
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Efficient yet robust biometric iris matching on smart cards for data high security and privacy
Nadia Nedjah, Rafael Soares Wyant, Luiza de Macedo Mourelle, et al.
Future Generation Computer Systems (2017) Vol. 76, pp. 18-32
Closed Access | Times Cited: 27
Nadia Nedjah, Rafael Soares Wyant, Luiza de Macedo Mourelle, et al.
Future Generation Computer Systems (2017) Vol. 76, pp. 18-32
Closed Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
Iris based cancelable biometric cryptosystem for secure healthcare smart card
Firdous Kausar
Egyptian Informatics Journal (2021) Vol. 22, Iss. 4, pp. 447-453
Open Access | Times Cited: 26
Firdous Kausar
Egyptian Informatics Journal (2021) Vol. 22, Iss. 4, pp. 447-453
Open Access | Times Cited: 26
A Survey on Contactless Smart Cards and Payment System
Brij B. Gupta, Shaifali Narayan
Journal of Global Information Management (2020) Vol. 28, Iss. 4, pp. 135-159
Open Access | Times Cited: 27
Brij B. Gupta, Shaifali Narayan
Journal of Global Information Management (2020) Vol. 28, Iss. 4, pp. 135-159
Open Access | Times Cited: 27
Security of facial biometric authentication for attendance system
Vera Wati, Kusrini Kusrini, Hanif Al Fatta, et al.
Multimedia Tools and Applications (2021) Vol. 80, Iss. 15, pp. 23625-23646
Closed Access | Times Cited: 20
Vera Wati, Kusrini Kusrini, Hanif Al Fatta, et al.
Multimedia Tools and Applications (2021) Vol. 80, Iss. 15, pp. 23625-23646
Closed Access | Times Cited: 20
Efficient fingerprint matching on smart cards for high security and privacy in smart systems
Nadia Nedjah, Rafael Soares Wyant, Luiza de Macedo Mourelle, et al.
Information Sciences (2017) Vol. 479, pp. 622-639
Closed Access | Times Cited: 26
Nadia Nedjah, Rafael Soares Wyant, Luiza de Macedo Mourelle, et al.
Information Sciences (2017) Vol. 479, pp. 622-639
Closed Access | Times Cited: 26
Mobile Match on Card Active Authentication Using Touchscreen Biometric
Sepehr Keykhaie, Samuel Pierre
IEEE Transactions on Consumer Electronics (2020) Vol. 66, Iss. 4, pp. 376-385
Closed Access | Times Cited: 15
Sepehr Keykhaie, Samuel Pierre
IEEE Transactions on Consumer Electronics (2020) Vol. 66, Iss. 4, pp. 376-385
Closed Access | Times Cited: 15
A taxonomy of various attacks on smart card–based applications and countermeasures
Brij B. Gupta, Megha Quamara
Concurrency and Computation Practice and Experience (2018) Vol. 33, Iss. 7, pp. 1-1
Closed Access | Times Cited: 16
Brij B. Gupta, Megha Quamara
Concurrency and Computation Practice and Experience (2018) Vol. 33, Iss. 7, pp. 1-1
Closed Access | Times Cited: 16
Biometric touchstroke authentication by fuzzy proximity of touch locations
Orcan Alpar
Future Generation Computer Systems (2018) Vol. 86, pp. 71-80
Closed Access | Times Cited: 13
Orcan Alpar
Future Generation Computer Systems (2018) Vol. 86, pp. 71-80
Closed Access | Times Cited: 13
Automatic keyphrase extraction using word embeddings
Yuxiang Zhang, Huan Liu, Suge Wang, et al.
Soft Computing (2019) Vol. 24, Iss. 8, pp. 5593-5608
Closed Access | Times Cited: 12
Yuxiang Zhang, Huan Liu, Suge Wang, et al.
