
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Collusion resistant secret sharing scheme for secure data storage and processing over cloud
V. S. Lakshmi, Sneha Deepthi, Deepthi P. P
Journal of Information Security and Applications (2021) Vol. 60, pp. 102869-102869
Closed Access | Times Cited: 15
V. S. Lakshmi, Sneha Deepthi, Deepthi P. P
Journal of Information Security and Applications (2021) Vol. 60, pp. 102869-102869
Closed Access | Times Cited: 15
Showing 15 citing articles:
Privacy-preserving candidate assessment and selection frameworks in e-recruitment system
Gaurav Baranwal, Anubhav Yadav
Journal of Information Security and Applications (2025) Vol. 90, pp. 104043-104043
Closed Access
Gaurav Baranwal, Anubhav Yadav
Journal of Information Security and Applications (2025) Vol. 90, pp. 104043-104043
Closed Access
Private and Energy-Efficient Decision Tree-Based Disease Detection for Resource-Constrained Medical Users in Mobile Healthcare Network
Sona Alex, K.J. Dhanaraj, P. P. Deepthi
IEEE Access (2022) Vol. 10, pp. 17098-17112
Open Access | Times Cited: 23
Sona Alex, K.J. Dhanaraj, P. P. Deepthi
IEEE Access (2022) Vol. 10, pp. 17098-17112
Open Access | Times Cited: 23
BO-LCNN: butterfly optimization based lightweight convolutional neural network for remote data integrity auditing and data sanitizing model
B. Judy Flavia, Balika J Chelliah
Telecommunication Systems (2024) Vol. 85, Iss. 4, pp. 623-647
Closed Access | Times Cited: 2
B. Judy Flavia, Balika J Chelliah
Telecommunication Systems (2024) Vol. 85, Iss. 4, pp. 623-647
Closed Access | Times Cited: 2
A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment
Venkata Bhikshapathi Chenam, Syed Taqi Ali
Journal of Information Security and Applications (2022) Vol. 72, pp. 103377-103377
Closed Access | Times Cited: 9
Venkata Bhikshapathi Chenam, Syed Taqi Ali
Journal of Information Security and Applications (2022) Vol. 72, pp. 103377-103377
Closed Access | Times Cited: 9
Cheating identifiable polynomial based secret sharing scheme for audio and image
Prashanti Guttikonda, M. Nirupama Bhat
Multimedia Tools and Applications (2023) Vol. 83, Iss. 1, pp. 403-423
Closed Access | Times Cited: 3
Prashanti Guttikonda, M. Nirupama Bhat
Multimedia Tools and Applications (2023) Vol. 83, Iss. 1, pp. 403-423
Closed Access | Times Cited: 3
Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage
Masahito Hayashi, Takeshi Koshiba
IEEE/ACM Transactions on Networking (2023) Vol. 32, Iss. 1, pp. 253-267
Closed Access | Times Cited: 3
Masahito Hayashi, Takeshi Koshiba
IEEE/ACM Transactions on Networking (2023) Vol. 32, Iss. 1, pp. 253-267
Closed Access | Times Cited: 3
A new secure and searchable data outsourcing leveraging a Bucket-Chain index tree
Somaye Bahrami, Reza Ghasemi
Journal of Information Security and Applications (2022) Vol. 67, pp. 103206-103206
Closed Access | Times Cited: 4
Somaye Bahrami, Reza Ghasemi
Journal of Information Security and Applications (2022) Vol. 67, pp. 103206-103206
Closed Access | Times Cited: 4
An efficient verifiable secret redistribution scheme
Bagher Bagherpour
Journal of Information Security and Applications (2022) Vol. 69, pp. 103295-103295
Closed Access | Times Cited: 4
Bagher Bagherpour
Journal of Information Security and Applications (2022) Vol. 69, pp. 103295-103295
Closed Access | Times Cited: 4
BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud
M. Pavithra, M. Prakash, V. Vennila
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
M. Pavithra, M. Prakash, V. Vennila
Journal of Cloud Computing Advances Systems and Applications (2024) Vol. 13, Iss. 1
Open Access
COMPUTAÇÃO SEGURA DE UM MODELO SIR E SIRV
Thays Rocha Neri Ferreira, Renato José Policani Borseti, Fábio Borges
(2024)
Open Access
Thays Rocha Neri Ferreira, Renato José Policani Borseti, Fábio Borges
(2024)
Open Access
RSDA: A Reliable and Secure Data Aggregation Scheme for Smart Grid
V. S. Lakshmi
Deleted Journal (2024) Vol. 20, Iss. 3, pp. 2007-2017
Open Access
V. S. Lakshmi
Deleted Journal (2024) Vol. 20, Iss. 3, pp. 2007-2017
Open Access
Energy Efficient and Secure Neural Network–based Disease Detection Framework for Mobile Healthcare Network
Sona Alex, K.J. Dhanaraj, P. P. Deepthi
ACM Transactions on Privacy and Security (2023) Vol. 26, Iss. 3, pp. 1-27
Closed Access | Times Cited: 1
Sona Alex, K.J. Dhanaraj, P. P. Deepthi
ACM Transactions on Privacy and Security (2023) Vol. 26, Iss. 3, pp. 1-27
Closed Access | Times Cited: 1
Thumbnail Secret Image Sharing in Cloud Storage
Yongqiang Yu, Xuehu Yan, Shudong Wang, et al.
Mathematics (2022) Vol. 10, Iss. 17, pp. 3076-3076
Open Access | Times Cited: 1
Yongqiang Yu, Xuehu Yan, Shudong Wang, et al.
Mathematics (2022) Vol. 10, Iss. 17, pp. 3076-3076
Open Access | Times Cited: 1
Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment
A. Ramachandran, Punyala Ramadevi, Ahmed Alkhayyat, et al.
Intelligent Automation & Soft Computing (2023) Vol. 36, Iss. 2, pp. 2055-2070
Open Access
A. Ramachandran, Punyala Ramadevi, Ahmed Alkhayyat, et al.
Intelligent Automation & Soft Computing (2023) Vol. 36, Iss. 2, pp. 2055-2070
Open Access
Additive Congruential Kupyna Koorde Cryptographic Hashfor Secured Data Storage in Cloud
P. V. Shakira, Laxmi Raja
Lecture notes in networks and systems (2023), pp. 747-763
Closed Access
P. V. Shakira, Laxmi Raja
Lecture notes in networks and systems (2023), pp. 747-763
Closed Access
Bgnba-oco Based Privacy Preserving Attribute Based Access Control With Data Duplication for Secure Storage in Cloud
M. Pavithra, M. Prakash, V. Vennila
Research Square (Research Square) (2023)
Open Access
M. Pavithra, M. Prakash, V. Vennila
Research Square (Research Square) (2023)
Open Access