OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Encryption Scheme Based on Grain Stream Cipher and Chaos for Privacy Protection of Image Data on IoT Network
Punam Kumari, Bhaskar Mondal
Wireless Personal Communications (2023) Vol. 130, Iss. 3, pp. 2261-2280
Closed Access | Times Cited: 22

Showing 22 citing articles:

Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion
Heping Wen, Yiting Lin, S. H. Kang, et al.
iScience (2023) Vol. 27, Iss. 1, pp. 108610-108610
Open Access | Times Cited: 30

Lightweight image encryption algorithm using NLFSR and CBC mode
Punam Kumari, Bhaskar Mondal
The Journal of Supercomputing (2023) Vol. 79, Iss. 17, pp. 19452-19472
Closed Access | Times Cited: 24

Chaos-based block permutation and dynamic sequence multiplexing for video encryption
Heping Wen, Yiting Lin, Zhiyu Xie, et al.
Scientific Reports (2023) Vol. 13, Iss. 1
Open Access | Times Cited: 23

Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices
Cemile İnce, Kenan İNCE, Davut Hanbay
Multimedia Tools and Applications (2024) Vol. 83, Iss. 29, pp. 72789-72817
Open Access | Times Cited: 8

A Lightweight Multi-Chaos-Based Image Encryption Scheme for IoT Networks
Kurunandan Jain, Betrant Titus, Prabhakar Krishnan, et al.
IEEE Access (2024) Vol. 12, pp. 62118-62148
Open Access | Times Cited: 6

An Enhanced Encryption Scheme for IoT‐Based Wireless Sensor Network Using DNA Enclosed Fully Homomorphic Approach
Alka P. Sawlikar, Devashri Raich, B. Ganguly, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access

Image Encryption using Half-Inverted Cascading Chaos Cipheration
De Rosal Ignatius Moses Setiadi, Robet Robet, Octara Pribadi, et al.
Journal of Computing Theories and Applications (2023) Vol. 1, Iss. 2, pp. 61-77
Open Access | Times Cited: 8

A systematic review of innovations for real-time image security in IoT applications using machine learning and blockchain
Manish Rai, Sunil Kumar, Pramod Singh Rathore
Journal of Intelligent Manufacturing (2024)
Closed Access | Times Cited: 2

Lightweight encryption scheme based on a new NLFSR
Punam Kumari, Bhaskar Mondal
Multimedia Tools and Applications (2024) Vol. 83, Iss. 24, pp. 64919-64943
Closed Access | Times Cited: 1

Lightweight Stream Cipher for Health Care IoT
Punam Kumari Kumar, Bhaskar Mondal
(2023), pp. 444-449
Closed Access | Times Cited: 4

Artistic expression and data protection: Balancing aesthetics with data privacy in IoT
Qi Zhang
Heliyon (2023) Vol. 9, Iss. 9, pp. e19380-e19380
Open Access | Times Cited: 2

A Novel Newton–Raphson Modulo Generator and Its VLSI Architecture for Pseudorandom Bit Generation
Puna Kumar Rajak, Tarni Mandal
SN Computer Science (2024) Vol. 5, Iss. 1
Closed Access

Lightweight image encryption based on composite pseudo-random number generator
Deepak Kumar, Bhaskar Mondal, Jyoti Prakash Singh
Journal of Electronic Imaging (2024) Vol. 33, Iss. 02
Closed Access

Remodified Dual-CLCG Method and Its VLSI Architecture for Pseudorandom Bit Generation
Puna Kumar Rajak, Tarni Mandal, M. L. S. Sai Kumar
SN Computer Science (2024) Vol. 5, Iss. 4
Closed Access

5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q‐Matrix
Geeta Biban, Renu Chugh, Anju Panwar, et al.
Complexity (2024) Vol. 2024, Iss. 1
Open Access

A secure healthcare data sharing scheme based on two-dimensional chaotic mapping and blockchain
Zhigang Xu, Enda Zheng, Hongmu Han, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access

Full‐Accessible Multiparty Searchable Encryption Scheme for Shared Cloud Storage
Dongmin Kim, Jieun Eom, Kee Sung Kim
IET Information Security (2024) Vol. 2024, Iss. 1
Open Access

Image encryption algorithm based on face recognition, facial features recognition and bitonic sequence
Xingyuan Wang, Ziyu Leng
Multimedia Tools and Applications (2023) Vol. 83, Iss. 11, pp. 31603-31627
Closed Access | Times Cited: 1

Revealing Modern Stream Ciphers Security: A Comprehensive Review
Mohammed Albawi, Asaad Noori Hashim, Khalid Ali Hussein
(2023), pp. 147-152
Closed Access

Page 1

Scroll to top