
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A formally verified blockchain-based decentralised authentication scheme for the internet of things
Khizar Hameed, Saurabh Garg, Muhammad Bilal Amin, et al.
The Journal of Supercomputing (2021) Vol. 77, Iss. 12, pp. 14461-14501
Closed Access | Times Cited: 26
Khizar Hameed, Saurabh Garg, Muhammad Bilal Amin, et al.
The Journal of Supercomputing (2021) Vol. 77, Iss. 12, pp. 14461-14501
Closed Access | Times Cited: 26
Showing 1-25 of 26 citing articles:
Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems
Osama A. Khashan, Nour M. Khafajah
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 2, pp. 726-739
Open Access | Times Cited: 42
Osama A. Khashan, Nour M. Khafajah
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 2, pp. 726-739
Open Access | Times Cited: 42
A taxonomy study on securing Blockchain-based Industrial applications: An overview, application perspectives, requirements, attacks, countermeasures, and open issues
Khizar Hameed, Mutaz Barika, Saurabh Garg, et al.
Journal of Industrial Information Integration (2022) Vol. 26, pp. 100312-100312
Open Access | Times Cited: 59
Khizar Hameed, Mutaz Barika, Saurabh Garg, et al.
Journal of Industrial Information Integration (2022) Vol. 26, pp. 100312-100312
Open Access | Times Cited: 59
A scalable and lightweight group authentication framework for Internet of Medical Things using integrated blockchain and fog computing
Norah Alsaeed, Farrukh Nadeem, Faisal Albalwy
Future Generation Computer Systems (2023) Vol. 151, pp. 162-181
Open Access | Times Cited: 16
Norah Alsaeed, Farrukh Nadeem, Faisal Albalwy
Future Generation Computer Systems (2023) Vol. 151, pp. 162-181
Open Access | Times Cited: 16
Authentication and Access Control Mechanisms to Secure IoT Environments: A comprehensive SLR
Seetah Almarri, Mounir Frikha
(2024)
Open Access | Times Cited: 3
Seetah Almarri, Mounir Frikha
(2024)
Open Access | Times Cited: 3
Blockchain-based IoT enabled health monitoring system
Poonam Rani, Preeti Kaur, Vibha Jain, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 15, pp. 17284-17308
Closed Access | Times Cited: 18
Poonam Rani, Preeti Kaur, Vibha Jain, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 15, pp. 17284-17308
Closed Access | Times Cited: 18
A genetic timing scheduling model for urban traffic signal control
Huan Wang, Po Hu, Hao Wang
Information Sciences (2021) Vol. 576, pp. 475-483
Closed Access | Times Cited: 22
Huan Wang, Po Hu, Hao Wang
Information Sciences (2021) Vol. 576, pp. 475-483
Closed Access | Times Cited: 22
Blockchain-enabled Smart Contracts and the Internet of Things: Advancing the research agenda through a narrative review
C. R. Arun, Ashis K. Pani, Prashant Kumar
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2
C. R. Arun, Ashis K. Pani, Prashant Kumar
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 2
Blockchain-driven security for IoT networks: State-of-the-art, challenges and future directions
Vinay Maurya, Vinay Rishiwal, Mano Yadav, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 18, Iss. 1, pp. 1-35
Closed Access | Times Cited: 2
Vinay Maurya, Vinay Rishiwal, Mano Yadav, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 18, Iss. 1, pp. 1-35
Closed Access | Times Cited: 2
Cryptanalysis and Enhancement of an Authenticated Key Agreement Protocol for Dew-Assisted IoT Systems
Yuqian Ma, Yongliu Ma, Qingfeng Cheng
Security and Communication Networks (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 11
Yuqian Ma, Yongliu Ma, Qingfeng Cheng
Security and Communication Networks (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 11
Feature Cluster-Based Secure Data Transmission Method for Social Internet of Vehicles
Ling Xing, Lulu Liu, Honghai Wu, et al.
Electronics (2023) Vol. 12, Iss. 10, pp. 2180-2180
Open Access | Times Cited: 6
Ling Xing, Lulu Liu, Honghai Wu, et al.
Electronics (2023) Vol. 12, Iss. 10, pp. 2180-2180
Open Access | Times Cited: 6
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review
Elham Ebrahimpour, Shahram Babaie
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1583-1602
Closed Access | Times Cited: 1
Elham Ebrahimpour, Shahram Babaie
International Journal of Information Security (2024) Vol. 23, Iss. 3, pp. 1583-1602
Closed Access | Times Cited: 1
BSAS: blockchain-based shareable authentication scheme for smart healthcare
Divya Rani, Sachin Tripathi, Ashish Tomar
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7955-7979
Closed Access | Times Cited: 1
Divya Rani, Sachin Tripathi, Ashish Tomar
Cluster Computing (2024) Vol. 27, Iss. 6, pp. 7955-7979
Closed Access | Times Cited: 1
Decentralized Access Control using Blockchain Technology for Application in Smart Farming
Normaizeerah Mohd Noor, Noor Afiza Mat Razali, Nur Atiqah Malizan, et al.
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 9
Open Access | Times Cited: 7
Normaizeerah Mohd Noor, Noor Afiza Mat Razali, Nur Atiqah Malizan, et al.
