
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Blockchain aware proxy re-encryption algorithm-based data sharing scheme
Ismail Keshta, Yassine Aoudni, Mukta Sandhu, et al.
Physical Communication (2023) Vol. 58, pp. 102048-102048
Closed Access | Times Cited: 22
Ismail Keshta, Yassine Aoudni, Mukta Sandhu, et al.
Physical Communication (2023) Vol. 58, pp. 102048-102048
Closed Access | Times Cited: 22
Showing 22 citing articles:
Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security
Mohammed Y. Shakor, Mustafa Ibrahim Khaleel, Mejdl Safran, et al.
IEEE Access (2024) Vol. 12, pp. 26334-26343
Open Access | Times Cited: 9
Mohammed Y. Shakor, Mustafa Ibrahim Khaleel, Mejdl Safran, et al.
IEEE Access (2024) Vol. 12, pp. 26334-26343
Open Access | Times Cited: 9
Investigating the Application of Digital Tools for Information Management in Financial Control: Evidence from Bulgaria
Zhelyo Zhelev, Silviya Kostova
Journal of risk and financial management (2024) Vol. 17, Iss. 4, pp. 165-165
Open Access | Times Cited: 5
Zhelyo Zhelev, Silviya Kostova
Journal of risk and financial management (2024) Vol. 17, Iss. 4, pp. 165-165
Open Access | Times Cited: 5
Vspp: Verifiable, shareable, and privacy-preserving access control scheme for IoV
Chunhua Jin, Youwang Sun, Xinying Liu, et al.
Pervasive and Mobile Computing (2025), pp. 102014-102014
Closed Access
Chunhua Jin, Youwang Sun, Xinying Liu, et al.
Pervasive and Mobile Computing (2025), pp. 102014-102014
Closed Access
Harnessing Industry 4.0 for SMEs: Advancing Smart Manufacturing and Logistics for Sustainable Supply Chains
Majid Alkhodair, Hanadi Alkhudhayr
Sustainability (2025) Vol. 17, Iss. 3, pp. 813-813
Open Access
Majid Alkhodair, Hanadi Alkhudhayr
Sustainability (2025) Vol. 17, Iss. 3, pp. 813-813
Open Access
The Use of Blockchain Technology and Artificial Intelligence in Cryptocurrency and Medical Technology
Ranson Sifiso Gwala
Advances in computational intelligence and robotics book series (2025), pp. 147-184
Closed Access
Ranson Sifiso Gwala
Advances in computational intelligence and robotics book series (2025), pp. 147-184
Closed Access
Unveiling Privacy, Security, and Ethical Concerns of ChatGPT
Sachin Lalar, Tajinder Kumar, Rajinder Kumar, et al.
Advances in computational intelligence and robotics book series (2024), pp. 202-215
Closed Access | Times Cited: 2
Sachin Lalar, Tajinder Kumar, Rajinder Kumar, et al.
Advances in computational intelligence and robotics book series (2024), pp. 202-215
Closed Access | Times Cited: 2
Blockchain-based proxy re-encryption access control method for biological risk privacy protection of agricultural products
Shaohua Wang, Na Luo, Bin Xing, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2
Shaohua Wang, Na Luo, Bin Xing, et al.
Scientific Reports (2024) Vol. 14, Iss. 1
Open Access | Times Cited: 2
An Efficient Multi-User Groupwise Integrity CP-ABE(GI-CPABE) for Homogeneous and Heterogeneous Cloud Blockchain Transactions
K. Sravanthi
Deleted Journal (2024) Vol. 20, Iss. 1, pp. 326-349
Open Access | Times Cited: 1
K. Sravanthi
Deleted Journal (2024) Vol. 20, Iss. 1, pp. 326-349
Open Access | Times Cited: 1
Distributed identity management mechanism based on improved block-chain certificateless encryption algorithm
Xiang Feng, Linrong Wang, Xin Bai, et al.
Physical Communication (2024) Vol. 65, pp. 102341-102341
Closed Access | Times Cited: 1
Xiang Feng, Linrong Wang, Xin Bai, et al.
