OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

ZT-Access: A combining zero trust access control with attribute-based encryption scheme against compromised devices in power IoT environments
Wenhua Huang, Xuemin Xie, Ziying Wang, et al.
Ad Hoc Networks (2023) Vol. 145, pp. 103161-103161
Closed Access | Times Cited: 16

Showing 16 citing articles:

Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme
Shruti, Shalli Rani, Gautam Srivastava
Expert Systems with Applications (2023) Vol. 235, pp. 121180-121180
Closed Access | Times Cited: 54

Verify and trust: A multidimensional survey of zero-trust security in the age of IoT
Muhammad Ajmal Azad, Sidrah Abdullah, Junaid Arshad, et al.
Internet of Things (2024) Vol. 27, pp. 101227-101227
Open Access | Times Cited: 9

AI-powered malware detection with Differential Privacy for zero trust security in Internet of Things networks
Faria Nawshin, Devrim Ünal, Mohammad Hammoudeh, et al.
Ad Hoc Networks (2024) Vol. 161, pp. 103523-103523
Open Access | Times Cited: 8

Zero-trust based dynamic access control for cloud computing
Ri Wang, Li Chen, Zhang Kun, et al.
Cybersecurity (2025) Vol. 8, Iss. 1
Open Access | Times Cited: 1

Dissecting zero trust: research landscape and its implementation in IoT
Chunwen Liu, Ru Tan, Yang Wu, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 6

Securing cross-domain data access with decentralized attribute-based access control
Seyedmohammad Salehi, Carsten Rudolph, Hooman Alavizadeh, et al.
Ad Hoc Networks (2025), pp. 103807-103807
Closed Access

Patient-centric medical service matching with fine-grained access control and dynamic user management
Shu Wu, Aiqing Zhang, Ya Gao, et al.
Computer Standards & Interfaces (2024) Vol. 89, pp. 103833-103833
Closed Access | Times Cited: 4

A Review of Artificial Intelligence Techniques for Improved Cloud and IoT Security
Kassim Kalinaki, Wasswa Shafik, Magezi Masha, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 38-68
Closed Access | Times Cited: 1

A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments
Siwei Li, Hui Zhang, Hui Shi, et al.
The Journal of Supercomputing (2024) Vol. 80, Iss. 14, pp. 20682-20714
Closed Access

Adaptive Policy Learning for Connected Autonomous Vehicles Defending Malicious Access Requests by Graph Reinforcement Learning
Qian Xu, Lei Zhang, Yixiao Liu
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33477-33491
Closed Access

Intelligent Computing Making Access Control More Secure: From Cipher to Trust
Tian Wang, Weidong Fang, Mufan Ni, et al.
Lecture notes in computer science (2024), pp. 307-317
Closed Access

Risk-Aware Lightweight Data Access Control for Cloud-Assisted IIoT: A Zero-Trust Approach
Kasturi Routray, Padmalochan Bera
(2024), pp. 40-42
Closed Access

Access Control for IoT-based Big Data: a State-of-the-art Review
Tian Wang, Weidong Fang, Wuxiong Zhang
(2024), pp. 81-87
Closed Access

Verifiable Searchable Encryption Scheme with Flexible Access Control in the Cloud
Yang Li, Chungen Xu, Lei Xu, et al.
Journal of Parallel and Distributed Computing (2024), pp. 105025-105025
Closed Access

A Personal Microcomputer as an Access Control Management Platform in Road Transport
Przemysław Wójcik, Tomasz Neumann
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9770-9770
Open Access

Page 1

Scroll to top