
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Healthcare with datacare—a triangular DNA security
S. Aashiq Banu, Adel Ismail Al‐Alawi, M. Padmaa, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 7, pp. 21153-21170
Closed Access | Times Cited: 15
S. Aashiq Banu, Adel Ismail Al‐Alawi, M. Padmaa, et al.
Multimedia Tools and Applications (2023) Vol. 83, Iss. 7, pp. 21153-21170
Closed Access | Times Cited: 15
Showing 15 citing articles:
A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm
Sanjay Kumar, Deepmala Sharma
Artificial Intelligence Review (2024) Vol. 57, Iss. 4
Open Access | Times Cited: 30
Sanjay Kumar, Deepmala Sharma
Artificial Intelligence Review (2024) Vol. 57, Iss. 4
Open Access | Times Cited: 30
Data Center Secure Communication via DNA Hyperchaotic Encryption
Xue Wang, Chongfu Zhang, Wenjun Zeng, et al.
Journal of Lightwave Technology (2024) Vol. 42, Iss. 16, pp. 5564-5572
Closed Access | Times Cited: 5
Xue Wang, Chongfu Zhang, Wenjun Zeng, et al.
Journal of Lightwave Technology (2024) Vol. 42, Iss. 16, pp. 5564-5572
Closed Access | Times Cited: 5
Artificial Intelligence and Algorithmic Approaches of Health Security Systems: A Review
Savina Mariettou, Constantinos Koutsojannis, Vassilios Triantafillou
Algorithms (2025) Vol. 18, Iss. 2, pp. 59-59
Open Access
Savina Mariettou, Constantinos Koutsojannis, Vassilios Triantafillou
Algorithms (2025) Vol. 18, Iss. 2, pp. 59-59
Open Access
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs
Siva Janakiraman, Vinoth Raj, R. Sivaraman, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Siva Janakiraman, Vinoth Raj, R. Sivaraman, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Secure gray image sharing framework with adaptive key generation using image digest
C. Nithya, C. Vasantha Lakshmi, K. Thenmozhi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
C. Nithya, C. Vasantha Lakshmi, K. Thenmozhi, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
An efficient image encryption algorithm using a discrete memory-based logistic map with deep neural network
B. Sakthi Kumar, R. Revathi
Journal of Engineering and Applied Science (2024) Vol. 71, Iss. 1
Open Access | Times Cited: 4
B. Sakthi Kumar, R. Revathi
Journal of Engineering and Applied Science (2024) Vol. 71, Iss. 1
Open Access | Times Cited: 4
Optimized quantum computing technique to encrypt medical images
Monireh Houshmand, Mahsa Khorrampanah, Ali Hamid Muosa Alkhudhari
Optical and Quantum Electronics (2024) Vol. 56, Iss. 3
Closed Access | Times Cited: 2
Monireh Houshmand, Mahsa Khorrampanah, Ali Hamid Muosa Alkhudhari
Optical and Quantum Electronics (2024) Vol. 56, Iss. 3
Closed Access | Times Cited: 2
A Review of Genome to Chaos: Exploring DNA Dynamics in Security
S. Aashiq Banu, L. Koteswara Rao, P. Shanmuga Priya, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2
S. Aashiq Banu, L. Koteswara Rao, P. Shanmuga Priya, et al.
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2
Achieving Image Encryption Quantum Dot‐Functionalized Encryption Camera with Designed Films
Xue Li, Tao Zhang, M. Liu, et al.
Advanced Science (2024) Vol. 11, Iss. 38
Open Access | Times Cited: 2
Xue Li, Tao Zhang, M. Liu, et al.
Advanced Science (2024) Vol. 11, Iss. 38
Open Access | Times Cited: 2
A secure and adaptive block-based image encryption: a novel high-speed approach
Sajid Khan, Hao Peng
Nonlinear Dynamics (2024) Vol. 112, Iss. 18, pp. 16445-16473
Closed Access | Times Cited: 1
Sajid Khan, Hao Peng
Nonlinear Dynamics (2024) Vol. 112, Iss. 18, pp. 16445-16473
Closed Access | Times Cited: 1
Image Encryption Using Higher Dimension Chaotic Systems for Enhanced Image Security
S. Subathra, V. Thanikaiselvan
(2024), pp. 1-6
Closed Access
S. Subathra, V. Thanikaiselvan
(2024), pp. 1-6
Closed Access
Biotechnology, ICT and Health: Overview
Shubhangi Shukla, Sachin Kadian, Roger J. Narayan
Elsevier eBooks (2024), pp. 468-474
Closed Access
Shubhangi Shukla, Sachin Kadian, Roger J. Narayan
Elsevier eBooks (2024), pp. 468-474
Closed Access
Improving Healthcare Data Security Using Cheon-Kim-Kim-Song (CKKS) Homomorphic Encryption
P. Sathishkumar, K Pugalarasan, C Ponnparamaguru, et al.
(2024), pp. 1-6
Closed Access
P. Sathishkumar, K Pugalarasan, C Ponnparamaguru, et al.
(2024), pp. 1-6
Closed Access
Chaotic Audio Encryption and Decryption Using Logistic Map
V. Thanikaiselvan, P Abilash, C Lingeswar, et al.
(2024), pp. 346-351
Closed Access
V. Thanikaiselvan, P Abilash, C Lingeswar, et al.
(2024), pp. 346-351
Closed Access
A novel technique of image encryption through projective coordinates of elliptic curve
Hafsa, Hafeez Ur Rehman, Tariq Shah, et al.
Multimedia Tools and Applications (2024)
Closed Access
Hafsa, Hafeez Ur Rehman, Tariq Shah, et al.
Multimedia Tools and Applications (2024)
Closed Access