
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing
Vinod Kumar, Srinivas Jangirala, Musheer Ahmad
Journal of Medical Systems (2018) Vol. 42, Iss. 8
Closed Access | Times Cited: 67
Vinod Kumar, Srinivas Jangirala, Musheer Ahmad
Journal of Medical Systems (2018) Vol. 42, Iss. 8
Closed Access | Times Cited: 67
Showing 1-25 of 67 citing articles:
Artificial intelligence‐powered decentralized framework for Internet of Things in Healthcare 4.0
Vikram Puri, Aman Kataria, Vishal Sharma
Transactions on Emerging Telecommunications Technologies (2021) Vol. 35, Iss. 4
Open Access | Times Cited: 80
Vikram Puri, Aman Kataria, Vishal Sharma
Transactions on Emerging Telecommunications Technologies (2021) Vol. 35, Iss. 4
Open Access | Times Cited: 80
PALK: Password-based anonymous lightweight key agreement framework for smart grid
Akber Ali Khan, Vinod Kumar, Musheer Ahmad, et al.
International Journal of Electrical Power & Energy Systems (2020) Vol. 121, pp. 106121-106121
Closed Access | Times Cited: 78
Akber Ali Khan, Vinod Kumar, Musheer Ahmad, et al.
International Journal of Electrical Power & Energy Systems (2020) Vol. 121, pp. 106121-106121
Closed Access | Times Cited: 78
CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC
Adesh Kumari, Vinod Kumar, Mohammad Yahya Abbasi, et al.
IEEE Access (2020) Vol. 8, pp. 107838-107852
Open Access | Times Cited: 78
Adesh Kumari, Vinod Kumar, Mohammad Yahya Abbasi, et al.
IEEE Access (2020) Vol. 8, pp. 107838-107852
Open Access | Times Cited: 78
RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
Vinod Kumar, Musheer Ahmad, Dheerendra Mishra, et al.
Vehicular Communications (2019) Vol. 22, pp. 100213-100213
Closed Access | Times Cited: 75
Vinod Kumar, Musheer Ahmad, Dheerendra Mishra, et al.
Vehicular Communications (2019) Vol. 22, pp. 100213-100213
Closed Access | Times Cited: 75
Evolutionary trends in progressive cloud computing based healthcare: Ideas, enablers, and barriers
Mohd Javaid, Abid Haleem, Ravi Pratap Singh, et al.
International Journal of Cognitive Computing in Engineering (2022) Vol. 3, pp. 124-135
Open Access | Times Cited: 42
Mohd Javaid, Abid Haleem, Ravi Pratap Singh, et al.
International Journal of Cognitive Computing in Engineering (2022) Vol. 3, pp. 124-135
Open Access | Times Cited: 42
An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
Akber Ali Khan, Vinod Kumar, Musheer Ahmad
Journal of King Saud University - Computer and Information Sciences (2019) Vol. 34, Iss. 3, pp. 698-705
Open Access | Times Cited: 68
Akber Ali Khan, Vinod Kumar, Musheer Ahmad
Journal of King Saud University - Computer and Information Sciences (2019) Vol. 34, Iss. 3, pp. 698-705
Open Access | Times Cited: 68
A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
Vinod Kumar, Musheer Ahmad, Adesh Kumari
Telematics and Informatics (2018) Vol. 38, pp. 100-117
Closed Access | Times Cited: 66
Vinod Kumar, Musheer Ahmad, Adesh Kumari
Telematics and Informatics (2018) Vol. 38, pp. 100-117
Closed Access | Times Cited: 66
ESEAP: ECC based secure and efficient mutual authentication protocol using smart card
Adesh Kumari, Srinivas Jangirala, Mohammad Yahya Abbasi, et al.
Journal of Information Security and Applications (2020) Vol. 51, pp. 102443-102443
Closed Access | Times Cited: 60
Adesh Kumari, Srinivas Jangirala, Mohammad Yahya Abbasi, et al.
