OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach
Abidemi Emmanuel Adeniyi, Moses Kazeem Abiodun, Joseph Bamidele Awotunde, et al.
Multimedia Tools and Applications (2023) Vol. 82, Iss. 13, pp. 20537-20551
Closed Access | Times Cited: 21

Showing 21 citing articles:

Enhancing Cloud Security: A Deep Cryptographic Analysis
Ashish Govindrao Deshpande, C. Srinivasan, Ramakrishnan Raman, et al.
(2023), pp. 1118-1123
Closed Access | Times Cited: 25

Secure blockchain assisted Internet of Medical Things architecture for data fusion enabled cancer workflow
Abdullah Lakhan, Mazin Abed Mohammed, Karrar Hameed Abdulkareem, et al.
Internet of Things (2023) Vol. 24, pp. 100928-100928
Closed Access | Times Cited: 15

Advanced Encryption Standard Algorithm for Power-Efficient and High-Speed Applications
Manoj Kumar Thanikodi
Wireless Personal Communications (2025)
Closed Access

Simplified Image Encryption Algorithm (SIEA) to enhance image security in cloud storage
M. Lavanya, K. Joseph Abraham Sundar, S. Saravanan
Multimedia Tools and Applications (2024) Vol. 83, Iss. 22, pp. 61313-61345
Closed Access | Times Cited: 4

Securing IoT Communications: A Novel Lightweight Stream Cipher Using DNA Cryptography and Grain-80 Cipher
Mohammad Ubaidullah Bokhari, Shahnwaz Afzal, Imran Khan, et al.
SN Computer Science (2025) Vol. 6, Iss. 2
Closed Access

A Novel Data Transmission Model Using Hybrid Encryption Scheme for Preserving Data Integrity
Riyaz Fathima Abdul, A. Saravanan
Advances in Technology Innovation (2025) Vol. 10, Iss. 1, pp. 15-28
Open Access

Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain
Shruthi Gangadharaiah, Purohit Shrinivasacharya
Multimedia Tools and Applications (2024) Vol. 83, Iss. 29, pp. 72301-72320
Closed Access | Times Cited: 3

Analysis of the Application of Data Encryption Technology in Computer Network Security
Xinyang Jia
Journal of big data and computing. (2023) Vol. 1, Iss. 4, pp. 46-51
Closed Access | Times Cited: 4

An efficient secure channel establishment through lightweight key distribution in e-health communication systems
Iman Ebrahimi, Morteza Nikooghadam
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1

SE2CURA - design and implementation of a robust ensemble learning based 2-tier intrusion detection system for real time traffic
Ratul Chowdhury, Tamal Chakraborty, Shankhadeep Purkait, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 13, pp. 38567-38609
Closed Access | Times Cited: 2

An innovative design of substitution-box using Trigonometric-Multiplicative Functions Using Square Root Arguments: A Data-driven study.
Syed Atir Raza Shirazi, Sadia Abbas Shah, Abdul Wahab, et al.
Deleted Journal (2024) Vol. 4, Iss. 1
Open Access

A novel AES–DES with improved Cheetah optimisation algorithm for secured medical data transmission in cloud environment
Gunde Joel, Chaturvedula V. Narasimha Manikanta Kasyap, Shaik Abubakar Sidiq, et al.
Journal of Medical Engineering & Technology (2024) Vol. 48, Iss. 3, pp. 100-117
Closed Access

Legal Framework for Security of Organ Transplant Information in the Digital Age with Biotechnology
Qionglian Wan, Xiaojue Hu
Natural and Engineering Sciences (2024) Vol. 9, Iss. 2, pp. 73-93
Open Access

Securecipher: An instantaneous synchronization stream encryption system for insider threat data leakage protection
Isabel Herrera Montano, Juan Ramos Diaz, José Javier García Aranda, et al.
Expert Systems with Applications (2024) Vol. 254, pp. 124470-124470
Open Access

Application of Blockchain-Based Internet of Things in Medical Healthcare
Abidemi Emmanuel Adeniyi, Joseph Bamidele Awotunde, Peace Busola Falola, et al.
Advances in civil and industrial engineering book series (2024), pp. 233-266
Closed Access

Artificial Intelligence based Security Solution for Data Encryption using AES Algorithm
Amit Kumar Mishra, Neha Tripathi, Musheer Vaqur, et al.
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2023), pp. 1685-1690
Closed Access | Times Cited: 1

Performance Analysis of Two Famous Cryptographic Algorithms on Mixed Data
Abidemi Emmanuel Adeniyi, Abidemi Emmanuel Adeniyi, Abidemi Emmanuel Adeniyi, et al.
Journal of Computer Science (2023) Vol. 19, Iss. 6, pp. 694-706
Open Access | Times Cited: 1

Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map
Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 9
Open Access | Times Cited: 1

A lightweight and robust block cipher algorithm for real-time applications
Amal Hafsa, Mohamed Gafsi, Mohsen Machhout
Signal Image and Video Processing (2023) Vol. 18, Iss. 2, pp. 1609-1624
Closed Access | Times Cited: 1

Securing and privacy preserving for electronic health records using two-phased scheme
B. Arulmozhi, J.I. Sheeba, Pradeep Devaneyan S
Research Square (Research Square) (2023)
Open Access

Secure Encryption Scheme for Medical Data based on Homomorphic Encryption
Liaoran Xu, Chenyang Zhao, Weili Jiang, et al.
(2023), pp. 01-09
Closed Access

Page 1

Scroll to top