
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Lightweight cryptographic algorithms based on different model architectures: A systematic review and futuristic applications
Vijesh Bhagat, Santosh Kumar, Sachin Kumar Gupta, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 35, Iss. 1
Closed Access | Times Cited: 28
Vijesh Bhagat, Santosh Kumar, Sachin Kumar Gupta, et al.
Concurrency and Computation Practice and Experience (2022) Vol. 35, Iss. 1
Closed Access | Times Cited: 28
Showing 1-25 of 28 citing articles:
A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review
Usman Tariq, Irfan Ahmed, Ali Kashif Bashir, et al.
Sensors (2023) Vol. 23, Iss. 8, pp. 4117-4117
Open Access | Times Cited: 148
Usman Tariq, Irfan Ahmed, Ali Kashif Bashir, et al.
Sensors (2023) Vol. 23, Iss. 8, pp. 4117-4117
Open Access | Times Cited: 148
A Survey on Cybersecurity in IoT
Ηλίας Δρίτσας, Μαρία Τρίγκα
Future Internet (2025) Vol. 17, Iss. 1, pp. 30-30
Open Access | Times Cited: 2
Ηλίας Δρίτσας, Μαρία Τρίγκα
Future Internet (2025) Vol. 17, Iss. 1, pp. 30-30
Open Access | Times Cited: 2
An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security
Olusogo Popoola, Marcos Rodrigues, Jims Marchang, et al.
Internet of Things (2024) Vol. 27, pp. 101314-101314
Open Access | Times Cited: 5
Olusogo Popoola, Marcos Rodrigues, Jims Marchang, et al.
Internet of Things (2024) Vol. 27, pp. 101314-101314
Open Access | Times Cited: 5
Methodological and Technological Advancements in E-Learning
Ηλίας Δρίτσας, Μαρία Τρίγκα
Information (2025) Vol. 16, Iss. 1, pp. 56-56
Open Access
Ηλίας Δρίτσας, Μαρία Τρίγκα
Information (2025) Vol. 16, Iss. 1, pp. 56-56
Open Access
Lightweight image encryption scheme for IoT environment and machine learning-driven robust S-box selection
Arslan Shafique, Abid Mehmood, Moatsum Alawida, et al.
Telecommunication Systems (2025) Vol. 88, Iss. 1
Open Access
Arslan Shafique, Abid Mehmood, Moatsum Alawida, et al.
Telecommunication Systems (2025) Vol. 88, Iss. 1
Open Access
Singularization: A New Approach to Designing Block Ciphers for Resource-Constrained Devices
Gilles Macario-Rat, Mihail-Iulian Pleşa
Lecture notes in computer science (2025), pp. 155-167
Closed Access
Gilles Macario-Rat, Mihail-Iulian Pleşa
Lecture notes in computer science (2025), pp. 155-167
Closed Access
SFL-MDrone: Synchronous federated learning enabled multi drones
Itika Sharma, Sachin Kumar Gupta
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 4, pp. 8543-8562
Closed Access | Times Cited: 3
Itika Sharma, Sachin Kumar Gupta
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 4, pp. 8543-8562
Closed Access | Times Cited: 3
A novel method for indian vehicle registration number plate detection and recognition using CNN
Vibha Pandey, Siddhartha Choubey, Jyotiprakash Patra, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 4, pp. 8563-8585
Closed Access | Times Cited: 2
Vibha Pandey, Siddhartha Choubey, Jyotiprakash Patra, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 4, pp. 8563-8585
Closed Access | Times Cited: 2
Lightweight Image Encryption Scheme for IoT Environment and MachineLearning-Driven Robust S-box Selection
Abid Mehmood, Arslan Shafique, Abdul Nasir Khan, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Abid Mehmood, Arslan Shafique, Abdul Nasir Khan, et al.
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Lightweight Cryptography for Internet of Things: A Review
Amrita Amrita, Chika Paul Ekwueme, Ibrahim Hussaini Adam, et al.
EAI Endorsed Transactions on Internet of Things (2024) Vol. 10
Open Access | Times Cited: 1
Amrita Amrita, Chika Paul Ekwueme, Ibrahim Hussaini Adam, et al.
EAI Endorsed Transactions on Internet of Things (2024) Vol. 10
Open Access | Times Cited: 1
Enhancing UAV ‐HetNet security through functional encryption framework
Sachin Kumar Gupta, Parul Gupta, Pawan Singh
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 20
Closed Access | Times Cited: 1
Sachin Kumar Gupta, Parul Gupta, Pawan Singh
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 20
Closed Access | Times Cited: 1
LightLock: Ensuring Hardware IP Security in IoT Environment with Lightweight Logic Locking
Jugal Gandhi, Diksha Shekhawat, M. Santosh, et al.
Lecture notes in electrical engineering (2024), pp. 201-214
Closed Access | Times Cited: 1
Jugal Gandhi, Diksha Shekhawat, M. Santosh, et al.
Lecture notes in electrical engineering (2024), pp. 201-214
Closed Access | Times Cited: 1
DNA-PRESENT: An Improved Security and Low-Latency, Lightweight Cryptographic Solution for IoT
Maria Imdad, Adnan Fazil, Sofia Najwa Ramli, et al.
