
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Security, Privacy, and Usability in Continuous Authentication: A Survey
Ahmed Fraz Baig, Sigurd Eskeland
Sensors (2021) Vol. 21, Iss. 17, pp. 5967-5967
Open Access | Times Cited: 55
Ahmed Fraz Baig, Sigurd Eskeland
Sensors (2021) Vol. 21, Iss. 17, pp. 5967-5967
Open Access | Times Cited: 55
Showing 26-50 of 55 citing articles:
Extended right-angle difference ternary co-relation pattern: A new feature descriptor for face anti-spoofing
Raghavendra Raghuram Jingade, R. Sanjeev Kunte
Computers & Security (2023) Vol. 134, pp. 103421-103421
Closed Access | Times Cited: 2
Raghavendra Raghuram Jingade, R. Sanjeev Kunte
Computers & Security (2023) Vol. 134, pp. 103421-103421
Closed Access | Times Cited: 2
SmartDriveAuth: Enhancing Vehicle Security with Continuous Driver Authentication via Wearable PPG Sensors and Deep Learning
Laxmi Divya Chhibbar, Sujay Patni, Siddarth Todi, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 59-72
Closed Access
Laxmi Divya Chhibbar, Sujay Patni, Siddarth Todi, et al.
Lecture notes on data engineering and communications technologies (2024), pp. 59-72
Closed Access
Internet Users' Willingness to Disclose Biometric Data for Continuous Online Account Protection: An Empirical Investigation
Florian Dehling, Jan Tolsdorf, Hannes Federrath, et al.
Proceedings on Privacy Enhancing Technologies (2024) Vol. 2024, Iss. 2, pp. 479-508
Open Access
Florian Dehling, Jan Tolsdorf, Hannes Federrath, et al.
Proceedings on Privacy Enhancing Technologies (2024) Vol. 2024, Iss. 2, pp. 479-508
Open Access
Toward secure mobile applications through proper authentication mechanisms
Abdulmohsen Saud Albesher, Amal Alkhaldi, Ahmed Aljughaiman
PLoS ONE (2024) Vol. 19, Iss. 12, pp. e0315201-e0315201
Open Access
Abdulmohsen Saud Albesher, Amal Alkhaldi, Ahmed Aljughaiman
PLoS ONE (2024) Vol. 19, Iss. 12, pp. e0315201-e0315201
Open Access
Human-Computable OTP Generator as an Alternative of the Two-Factor Authentication
Sławomir Matelski
(2022), pp. 64-71
Open Access | Times Cited: 3
Sławomir Matelski
(2022), pp. 64-71
Open Access | Times Cited: 3
Secure Human Identification Protocol with Human-Computable Passwords
Sławomir Matelski
Lecture notes in computer science (2022), pp. 452-467
Open Access | Times Cited: 3
Sławomir Matelski
Lecture notes in computer science (2022), pp. 452-467
Open Access | Times Cited: 3
From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Rushit Dave, Marcho Handoko, Rashid Ali, et al.
International Journal of Computer Science and Information Technology (2024) Vol. 16, Iss. 1, pp. 29-44
Open Access
Rushit Dave, Marcho Handoko, Rashid Ali, et al.
International Journal of Computer Science and Information Technology (2024) Vol. 16, Iss. 1, pp. 29-44
Open Access
Framework for Securing Biometric Authentication System Using InterPlanetary File System and Blockchain Technology
Dharmesh Kumar Sonkar, Sarvpal Singh
(2024), pp. 384-394
Closed Access
Dharmesh Kumar Sonkar, Sarvpal Singh
(2024), pp. 384-394
Closed Access
Towards Automated Creation of Adaptive Continuous Authentication Systems for Telework Scenarios
Adam Gałązkiewicz, Adam Wójtowicz
Communications in computer and information science (2024), pp. 3-12
Closed Access
Adam Gałązkiewicz, Adam Wójtowicz
Communications in computer and information science (2024), pp. 3-12
Closed Access
User identification and authentication in browser environments via machine learning
Anton Uymin
E3S Web of Conferences (2024) Vol. 549, pp. 08019-08019
Open Access
Anton Uymin
E3S Web of Conferences (2024) Vol. 549, pp. 08019-08019
Open Access
Deep Learning Application in Continuous Authentication
Mariia Havrylovych, Valeriy Danylov
Lecture notes in electrical engineering (2024), pp. 644-667
Closed Access
Mariia Havrylovych, Valeriy Danylov
Lecture notes in electrical engineering (2024), pp. 644-667
Closed Access
PERANCANGAN AUTENTIKASI MULTI FAKTOR DENGAN PENGENALAN WAJAH DAN FIDO (FAST IDENTITY ONLINE)
Rizky Atmawijaya, Ummu Radiyah
INTI Nusa Mandiri (2024) Vol. 19, Iss. 1, pp. 46-53
Open Access
Rizky Atmawijaya, Ummu Radiyah
INTI Nusa Mandiri (2024) Vol. 19, Iss. 1, pp. 46-53
Open Access
Prototyping a Secure and Usable User Authentication Mechanism for Mobile Passenger ID Devices for Land/Sea Border Control
Μαρία Παπαϊωάννου, Georgios Zachos, Γεώργιος Μαντάς, et al.
