
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Encryption Scheme Based on Grain Stream Cipher and Chaos for Privacy Protection of Image Data on IoT Network
Punam Kumari, Bhaskar Mondal
Wireless Personal Communications (2023) Vol. 130, Iss. 3, pp. 2261-2280
Closed Access | Times Cited: 22
Punam Kumari, Bhaskar Mondal
Wireless Personal Communications (2023) Vol. 130, Iss. 3, pp. 2261-2280
Closed Access | Times Cited: 22
Showing 22 citing articles:
Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion
Heping Wen, Yiting Lin, S. H. Kang, et al.
iScience (2023) Vol. 27, Iss. 1, pp. 108610-108610
Open Access | Times Cited: 30
Heping Wen, Yiting Lin, S. H. Kang, et al.
iScience (2023) Vol. 27, Iss. 1, pp. 108610-108610
Open Access | Times Cited: 30
Lightweight image encryption algorithm using NLFSR and CBC mode
Punam Kumari, Bhaskar Mondal
The Journal of Supercomputing (2023) Vol. 79, Iss. 17, pp. 19452-19472
Closed Access | Times Cited: 24
Punam Kumari, Bhaskar Mondal
The Journal of Supercomputing (2023) Vol. 79, Iss. 17, pp. 19452-19472
Closed Access | Times Cited: 24
Chaos-based block permutation and dynamic sequence multiplexing for video encryption
Heping Wen, Yiting Lin, Zhiyu Xie, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 23
Heping Wen, Yiting Lin, Zhiyu Xie, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 23
Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices
Cemile İnce, Kenan İNCE, Davut Hanbay
Multimedia Tools and Applications (2024) Vol. 83, Iss. 29, pp. 72789-72817
Open Access | Times Cited: 8
Cemile İnce, Kenan İNCE, Davut Hanbay
Multimedia Tools and Applications (2024) Vol. 83, Iss. 29, pp. 72789-72817
Open Access | Times Cited: 8
A Lightweight Multi-Chaos-Based Image Encryption Scheme for IoT Networks
Kurunandan Jain, Betrant Titus, Prabhakar Krishnan, et al.
IEEE Access (2024) Vol. 12, pp. 62118-62148
Open Access | Times Cited: 6
Kurunandan Jain, Betrant Titus, Prabhakar Krishnan, et al.
IEEE Access (2024) Vol. 12, pp. 62118-62148
Open Access | Times Cited: 6
An Enhanced Encryption Scheme for IoT ‐Based Wireless Sensor Network Using DNA Enclosed Fully Homomorphic Approach
Alka P. Sawlikar, Devashri Raich, B. Ganguly, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Alka P. Sawlikar, Devashri Raich, B. Ganguly, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Image Encryption using Half-Inverted Cascading Chaos Cipheration
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8
A systematic review of innovations for real-time image security in IoT applications using machine learning and blockchain
Manish Rai, Sunil Kumar, Pramod Singh Rathore
Journal of Intelligent Manufacturing (2024)
Closed Access | Times Cited: 2
Manish Rai, Sunil Kumar, Pramod Singh Rathore
Journal of Intelligent Manufacturing (2024)
Closed Access | Times Cited: 2
Lightweight encryption scheme based on a new NLFSR
Punam Kumari, Bhaskar Mondal
Multimedia Tools and Applications (2024) Vol. 83, Iss. 24, pp. 64919-64943
Closed Access | Times Cited: 1
Punam Kumari, Bhaskar Mondal
Multimedia Tools and Applications (2024) Vol. 83, Iss. 24, pp. 64919-64943
Closed Access | Times Cited: 1
Lightweight Stream Cipher for Health Care IoT
Punam Kumari Kumar, Bhaskar Mondal
(2023), pp. 444-449
Closed Access | Times Cited: 4
Punam Kumari Kumar, Bhaskar Mondal
