp. 9136-9147
Closed Access | Times Cited: 19
Consensus-based mutual authentication scheme for Industrial IoT
Ali Haj-Hassan, Youcef Imine, Antoine Gallais, et al.
Ad Hoc Networks (2023) Vol. 145, pp. 103162-103162
Closed Access | Times Cited: 12
Ali Haj-Hassan, Youcef Imine, Antoine Gallais, et al.
Ad Hoc Networks (2023) Vol. 145, pp. 103162-103162
Closed Access | Times Cited: 12
ARP-PROBE: An ARP spoofing detector for Internet of Things networks using explainable deep learning
Mohammed M. Alani, Ali Ismail Awad, Ezedin Barka
Internet of Things (2023) Vol. 23, pp. 100861-100861
Closed Access | Times Cited: 11
Mohammed M. Alani, Ali Ismail Awad, Ezedin Barka
Internet of Things (2023) Vol. 23, pp. 100861-100861
Closed Access | Times Cited: 11
LUTBIO: A Comprehensive multimodal biometric database targeting middle-aged and elderly populations for enhanced identity authentication
Rui Yang, Qiuyu Zhang, Lingtao Meng, et al.
Information Fusion (2025), pp. 102945-102945
Closed Access
Rui Yang, Qiuyu Zhang, Lingtao Meng, et al.
Information Fusion (2025), pp. 102945-102945
Closed Access
SECURED USER AUTHENTICATION AND DATA SHARING FOR MOBILE CLOUD COMPUTING USING 2C-CUBEHASH AND PWCC
Surendar Rama Sitaraman, Kalyan Gattupalli, Venkata Surya Bhavana Harish Gollavilli, et al.
Sustainable Computing Informatics and Systems (2025), pp. 101107-101107
Closed Access
Surendar Rama Sitaraman, Kalyan Gattupalli, Venkata Surya Bhavana Harish Gollavilli, et al.
Sustainable Computing Informatics and Systems (2025), pp. 101107-101107
Closed Access
A Review of Blockchain Technology Applications in Ambient Assisted Living
Alexandru-Ioan Florea, Ionuț Anghel, Tudor Cioara
Future Internet (2022) Vol. 14, Iss. 5, pp. 150-150
Open Access | Times Cited: 18
Alexandru-Ioan Florea, Ionuț Anghel, Tudor Cioara
Future Internet (2022) Vol. 14, Iss. 5, pp. 150-150
Open Access | Times Cited: 18
A Machine-Learning–Blockchain-Based Authentication Using Smart Contracts for an IoHT System
Rajkumar Gaur, Shiva Prakash, Sanjay Kumar, et al.
Sensors (2022) Vol. 22, Iss. 23, pp. 9074-9074
Open Access | Times Cited: 16
Rajkumar Gaur, Shiva Prakash, Sanjay Kumar, et al.
Sensors (2022) Vol. 22, Iss. 23, pp. 9074-9074
Open Access | Times Cited: 16
Cybersecurity Risk Management Framework for Blockchain Identity Management Systems in Health IoT
Bandar Alamri, Katie Crowley, Ita Richardson
Sensors (2022) Vol. 23, Iss. 1, pp. 218-218
Open Access | Times Cited: 16
Bandar Alamri, Katie Crowley, Ita Richardson
Sensors (2022) Vol. 23, Iss. 1, pp. 218-218
Open Access | Times Cited: 16
Zero Knowledge based Authentication for Internet of Medical Things
Garima Misha, Bramah Hazela, Brijesh Kumar Chaurasia
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023), pp. 1-6
Closed Access | Times Cited: 9
Garima Misha, Bramah Hazela, Brijesh Kumar Chaurasia
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023), pp. 1-6
Closed Access | Times Cited: 9
Towards a lightweight security framework using blockchain and machine learning
Shereen Ismail, Muhammad Nouman, Diana W. Dawoud, et al.
Blockchain Research and Applications (2023) Vol. 5, Iss. 1, pp. 100174-100174
Open Access | Times Cited: 9
Shereen Ismail, Muhammad Nouman, Diana W. Dawoud, et al.
Blockchain Research and Applications (2023) Vol. 5, Iss. 1, pp. 100174-100174
Open Access | Times Cited: 9
Health IoT Threats: Survey of Risks and Vulnerabilities
Samaneh Madanian, Tserendorj Chinbat, Subasinghage Maduka Nuwangi, et al.
Future Internet (2024) Vol. 16, Iss. 11, pp. 389-389
Open Access | Times Cited: 3
Samaneh Madanian, Tserendorj Chinbat, Subasinghage Maduka Nuwangi, et al.
