
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems
Osama A. Khashan, Nour M. Khafajah
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 2, pp. 726-739
Open Access | Times Cited: 42
Osama A. Khashan, Nour M. Khafajah
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 2, pp. 726-739
Open Access | Times Cited: 42
Showing 1-25 of 42 citing articles:
Enhancing intrusion detection in IoT networks using machine learning-based feature selection and ensemble models
Ayoob Almotairi, Samer Atawneh, Osama A. Khashan, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 16
Ayoob Almotairi, Samer Atawneh, Osama A. Khashan, et al.
Systems Science & Control Engineering (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 16
Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks
Osama A. Khashan, Nour M. Khafajah, Waleed Alomoush, et al.
IEEE Access (2024) Vol. 12, pp. 23290-23304
Open Access | Times Cited: 11
Osama A. Khashan, Nour M. Khafajah, Waleed Alomoush, et al.
IEEE Access (2024) Vol. 12, pp. 23290-23304
Open Access | Times Cited: 11
Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 11
Open Access | Times Cited: 9
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 11
Open Access | Times Cited: 9
Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review
Nazhatul Hafizah Kamarudin, Nur Hanis Sabrina Suhaimi, Fadilla ’Atyka Nor Rashid, et al.
Symmetry (2024) Vol. 16, Iss. 2, pp. 171-171
Open Access | Times Cited: 5
Nazhatul Hafizah Kamarudin, Nur Hanis Sabrina Suhaimi, Fadilla ’Atyka Nor Rashid, et al.
Symmetry (2024) Vol. 16, Iss. 2, pp. 171-171
Open Access | Times Cited: 5
An Efficient Cluster-Based Mutual Authentication and Key Update Protocol for Secure Internet of Vehicles in 5G Sensor Networks
Xinzhong Su, Youyun Xu
Sensors (2025) Vol. 25, Iss. 1, pp. 212-212
Open Access
Xinzhong Su, Youyun Xu
Sensors (2025) Vol. 25, Iss. 1, pp. 212-212
Open Access
A Comprehensive Review of Block Chain Based Multi Factor Authentication
Abdul Rahman Khan, Parma Nand, Bharat Bhushan, et al.
Lecture notes in networks and systems (2025), pp. 713-726
Closed Access
Abdul Rahman Khan, Parma Nand, Bharat Bhushan, et al.
Lecture notes in networks and systems (2025), pp. 713-726
Closed Access
RETRACTED: An enhanced consortium blockchain diversity mining technique for IoT metadata aggregation
Premkumar Chithaluru, Fadi Al‐Turjman, Raman Dugyala, et al.
Future Generation Computer Systems (2023) Vol. 152, pp. 239-253
Closed Access | Times Cited: 15
Premkumar Chithaluru, Fadi Al‐Turjman, Raman Dugyala, et al.
Future Generation Computer Systems (2023) Vol. 152, pp. 239-253
Closed Access | Times Cited: 15
Development of an Enhanced Blockchain Mechanism for Internet of Things Authentication
Mahyar Sadrishojaei, Faeze Kazemian
Wireless Personal Communications (2023) Vol. 132, Iss. 4, pp. 2543-2561
Closed Access | Times Cited: 13
Mahyar Sadrishojaei, Faeze Kazemian
Wireless Personal Communications (2023) Vol. 132, Iss. 4, pp. 2543-2561
Closed Access | Times Cited: 13
Blockchain-Based Decentralised Authentication in Closed Environments
Wata Kanjanapruthipong, Sirapat Boonkrong
Future Internet (2025) Vol. 17, Iss. 3, pp. 98-98
Open Access
Wata Kanjanapruthipong, Sirapat Boonkrong
Future Internet (2025) Vol. 17, Iss. 3, pp. 98-98
Open Access
AI-driven dynamic trust management and blockchain-based security in industrial IoT
Rajesh Kumar, Rewa Sharma
Computers & Electrical Engineering (2025) Vol. 123, pp. 110213-110213
Closed Access
Rajesh Kumar, Rewa Sharma
Computers & Electrical Engineering (2025) Vol. 123, pp. 110213-110213
Closed Access
Dynamic Multimedia Encryption Using a Parallel File System Based on Multi-Core Processors
Osama A. Khashan, Nour M. Khafajah, Waleed Alomoush, et al.
Cryptography (2023) Vol. 7, Iss. 1, pp. 12-12
Open Access | Times Cited: 11
Osama A. Khashan, Nour M. Khafajah, Waleed Alomoush, et al.
Cryptography (2023) Vol. 7, Iss. 1, pp. 12-12
Open Access | Times Cited: 11
Aligning security and energy-efficiency using change detection and partial encryption for wireless camera networks
Osama A. Khashan
Engineering Science and Technology an International Journal (2024) Vol. 53, pp. 101689-101689
Open Access | Times Cited: 3
Osama A. Khashan
Engineering Science and Technology an International Journal (2024) Vol. 53, pp. 101689-101689
Open Access | Times Cited: 3
Fortifying IoT against crimpling cyber-attacks: a systematic review
Usman Tariq, Irfan Ahmed, Muhammad Attique Khan, et al.