Soft Computing (2019) Vol. 24, Iss. 8, pp. 5593-5608
Closed Access | Times Cited: 12
Password based authentication for web based graphics computing services retrieval in cloud
Eman S. Alkhalifah
Multimedia Tools and Applications (2024) Vol. 83, Iss. 36, pp. 84357-84379
Closed Access | Times Cited: 1
Eman S. Alkhalifah
Multimedia Tools and Applications (2024) Vol. 83, Iss. 36, pp. 84357-84379
Closed Access | Times Cited: 1
A Key-Based Mutual Authentication Framework for Mobile Contactless Payment System Using Authentication Server
Brij B. Gupta, Shaifali Narayan
Journal of Organizational and End User Computing (2020) Vol. 33, Iss. 2, pp. 1-16
Open Access | Times Cited: 8
Brij B. Gupta, Shaifali Narayan
Journal of Organizational and End User Computing (2020) Vol. 33, Iss. 2, pp. 1-16
Open Access | Times Cited: 8
Lightweight and Secure Face-based Active Authentication for Mobile Users
Sepehr Keykhaie, Samuel Pierre
IEEE Transactions on Mobile Computing (2021), pp. 1-1
Closed Access | Times Cited: 8
Sepehr Keykhaie, Samuel Pierre
IEEE Transactions on Mobile Computing (2021), pp. 1-1
Closed Access | Times Cited: 8
Design Recommendations for Gate Security Systems and Health Status: A Systematic Review
Abdullah M. Almuhaideb, Mariam Elhussein, Reem Osman, et al.
IEEE Access (2023) Vol. 11, pp. 131508-131520
Open Access | Times Cited: 2
Abdullah M. Almuhaideb, Mariam Elhussein, Reem Osman, et al.
IEEE Access (2023) Vol. 11, pp. 131508-131520
Open Access | Times Cited: 2
Machine Learning Methods Used in Evaluations of Secure Biometric System Components
Bilgehan Arslan, Mehtap Ülker, Şeref Sağıroğlu
2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA) (2017), pp. 448-453
Closed Access | Times Cited: 5
Bilgehan Arslan, Mehtap Ülker, Şeref Sağıroğlu
2021 20th IEEE International Conference on Machine Learning and Applications (ICMLA) (2017), pp. 448-453
Closed Access | Times Cited: 5
A privacy-preserving multi-keyword search approach in cloud computing
Ahmed M. Manasrah, Mahmoud Abu Nasir, Maher Salem
Soft Computing (2019) Vol. 24, Iss. 8, pp. 5609-5631
Closed Access | Times Cited: 5
Ahmed M. Manasrah, Mahmoud Abu Nasir, Maher Salem
Soft Computing (2019) Vol. 24, Iss. 8, pp. 5609-5631
Closed Access | Times Cited: 5
3T‐FASDM: Linear discriminant analysis‐based three‐tier face anti‐spoofing detection model using support vector machine
Aditya Bakshi, Sunanda Gupta, Akhil Gupta, et al.
International Journal of Communication Systems (2020) Vol. 33, Iss. 12
Closed Access | Times Cited: 5
Aditya Bakshi, Sunanda Gupta, Akhil Gupta, et al.
International Journal of Communication Systems (2020) Vol. 33, Iss. 12
Closed Access | Times Cited: 5
An Effective Multi-Mode Iris Authentication System on a Microprocessor-FPGA Heterogeneous Platform With QC-LDPC Codes
Longyu Ma, Chiu‐Wing Sham, Chun Yan Lo, et al.
IEEE Access (2021) Vol. 9, pp. 163665-163674
Open Access | Times Cited: 5
Longyu Ma, Chiu‐Wing Sham, Chun Yan Lo, et al.
IEEE Access (2021) Vol. 9, pp. 163665-163674
Open Access | Times Cited: 5
Recent advances in security and privacy in Social Big Data
Jun Zhang, Aniello Castiglione, Laurence Tianruno Yang, et al.
Future Generation Computer Systems (2018) Vol. 87, pp. 686-687
Closed Access | Times Cited: 4
Jun Zhang, Aniello Castiglione, Laurence Tianruno Yang, et al.
