
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A systematic literature review of attribute based encryption in health services
Raza Imam, Kaushal Kumar, Syed Mehran Raza, et al.
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 9, pp. 6743-6774
Open Access | Times Cited: 14
Raza Imam, Kaushal Kumar, Syed Mehran Raza, et al.
Journal of King Saud University - Computer and Information Sciences (2022) Vol. 34, Iss. 9, pp. 6743-6774
Open Access | Times Cited: 14
Showing 14 citing articles:
Design and Implementation of an Attribute-Based Encryption to Enhance Privacy in Federated Identity Management (FIM) Systems for Cloud Computing
Andrews Ocran
(2025), pp. 2384-2421
Closed Access
Andrews Ocran
(2025), pp. 2384-2421
Closed Access
An efficient poly-quantum integrity key generation based multi-user access control encryption and decryption framework for homogeneous and heterogeneous cloud EHR databases
Nagababu Garigipati, S Srithar, V. Krishna Reddy
Information Security Journal A Global Perspective (2025), pp. 1-21
Closed Access
Nagababu Garigipati, S Srithar, V. Krishna Reddy
Information Security Journal A Global Perspective (2025), pp. 1-21
Closed Access
Optimized Encryption-Integrated Strategy for Containers Scheduling and Secure Migration in Multi-Cloud Data Centers
Mohammad A. Altahat, Tariq Daradkeh, Anjali Agarwal
IEEE Access (2024) Vol. 12, pp. 51330-51345
Open Access | Times Cited: 3
Mohammad A. Altahat, Tariq Daradkeh, Anjali Agarwal
IEEE Access (2024) Vol. 12, pp. 51330-51345
Open Access | Times Cited: 3
A Review of Functional Encryption in IoT Applications
Khurram Shahzad, Tanveer Zia, Emad-ul-Haq Qazi
Sensors (2022) Vol. 22, Iss. 19, pp. 7567-7567
Open Access | Times Cited: 14
Khurram Shahzad, Tanveer Zia, Emad-ul-Haq Qazi
Sensors (2022) Vol. 22, Iss. 19, pp. 7567-7567
Open Access | Times Cited: 14
RETRACTED: Enhancing online health consultations through fuzzy logic-integrated attribute-based encryption system
Haewon Byeon, Manoj Ram Tammina, Mukesh Soni, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 4, pp. 7677-7695
Closed Access | Times Cited: 1
Haewon Byeon, Manoj Ram Tammina, Mukesh Soni, et al.
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 4, pp. 7677-7695
Closed Access | Times Cited: 1
Optimizing Brain Tumor Classification: A Comprehensive Study on Transfer Learning and Imbalance Handling in Deep Learning Models
Raza Imam, Mohammed Talha Alam
Lecture notes in computer science (2024), pp. 74-88
Closed Access | Times Cited: 1
Raza Imam, Mohammed Talha Alam
Lecture notes in computer science (2024), pp. 74-88
Closed Access | Times Cited: 1
A systematic literature review on software security testing using metaheuristics
Fatma Ahsan, Faisal Anwer
Automated Software Engineering (2024) Vol. 31, Iss. 2
Closed Access | Times Cited: 1
Fatma Ahsan, Faisal Anwer
Automated Software Engineering (2024) Vol. 31, Iss. 2
Closed Access | Times Cited: 1
A Privacy-Preserving Friend Matching Scheme Based on Attribute Encryption in Mobile Social Networks
Yu Li, Xingxing Nan, Shufen Niu
Electronics (2024) Vol. 13, Iss. 11, pp. 2175-2175
Open Access | Times Cited: 1
Yu Li, Xingxing Nan, Shufen Niu
Electronics (2024) Vol. 13, Iss. 11, pp. 2175-2175
Open Access | Times Cited: 1
L2-MA-CPABE: A ciphertext access control scheme integrating blockchain and off-chain computation with zero knowledge proof
Zhixin Ren, Yimin Yu, Enhua Yan, et al.
Journal of King Saud University - Computer and Information Sciences (2024), pp. 102247-102247
Open Access | Times Cited: 1
Zhixin Ren, Yimin Yu, Enhua Yan, et al.
Journal of King Saud University - Computer and Information Sciences (2024), pp. 102247-102247
Open Access | Times Cited: 1
An Efficient Encryption Scheme with Fully Hidden Access Policy for Medical Data
Moli Zhang, Feijiao Shao, Ruijuan Zheng, et al.
Electronics (2023) Vol. 12, Iss. 13, pp. 2930-2930
Open Access | Times Cited: 2
Moli Zhang, Feijiao Shao, Ruijuan Zheng, et al.
Electronics (2023) Vol. 12, Iss. 13, pp. 2930-2930
Open Access | Times Cited: 2
Telemetry data sharing based on Attribute-Based Encryption schemes for cloud-based Drone Management system
Alexandr Silonosov, Lawrence Henesey
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-8
Closed Access
Alexandr Silonosov, Lawrence Henesey
Proceedings of the 17th International Conference on Availability, Reliability and Security (2024), pp. 1-8
Closed Access
A Blockchain Identity Privacy Management Framework for a Healthcare Application
Sofia Sakka, Vasiliki Liagkou, Chrysostomos Stylios
(2024) Vol. 141, pp. 599-604
Closed Access
Sofia Sakka, Vasiliki Liagkou, Chrysostomos Stylios
(2024) Vol. 141, pp. 599-604
Closed Access
Attribute-Based Encryption for the Internet of Things: A Review
Kirti Dinkar More, Dhanya Pramod
Lecture notes in networks and systems (2024), pp. 335-358
Closed Access
Kirti Dinkar More, Dhanya Pramod
Lecture notes in networks and systems (2024), pp. 335-358
Closed Access
ABE Cloud Privacy Improvisation on Healthcare Systems Using Trained Neural Networking Technique
M. H. Chaithra, S. Vagdevi
SN Computer Science (2023) Vol. 4, Iss. 5
Closed Access
M. H. Chaithra, S. Vagdevi
SN Computer Science (2023) Vol. 4, Iss. 5
Closed Access
Attribute-Based Key Management for Patient-Centric and Trusted Data Access in Blockchain-Enabled IoMT
Axin Xiang, Hongfeng Gao, Youliang Tian, et al.
(2023)
Closed Access
Axin Xiang, Hongfeng Gao, Youliang Tian, et al.
(2023)
Closed Access