
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Covert channels in blockchain and blockchain based covert communication: Overview, state-of-the-art, and future directions
Tao Zhang, Bingyu Li, Yan Zhu, et al.
Computer Communications (2023) Vol. 205, pp. 136-146
Closed Access | Times Cited: 22
Tao Zhang, Bingyu Li, Yan Zhu, et al.
Computer Communications (2023) Vol. 205, pp. 136-146
Closed Access | Times Cited: 22
Showing 22 citing articles:
Privacy-Preserving Covert Channels in VoLTE via Inter-Frame Delay Modulation
Xianguo Wu, Xuan Sun, Jiaxin Huang, et al.
Lecture notes in computer science (2025), pp. 74-88
Closed Access
Xianguo Wu, Xuan Sun, Jiaxin Huang, et al.
Lecture notes in computer science (2025), pp. 74-88
Closed Access
Exploring Embedded Content in the Ethereum Blockchain: Data Restoration and Analysis
Mingdong Tang, Xingyu Feng, Weili Chen
Communications in computer and information science (2025), pp. 81-94
Closed Access
Mingdong Tang, Xingyu Feng, Weili Chen
Communications in computer and information science (2025), pp. 81-94
Closed Access
BlockWhisper: A Blockchain-Based Hybrid Covert Communication Scheme with Strong Ability to Evade Detection
Zehui Wu, Yuwei Xu, Ranfeng Huang, et al.
Lecture notes in computer science (2025), pp. 161-181
Closed Access
Zehui Wu, Yuwei Xu, Ranfeng Huang, et al.
Lecture notes in computer science (2025), pp. 161-181
Closed Access
Amount-Based Covert Communication Over Blockchain
Yang Tian, Xin Liao, Li Dong, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 3, pp. 3095-3111
Closed Access | Times Cited: 4
Yang Tian, Xin Liao, Li Dong, et al.
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 3, pp. 3095-3111
Closed Access | Times Cited: 4
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems
Zhuo Chen, Liehuang Zhu, Peng Jiang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3380-3394
Closed Access | Times Cited: 4
Zhuo Chen, Liehuang Zhu, Peng Jiang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 3380-3394
Closed Access | Times Cited: 4
A Blockchain-Enabled Group Covert Channel against Transaction Forgery
Tongzhou Shen, Liehuang Zhu, Feng Gao, et al.
Mathematics (2024) Vol. 12, Iss. 2, pp. 251-251
Open Access | Times Cited: 3
Tongzhou Shen, Liehuang Zhu, Feng Gao, et al.
Mathematics (2024) Vol. 12, Iss. 2, pp. 251-251
Open Access | Times Cited: 3
Privacy Evaluation of Blockchain Based Privacy Cryptocurrencies: A Comparative Analysis of Dash, Monero, Verge, Zcash, and Grin
Tao Zhang
IEEE Transactions on Sustainable Computing (2023) Vol. 8, Iss. 4, pp. 574-582
Closed Access | Times Cited: 9
Tao Zhang
IEEE Transactions on Sustainable Computing (2023) Vol. 8, Iss. 4, pp. 574-582
Closed Access | Times Cited: 9
Covert communication via blockchain: Hiding patterns and communication patterns
Tao Zhang, Qianhong Wu, Qin Wang, et al.
Computer Standards & Interfaces (2024) Vol. 90, pp. 103851-103851
Closed Access | Times Cited: 2
Tao Zhang, Qianhong Wu, Qin Wang, et al.
Computer Standards & Interfaces (2024) Vol. 90, pp. 103851-103851
Closed Access | Times Cited: 2
Logistics Model Based on Smart Contracts on Blockchain and IoT
Veneta Aleksieva, Hristo Valchanov, Aydan Haka, et al.
(2023), pp. 8-8
Open Access | Times Cited: 5
Veneta Aleksieva, Hristo Valchanov, Aydan Haka, et al.
