OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Security, Privacy, and Usability in Continuous Authentication: A Survey
Ahmed Fraz Baig, Sigurd Eskeland
Sensors (2021) Vol. 21, Iss. 17, pp. 5967-5967
Open Access | Times Cited: 55

Showing 26-50 of 55 citing articles:

Extended right-angle difference ternary co-relation pattern: A new feature descriptor for face anti-spoofing
Raghavendra Raghuram Jingade, R. Sanjeev Kunte
Computers & Security (2023) Vol. 134, pp. 103421-103421
Closed Access | Times Cited: 2

SmartDriveAuth: Enhancing Vehicle Security with Continuous Driver Authentication via Wearable PPG Sensors and Deep Learning
Laxmi Divya Chhibbar, Sujay Patni, Siddarth Todi, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 59-72
Closed Access

Internet Users' Willingness to Disclose Biometric Data for Continuous Online Account Protection: An Empirical Investigation
Florian Dehling, Jan Tolsdorf, Hannes Federrath, et al.
Proceedings on Privacy Enhancing Technologies (2024) Vol. 2024, Iss. 2, pp. 479-508
Open Access

Toward secure mobile applications through proper authentication mechanisms
Abdulmohsen Saud Albesher, Amal Alkhaldi, Ahmed Aljughaiman
PLoS ONE (2024) Vol. 19, Iss. 12, pp. e0315201-e0315201
Open Access

Secure Human Identification Protocol with Human-Computable Passwords
Sławomir Matelski
Lecture notes in computer science (2022), pp. 452-467
Open Access | Times Cited: 3

From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Rushit Dave, Marcho Handoko, Rashid Ali, et al.
International Journal of Computer Science and Information Technology (2024) Vol. 16, Iss. 1, pp. 29-44
Open Access

Towards Automated Creation of Adaptive Continuous Authentication Systems for Telework Scenarios
Adam Gałązkiewicz, Adam Wójtowicz
Communications in computer and information science (2024), pp. 3-12
Closed Access

User identification and authentication in browser environments via machine learning
Anton Uymin
E3S Web of Conferences (2024) Vol. 549, pp. 08019-08019
Open Access

Deep Learning Application in Continuous Authentication
Mariia Havrylovych, Valeriy Danylov
Lecture notes in electrical engineering (2024), pp. 644-667
Closed Access

PERANCANGAN AUTENTIKASI MULTI FAKTOR DENGAN PENGENALAN WAJAH DAN FIDO (FAST IDENTITY ONLINE)
Rizky Atmawijaya, Ummu Radiyah
INTI Nusa Mandiri (2024) Vol. 19, Iss. 1, pp. 46-53
Open Access

Prototyping a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control
Μαρία Παπαϊωάννου, Georgios Zachos, Γεώργιος Μαντάς, et al.
Sensors (2024) Vol. 24, Iss. 16, pp. 5193-5193
Open Access

CNN-based continuous authentication for digital therapeutics using variational autoencoder
Chengling Wang, Yuexin Zhang, Yunru Ma, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access

Authenticate As You Go: From Exploring Smart Home Authentication with Daily Objects to Authenticating with Primary Tasks
Verena Zimmermann, Stina Schäfer, Markus Duermuth, et al.
ACM Transactions on Computer-Human Interaction (2024)
Open Access

A Secure and Lightweight ZKP-based Mutual Authentication Scheme with Key Agreement
Ahcène Bounceur
Arabian Journal for Science and Engineering (2024)
Closed Access

Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study
Khuralay Moldamurat, Yerzhan Seitkulov, Sabyrzhan Atanov, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2023) Vol. 14, Iss. 1, pp. 479-479
Open Access | Times Cited: 1

WoX+: A Meta-Model-Driven Approach to Mine User Habits and Provide Continuous Authentication in the Smart City
Luca Mainetti, Paolo Panarese, Roberto Vergallo
Sensors (2022) Vol. 22, Iss. 18, pp. 6980-6980
Open Access | Times Cited: 2

Transfer Learning for Behavioral Biometrics-based Continuous User Authentication
Sanket Vilas Salunke, Abdelkader Ouda, Jonathan Gagné
2022 International Symposium on Networks, Computers and Communications (ISNCC) (2022), pp. 1-6
Closed Access | Times Cited: 1

User Verification Using Evoked EEG by Invisible Visual Stimulation
Atikur RAHMAN, Nozomi KINJO, Isao NAKANISHI
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (2023) Vol. E106.A, Iss. 12, pp. 1569-1576
Open Access

On the Improvements of Mouse Dynamics Based Continuous User Authentication
Hayri Durmaz, Mehmet Keskinöz
(2023), pp. 13-19
Closed Access

LWO vs. LWE Lattice Problems in Human-Computable Passwords Protocol
Sławomir Matelski
Procedia Computer Science (2023) Vol. 225, pp. 4531-4540
Open Access

Continuous Authentication
Max Smith-Creasey
SpringerBriefs in computer science (2023), pp. 35-72
Closed Access

A Continuous Authentication Scheme for Digital Therapeutics Using Denoising Autoencoder
Chengling Wang, Yunru Ma, Yuexin Zhang, et al.
(2023), pp. 12-18
Closed Access

Scroll to top