
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Mutual authentication scheme for smart devices in IoT-enabled smart home systems
Qingru Ma, Haowen Tan, Tianqi Zhou
Computer Standards & Interfaces (2023) Vol. 86, pp. 103743-103743
Closed Access | Times Cited: 15
Qingru Ma, Haowen Tan, Tianqi Zhou
Computer Standards & Interfaces (2023) Vol. 86, pp. 103743-103743
Closed Access | Times Cited: 15
Showing 15 citing articles:
Technological advancements toward smart energy management in smart cities
P. Pandiyan, Subramanian Saravanan, Usha Kothandaraman, et al.
Energy Reports (2023) Vol. 10, pp. 648-677
Open Access | Times Cited: 96
P. Pandiyan, Subramanian Saravanan, Usha Kothandaraman, et al.
Energy Reports (2023) Vol. 10, pp. 648-677
Open Access | Times Cited: 96
A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
Mohammad Kamrul Hasan, Zhou Weichen, Nurhizam Safie, et al.
IEEE Access (2024) Vol. 12, pp. 61642-61666
Open Access | Times Cited: 27
Mohammad Kamrul Hasan, Zhou Weichen, Nurhizam Safie, et al.
IEEE Access (2024) Vol. 12, pp. 61642-61666
Open Access | Times Cited: 27
A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things
Yimin Guo, Ya-Jun Guo, Ping Xiong, et al.
Pervasive and Mobile Computing (2024) Vol. 98, pp. 101877-101877
Closed Access | Times Cited: 5
Yimin Guo, Ya-Jun Guo, Ping Xiong, et al.
Pervasive and Mobile Computing (2024) Vol. 98, pp. 101877-101877
Closed Access | Times Cited: 5
The Power of Patents: Leveraging Text Mining and Social Network Analysis to Forecast Iot Trends
Mehrdad Maghsoudi, Reza Nourbakhsh, Mehrdad Ali Kermani, et al.
(2025)
Open Access
Mehrdad Maghsoudi, Reza Nourbakhsh, Mehrdad Ali Kermani, et al.
(2025)
Open Access
A Novel Pyra-Cryptosystem Relying Secure Light-Weight Data Exchange, Peer-to-Peer Authentication, and Secure Communication Session Key Management Approach-Based Model for Internet of Things Network Security
Ankit Attkan, Priyanka Ahlawat, Virender Ranga
SN Computer Science (2025) Vol. 6, Iss. 1
Closed Access
Ankit Attkan, Priyanka Ahlawat, Virender Ranga
SN Computer Science (2025) Vol. 6, Iss. 1
Closed Access
IoT Based Smart Home Systems
Akshet Patel, Shrey Sharma, Princy Randhawa
(2025), pp. 277-293
Closed Access
Akshet Patel, Shrey Sharma, Princy Randhawa
(2025), pp. 277-293
Closed Access
A Review of Lightweight IoT Authentication Protocols from the Perspective of Security Requirements, Computation, Communication, and Hardware Costs
Işıl Çetintav, Mehmet Tahir Sandıkkaya
IEEE Access (2025) Vol. 13, pp. 37703-37723
Open Access
Işıl Çetintav, Mehmet Tahir Sandıkkaya
IEEE Access (2025) Vol. 13, pp. 37703-37723
Open Access
Behavioral Dynamics of Smart Home Adoption: A PLS‐SEM Study in Emerging Markets
Bora Ly, Romny Ly, Suli Ma
Human Behavior and Emerging Technologies (2025) Vol. 2025, Iss. 1
Open Access
Bora Ly, Romny Ly, Suli Ma
Human Behavior and Emerging Technologies (2025) Vol. 2025, Iss. 1
Open Access
Three-factor authentication and key agreement protocol with collusion resistance in VANETs
G.Q. Pan, Haowen Tan, Wenying Zheng, et al.
Journal of Information Security and Applications (2025) Vol. 90, pp. 104029-104029
Closed Access
G.Q. Pan, Haowen Tan, Wenying Zheng, et al.
Journal of Information Security and Applications (2025) Vol. 90, pp. 104029-104029
Closed Access
Computation Cost-Driven Offloading Strategy Based on Reinforcement Learning for Consumer Devices
Rui Zhang, Hui Xia, Zijun Chen, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 4120-4131
Closed Access | Times Cited: 3
Rui Zhang, Hui Xia, Zijun Chen, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 4120-4131
Closed Access | Times Cited: 3
A novel methodology for anomaly detection in smart home networks via Fractional Stochastic Gradient Descent
Abhishek Bajpai, Divyansh Chaurasia, Naveen Kumar Tiwari
Computers & Electrical Engineering (2024) Vol. 119, pp. 109604-109604
Closed Access | Times Cited: 1
Abhishek Bajpai, Divyansh Chaurasia, Naveen Kumar Tiwari
Computers & Electrical Engineering (2024) Vol. 119, pp. 109604-109604
Closed Access | Times Cited: 1
Authentication scheme based on blockchain and Proof-of-Work for IoT
Ines Adjeroud, Sarra Cherbal, Chahrazed Benrebbouh, et al.
(2024) Vol. 9, pp. 1-8
Closed Access | Times Cited: 1
Ines Adjeroud, Sarra Cherbal, Chahrazed Benrebbouh, et al.
(2024) Vol. 9, pp. 1-8
Closed Access | Times Cited: 1
MRFM: A timely detection method for DDoS attacks in IoT with multidimensional reconstruction and function mapping
Lixia Xie, Bingdi Yuan, Hongyu Yang, et al.
Computer Standards & Interfaces (2023) Vol. 89, pp. 103829-103829
Closed Access | Times Cited: 2
Lixia Xie, Bingdi Yuan, Hongyu Yang, et al.
Computer Standards & Interfaces (2023) Vol. 89, pp. 103829-103829
Closed Access | Times Cited: 2
Exploring Reciprocal Exchanges and Trust-Based Authorizations: A Feasibility Demonstration with Location-Based Services
Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm
Lecture notes in computer science (2024), pp. 27-67
Closed Access
Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm
Lecture notes in computer science (2024), pp. 27-67
Closed Access
Intelligent shoe cabinet system based on multiple sensors
Yanqun Cui, Chuan Zhang, Ruiqi Li
(2024), pp. 22-22
Closed Access
Yanqun Cui, Chuan Zhang, Ruiqi Li
(2024), pp. 22-22
Closed Access
Mrfm: A Timely Detection Method for Ddos Attacks in Iot with Multidimensional Reconstruction and Function Mapping
Lixia Xie, Bingdi Yuan, Hongyu Yang, et al.
(2023)
Closed Access | Times Cited: 1
Lixia Xie, Bingdi Yuan, Hongyu Yang, et al.
(2023)
Closed Access | Times Cited: 1
Evaluation the Robustness of Iot Intrusion Detection Models in Adversarial Attack Environments
Xiaoting Che, Hongtu Li, Ling Chi, et al.
(2023)
Closed Access
Xiaoting Che, Hongtu Li, Ling Chi, et al.
(2023)
Closed Access
Designing A WSNs-based Smart Home Monitoring System through Deep Reinforcement Learning
Ahmad Taqwa, Indra Griha Tofik Isa, Indri Ariyanti
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (2023) Vol. 7, Iss. 5, pp. 1224-1232
Open Access
Ahmad Taqwa, Indra Griha Tofik Isa, Indri Ariyanti
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) (2023) Vol. 7, Iss. 5, pp. 1224-1232
Open Access