Journal of Information Security and Applications (2020) Vol. 51, pp. 102443-102443
Closed Access | Times Cited: 60
Investigating Healthcare 4.0 Transition Through a Knowledge Management Perspective
Stefano Abbate, Piera Centobelli, Roberto Cerchione, et al.
IEEE Transactions on Engineering Management (2022) Vol. 70, Iss. 9, pp. 3297-3310
Open Access | Times Cited: 31
Stefano Abbate, Piera Centobelli, Roberto Cerchione, et al.
IEEE Transactions on Engineering Management (2022) Vol. 70, Iss. 9, pp. 3297-3310
Open Access | Times Cited: 31
IoT Equipped Intelligent Distributed Framework for Smart Healthcare Systems
Sita Rani, Meetali Chauhan, Aman Kataria, et al.
Studies in big data (2023), pp. 97-114
Closed Access | Times Cited: 16
Sita Rani, Meetali Chauhan, Aman Kataria, et al.
Studies in big data (2023), pp. 97-114
Closed Access | Times Cited: 16
SEBAP: A secure and efficient biometric‐assisted authentication protocol using ECC for vehicular cloud computing
Vinod Kumar, Musheer Ahmad, Adesh Kumari, et al.
International Journal of Communication Systems (2019) Vol. 34, Iss. 2
Closed Access | Times Cited: 50
Vinod Kumar, Musheer Ahmad, Adesh Kumari, et al.
International Journal of Communication Systems (2019) Vol. 34, Iss. 2
Closed Access | Times Cited: 50
From the Digital Data Revolution toward a Digital Society: Pervasiveness of Artificial Intelligence
Frank Emmert‐Streib
Machine Learning and Knowledge Extraction (2021) Vol. 3, Iss. 1, pp. 284-298
Open Access | Times Cited: 35
Frank Emmert‐Streib
Machine Learning and Knowledge Extraction (2021) Vol. 3, Iss. 1, pp. 284-298
Open Access | Times Cited: 35
RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure
Vinod Kumar, Mahmoud Shuker Mahmoud, Ahmed Alkhayyat, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 14, pp. 16167-16196
Open Access | Times Cited: 25
Vinod Kumar, Mahmoud Shuker Mahmoud, Ahmed Alkhayyat, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 14, pp. 16167-16196
Open Access | Times Cited: 25
CKMIB: Construction of Key Agreement Protocol for Cloud Medical Infrastructure Using Blockchain
Samiulla Itoo, Akber Ali Khan, Vinod Kumar, et al.
IEEE Access (2022) Vol. 10, pp. 67787-67801
Open Access | Times Cited: 23
Samiulla Itoo, Akber Ali Khan, Vinod Kumar, et al.
IEEE Access (2022) Vol. 10, pp. 67787-67801
Open Access | Times Cited: 23
Enhancing healthcare data security using RFE and CRHSM for big data
C. Sreedhar, K. Mahesh Babu, Suresh Kallam, et al.
Computers in Biology and Medicine (2025) Vol. 190, pp. 110063-110063
Closed Access
C. Sreedhar, K. Mahesh Babu, Suresh Kallam, et al.
Computers in Biology and Medicine (2025) Vol. 190, pp. 110063-110063
Closed Access
A secure electronic medical record authorization system for smart device application in cloud computing environments
Chin‐Ling Chen, Po-Tsun Huang, Yong‐Yuan Deng, et al.
Human-centric Computing and Information Sciences (2020) Vol. 10, Iss. 1
Open Access | Times Cited: 35
Chin‐Ling Chen, Po-Tsun Huang, Yong‐Yuan Deng, et al.
