OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An efficient and secure RFID authentication protocol using elliptic curve cryptography
Negin Dinarvand, Hamid Barati
Wireless Networks (2017) Vol. 25, Iss. 1, pp. 415-428
Closed Access | Times Cited: 65

Showing 1-25 of 65 citing articles:

RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
Vinod Kumar, Musheer Ahmad, Dheerendra Mishra, et al.
Vehicular Communications (2019) Vol. 22, pp. 100213-100213
Closed Access | Times Cited: 75

A Mutual Security Authentication Method for RFID-PUF Circuit Based on Deep Learning
Wei Liang, Songyou Xie, Dafang Zhang, et al.
ACM Transactions on Internet Technology (2021) Vol. 22, Iss. 2, pp. 1-20
Closed Access | Times Cited: 64

An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment
Sarah Izza, Mustapha Benssalah, Karim Drouiche
Journal of Information Security and Applications (2021) Vol. 58, pp. 102705-102705
Closed Access | Times Cited: 61

An Authentication-Based Secure Data Aggregation Method in Internet of Things
Maryam Ataei Nezhad, Hamid Barati, Ali Barati
Journal of Grid Computing (2022) Vol. 20, Iss. 3
Open Access | Times Cited: 49

Game Theory-Based Authentication Framework to Secure Internet of Vehicles with Blockchain
Manik Gupta, Rakesh Kumar, Shashi Shekhar, et al.
Sensors (2022) Vol. 22, Iss. 14, pp. 5119-5119
Open Access | Times Cited: 41

A secure three-factor authentication scheme for IoT environments
AmirHossein Ghafouri Mirsaraei, Ali Barati, Hamid Barati
Journal of Parallel and Distributed Computing (2022) Vol. 169, pp. 87-105
Closed Access | Times Cited: 39

ESEAP: ECC based secure and efficient mutual authentication protocol using smart card
Adesh Kumari, Srinivas Jangirala, Mohammad Yahya Abbasi, et al.
Journal of Information Security and Applications (2020) Vol. 51, pp. 102443-102443
Closed Access | Times Cited: 60

Public key versus symmetric key cryptography in client–server authentication protocols
An Braeken
International Journal of Information Security (2021) Vol. 21, Iss. 1, pp. 103-114
Closed Access | Times Cited: 41

An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems
Anand Kumar, Karan Singh, Mohd Shariq, et al.
Computer Communications (2023) Vol. 205, pp. 147-157
Open Access | Times Cited: 19

HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks
K. Dinesh, S. V. N. Santhosh Kumar
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 5, pp. 2609-2636
Closed Access | Times Cited: 7

Novel ECC-Based RFID Mutual Authentication Protocol for Emerging IoT Applications
Souhir Gabsi, Yassin Kortli, Vincent Beroulle, et al.
IEEE Access (2021) Vol. 9, pp. 130895-130913
Open Access | Times Cited: 32

A Novel Architectural Framework on IoT Ecosystem, Security Aspects and Mechanisms: A Comprehensive Survey
Mohammed Bouzidi, Nishu Gupta, Faouzi Alaya Cheikh, et al.
IEEE Access (2022) Vol. 10, pp. 101362-101384
Open Access | Times Cited: 22

New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications
Fatma Merabet, Amina Cherif, Malika Belkadi, et al.
Peer-to-Peer Networking and Applications (2019) Vol. 13, Iss. 2, pp. 439-474
Closed Access | Times Cited: 36

Blockchain-based anonymous authentication for traffic reporting in VANETs
Li Zhang, Jianbo Xu
Connection Science (2022) Vol. 34, Iss. 1, pp. 1038-1065
Open Access | Times Cited: 19

ESRAS: An efficient and secure ultra-lightweight RFID authentication scheme for low-cost tags
Mohd Shariq, Karan Singh, Chhagan Lal, et al.
Computer Networks (2022) Vol. 217, pp. 109360-109360
Open Access | Times Cited: 19

Highly Efficient Bidirectional Multifactor Authentication and Key Agreement for Real-Time Access to Sensor Data
An Braeken
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 23, pp. 21089-21099
Closed Access | Times Cited: 11

An Improved IoT/RFID-Enabled Object Tracking and Authentication Scheme for Smart Logistics
Bander Alzahrani, Azeem Irshad
Wireless Personal Communications (2022) Vol. 129, Iss. 1, pp. 399-422
Closed Access | Times Cited: 18

An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing
Vikas Kumar, Rahul Kumar, Srinivas Jangirala, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-18
Open Access | Times Cited: 16

Cryptographic Solution-Based Secure Elliptic Curve Cryptography Enabled Radio Frequency Identification Mutual Authentication Protocol for Internet of Vehicles
Surbhi Sharma, Baijnath Kaushik, Mohammad Khalid Imam Rahmani, et al.
IEEE Access (2021) Vol. 9, pp. 147114-147128
Open Access | Times Cited: 19

A Highly Efficient ECC‐Based Authentication Protocol for RFID
Hasnae Lamrani Alaoui, Abdellatif El Ghazi, Mustapha Zbakh, et al.
Journal of Sensors (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 16

Software randomness analysis and evaluation of lightweight ciphers: the prospective for IoT security
Malik Qasaimeh, Raad S. Al‐Qassas, Sara Tedmori
Multimedia Tools and Applications (2018) Vol. 77, Iss. 14, pp. 18415-18449
Closed Access | Times Cited: 20

RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption
Usman Ali, Mohd Yamani Idna Idris, Mohamad Nizam Bin Ayub, et al.
IEEE Access (2021) Vol. 9, pp. 49942-49959
Open Access | Times Cited: 14

Comparison and Feasibility of Various RFID Authentication Methods Using ECC
Alexander Pagan, Rania Baashirah, Abdelshakour Abuzneid
Sensors (2018) Vol. 18, Iss. 9, pp. 2902-2902
Open Access | Times Cited: 16

KL-RAP: An Efficient Key-Less RFID Authentication Protocol Based on ECDLP for Consumer Warehouse Management System
Bimal Kumar Meher, Ruhul Amin, Ashok Kumar Das, et al.
IEEE Transactions on Network Science and Engineering (2022) Vol. 9, Iss. 5, pp. 3411-3420
Closed Access | Times Cited: 9

Page 1 - Next Page

Scroll to top