
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Towards secure authenticating of cache in the reader for RFID-based IoT systems
Chun‐Ta Li, Cheng‐Chi Lee, Chi-Yao Weng, et al.
Peer-to-Peer Networking and Applications (2017) Vol. 11, Iss. 1, pp. 198-208
Closed Access | Times Cited: 56
Chun‐Ta Li, Cheng‐Chi Lee, Chi-Yao Weng, et al.
Peer-to-Peer Networking and Applications (2017) Vol. 11, Iss. 1, pp. 198-208
Closed Access | Times Cited: 56
Showing 1-25 of 56 citing articles:
Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment
Srinivas Jangirala, Ashok Kumar Das, Athanasios V. Vasilakos
IEEE Transactions on Industrial Informatics (2019) Vol. 16, Iss. 11, pp. 7081-7093
Open Access | Times Cited: 197
Srinivas Jangirala, Ashok Kumar Das, Athanasios V. Vasilakos
IEEE Transactions on Industrial Informatics (2019) Vol. 16, Iss. 11, pp. 7081-7093
Open Access | Times Cited: 197
An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT
B. D. Deebak, Fadi Al‐Turjman, Moayad Aloqaily, et al.
IEEE Access (2019) Vol. 7, pp. 135632-135649
Open Access | Times Cited: 183
B. D. Deebak, Fadi Al‐Turjman, Moayad Aloqaily, et al.
IEEE Access (2019) Vol. 7, pp. 135632-135649
Open Access | Times Cited: 183
Anonymous Lightweight Chaotic Map-Based Authenticated Key Agreement Protocol for Industrial Internet of Things
Srinivas Jangirala, Ashok Kumar Das, Mohammad Wazid, et al.
IEEE Transactions on Dependable and Secure Computing (2018) Vol. 17, Iss. 6, pp. 1133-1146
Closed Access | Times Cited: 173
Srinivas Jangirala, Ashok Kumar Das, Mohammad Wazid, et al.
IEEE Transactions on Dependable and Secure Computing (2018) Vol. 17, Iss. 6, pp. 1133-1146
Closed Access | Times Cited: 173
Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review
Bin Liao, Yasir Ali, Shah Nazir, et al.
IEEE Access (2020) Vol. 8, pp. 120331-120350
Open Access | Times Cited: 142
Bin Liao, Yasir Ali, Shah Nazir, et al.
IEEE Access (2020) Vol. 8, pp. 120331-120350
Open Access | Times Cited: 142
A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment
Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, et al.
IEEE Internet of Things Journal (2019) Vol. 6, Iss. 5, pp. 8739-8752
Closed Access | Times Cited: 126
Soumya Banerjee, Vanga Odelu, Ashok Kumar Das, et al.
IEEE Internet of Things Journal (2019) Vol. 6, Iss. 5, pp. 8739-8752
Closed Access | Times Cited: 126
An enhanced pairing-based authentication scheme for smart grid communications
Tsu‐Yang Wu, Yu-Qi Lee, Chien‐Ming Chen, et al.
Journal of Ambient Intelligence and Humanized Computing (2021)
Closed Access | Times Cited: 56
Tsu‐Yang Wu, Yu-Qi Lee, Chien‐Ming Chen, et al.
Journal of Ambient Intelligence and Humanized Computing (2021)
Closed Access | Times Cited: 56
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
Ashish Kumar, Rahul Saha, Mauro Conti, et al.
Journal of Network and Computer Applications (2022) Vol. 204, pp. 103414-103414
Closed Access | Times Cited: 37
Ashish Kumar, Rahul Saha, Mauro Conti, et al.
Journal of Network and Computer Applications (2022) Vol. 204, pp. 103414-103414
Closed Access | Times Cited: 37
P2P networking based internet of things (IoT) sensor node authentication by Blockchain
Sunghyuck Hong
Peer-to-Peer Networking and Applications (2019) Vol. 13, Iss. 2, pp. 579-589
Closed Access | Times Cited: 67
Sunghyuck Hong
Peer-to-Peer Networking and Applications (2019) Vol. 13, Iss. 2, pp. 579-589
Closed Access | Times Cited: 67
IoT Enabled RFID Authentication and Secure Object Tracking System for Smart Logistics
S. Anandhi, R. Anitha, Venkatasamy Sureshkumar
Wireless Personal Communications (2018) Vol. 104, Iss. 2, pp. 543-560
Closed Access | Times Cited: 55
S. Anandhi, R. Anitha, Venkatasamy Sureshkumar
Wireless Personal Communications (2018) Vol. 104, Iss. 2, pp. 543-560
Closed Access | Times Cited: 55
DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT
Seyed Farhad Aghili, Maede Ashouri-Talouki, Hamid Mala
The Journal of Supercomputing (2017) Vol. 74, Iss. 1, pp. 509-525
Closed Access | Times Cited: 49
Seyed Farhad Aghili, Maede Ashouri-Talouki, Hamid Mala
The Journal of Supercomputing (2017) Vol. 74, Iss. 1, pp. 509-525
Closed Access | Times Cited: 49
Enhanced Authentication Protocol for the Internet of Things Environment
Chien‐Ming Chen, Xuanang Li, Shuangshuang Liu, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 21
Chien‐Ming Chen, Xuanang Li, Shuangshuang Liu, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-13
Open Access | Times Cited: 21
A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things
Ankur Gupta, Meenakshi Tripathi, Samya Muhuri, et al.
Journal of Information Security and Applications (2022) Vol. 68, pp. 103259-103259
Closed Access | Times Cited: 20
Ankur Gupta, Meenakshi Tripathi, Samya Muhuri, et al.