(2023), pp. 444-449
Closed Access | Times Cited: 4
Artistic expression and data protection: Balancing aesthetics with data privacy in IoT
Qi Zhang
Heliyon (2023) Vol. 9, Iss. 9, pp. e19380-e19380
Open Access | Times Cited: 2
Qi Zhang
Heliyon (2023) Vol. 9, Iss. 9, pp. e19380-e19380
Open Access | Times Cited: 2
A Novel Newton–Raphson Modulo Generator and Its VLSI Architecture for Pseudorandom Bit Generation
Puna Kumar Rajak, Tarni Mandal
SN Computer Science (2024) Vol. 5, Iss. 1
Closed Access
Puna Kumar Rajak, Tarni Mandal
SN Computer Science (2024) Vol. 5, Iss. 1
Closed Access
Lightweight image encryption based on composite pseudo-random number generator
Deepak Kumar, Bhaskar Mondal, Jyoti Prakash Singh
Journal of Electronic Imaging (2024) Vol. 33, Iss. 02
Closed Access
Deepak Kumar, Bhaskar Mondal, Jyoti Prakash Singh
Journal of Electronic Imaging (2024) Vol. 33, Iss. 02
Closed Access
Remodified Dual-CLCG Method and Its VLSI Architecture for Pseudorandom Bit Generation
Puna Kumar Rajak, Tarni Mandal, M. L. S. Sai Kumar
SN Computer Science (2024) Vol. 5, Iss. 4
Closed Access
Puna Kumar Rajak, Tarni Mandal, M. L. S. Sai Kumar
SN Computer Science (2024) Vol. 5, Iss. 4
Closed Access
5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q‐Matrix
Geeta Biban, Renu Chugh, Anju Panwar, et al.
Complexity (2024) Vol. 2024, Iss. 1
Open Access
Geeta Biban, Renu Chugh, Anju Panwar, et al.
Complexity (2024) Vol. 2024, Iss. 1
Open Access
A Novel Chaos-Based Encryption Technique with Parallel Processing Using CUDA for Mobile Powerful GPU Control Center
Harun Emre Kıran
Chaos and fractals. (2024)
Open Access
Harun Emre Kıran
Chaos and fractals. (2024)
Open Access
A secure healthcare data sharing scheme based on two-dimensional chaotic mapping and blockchain
Zhigang Xu, Enda Zheng, Hongmu Han, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
Zhigang Xu, Enda Zheng, Hongmu Han, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access
OSL-ABE: an optimal secure and lightweight attribute-based encryption method for blockchain-enabled IoT-based healthcare systems
A. Preethi Vinnarasi, R. Dayana
Neural Computing and Applications (2024)
Closed Access
A. Preethi Vinnarasi, R. Dayana
Neural Computing and Applications (2024)
Closed Access
Full‐Accessible Multiparty Searchable Encryption Scheme for Shared Cloud Storage
Dongmin Kim, Jieun Eom, Kee Sung Kim
IET Information Security (2024) Vol. 2024, Iss. 1
Open Access
Dongmin Kim, Jieun Eom, Kee Sung Kim
IET Information Security (2024) Vol. 2024, Iss. 1
Open Access
Image encryption algorithm based on face recognition, facial features recognition and bitonic sequence
Xingyuan Wang, Ziyu Leng
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 31603-31627
Closed Access | Times Cited: 1
Xingyuan Wang, Ziyu Leng
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 31603-31627
Closed Access | Times Cited: 1
Construction and Management of Doctor-Patient Privacy Protection System under Big Data Computing Environment
Zhicheng Guan
(2023), pp. 1-6
Closed Access
Zhicheng Guan
(2023), pp. 1-6
Closed Access
Revealing Modern Stream Ciphers Security: A Comprehensive Review
Mohammed Albawi, Asaad Noori Hashim, Khalid Ali Hussein
(2023), pp. 147-152
Closed Access
Mohammed Albawi, Asaad Noori Hashim, Khalid Ali Hussein
(2023), pp. 147-152
Closed Access