
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Iris based cancelable biometric cryptosystem for secure healthcare smart card
Firdous Kausar
Egyptian Informatics Journal (2021) Vol. 22, Iss. 4, pp. 447-453
Open Access | Times Cited: 26
Firdous Kausar
Egyptian Informatics Journal (2021) Vol. 22, Iss. 4, pp. 447-453
Open Access | Times Cited: 26
Showing 1-25 of 26 citing articles:
Cancelable iris template based on slicing
Qianrong Zheng, Jianwen Xiang, Chao Song, et al.
Computers & Security (2025), pp. 104381-104381
Closed Access
Qianrong Zheng, Jianwen Xiang, Chao Song, et al.
Computers & Security (2025), pp. 104381-104381
Closed Access
Feature extraction and learning approaches for cancellable biometrics: A survey
Wencheng Yang, Song Wang, Jiankun Hu, et al.
CAAI Transactions on Intelligence Technology (2024) Vol. 9, Iss. 1, pp. 4-25
Open Access | Times Cited: 4
Wencheng Yang, Song Wang, Jiankun Hu, et al.
CAAI Transactions on Intelligence Technology (2024) Vol. 9, Iss. 1, pp. 4-25
Open Access | Times Cited: 4
Recurrent neural networks-guided vector-valued synchronized key exchange for secure and privacy-preserving communication in Industrial Internet of Things
Arindam Sarkar
Applied Soft Computing (2024) Vol. 161, pp. 111731-111731
Closed Access | Times Cited: 3
Arindam Sarkar
Applied Soft Computing (2024) Vol. 161, pp. 111731-111731
Closed Access | Times Cited: 3
Privacy and biometrics for smart healthcare systems: attacks, and techniques
Alec Wells, Aminu K. Bello
Information Security Journal A Global Perspective (2023) Vol. 33, Iss. 3, pp. 307-331
Open Access | Times Cited: 8
Alec Wells, Aminu K. Bello
Information Security Journal A Global Perspective (2023) Vol. 33, Iss. 3, pp. 307-331
Open Access | Times Cited: 8
Secure access microcontroller system based on fingerprint template with hyperchaotic encryption
M.A. Murillo-Escobar, R.M. López-Gutiérrez, C. Cruz-Hernández, et al.
Integration (2023) Vol. 90, pp. 27-39
Closed Access | Times Cited: 7
M.A. Murillo-Escobar, R.M. López-Gutiérrez, C. Cruz-Hernández, et al.
Integration (2023) Vol. 90, pp. 27-39
Closed Access | Times Cited: 7
A Survey on Cancellable Biometrics Techniques
Sarvesh Maurya, Jyoti Bharti, Bholanath Roy
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2024), pp. 1-7
Closed Access | Times Cited: 2
Sarvesh Maurya, Jyoti Bharti, Bholanath Roy
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2024), pp. 1-7
Closed Access | Times Cited: 2
Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication
K. Suresh, Rajarshi Pal, S. R. Balasundaram
Complex & Intelligent Systems (2022) Vol. 8, Iss. 4, pp. 3247-3261
Open Access | Times Cited: 11
K. Suresh, Rajarshi Pal, S. R. Balasundaram
Complex & Intelligent Systems (2022) Vol. 8, Iss. 4, pp. 3247-3261
Open Access | Times Cited: 11
A critical review of the state of computer security in the health sector
Raúl Jáuregui-Velarde, Domingo Hernández Celis, Cesar Yactayo-Arias, et al.
Bulletin of Electrical Engineering and Informatics (2023) Vol. 12, Iss. 6, pp. 3805-3816
Open Access | Times Cited: 5
Raúl Jáuregui-Velarde, Domingo Hernández Celis, Cesar Yactayo-Arias, et al.
Bulletin of Electrical Engineering and Informatics (2023) Vol. 12, Iss. 6, pp. 3805-3816
Open Access | Times Cited: 5
Complex-valued hyperchaos-assisted vector-valued artificial neural key coordination for improving security in the Industrial Internet of Things
Tao Hai, Arindam Sarkar, Muammer Aksoy, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 128, pp. 107561-107561
Closed Access | Times Cited: 5
Tao Hai, Arindam Sarkar, Muammer Aksoy, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 128, pp. 107561-107561
Closed Access | Times Cited: 5
A zero trust architecture for health information systems
Onome Christopher Edo, David Ang, Praveen Billakota, et al.
Health and Technology (2023) Vol. 14, Iss. 1, pp. 189-199
Closed Access | Times Cited: 5
Onome Christopher Edo, David Ang, Praveen Billakota, et al.
Health and Technology (2023) Vol. 14, Iss. 1, pp. 189-199
Closed Access | Times Cited: 5
Neural session key exchange in the Industrial Internet of Things using hyperchaotic-guided vector-valued artificial neural synchronization
Tao Hai, Arindam Sarkar, Rahul Karmakar, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 125, pp. 106683-106683
Closed Access | Times Cited: 4
Tao Hai, Arindam Sarkar, Rahul Karmakar, et al.
Engineering Applications of Artificial Intelligence (2023) Vol. 125, pp. 106683-106683
Closed Access | Times Cited: 4
An investigation of healthcare professionals’ intention to use Smart Card Technology
Lario Malungana, Lovemore Motsi
South African journal of information management (2024) Vol. 26, Iss. 1
Open Access | Times Cited: 1
Lario Malungana, Lovemore Motsi
South African journal of information management (2024) Vol. 26, Iss. 1
Open Access | Times Cited: 1
Unrecognizable yet identifiable: Image distortion with preserved embeddings
Dmytro Zakharov, Alexandr Kuznetsov, Emanuele Frontoni
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109164-109164
Open Access | Times Cited: 1
Dmytro Zakharov, Alexandr Kuznetsov, Emanuele Frontoni
Engineering Applications of Artificial Intelligence (2024) Vol. 137, pp. 109164-109164
Open Access | Times Cited: 1
SCB-HC-ECC–Based Privacy Safeguard Protocol for Secure Cloud Storage of Smart Card–Based Health Care System
Sudha Senthilkumar, K. Brindha, Natalia Kryvinska, et al.