Physical Communication (2024) Vol. 65, pp. 102341-102341
Closed Access | Times Cited: 1
P. Britto Corthis, G. P. Ramesh, Ananda Babu Jayachandra
Expert Systems (2024)
Closed Access | Times Cited: 1
Securing the Patient’s Breast Cancer Data using Blockchain-based IBE with Deep Learning Model in IoT
D. Baby Sathiya
Deleted Journal (2024) Vol. 20, Iss. 4s, pp. 2364-2377
Open Access | Times Cited: 1
D. Baby Sathiya
Deleted Journal (2024) Vol. 20, Iss. 4s, pp. 2364-2377
Open Access | Times Cited: 1
A novel image encryption scheme based on a new hyperchaotic map
Tarek Farah, Badr M. Alshammari
Multimedia Tools and Applications (2023) Vol. 83, Iss. 12, pp. 34537-34579
Closed Access | Times Cited: 3
Tarek Farah, Badr M. Alshammari
Multimedia Tools and Applications (2023) Vol. 83, Iss. 12, pp. 34537-34579
Closed Access | Times Cited: 3
Blockchain Based Abstract Syntax Tree to Detect Vulnerability in IOT-Enabled Smart Contract
Amit Mittal, Gunawan Widjaja, Renzon Daniel Cosme Pecho, et al.
(2023), pp. 270-275
Closed Access | Times Cited: 2
Amit Mittal, Gunawan Widjaja, Renzon Daniel Cosme Pecho, et al.
(2023), pp. 270-275
Closed Access | Times Cited: 2
Decentralized Anonymous IoT Data Sharing with Key-Private Proxy Re-Encryption
Esra Günsay, Oğuz Yayla
International Journal of Information Security Science (2024) Vol. 13, Iss. 1, pp. 23-39
Open Access
Esra Günsay, Oğuz Yayla
International Journal of Information Security Science (2024) Vol. 13, Iss. 1, pp. 23-39
Open Access
Enhanced Homomorphic Encryption and Dual Blockchain Authentication for Securing Medical Data on the Internet of Things
Velivela Gopinath, venkata rao k, krishana rao sala
Research Square (Research Square) (2024)
Open Access
Velivela Gopinath, venkata rao k, krishana rao sala
Research Square (Research Square) (2024)
Open Access
An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles
Negalign Wake Hundera, Muhammad Umar Aftab, Dagmawit Mesfin, et al.
Vehicular Communications (2024) Vol. 49, pp. 100811-100811
Closed Access
Negalign Wake Hundera, Muhammad Umar Aftab, Dagmawit Mesfin, et al.
Vehicular Communications (2024) Vol. 49, pp. 100811-100811
Closed Access
Blockchain data sharing scheme based on quantum re-encryption
Sha Xie, Lili Yan, Shibin Zhang, et al.
Quantum Information Processing (2024) Vol. 23, Iss. 8
Closed Access
Sha Xie, Lili Yan, Shibin Zhang, et al.
Quantum Information Processing (2024) Vol. 23, Iss. 8
Closed Access
EPREKM: ElGamal proxy re‐encryption‐based key management scheme with constant rekeying cost and linear public bulletin size
Payal Sharma, B. Purushothama
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 13
Closed Access
Payal Sharma, B. Purushothama
Concurrency and Computation Practice and Experience (2024) Vol. 36, Iss. 13
Closed Access
An Approach to Secure Data Sharing in the Internet of Things Using Blockchain- Based Proxy Re-Encryption
Keshav Kumar Choudhary, Shreedhara N Hegde, Ching-Hua Lin
INTI JOURNAL. (2024) Vol. 2024, Iss. 1
Open Access
Keshav Kumar Choudhary, Shreedhara N Hegde, Ching-Hua Lin
INTI JOURNAL. (2024) Vol. 2024, Iss. 1
Open Access
Revolutionizing Data Capitalization: Harnessing Blockchain for IoT-Enabled Smart Contracts
Chintureena Thingom, Manoj Ram Tammina, Anjali Joshi, et al.
(2023), pp. 490-496
Closed Access | Times Cited: 1
Chintureena Thingom, Manoj Ram Tammina, Anjali Joshi, et al.
(2023), pp. 490-496
Closed Access | Times Cited: 1
Improve Quality Of Public Opinion In Website Using Blockchain Technology
Galih Mahardika Munandar, Imam Samsul Ma’arif
Jurnal Sains dan Teknologi Industri (2023) Vol. 21, Iss. 1, pp. 13-13
Open Access
Galih Mahardika Munandar, Imam Samsul Ma’arif
Jurnal Sains dan Teknologi Industri (2023) Vol. 21, Iss. 1, pp. 13-13
Open Access
IoT-enabled Secure Service-Oriented Architecture (IOT-SOA) through Blockchain
Aditi Sharma, Manvitha Gali, Aditya Mahamkali, et al.
(2023), pp. 264-268
Closed Access
Aditi Sharma, Manvitha Gali, Aditya Mahamkali, et al.
(2023), pp. 264-268
Closed Access