Journal of Information Security and Applications (2022) Vol. 68, pp. 103259-103259
Closed Access | Times Cited: 20
Quantum secured 6G technology-based applications in Internet of Everything
Kumar Prateek, Nitish Kumar Ojha, Fahiem Altaf, et al.
Telecommunication Systems (2022) Vol. 82, Iss. 2, pp. 315-344
Closed Access | Times Cited: 20
Kumar Prateek, Nitish Kumar Ojha, Fahiem Altaf, et al.
Telecommunication Systems (2022) Vol. 82, Iss. 2, pp. 315-344
Closed Access | Times Cited: 20
Ultra-lightweight blockchain-enabled RFID authentication protocol for supply chain in the domain of 5G mobile edge computing
Sanjeev Kumar, Haider Banka, Baijnath Kaushik
Wireless Networks (2023) Vol. 29, Iss. 5, pp. 2105-2126
Closed Access | Times Cited: 11
Sanjeev Kumar, Haider Banka, Baijnath Kaushik
Wireless Networks (2023) Vol. 29, Iss. 5, pp. 2105-2126
Closed Access | Times Cited: 11
Signature-based three-factor authenticated key exchange for internet of things applications
Xiaoying Jia, Debiao He, Li Li, et al.
Multimedia Tools and Applications (2018) Vol. 77, Iss. 14, pp. 18355-18382
Closed Access | Times Cited: 32
Xiaoying Jia, Debiao He, Li Li, et al.
Multimedia Tools and Applications (2018) Vol. 77, Iss. 14, pp. 18355-18382
Closed Access | Times Cited: 32
Lightweight authentication protocol in edge-based smart grid environment
Chien‐Ming Chen, Lili Chen, Yanyu Huang, et al.
EURASIP Journal on Wireless Communications and Networking (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 25
Chien‐Ming Chen, Lili Chen, Yanyu Huang, et al.
EURASIP Journal on Wireless Communications and Networking (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 25
A Secure Face Recognition for IoT-enabled Healthcare System
Alamgir Sardar, Saiyed Umer, Ranjeet Kumar Rout, et al.
ACM Transactions on Sensor Networks (2022) Vol. 19, Iss. 3, pp. 1-23
Closed Access | Times Cited: 17
Alamgir Sardar, Saiyed Umer, Ranjeet Kumar Rout, et al.
ACM Transactions on Sensor Networks (2022) Vol. 19, Iss. 3, pp. 1-23
Closed Access | Times Cited: 17
Securing Digital Ledger Technologies-Enabled IoT Devices: Taxonomy, Challenges, and Solutions
Anastasios N. Bikos, Sathish Kumar
IEEE Access (2022) Vol. 10, pp. 46238-46254
Open Access | Times Cited: 15
Anastasios N. Bikos, Sathish Kumar
IEEE Access (2022) Vol. 10, pp. 46238-46254
Open Access | Times Cited: 15
A Cost Effective Identity-Based Authentication Scheme for Internet of Things-Enabled Agriculture
Bilal Hassan, Abeer Abdulaziz Alsanad, Insaf Ullah, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 14
Bilal Hassan, Abeer Abdulaziz Alsanad, Insaf Ullah, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 14
An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications
Arun Sekar Rajasekaran, Maria Azees
Security and Communication Networks (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 12
Arun Sekar Rajasekaran, Maria Azees
Security and Communication Networks (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 12
Applicability of WSN and Biometric Models in the Field of Healthcare
Nikhil Sharma, Ila Kaushik, Bharat Bhushan, et al.
Advances in information security, privacy, and ethics book series (2020), pp. 304-329
Closed Access | Times Cited: 16
Nikhil Sharma, Ila Kaushik, Bharat Bhushan, et al.
Advances in information security, privacy, and ethics book series (2020), pp. 304-329
Closed Access | Times Cited: 16
Optimization of the Medical Service Consultation System Based on the Artificial Intelligence of the Internet of Things
Yi Mao, Lei Zhang
IEEE Access (2021) Vol. 9, pp. 98261-98274
Open Access | Times Cited: 14
Yi Mao, Lei Zhang
IEEE Access (2021) Vol. 9, pp. 98261-98274
Open Access | Times Cited: 14
A Lightweight and Robust User Authentication Protocol with User Anonymity for IoT-Based Healthcare
Chien‐Ming Chen, Shuangshuang Liu, Shehzad Ashraf Chaudhry, et al.
Computer Modeling in Engineering & Sciences (2022) Vol. 131, Iss. 1, pp. 307-329
Open Access | Times Cited: 10
Chien‐Ming Chen, Shuangshuang Liu, Shehzad Ashraf Chaudhry, et al.
Computer Modeling in Engineering & Sciences (2022) Vol. 131, Iss. 1, pp. 307-329
Open Access | Times Cited: 10
ILAS-IoT: An improved and lightweight authentication scheme for IoT deployment
Bander Alzahrani, Shehzad Ashraf Chaudhry, Ahmed Barnawi, et al.
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 13, Iss. 11, pp. 5123-5135
Closed Access | Times Cited: 14
Bander Alzahrani, Shehzad Ashraf Chaudhry, Ahmed Barnawi, et al.
Journal of Ambient Intelligence and Humanized Computing (2020) Vol. 13, Iss. 11, pp. 5123-5135
Closed Access | Times Cited: 14
Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure
Chien‐Ming Chen, Shuangshuang Liu
Security and Communication Networks (2021) Vol. 2021, pp. 1-13
Open Access | Times Cited: 11
Chien‐Ming Chen, Shuangshuang Liu
Security and Communication Networks (2021) Vol. 2021, pp. 1-13
Open Access | Times Cited: 11