OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security
Olufunke Rebecca Vincent, T. M. Okediran, Adebayo Abayomi‐Alli, et al.
SN Computer Science (2020) Vol. 1, Iss. 2
Open Access | Times Cited: 22

Showing 22 citing articles:

Systematic survey of mobile payments, protocols, and security infrastructure
Sriramulu Bojjagani, V. N. Sastry, Chien‐Ming Chen, et al.
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 14, Iss. 1, pp. 609-654
Closed Access | Times Cited: 49

A systematic review of multi-factor authentication in digital payment systems: NIST standards alignment and industry implementation analysis
Phat T. Tran-Truong, Phạm Minh Quân, Ha Xuan Son, et al.
Journal of Systems Architecture (2025), pp. 103402-103402
Open Access

A Secure and Efficient Multi-Factor Authentication Algorithm for Mobile Money Applications
Guma Ali, Mussa Ally Dida, Anael Sam
Future Internet (2021) Vol. 13, Iss. 12, pp. 299-299
Open Access | Times Cited: 23

Secure privacy-enhanced fast authentication and key management for IoMT-enabled smart healthcare systems
Sriramulu Bojjagani, D. R. Denslin Brabin, K. Shiv Kumar, et al.
Computing (2024) Vol. 106, Iss. 7, pp. 2427-2458
Closed Access | Times Cited: 2

Enterprise Financial Leverage and Risk Assessment Based on Mobile Payment under Artificial Intelligence
Xiaoling Xu, Jianghao Song
Mobile Information Systems (2021) Vol. 2021, pp. 1-10
Open Access | Times Cited: 15

An improved hybrid scheme for e-payment security using elliptic curve cryptography
Olarewaju Mubashiru Lawal, Olufunke Rebecca Vincent, A. A. A. Agboola, et al.
International Journal of Information Technology (2020) Vol. 13, Iss. 1, pp. 139-153
Closed Access | Times Cited: 12

Securing the Perceptual Layer of the Internet of Things (Iot) Devices Using Elliptic Curve Cryptography
T. M. Okediran, Olufunke Rebecca Vincent, Adebayo Abayomi‐Alli, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 2

Exploring Online Teaching Design of Curriculum Politics by Deep Learning and Visual Sensing Technology
XiaoJuan Huang, Yanhong Xie, Yongyu Li
Computational Intelligence and Neuroscience (2022) Vol. 2022, pp. 1-16
Open Access | Times Cited: 4

Elliptic Curves Cryptography for Lightweight Devices in IoT Systems
Ana Simon Francia, Javier Solis-Lastra, Erik Alex Papa Quiroz
Lecture notes in networks and systems (2022), pp. 71-82
Closed Access | Times Cited: 3

BB-CSP: An Efficient Blockchain-Based Collective Salary Payment Framework Using Weighted Functional Encryption
Saeed Banaeian Far, Azadeh Imani Rad, Maryam Rajabzade Asaar
SN Computer Science (2022) Vol. 3, Iss. 5
Closed Access | Times Cited: 3

Securing the perceptual layer of E-payment-based internet of things devices using elliptic curve cryptography over binary field
T. M. Okediran, Olufunke Rebecca Vincent, Adebayo Abayomi‐Alli, et al.
The Journal of Supercomputing (2024) Vol. 80, Iss. 15, pp. 21592-21614
Closed Access

Block chain-based trusted smart contract for secure mobile user payment gateway in e-health systems
A. Saranya, R. Naresh
Soft Computing (2024) Vol. 28, Iss. 17-18, pp. 10139-10151
Closed Access

Securing the Perceptual Layer of E-Payment-Based Internet of Things Devices Using Elliptic Curve Cryptography
T. M. Okediran, Olufunke Rebecca Vincent, Adebayo Abayomi‐Alli, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 1

Spectrum Aware Cryptography (SAC) in Wireless Cognitive Radio Sensor Networks for Delay Sensitive Applications
Veeranna Gatate, Jayashree Agarkhed
2020 International Conference for Emerging Technology (INCET) (2020), pp. 1-7
Closed Access | Times Cited: 2

Digital Certificate-Based User Authentication to Access Networks and Hosts
K. Ramesh, Poshini Ganeshkumar, B. Gokul, et al.
EAI/Springer Innovations in Communication and Computing (2022), pp. 437-445
Closed Access | Times Cited: 1

Elliptic Curve Cryptosystem for Digital multimedia, General Review
Dina.H. Abbas, Ayad A. AbdulSalam
Al-Salam Journal for Engineering and Technology (2023), pp. 63-71
Open Access

Application of Big Data Technology in Mobile Payment Security
Yongguan Wang
Journal of Research in Social Science and Humanities (2023) Vol. 2, Iss. 12, pp. 18-23
Open Access

An Intelligent Health Diagnosis System Based on a Secure Data Transfer Through Li-Fi Technology
Manash Sarkar, Hameed Al Qaheri, Diksha Jaiswal, et al.
Intelligent systems reference library (2022), pp. 149-171
Closed Access

An Ensemble-based Shill Billing Prediction Model in Car Auction System
Segun Micheal Akintunde, Olufunke Rebecca Vincent, Oreoluwa Carolyn Tinubu
(2022), pp. 1-6
Closed Access

An Ensemble-based Shill Bidding Prediction Model in Car *Auction System
Segun Micheal Akintunde, Olufunke Rebecca Vincent, Oreoluwa Carolyn Tinubu
(2022), pp. 1-6
Closed Access

Page 1

Scroll to top