Sensors (2024) Vol. 24, Iss. 24, pp. 7900-7900
Open Access | Times Cited: 1
Maria Imdad, Adnan Fazil, Sofia Najwa Ramli, et al.
Sensors (2024) Vol. 24, Iss. 24, pp. 7900-7900
Open Access | Times Cited: 1
S-method: secure multimedia encryption technique in cloud environment
Parul Saini, Krishan Kumar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 8295-8309
Closed Access | Times Cited: 3
Parul Saini, Krishan Kumar
Multimedia Tools and Applications (2023) Vol. 83, Iss. 3, pp. 8295-8309
Closed Access | Times Cited: 3
FPGA Implementation of the AES Algorithm with Lightweight LFSR-Based Approach and Optimized Key Expansion
Samruddhi Purohit, Vaishnavi Deshpande, Vaishali Ingale
(2023), pp. 1-7
Closed Access | Times Cited: 3
Samruddhi Purohit, Vaishnavi Deshpande, Vaishali Ingale
(2023), pp. 1-7
Closed Access | Times Cited: 3
Lightweight Security for IoT
Saurabh Kumar, Chirag Sharma, Shakir Khan, et al.
Journal of Intelligent & Fuzzy Systems (2023) Vol. 45, Iss. 4, pp. 5423-5439
Closed Access | Times Cited: 2
Saurabh Kumar, Chirag Sharma, Shakir Khan, et al.
Journal of Intelligent & Fuzzy Systems (2023) Vol. 45, Iss. 4, pp. 5423-5439
Closed Access | Times Cited: 2
Secure IoT data management and sharing architecture for information security using cryptographic technique
Rajiv Kumar Mishra, Rajesh Kumar Yadav, Prem Nath
Journal of Intelligent & Fuzzy Systems (2023) Vol. 45, Iss. 6, pp. 10951-10966
Closed Access | Times Cited: 2
Rajiv Kumar Mishra, Rajesh Kumar Yadav, Prem Nath
Journal of Intelligent & Fuzzy Systems (2023) Vol. 45, Iss. 6, pp. 10951-10966
Closed Access | Times Cited: 2
Cryptography by the Echacha20 Algorithm Based on Logistic and Chirikov Chaotic Maps
Ibtesam Jomaa, Rana jassim Mohammed, Noor Abdulmuttaleb Jaafar, et al.
Bilad Alrafidain Journal for Engineering Science and Technology (2024) Vol. 3, Iss. 1, pp. 1-19
Open Access
Ibtesam Jomaa, Rana jassim Mohammed, Noor Abdulmuttaleb Jaafar, et al.
Bilad Alrafidain Journal for Engineering Science and Technology (2024) Vol. 3, Iss. 1, pp. 1-19
Open Access
An innovative design of substitution-box using Trigonometric-Multiplicative Functions Using Square Root Arguments: A Data-driven study.
Syed Atir Raza Shirazi, Sadia Abbas Shah, Abdul Wahab, et al.
Deleted Journal (2024) Vol. 4, Iss. 1
Open Access
Syed Atir Raza Shirazi, Sadia Abbas Shah, Abdul Wahab, et al.
Deleted Journal (2024) Vol. 4, Iss. 1
Open Access
Hybrid Encryption for Smart Home Healthcare: Ensuring Data Confidentiality and Security
Olusogo Popoola, Marcos Rodrigues, Jims Marchang, et al.
(2024)
Closed Access
Olusogo Popoola, Marcos Rodrigues, Jims Marchang, et al.
(2024)
Closed Access
In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes
Amal Hkiri, Mouna Karmani, Fawaz Hasan Alasmary, et al.
Alexandria Engineering Journal (2024) Vol. 113, pp. 461-479
Open Access
Amal Hkiri, Mouna Karmani, Fawaz Hasan Alasmary, et al.
Alexandria Engineering Journal (2024) Vol. 113, pp. 461-479
Open Access
Exploring smooth number-based MAC algorithms for secure communication in IoT devices: a systematic literature review
Eduard-Matei Constantinescu, Mohammed El‐Hajj, Luca Mariot
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Eduard-Matei Constantinescu, Mohammed El‐Hajj, Luca Mariot
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access
Anomaly Detection in IoT Network Traffic Using Bidirectional 3D Quasi‐Recurrent Neural Network Optimize With Coati Optimization Algorithm
M. Deivakani
Transactions on Emerging Telecommunications Technologies (2024) Vol. 36, Iss. 1
Closed Access
M. Deivakani
Transactions on Emerging Telecommunications Technologies (2024) Vol. 36, Iss. 1
Closed Access
Unlocking IoT Security: Enabling the Future with Lightweight Cryptographic Ciphers
Srishti Priya Chaturvedi, Ajay Yadav, Ashok Kumar, et al.
Lecture notes in electrical engineering (2024), pp. 189-199
Closed Access
Srishti Priya Chaturvedi, Ajay Yadav, Ashok Kumar, et al.
Lecture notes in electrical engineering (2024), pp. 189-199
Closed Access
Hyper contour cryptography with master Birch‐Brown Paruvala‐SLSTM model for enhanced healthcare security
P. Blessed Angelin, S. Wilfred Franklin
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 7
Closed Access | Times Cited: 1
P. Blessed Angelin, S. Wilfred Franklin
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 7
Closed Access | Times Cited: 1