Sensors (2024) Vol. 24, Iss. 16, pp. 5193-5193
Open Access
Μαρία Παπαϊωάννου, Georgios Zachos, Γεώργιος Μαντάς, et al.
Sensors (2024) Vol. 24, Iss. 16, pp. 5193-5193
Open Access
CNN-based continuous authentication for digital therapeutics using variational autoencoder
Chengling Wang, Yuexin Zhang, Yunru Ma, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access
Chengling Wang, Yuexin Zhang, Yunru Ma, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access
Authenticate As You Go: From Exploring Smart Home Authentication with Daily Objects to Authenticating with Primary Tasks
Verena Zimmermann, Stina Schäfer, Markus Duermuth, et al.
ACM Transactions on Computer-Human Interaction (2024)
Open Access
Verena Zimmermann, Stina Schäfer, Markus Duermuth, et al.
ACM Transactions on Computer-Human Interaction (2024)
Open Access
A Secure and Lightweight ZKP-based Mutual Authentication Scheme with Key Agreement
Ahcène Bounceur
Arabian Journal for Science and Engineering (2024)
Closed Access
Ahcène Bounceur
Arabian Journal for Science and Engineering (2024)
Closed Access
Enhancing cryptographic protection, authentication, and authorization in cellular networks: a comprehensive research study
Khuralay Moldamurat, Yerzhan Seitkulov, Sabyrzhan Atanov, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2023) Vol. 14, Iss. 1, pp. 479-479
Open Access | Times Cited: 1
Khuralay Moldamurat, Yerzhan Seitkulov, Sabyrzhan Atanov, et al.
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2023) Vol. 14, Iss. 1, pp. 479-479
Open Access | Times Cited: 1
WoX+: A Meta-Model-Driven Approach to Mine User Habits and Provide Continuous Authentication in the Smart City
Luca Mainetti, Paolo Panarese, Roberto Vergallo
Sensors (2022) Vol. 22, Iss. 18, pp. 6980-6980
Open Access | Times Cited: 2
Luca Mainetti, Paolo Panarese, Roberto Vergallo
Sensors (2022) Vol. 22, Iss. 18, pp. 6980-6980
Open Access | Times Cited: 2
Transfer Learning for Behavioral Biometrics-based Continuous User Authentication
Sanket Vilas Salunke, Abdelkader Ouda, Jonathan Gagné
2022 International Symposium on Networks, Computers and Communications (ISNCC) (2022), pp. 1-6
Closed Access | Times Cited: 1
Sanket Vilas Salunke, Abdelkader Ouda, Jonathan Gagné
2022 International Symposium on Networks, Computers and Communications (ISNCC) (2022), pp. 1-6
Closed Access | Times Cited: 1
Development of a secure multi-factor authentication algorithm for mobile money applications
Ali Guma
(2022)
Open Access | Times Cited: 1
Ali Guma
(2022)
Open Access | Times Cited: 1
User Verification Using Evoked EEG by Invisible Visual Stimulation
Atikur RAHMAN, Nozomi KINJO, Isao NAKANISHI
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (2023) Vol. E106.A, Iss. 12, pp. 1569-1576
Open Access
Atikur RAHMAN, Nozomi KINJO, Isao NAKANISHI
IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences (2023) Vol. E106.A, Iss. 12, pp. 1569-1576
Open Access
On the Improvements of Mouse Dynamics Based Continuous User Authentication
Hayri Durmaz, Mehmet Keskinöz
(2023), pp. 13-19
Closed Access
Hayri Durmaz, Mehmet Keskinöz
(2023), pp. 13-19
Closed Access
LWO vs. LWE Lattice Problems in Human-Computable Passwords Protocol
Sławomir Matelski
Procedia Computer Science (2023) Vol. 225, pp. 4531-4540
Open Access
Sławomir Matelski
Procedia Computer Science (2023) Vol. 225, pp. 4531-4540
Open Access
Continuous Authentication
Max Smith-Creasey
SpringerBriefs in computer science (2023), pp. 35-72
Closed Access
Max Smith-Creasey
SpringerBriefs in computer science (2023), pp. 35-72
Closed Access
A Continuous Authentication Scheme for Digital Therapeutics Using Denoising Autoencoder
Chengling Wang, Yunru Ma, Yuexin Zhang, et al.
(2023), pp. 12-18
Closed Access
Chengling Wang, Yunru Ma, Yuexin Zhang, et al.
(2023), pp. 12-18
Closed Access