Karbala International Journal of Modern Science (2023) Vol. 9, Iss. 4
Open Access | Times Cited: 9
Usman Tariq, Irfan Ahmed, Muhammad Attique Khan, et al.
Karbala International Journal of Modern Science (2023) Vol. 9, Iss. 4
Open Access | Times Cited: 9
DBPBFT: A hierarchical PBFT consensus algorithm with dual blockchain for IoT
Xiaohua Wu, Z. Y. Wang, Xiaoyu Li, et al.
Future Generation Computer Systems (2024) Vol. 162, pp. 107429-107429
Closed Access | Times Cited: 3
Xiaohua Wu, Z. Y. Wang, Xiaoyu Li, et al.
Future Generation Computer Systems (2024) Vol. 162, pp. 107429-107429
Closed Access | Times Cited: 3
Smart Energy-Efficient Encryption for Wireless Multimedia Sensor Networks Using Deep Learning
Osama A. Khashan, Nour M. Khafajah, Waleed Alomoush, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 5745-5763
Open Access | Times Cited: 3
Osama A. Khashan, Nour M. Khafajah, Waleed Alomoush, et al.
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 5745-5763
Open Access | Times Cited: 3
A Decentralized Proxy-JRC Authentication System for Scalable IETF 6TiSCH Networks
Hakan Aydın, Sedat Görmüş, Burak Aydın
IEEE Access (2024) Vol. 12, pp. 90952-90970
Open Access | Times Cited: 2
Hakan Aydın, Sedat Görmüş, Burak Aydın
IEEE Access (2024) Vol. 12, pp. 90952-90970
Open Access | Times Cited: 2
An efficient blockchain-based authentication scheme with transferability
Xiushu Jin, Kazumasa Omote
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0310094-e0310094
Open Access | Times Cited: 2
Xiushu Jin, Kazumasa Omote
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0310094-e0310094
Open Access | Times Cited: 2
Bandwidth and power efficient lightweight authentication scheme for healthcare system☆☆☆☆☆☆
Saeed Ullah Jan, Anwar Ghani, Abdulrahman Alzahrani, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 7, pp. 101601-101601
Open Access | Times Cited: 5
Saeed Ullah Jan, Anwar Ghani, Abdulrahman Alzahrani, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 7, pp. 101601-101601
Open Access | Times Cited: 5
BDIDA-IoT: A Blockchain-Based Decentralized Identity Architecture Enhances the Efficiency of IoT Data Flow
Zequan Yang, Yumeng Liu, Xiaopeng Jin, et al.
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 1807-1807
Open Access | Times Cited: 1
Zequan Yang, Yumeng Liu, Xiaopeng Jin, et al.
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 1807-1807
Open Access | Times Cited: 1
Blockchain-Based Secure Content Caching and Computation for Edge Computing
Elif Bozkaya
IEEE Access (2024) Vol. 12, pp. 47619-47629
Open Access | Times Cited: 1
Elif Bozkaya
IEEE Access (2024) Vol. 12, pp. 47619-47629
Open Access | Times Cited: 1
Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review
Md. Ataullah, Naveen Chauhan
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access | Times Cited: 1
Md. Ataullah, Naveen Chauhan
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access | Times Cited: 1
The future of transportation: Blockchain‐powered solutions
Fayez Alanazi
Transportation Journal (2024)
Closed Access | Times Cited: 1
Fayez Alanazi
Transportation Journal (2024)
Closed Access | Times Cited: 1
Blockchain-Machine Learning Fusion for Enhanced Malicious Node Detection in Wireless Sensor Networks
Osama A. Khashan
Knowledge-Based Systems (2024), pp. 112557-112557
Open Access | Times Cited: 1
Osama A. Khashan
Knowledge-Based Systems (2024), pp. 112557-112557
Open Access | Times Cited: 1
SecEdge: A Novel Deep Learning Framework for Real-Time Cybersecurity in Mobile IoT Environments
Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, et al.
Heliyon (2024) Vol. 11, Iss. 1, pp. e40874-e40874
Closed Access | Times Cited: 1
Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, et al.
Heliyon (2024) Vol. 11, Iss. 1, pp. e40874-e40874
Closed Access | Times Cited: 1
Secure Application of MIoT: Privacy-Preserving Solution for Online English Education Platforms
Jiming Yin, Jie Cui
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8293-8293
Open Access | Times Cited: 3
Jiming Yin, Jie Cui
Applied Sciences (2023) Vol. 13, Iss. 14, pp. 8293-8293
Open Access | Times Cited: 3