OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Robust Privacy-Preserving ECC-Based Three-Factor Authentication Scheme for Metaverse Environment
Garima Thakur, Pankaj Kumar, Chien‐Ming Chen, et al.
Computer Communications (2023) Vol. 211, pp. 271-285
Closed Access | Times Cited: 34

Showing 1-25 of 34 citing articles:

User Safety and Security in the Metaverse: A Critical Review
Saurabh Sharma, Jaiteg Singh, Ankur Gupta, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 5467-5487
Open Access | Times Cited: 13

Privacy-Centric AI and IoT Solutions for Smart Rural Farm Monitoring and Control
Mosiur Rahaman, Chun‐Yuan Lin, Princy Pappachan, et al.
Sensors (2024) Vol. 24, Iss. 13, pp. 4157-4157
Open Access | Times Cited: 13

A privacy-preserving three-factor authentication system for IoT-enabled wireless sensor networks
Garima Thakur, Sunil Prajapat, Pankaj Kumar, et al.
Journal of Systems Architecture (2024) Vol. 154, pp. 103245-103245
Closed Access | Times Cited: 11

Space Authentication in the Metaverse: A Blockchain-Based User-Centric Approach
Jungwon Seo, Hankyeong Ko, Sooyong Park
IEEE Access (2024) Vol. 12, pp. 18703-18713
Open Access | Times Cited: 7

Avatar Privacy Challenges in the Metaverse: A Comprehensive Review and Future Directions
Somaya Eltanbouly, Osama Halabi, Junaid Qadir
International Journal of Human-Computer Interaction (2024), pp. 1-18
Closed Access | Times Cited: 7

Blockchain Assisted Intra-Twin and Inter-Twin Authentication Scheme for Vehicular Digital Twin System
Deepika Gautam, Garima Thakur, Pankaj Kumar, et al.
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 10, pp. 15002-15015
Closed Access | Times Cited: 5

Secure and privacy-preserving quantum authentication scheme using blockchain identifiers in metaverse environment
Sunil Prajapat, Aryan Rana, Pankaj Kumar, et al.
Journal of Systems Architecture (2025), pp. 103329-103329
Closed Access

Introduction of cyber security with metaverse: Challenges and applications
Shantanu Bindewari, Abhinav Raghav, Rajeev Tiwari
Elsevier eBooks (2025), pp. 139-164
Closed Access

SC-VDTwinAuth: Smart-Contract Assisted Handover Authentication Protocol for Vehicular Digital Twin Network
Deepika Gautam, Garima Thakur, Sunil Prajapat, et al.
Vehicular Communications (2025) Vol. 53, pp. 100890-100890
Closed Access

Efficient post-quantum attribute-based access control scheme for blockchain-empowered metaverse data management
Yuxuan Pan, Rui Jin, Yu Liu, et al.
Computer Communications (2025), pp. 108092-108092
Closed Access

An efficient provably secure authentication and key agreement protocol for satellite communication networks
Garima Thakur, Mohammad S. Obaidat, Piyush Sharma, et al.
Security and Privacy (2024) Vol. 7, Iss. 5
Closed Access | Times Cited: 3

A seamless authentication for intra and inter metaverse platforms using blockchain
Sarra Jebri, Arij Ben Amor, Salah Zidi
Computer Networks (2024) Vol. 247, pp. 110460-110460
Closed Access | Times Cited: 3

A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing
Wenlong Zhu, Xinzhang Chen, Linmei Jiang
Alexandria Engineering Journal (2024) Vol. 101, pp. 52-61
Open Access | Times Cited: 3

A blockchain-assisted privacy-preserving signature scheme using quantum teleportation for metaverse environment in Web 3.0
Sunil Prajapat, Garima Thakur, Pankaj Kumar, et al.
Future Generation Computer Systems (2024) Vol. 164, pp. 107581-107581
Closed Access | Times Cited: 3

Exploring the Metaverse as the next frontier for a living library experience
Yunze Liu, Hasan Tınmaz
Library Hi Tech News (2024)
Closed Access | Times Cited: 2

SAKM-ITS: Secure Authentication and Key Management Protocol Concerning Intelligent Transportation Systems
Praneetha Surapaneni, Sriramulu Bojjagani
Lecture notes in networks and systems (2024), pp. 249-264
Closed Access | Times Cited: 2

Quantum-safe blockchain-assisted data encryption protocol for internet of things networks
Sunil Prajapat, Neeraj Kumar, Ashok Kumar Das, et al.
Cluster Computing (2024) Vol. 28, Iss. 1
Closed Access | Times Cited: 2

A provably secure authenticated key agreement protocol for industrial sensor network system
Garima Thakur, Mohammad S. Obaidat, Piyush Sharma, et al.
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 23
Open Access | Times Cited: 2

A probably secure biometric‐based authentication and key agreement scheme for Internet of Drones
Deepika Gautam, Aryan Rana, Mohammad S. Obaidat, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 35, Iss. 1
Closed Access | Times Cited: 6

On the Privacy and Security for E-Education Metaverse
Sofia Sakka, Vasiliki Liagkou, Chrysostomos Stylios, et al.
2022 IEEE Global Engineering Education Conference (EDUCON) (2024), pp. 1-10
Open Access | Times Cited: 1

A robust ECC based authentication protocol for satellite-to-satellite communication network
Deepika Gautam, Shoraya Kanwar, Sunil Prajapat, et al.
Telecommunication Systems (2024) Vol. 87, Iss. 3, pp. 541-559
Closed Access | Times Cited: 1

FedCPD: A Federated Learning Algorithm for Processing and Securing Distributed Heterogeneous Data in the Metaverse
Le Sun, Zhimeng Zhang, Ghulam Muhammad
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 5540-5551
Open Access | Times Cited: 1

Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
Guojun Wang, Qi Liu
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 3, pp. 4471-4488
Open Access

Elliptic Curve Cryptography-Based Identity Authentication Scheme Suitable for Metaverse Environment
Haonan Zhai, Miaolei Deng, Huanmei Wu
Symmetry (2024) Vol. 16, Iss. 7, pp. 891-891
Open Access

Fault-tolerant security-efficiency combined authentication scheme for manned-unmanned teaming
Hanlin Yang, Guo Ya-jun, Yimin Guo
Computers & Security (2024) Vol. 146, pp. 104052-104052
Closed Access

Page 1 - Next Page

Scroll to top