
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Digital rights management scheme based on redactable blockchain and perceptual hash
Xinyu Yi, Yuping Zhou, Yuqian Lin, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2630-2648
Closed Access | Times Cited: 6
Xinyu Yi, Yuping Zhou, Yuqian Lin, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2630-2648
Closed Access | Times Cited: 6
Showing 6 citing articles:
A Redactable Blockchain-Based Data Management Scheme for Agricultural Product Traceability
Shangxiong Yang, Shaowen Li, Wenjia Chen, et al.
Sensors (2024) Vol. 24, Iss. 5, pp. 1667-1667
Open Access | Times Cited: 4
Shangxiong Yang, Shaowen Li, Wenjia Chen, et al.
Sensors (2024) Vol. 24, Iss. 5, pp. 1667-1667
Open Access | Times Cited: 4
A Verifiable Decentralized Data Modification Mechanism Supporting Accountability for Securing Industrial IoT
Changsong Yang, Junfu Wu, Hai Liang, et al.
Lecture notes in computer science (2025), pp. 182-200
Closed Access
Changsong Yang, Junfu Wu, Hai Liang, et al.
Lecture notes in computer science (2025), pp. 182-200
Closed Access
OREVI_PCH: An optimized resource-efficient redaction mechanism with integrity validation in policy-based chameleon hash for IoT applications
Shams Mhmood Abd Ali, Mohd Najwadi Yusoff, Je Sen Teh, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 18, Iss. 1, pp. 1-17
Closed Access
Shams Mhmood Abd Ali, Mohd Najwadi Yusoff, Je Sen Teh, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 18, Iss. 1, pp. 1-17
Closed Access
ProtAIN: Protecting the Authenticity and Integrity Properties of NFT Images
Iosif Polenakis, Vasileios Vouronikos, Eftychia Kiafa, et al.
(2024), pp. 16-23
Closed Access
Iosif Polenakis, Vasileios Vouronikos, Eftychia Kiafa, et al.
(2024), pp. 16-23
Closed Access
OREVI_PCH: An Optimized Resource-Efficient Redaction Mechanism with Integrity Validation in Policy-based Chameleon Hash for IoT Applications
Shams Mhmood Abd Ali, Mohd Najwadi Yusoff, Je Sen Teh, et al.
Research Square (Research Square) (2024)
Open Access
Shams Mhmood Abd Ali, Mohd Najwadi Yusoff, Je Sen Teh, et al.
Research Square (Research Square) (2024)
Open Access
DRPChain: A new blockchain-based trusted DRM scheme for image content protection
Jian Yun, Xinyu Liu, Yusheng Lu, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0309743-e0309743
Open Access
Jian Yun, Xinyu Liu, Yusheng Lu, et al.
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0309743-e0309743
Open Access