(2023), pp. 8-8
Open Access | Times Cited: 5
Strengthening Maqāṣid al-Sharī’ah Values in Halal Traceability: Evidence and Analysis of Block Chain Based on Halal Supply Chain Applications
Muh. Nashirudin, Ramadhan Ramadhan, Almira Keumala Ulfah
Al-Manahij Jurnal Kajian Hukum Islam (2024), pp. 95-108
Open Access | Times Cited: 1
Muh. Nashirudin, Ramadhan Ramadhan, Almira Keumala Ulfah
Al-Manahij Jurnal Kajian Hukum Islam (2024), pp. 95-108
Open Access | Times Cited: 1
A Review on Network Covert Channel Construction and Attack Detection
Mrinal Khadse, Dhananjay M. Dakhane
Concurrency and Computation Practice and Experience (2024)
Open Access | Times Cited: 1
Mrinal Khadse, Dhananjay M. Dakhane
Concurrency and Computation Practice and Experience (2024)
Open Access | Times Cited: 1
SPYIPv6: Locating Covert Data in One or a Combination of IPv6 Header Field(s)
Punam Bedi, Vinita Jindal, Arti Dua
IEEE Access (2023) Vol. 11, pp. 103486-103501
Closed Access | Times Cited: 3
Punam Bedi, Vinita Jindal, Arti Dua
IEEE Access (2023) Vol. 11, pp. 103486-103501
Closed Access | Times Cited: 3
Blockchain Security Mechanism Design Based on Chinese Cryptosystem SM2 Algorithm
Lu Meng, Zeyao Liu
Mathematics (2023) Vol. 11, Iss. 14, pp. 3036-3036
Open Access | Times Cited: 2
Lu Meng, Zeyao Liu
Mathematics (2023) Vol. 11, Iss. 14, pp. 3036-3036
Open Access | Times Cited: 2
An integrated model for evaluating the risk factors of crypto-currencies under fuzzy environment
Merve Bulut, Mehmet Erkin Uyar, Evrencan Özcan
Engineering Applications of Artificial Intelligence (2024) Vol. 134, pp. 108650-108650
Closed Access
Merve Bulut, Mehmet Erkin Uyar, Evrencan Özcan
Engineering Applications of Artificial Intelligence (2024) Vol. 134, pp. 108650-108650
Closed Access
A Generic Blockchain-based Steganography Framework with High Capacity via Reversible GAN
Zhuo Chen, Liehuang Zhu, Peng Jiang, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2024), pp. 241-250
Closed Access
Zhuo Chen, Liehuang Zhu, Peng Jiang, et al.
IEEE INFOCOM 2022 - IEEE Conference on Computer Communications (2024), pp. 241-250
Closed Access
Bcdh: Blockchain-Based Covert Elliptic-Curve Diffie-Hellman Key Exchange Scheme
Qinghua Hu, Chunxiang Xu, Wanpeng Li
(2024)
Closed Access
Qinghua Hu, Chunxiang Xu, Wanpeng Li
(2024)
Closed Access
Optimizing the SM4 Encryption Algorithm for Blockchain Security
Xiaomeng Hu, Haibo Yi, Wenyu Zhang, et al.
Communications in computer and information science (2024), pp. 31-45
Closed Access
Xiaomeng Hu, Haibo Yi, Wenyu Zhang, et al.
Communications in computer and information science (2024), pp. 31-45
Closed Access
Research on Convergence Media Ecological Model Based on Blockchain
Hongbin Hu, Yongbin Wang, Guohui Song
Systems (2024) Vol. 12, Iss. 9, pp. 381-381
Open Access
Hongbin Hu, Yongbin Wang, Guohui Song
Systems (2024) Vol. 12, Iss. 9, pp. 381-381
Open Access
Embedding Data in Bitcoin Transaction Values with Restricted Boltzmann Machine
Jubai An, Haibo Tian
Lecture notes in computer science (2024), pp. 21-38
Closed Access
Jubai An, Haibo Tian
Lecture notes in computer science (2024), pp. 21-38
Closed Access
Integration of Blockchain and Fog Computing—A Review
Nirbeh Kaur, Shubham Kumar, Ritik Kumar, et al.
Lecture notes in networks and systems (2024), pp. 781-795
Closed Access
Nirbeh Kaur, Shubham Kumar, Ritik Kumar, et al.
Lecture notes in networks and systems (2024), pp. 781-795
Closed Access
DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment
Yuwei Xu, Zehui Wu, Jie Cao, et al.
(2023)
Closed Access | Times Cited: 1
Yuwei Xu, Zehui Wu, Jie Cao, et al.
(2023)
Closed Access | Times Cited: 1