Human-centric Computing and Information Sciences (2020) Vol. 10, Iss. 1
Open Access | Times Cited: 35
Secure and Efficient Cloud-based IoT Authenticated Key Agreement scheme for e-Health Wireless Sensor Networks
Bander Alzahrani
Arabian Journal for Science and Engineering (2020) Vol. 46, Iss. 4, pp. 3017-3032
Closed Access | Times Cited: 33
Bander Alzahrani
Arabian Journal for Science and Engineering (2020) Vol. 46, Iss. 4, pp. 3017-3032
Closed Access | Times Cited: 33
A secure user authentication protocol using elliptic curve cryptography
Adesh Kumari, Mohammad Yahya Abbasi, Vinod Kumar, et al.
Journal of Discrete Mathematical Sciences and Cryptography (2019) Vol. 22, Iss. 4, pp. 521-530
Closed Access | Times Cited: 31
Adesh Kumari, Mohammad Yahya Abbasi, Vinod Kumar, et al.
Journal of Discrete Mathematical Sciences and Cryptography (2019) Vol. 22, Iss. 4, pp. 521-530
Closed Access | Times Cited: 31
Two‐factor authentication using biometric based quantum operations
Mohit Kr Sharma, Manisha J. Nene
Security and Privacy (2020) Vol. 3, Iss. 3
Open Access | Times Cited: 28
Mohit Kr Sharma, Manisha J. Nene
Security and Privacy (2020) Vol. 3, Iss. 3
Open Access | Times Cited: 28
A secure and efficient remote patient‐monitoring authentication protocol for cloud‐IoT
Bander Alzahrani, Azeem Irshad, Khalid Alsubhi, et al.
International Journal of Communication Systems (2020) Vol. 33, Iss. 11
Closed Access | Times Cited: 27
Bander Alzahrani, Azeem Irshad, Khalid Alsubhi, et al.
International Journal of Communication Systems (2020) Vol. 33, Iss. 11
Closed Access | Times Cited: 27
LSPA-SGs: A lightweight and secure protocol for authentication and key agreement based Elliptic Curve Cryptography in smart grids
Susan A. Mohammed Taqi, Saeed Jalili
Energy Reports (2022) Vol. 8, pp. 153-164
Open Access | Times Cited: 17
Susan A. Mohammed Taqi, Saeed Jalili
Energy Reports (2022) Vol. 8, pp. 153-164
Open Access | Times Cited: 17
A novel secure authentication protocol for eHealth records in cloud with a new key generation method and minimized key exchange
Mr. Rathod Balram B., N. Jaisankar
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 7, pp. 101629-101629
Open Access | Times Cited: 9
Mr. Rathod Balram B., N. Jaisankar
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 7, pp. 101629-101629
Open Access | Times Cited: 9
An Improved WBSN Key-Agreement Protocol Based on Static Parameters and Hash Functions
Behrooz Khadem, Amin Masoumi Suteh, Musheer Ahmad, et al.
IEEE Access (2021) Vol. 9, pp. 78463-78473
Open Access | Times Cited: 20
Behrooz Khadem, Amin Masoumi Suteh, Musheer Ahmad, et al.
IEEE Access (2021) Vol. 9, pp. 78463-78473
Open Access | Times Cited: 20
Internet of Things and Cloud Convergence for eHealth Systems: Concepts, Opportunities, and Challenges
Arif Ullah, Hanane Aznaoui, Dorsaf Sebai, et al.
Wireless Personal Communications (2023) Vol. 133, Iss. 3, pp. 1397-1447
Closed Access | Times Cited: 8
Arif Ullah, Hanane Aznaoui, Dorsaf Sebai, et al.
Wireless Personal Communications (2023) Vol. 133, Iss. 3, pp. 1397-1447
Closed Access | Times Cited: 8
A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks
Sungjin Yu, Joonyoung Lee, Yohan Park, et al.
Applied Sciences (2020) Vol. 10, Iss. 10, pp. 3565-3565
Open Access | Times Cited: 23
Sungjin Yu, Joonyoung Lee, Yohan Park, et al.
Applied Sciences (2020) Vol. 10, Iss. 10, pp. 3565-3565
Open Access | Times Cited: 23