Future Internet (2024) Vol. 16, Iss. 11, pp. 389-389
Open Access | Times Cited: 3
Towards A Lightweight Identity Management and Secure Authentication for IoT Using Blockchain
Shereen Ismail, Diana W. Dawoud, Hassan Reza
2022 IEEE World AI IoT Congress (AIIoT) (2022), pp. 077-083
Closed Access | Times Cited: 13
Shereen Ismail, Diana W. Dawoud, Hassan Reza
2022 IEEE World AI IoT Congress (AIIoT) (2022), pp. 077-083
Closed Access | Times Cited: 13
Forecasting cyber security threats landscape and associated technical trends in telehealth using Bidirectional Encoder Representations from Transformers (BERT)
Usharani Hareesh Govindarajan, Dhiraj K. Singh, Hardik Gohel
Computers & Security (2023) Vol. 133, pp. 103404-103404
Closed Access | Times Cited: 7
Usharani Hareesh Govindarajan, Dhiraj K. Singh, Hardik Gohel
Computers & Security (2023) Vol. 133, pp. 103404-103404
Closed Access | Times Cited: 7
Efficient Approach for Anomaly Detection in IoT Using System Calls
Nouman Shamim, Muhammad Asim, Thar Baker, et al.
Sensors (2023) Vol. 23, Iss. 2, pp. 652-652
Open Access | Times Cited: 6
Nouman Shamim, Muhammad Asim, Thar Baker, et al.
Sensors (2023) Vol. 23, Iss. 2, pp. 652-652
Open Access | Times Cited: 6
Authentication in Internet of Things: State of Art
Souhayla Dargaoui, Mourade Azrour, Ahmad El Allaoui, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 6
Souhayla Dargaoui, Mourade Azrour, Ahmad El Allaoui, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 6
Healthcare Data Security Using Lightweight Protocol for Cyber Physical System
Pradeep Kumar Roy, Ashish Singh, J. Desai, et al.
IEEE Transactions on Network Science and Engineering (2022) Vol. 10, Iss. 5, pp. 2597-2606
Closed Access | Times Cited: 9
Pradeep Kumar Roy, Ashish Singh, J. Desai, et al.
IEEE Transactions on Network Science and Engineering (2022) Vol. 10, Iss. 5, pp. 2597-2606
Closed Access | Times Cited: 9
Block chain-based security and privacy framework for point of care health care IoT devices
Srigitha S. Nath, S Sadagopan, D. Vijendra Babu, et al.
Soft Computing (2023)
Closed Access | Times Cited: 5
Srigitha S. Nath, S Sadagopan, D. Vijendra Babu, et al.
Soft Computing (2023)
Closed Access | Times Cited: 5
Using Supervised Learning to Detect Command and Control Attacks in IoT
Muath AlShaikh, Waleed Alsemaih, Sultan Alamri, et al.
International Journal of Cloud Applications and Computing (2023) Vol. 14, Iss. 1, pp. 1-19
Open Access | Times Cited: 5
Muath AlShaikh, Waleed Alsemaih, Sultan Alamri, et al.
International Journal of Cloud Applications and Computing (2023) Vol. 14, Iss. 1, pp. 1-19
Open Access | Times Cited: 5
Analyzing web descriptions of cybersecurity breaches in the healthcare provider sector: A content analytics research method
In Lee
Computers & Security (2023) Vol. 129, pp. 103185-103185
Closed Access | Times Cited: 4
In Lee
Computers & Security (2023) Vol. 129, pp. 103185-103185
Closed Access | Times Cited: 4
A Platform for GHG Emissions Management in Mixed Farms
Dana Popa, Yolanda Laurent, R. Popa, et al.
Agriculture (2023) Vol. 14, Iss. 1, pp. 78-78
Open Access | Times Cited: 4
Dana Popa, Yolanda Laurent, R. Popa, et al.
Agriculture (2023) Vol. 14, Iss. 1, pp. 78-78
Open Access | Times Cited: 4
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
Iain Baird, Baraq Ghaleb, Isam Wadhaj, et al.
Electronics (2024) Vol. 13, Iss. 17, pp. 3467-3467
Open Access | Times Cited: 1
Iain Baird, Baraq Ghaleb, Isam Wadhaj, et al.
Electronics (2024) Vol. 13, Iss. 17, pp. 3467-3467
Open Access | Times Cited: 1
A survey of internet of medical things: technology, application and future directions
Peng He, Dexiu Huang, Dapeng Wu, et al.
Digital Communications and Networks (2024)
Open Access | Times Cited: 1
Peng He, Dexiu Huang, Dapeng Wu, et al.
Digital Communications and Networks (2024)
Open Access | Times Cited: 1