Frontiers in Public Health (2021) Vol. 9
Open Access | Times Cited: 9
Sudha Senthilkumar, K. Brindha, Natalia Kryvinska, et al.
Frontiers in Public Health (2021) Vol. 9
Open Access | Times Cited: 9
SOK: Evaluating Privacy and Security Vulnerabilities of Patients’ Data in Healthcare
Faiza Tazi, Josiah Dykstra, Prashanth Rajivan, et al.
Lecture notes in computer science (2022), pp. 153-181
Closed Access | Times Cited: 6
Faiza Tazi, Josiah Dykstra, Prashanth Rajivan, et al.
Lecture notes in computer science (2022), pp. 153-181
Closed Access | Times Cited: 6
Performance Analysis of Authentication system: A Systematic Literature Review
Divya Singla, Neetu Verma
Research Square (Research Square) (2023)
Open Access | Times Cited: 2
Divya Singla, Neetu Verma
Research Square (Research Square) (2023)
Open Access | Times Cited: 2
An Effective Multi-Mode Iris Authentication System on a Microprocessor-FPGA Heterogeneous Platform With QC-LDPC Codes
Longyu Ma, Chiu‐Wing Sham, Chun Yan Lo, et al.
IEEE Access (2021) Vol. 9, pp. 163665-163674
Open Access | Times Cited: 5
Longyu Ma, Chiu‐Wing Sham, Chun Yan Lo, et al.
IEEE Access (2021) Vol. 9, pp. 163665-163674
Open Access | Times Cited: 5
Unrecognizable Yet Identifiable: Image Distortion with Preserved Embeddings
Dmytro Zakharov, Alexandr Kuznetsov, Emanuele Frontoni
(2024)
Open Access
Dmytro Zakharov, Alexandr Kuznetsov, Emanuele Frontoni
(2024)
Open Access
Hyperchaotic-Based Neural Synchronized Complex Key Exchange in Wireless Sensor Network
Mohammad Zubair Khan
Arabian Journal for Science and Engineering (2023) Vol. 48, Iss. 8, pp. 10285-10297
Closed Access | Times Cited: 1
Mohammad Zubair Khan
Arabian Journal for Science and Engineering (2023) Vol. 48, Iss. 8, pp. 10285-10297
Closed Access | Times Cited: 1
Performance Analysis of Authentication System: A Systematic Literature Review
Divya Singla, Neetu Verma
Recent Advances in Computer Science and Communications (2023) Vol. 17, Iss. 7
Open Access | Times Cited: 1
Divya Singla, Neetu Verma
Recent Advances in Computer Science and Communications (2023) Vol. 17, Iss. 7
Open Access | Times Cited: 1
Biometric Cloud Services for Web-Based Examinations
Meennapa Rukhiran, Sorapak Pukdesree, Paniti Netinant
International Journal of Information Technology and Web Engineering (2022) Vol. 17, Iss. 1, pp. 1-25
Open Access | Times Cited: 2
Meennapa Rukhiran, Sorapak Pukdesree, Paniti Netinant
International Journal of Information Technology and Web Engineering (2022) Vol. 17, Iss. 1, pp. 1-25
Open Access | Times Cited: 2
Hiding Iris Biological Features with Encryption
Jun Gu, Heng Zhang, Yiming Lu, et al.
2021 International Conference on Security, Pattern Analysis, and Cybernetics(SPAC) (2021), pp. 501-505
Closed Access | Times Cited: 2
Jun Gu, Heng Zhang, Yiming Lu, et al.
2021 International Conference on Security, Pattern Analysis, and Cybernetics(SPAC) (2021), pp. 501-505
Closed Access | Times Cited: 2
Cancelable Face Biometric Verfication Algorithm Built on GoogLeNet and Characteristic Arbitrary Projection
Hiba Basim Alwan, Ahmed Hamid Ahmed, Ku Ruhana Ku‐Mahamud
(2022), pp. 44-48
Closed Access | Times Cited: 1
Hiba Basim Alwan, Ahmed Hamid Ahmed, Ku Ruhana Ku‐Mahamud
(2022), pp. 44-48
Closed Access | Times Cited: 1
Beneficios de sistemas biométricos basados en lectura de Iris
Álvaro Visitación Moreno, Fabio Mogollón Reyes, Alberto Carlos Mendoza de los Santos
Perfiles de Ingeniería (2023) Vol. 18, Iss. 18, pp. 51-66
Open Access
Álvaro Visitación Moreno, Fabio Mogollón Reyes, Alberto Carlos Mendoza de los Santos
Perfiles de Ingeniería (2023) Vol. 18, Iss. 18, pp. 51-66
Open Access
Community oriented socio-behavioural PentaPlicative Cipher Technique
Siya Garg, Vinita Jindal, Harshit Bhatia, et al.
Egyptian Informatics Journal (2023) Vol. 24, Iss. 1, pp. 71-80
Open Access
Siya Garg, Vinita Jindal, Harshit Bhatia, et al.
Egyptian Informatics Journal (2023) Vol. 24, Iss. 1, pp. 71-80
Open Access