International Journal of Advanced Computer Science and Applications (2022) Vol. 13, Iss. 9
Open Access | Times Cited: 7
Proof of location based delivery system using multi-party virtual state channel: a blockchain model
Sujit Sangram Sahoo, Vijay Kumar Chaurasiya
The Journal of Supercomputing (2023) Vol. 80, Iss. 1, pp. 703-733
Closed Access | Times Cited: 3
Sujit Sangram Sahoo, Vijay Kumar Chaurasiya
The Journal of Supercomputing (2023) Vol. 80, Iss. 1, pp. 703-733
Closed Access | Times Cited: 3
A Blockchain-Based Decentralised and Dynamic Authorisation Scheme for the Internet of Things
Khizar Hameed, Ali Raza, Saurabh Garg, et al.
(2023)
Open Access | Times Cited: 3
Khizar Hameed, Ali Raza, Saurabh Garg, et al.
(2023)
Open Access | Times Cited: 3
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives
Mahdi R. Alagheband, Atefeh Mashatan
The Journal of Supercomputing (2022) Vol. 78, Iss. 17, pp. 18777-18824
Open Access | Times Cited: 5
Mahdi R. Alagheband, Atefeh Mashatan
The Journal of Supercomputing (2022) Vol. 78, Iss. 17, pp. 18777-18824
Open Access | Times Cited: 5
AAC-IoT: Attribute Access Control Scheme for IoT Using Lightweight Cryptography and Hyperledger Fabric Blockchain
Suhair Alshehri, Omaimah Bamasag
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8111-8111
Open Access | Times Cited: 5
Suhair Alshehri, Omaimah Bamasag
Applied Sciences (2022) Vol. 12, Iss. 16, pp. 8111-8111
Open Access | Times Cited: 5
Block Chain based Secured Wireless Patient Health Monitoring System
Shalet Benvin, R Arvind, C Sugunadevi, et al.
(2023), pp. 166-172
Closed Access | Times Cited: 2
Shalet Benvin, R Arvind, C Sugunadevi, et al.
(2023), pp. 166-172
Closed Access | Times Cited: 2
FVF-BIoT: a formal verification framework for blockchain-based IoT authentication
Jiaqi Yin, Yuan Fei
Software Quality Journal (2024) Vol. 32, Iss. 4, pp. 1457-1480
Closed Access
Jiaqi Yin, Yuan Fei
Software Quality Journal (2024) Vol. 32, Iss. 4, pp. 1457-1480
Closed Access
A Lightweight Group Authentication Framework for Blockchain-Enabled IoT Network in Healthcare Systems
Iftikhar Aslam Tayubi, Mudarakola Lakshmi Prasad, Pundru Chandra Shaker Reddy, et al.
Lecture notes in networks and systems (2024), pp. 262-269
Closed Access
Iftikhar Aslam Tayubi, Mudarakola Lakshmi Prasad, Pundru Chandra Shaker Reddy, et al.
Lecture notes in networks and systems (2024), pp. 262-269
Closed Access
Dynamic Defense Strategies With Generative AI
Khizar Hameed, Muhammad Tayyab, N. Z. Jhanjhi, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 83-136
Closed Access
Khizar Hameed, Muhammad Tayyab, N. Z. Jhanjhi, et al.
Advances in digital crime, forensics, and cyber terrorism book series (2024), pp. 83-136
Closed Access
Intelligent ubiquitous computing model for energy optimization of cloud IOTs in sensor networks
Deepa S.N.
International Journal of Pervasive Computing and Communications (2021) Vol. 18, Iss. 1, pp. 18-42
Closed Access | Times Cited: 4
Deepa S.N.
International Journal of Pervasive Computing and Communications (2021) Vol. 18, Iss. 1, pp. 18-42
Closed Access | Times Cited: 4
BTDA: Two-factor dynamic identity authentication scheme for data trading based on alliance chain
Fengmei Chen, Bin Zhao, Yilong Gao, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 17, pp. 19118-19137
Open Access | Times Cited: 1
Fengmei Chen, Bin Zhao, Yilong Gao, et al.
The Journal of Supercomputing (2023) Vol. 79, Iss. 17, pp. 19118-19137
Open Access | Times Cited: 1
On the use of Petri Nets in Smart Contracts modeling, generation and verification
Andrea Pinna, Roberto Tonelli
2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) (2022), pp. 1207-1211
Closed Access | Times Cited: 2
Andrea Pinna, Roberto Tonelli
2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) (2022), pp. 1207-1211
Closed Access | Times Cited: 2
The Combination of Blockchain and Internet of Things - Challenges and Solutions to Security Issues
Pengyu Dai, Mingzhe Liu, Qiulin He, et al.
2022 5th International Conference on Pattern Recognition and Artificial Intelligence (PRAI) (2022), pp. 1213-1220
Closed Access | Times Cited: 1
Pengyu Dai, Mingzhe Liu, Qiulin He, et al.
2022 5th International Conference on Pattern Recognition and Artificial Intelligence (PRAI) (2022), pp. 1213-1220
Closed Access | Times Cited: 1