
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud
K. L. Neela, V. Kavitha
Wireless Personal Communications (2022) Vol. 123, Iss. 3, pp. 2431-2448
Closed Access | Times Cited: 12
K. L. Neela, V. Kavitha
Wireless Personal Communications (2022) Vol. 123, Iss. 3, pp. 2431-2448
Closed Access | Times Cited: 12
Showing 12 citing articles:
Introduction to The Data Mining Techniques in Cybersecurity
Israa Ezzat Salem, Maad M. Mijwil, Alaa Wagih Abdulqader, et al.
Deleted Journal (2022), pp. 28-37
Open Access | Times Cited: 22
Israa Ezzat Salem, Maad M. Mijwil, Alaa Wagih Abdulqader, et al.
Deleted Journal (2022), pp. 28-37
Open Access | Times Cited: 22
A comprehensive survey of cryptography key management systems
Subhabrata Rana, Fatemeh Khoda Parast, Brett Kelly, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103607-103607
Closed Access | Times Cited: 10
Subhabrata Rana, Fatemeh Khoda Parast, Brett Kelly, et al.
Journal of Information Security and Applications (2023) Vol. 78, pp. 103607-103607
Closed Access | Times Cited: 10
Blockchain based Quantum Resistant Signature Algorithm for Data Integrity Verification in Cloud and Internet of Everything
Pranav Shrivastava, Bashir Alam, Mansaf Alam
ICST Transactions on Scalable Information Systems (2024)
Open Access | Times Cited: 1
Pranav Shrivastava, Bashir Alam, Mansaf Alam
ICST Transactions on Scalable Information Systems (2024)
Open Access | Times Cited: 1
Integrity coded databases - protecting data integrity for outsourced databases
Jyh-haw Yeh, Md Mashrur Arifin, Ning Shen, et al.
Computers & Security (2023) Vol. 136, pp. 103569-103569
Closed Access | Times Cited: 2
Jyh-haw Yeh, Md Mashrur Arifin, Ning Shen, et al.
Computers & Security (2023) Vol. 136, pp. 103569-103569
Closed Access | Times Cited: 2
New attacks on secret sharing-based data outsourcing: toward a resistant scheme
Peyman Rahmani, Seyed Mostafa Fakhrahmad, Mohammad Taheri
The Journal of Supercomputing (2022) Vol. 78, Iss. 14, pp. 15749-15785
Closed Access | Times Cited: 3
Peyman Rahmani, Seyed Mostafa Fakhrahmad, Mohammad Taheri
The Journal of Supercomputing (2022) Vol. 78, Iss. 14, pp. 15749-15785
Closed Access | Times Cited: 3
Blockchain assisted blind signature algorithm with data integrity verification scheme
Pranav Shrivastava, Bashir Alam, Mansaf Alam
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 13
Closed Access
Pranav Shrivastava, Bashir Alam, Mansaf Alam
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 13
Closed Access
IoT data security in outsourced databases: A survey of verifiable database
Ailin Chen, Shaoyuan Yu, Xinyi Yang, et al.
Heliyon (2024) Vol. 10, Iss. 7, pp. e28117-e28117
Open Access
Ailin Chen, Shaoyuan Yu, Xinyi Yang, et al.
Heliyon (2024) Vol. 10, Iss. 7, pp. e28117-e28117
Open Access
Enhanced Data Integrity Encryption Algorithm for Cloud Computing
Moloko P. Mothlabeng, Topside E. Mathonsi, Tonderai Muchenje, et al.
(2022), pp. 1-6
Closed Access | Times Cited: 2
Moloko P. Mothlabeng, Topside E. Mathonsi, Tonderai Muchenje, et al.
(2022), pp. 1-6
Closed Access | Times Cited: 2
Cloud Data Integrity Verification Algorithm of Accounting Informatization in Sharing Mode
Ya Gao
Lecture notes in electrical engineering (2023), pp. 1028-1033
Closed Access
Ya Gao
Lecture notes in electrical engineering (2023), pp. 1028-1033
Closed Access
Analysis and Implementation of Digital Signature Algorithm in PDF Document
Muhammad Rizqi Ramadhan, Satria Mandala, Fazmah Arif Yulianto
(2023), pp. 11-16
Closed Access
Muhammad Rizqi Ramadhan, Satria Mandala, Fazmah Arif Yulianto
(2023), pp. 11-16
Closed Access
Security and Privacy of Cloud Data Auditing Protocols: A Review, State-of-the-art, Open Issues, and Future Research Directions
Muhammad Farooq, Mohd Rushdi Idrus, Adi Ahmad, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 12
Open Access
Muhammad Farooq, Mohd Rushdi Idrus, Adi Ahmad, et al.
International Journal of Advanced Computer Science and Applications (2023) Vol. 14, Iss. 12
Open Access
CGCoCoS-ODB: A Cell Granularity Correctness and Completeness Scheme for Outsourced DataBases
Bruno Ramos Cruz, Lil María Rodríguez-Henríquez, Saúl E. Pomares Hernández, et al.
Research Square (Research Square) (2022)
Open Access
Bruno Ramos Cruz, Lil María Rodríguez-Henríquez, Saúl E. Pomares Hernández, et al.
Research Square (Research Square) (2022)
Open Access