Future Generation Computer Systems (2018) Vol. 87, pp. 686-687
Closed Access | Times Cited: 4
Utilizing Multimodal Data for Diagnosis of Kawasaki Disease: An AI Approach
Zhixin Li, Gang Luo, Zhixian Ji, et al.
Research Square (Research Square) (2024)
Open Access
Zhixin Li, Gang Luo, Zhixian Ji, et al.
Research Square (Research Square) (2024)
Open Access
Evaluation of efficiency of using bank smart-card in Russian financial institutions
Alexey V. Bataev, Dmitriy Rodionov, Ekaterina S. Kosonogova
2022 International Conference on Information Networking (ICOIN) (2018), pp. 589-593
Closed Access | Times Cited: 3
Alexey V. Bataev, Dmitriy Rodionov, Ekaterina S. Kosonogova
2022 International Conference on Information Networking (ICOIN) (2018), pp. 589-593
Closed Access | Times Cited: 3
Ameliorating the Accuracy & Dimensional Reduction of Multi-modal Biometrics by Deep Learning
Viswanadha Raiu, P. Vidyasree, Ashok R. Patel
IEEE Aerospace Conference (2021), pp. 1-10
Closed Access | Times Cited: 2
Viswanadha Raiu, P. Vidyasree, Ashok R. Patel
IEEE Aerospace Conference (2021), pp. 1-10
Closed Access | Times Cited: 2
A Robust Authentication System With Application Anonymity in Multiple Identity Smart Cards
Varun Prajapati, Brij B. Gupta, Brij B. Gupta
Journal of Information Technology Research (2021) Vol. 15, Iss. 1, pp. 1-21
Open Access | Times Cited: 2
Varun Prajapati, Brij B. Gupta, Brij B. Gupta
Journal of Information Technology Research (2021) Vol. 15, Iss. 1, pp. 1-21
Open Access | Times Cited: 2
Development of a clustering based fusion framework for locating the most consistent IrisCodes bits
Debanjan Sadhya, Kanjar De, Balasubramanian Raman, et al.
Information Sciences (2019) Vol. 491, pp. 1-15
Closed Access | Times Cited: 1
Debanjan Sadhya, Kanjar De, Balasubramanian Raman, et al.
Information Sciences (2019) Vol. 491, pp. 1-15
Closed Access | Times Cited: 1
Secure key agreement based on ordered biometric features
Dilara Akdoğan, Duygu Karaoğlan Altop, Albert Lévi
Computer Networks (2019) Vol. 163, pp. 106885-106885
Closed Access | Times Cited: 1
Dilara Akdoğan, Duygu Karaoğlan Altop, Albert Lévi
Computer Networks (2019) Vol. 163, pp. 106885-106885
Closed Access | Times Cited: 1
Light Weight Cryptography Based Encrypted Multiple Secret Share Creation for Biometrics Images
Elavarasi Gunasekaran, Vanitha Muthuraman
Journal of Computational and Theoretical Nanoscience (2020) Vol. 17, Iss. 12, pp. 5469-5476
Closed Access | Times Cited: 1
Elavarasi Gunasekaran, Vanitha Muthuraman
Journal of Computational and Theoretical Nanoscience (2020) Vol. 17, Iss. 12, pp. 5469-5476
Closed Access | Times Cited: 1
MULTIPLE SECRET SHARE CREATION SCHEME WITH ELEPHANT HERD OPTIMIZATION ALGORITHM FOR BIOMETRIC IMAGE SECURITY
Elavarasi Gunasekaran, Vanitha Muthuraman
Advances in Mathematics Scientific Journal (2021) Vol. 10, Iss. 1, pp. 443-451
Closed Access | Times Cited: 1
Elavarasi Gunasekaran, Vanitha Muthuraman
Advances in Mathematics Scientific Journal (2021) Vol. 10, Iss. 1, pp. 443-451
Closed Access | Times Cited: 1