
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Trust-aware and incentive-based offloading scheme for secure multi-party computation in Internet of Things
Oladayo Olufemi Olakanmi, Kehinde O. Odeyemi
Internet of Things (2022) Vol. 19, pp. 100527-100527
Closed Access | Times Cited: 13
Oladayo Olufemi Olakanmi, Kehinde O. Odeyemi
Internet of Things (2022) Vol. 19, pp. 100527-100527
Closed Access | Times Cited: 13
Showing 13 citing articles:
Secure Multi-Party Computation for Machine Learning: A Survey
Ian Zhou, Farzad Tofigh, Massimo Piccardi, et al.
IEEE Access (2024) Vol. 12, pp. 53881-53899
Open Access | Times Cited: 10
Ian Zhou, Farzad Tofigh, Massimo Piccardi, et al.
IEEE Access (2024) Vol. 12, pp. 53881-53899
Open Access | Times Cited: 10
Security Challenges and Performance Trade-Offs in On-Chain and Off-Chain Blockchain Storage: A Comprehensive Review
Haluk Eren, O. Karaduman, Muharrem Tuncay Gençoğlu
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 3225-3225
Open Access
Haluk Eren, O. Karaduman, Muharrem Tuncay Gençoğlu
Applied Sciences (2025) Vol. 15, Iss. 6, pp. 3225-3225
Open Access
Enhancing Privacy and Security in IoT Environments through Secure Multiparty Computation
Rik van de Haterd, Mohammed Elhajj
Proceedings of international conference on intelligent systems and new applications. (2024)
Open Access | Times Cited: 3
Rik van de Haterd, Mohammed Elhajj
Proceedings of international conference on intelligent systems and new applications. (2024)
Open Access | Times Cited: 3
Dynamic offloading technique for real-time edge-to-cloud computing in heterogeneous MEC–MCC and IoT devices
Sheharyar Khan, Jiangbin Zheng, Sohrab Khan, et al.
Internet of Things (2023) Vol. 24, pp. 100996-100996
Closed Access | Times Cited: 7
Sheharyar Khan, Jiangbin Zheng, Sohrab Khan, et al.
Internet of Things (2023) Vol. 24, pp. 100996-100996
Closed Access | Times Cited: 7
Bidirectional utilization of blockchain and privacy computing: Issues, progress, and challenges
Zhang Hong-wei, Wei Fan, Jinsong Wang
Journal of Network and Computer Applications (2023) Vol. 222, pp. 103795-103795
Closed Access | Times Cited: 4
Zhang Hong-wei, Wei Fan, Jinsong Wang
Journal of Network and Computer Applications (2023) Vol. 222, pp. 103795-103795
Closed Access | Times Cited: 4
Security and Privacy Issues in the Internet of Things: A Comprehensive Survey of Protocols, Standards, and the Revolutionary Role of Blockchain
Ghazaleh Shahinzadeh, Hossein Shahinzadeh, Sudeep Tanwar
(2024), pp. 59-67
Closed Access | Times Cited: 1
Ghazaleh Shahinzadeh, Hossein Shahinzadeh, Sudeep Tanwar
(2024), pp. 59-67
Closed Access | Times Cited: 1
Enhancing Privacy in Large Language Model with Homomorphic Encryption and Sparse Attention
Lexin Zhang, Changxiang Li, Qi Hu, et al.
Applied Sciences (2023) Vol. 13, Iss. 24, pp. 13146-13146
Open Access | Times Cited: 3
Lexin Zhang, Changxiang Li, Qi Hu, et al.
Applied Sciences (2023) Vol. 13, Iss. 24, pp. 13146-13146
Open Access | Times Cited: 3
Defensive strategies against PCC attacks based on ideal (t,n)-secret sharing scheme
Sijjad Ali, Jia Wang, Victor Chung Ming Leung
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101784-101784
Open Access | Times Cited: 2
Sijjad Ali, Jia Wang, Victor Chung Ming Leung
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101784-101784
Open Access | Times Cited: 2
Exploring optimal pathways for enterprise procurement management systems based on fast neural modeling and semantic segmentation
Xiaodong Wang, Xinchao Shi, Junbo Chen, et al.
Heliyon (2024) Vol. 10, Iss. 7, pp. e26474-e26474
Open Access
Xiaodong Wang, Xinchao Shi, Junbo Chen, et al.
Heliyon (2024) Vol. 10, Iss. 7, pp. e26474-e26474
Open Access
Blockchain-assisted Verifiable Secure Multi-Party Data Computing
Hongmei Pei, Peng Yang, Miao Du, et al.
Computer Networks (2024) Vol. 253, pp. 110712-110712
Closed Access
Hongmei Pei, Peng Yang, Miao Du, et al.
Computer Networks (2024) Vol. 253, pp. 110712-110712
Closed Access
AAJS: An Anti-Malicious Attack Graphic Similarity Judgment System in Cloud Computing Environments
Xin Liu, Xiaomeng Liu, Naixue Xiong, et al.
Electronics (2023) Vol. 12, Iss. 9, pp. 1983-1983
Open Access | Times Cited: 1
Xin Liu, Xiaomeng Liu, Naixue Xiong, et al.
Electronics (2023) Vol. 12, Iss. 9, pp. 1983-1983
Open Access | Times Cited: 1
Secure reputation and morphism‐based offloading scheme: A veritable tool for multi‐party computation in Industrial Internet of Things
Oladayo Olufemi Olakanmi, Kehinde O. Odeyemi
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 21
Closed Access | Times Cited: 2
Oladayo Olufemi Olakanmi, Kehinde O. Odeyemi
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 21
Closed Access | Times Cited: 2
An efficient authentication and key agreement scheme for security-aware unmanned aerial vehicles assisted data harvesting in Internet of Things
Oladayo Olufemi Olakanmi, Kehinde O. Odeyemi
Internet of Things (2023) Vol. 23, pp. 100862-100862
Closed Access
Oladayo Olufemi Olakanmi, Kehinde O. Odeyemi
Internet of Things (2023) Vol. 23, pp. 100862-100862
Closed Access