OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing
Vinod Kumar, Musheer Ahmad, Dheerendra Mishra, et al.
Vehicular Communications (2019) Vol. 22, pp. 100213-100213
Closed Access | Times Cited: 75

Showing 1-25 of 75 citing articles:

5G/6G-enabled metaverse technologies: Taxonomy, applications, and open security challenges with future research directions
Muhammad Adil, Houbing Song, Muhammad Khurram Khan, et al.
Journal of Network and Computer Applications (2024) Vol. 223, pp. 103828-103828
Open Access | Times Cited: 26

Light-Edge: A Lightweight Authentication Protocol for IoT Devices in an Edge-Cloud Environment
Ali Shahidinejad, Mostafa Ghobaei‐Arani, Alireza Souri, et al.
IEEE Consumer Electronics Magazine (2021) Vol. 11, Iss. 2, pp. 57-63
Open Access | Times Cited: 83

CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC
Adesh Kumari, Vinod Kumar, Mohammad Yahya Abbasi, et al.
IEEE Access (2020) Vol. 8, pp. 107838-107852
Open Access | Times Cited: 79

PALK: Password-based anonymous lightweight key agreement framework for smart grid
Akber Ali Khan, Vinod Kumar, Musheer Ahmad, et al.
International Journal of Electrical Power & Energy Systems (2020) Vol. 121, pp. 106121-106121
Closed Access | Times Cited: 78

The Role of 6G Technologies in Advancing Smart City Applications: Opportunities and Challenges
Sanjeev Kumar Sharma, Renu Popli, Sajjan Singh, et al.
Sustainability (2024) Vol. 16, Iss. 16, pp. 7039-7039
Open Access | Times Cited: 9

ECCbAS: An ECC based authentication scheme for healthcare IoT systems
M R Servati, Masoumeh Safkhani
Pervasive and Mobile Computing (2023) Vol. 90, pp. 101753-101753
Closed Access | Times Cited: 21

Secure Operations of Connected and Autonomous Vehicles
Jinpeng Han, Zhiyang Ju, Xiaoguang Chen, et al.
IEEE Transactions on Intelligent Vehicles (2023) Vol. 8, Iss. 11, pp. 4484-4497
Closed Access | Times Cited: 19

An Efficient Lightweight Provably Secure Authentication Protocol for Patient Monitoring Using Wireless Medical Sensor Networks
Garima Thakur, Sunil Prajapat, Pankaj Kumar, et al.
IEEE Access (2023) Vol. 11, pp. 114662-114679
Open Access | Times Cited: 17

Secure RFID-Assisted Authentication Protocol for Vehicular Cloud Computing Environment
Muhammad Asad Saleem, Xiong Li, Khalid Mahmood, et al.
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 9, pp. 12528-12537
Closed Access | Times Cited: 7

Hybrid Sine-Cosine Chimp optimization based feature selection with deep learning model for threat detection in IoT sensor networks
Mimouna Abdullah Alkhonaini, Alanoud Al Mazroa, Mohammed Aljebreen, et al.
Alexandria Engineering Journal (2024) Vol. 102, pp. 169-178
Open Access | Times Cited: 7

Towards Autonomous Driving: Technologies and Data for Vehicles-to-Everything Communication
Vygantas Ušinskis, Mantas Makulavičius, Sigitas Petkevičius, et al.
Sensors (2024) Vol. 24, Iss. 11, pp. 3411-3411
Open Access | Times Cited: 5

A Secure, Privacy-Preserving, and Lightweight Authentication Scheme for VANETs
Tarak Nandy, Mohd Yamani Idna Idris, Rafidah Md Noor, et al.
IEEE Sensors Journal (2021) Vol. 21, Iss. 18, pp. 20998-21011
Closed Access | Times Cited: 33

An enhanced lightweight and secured authentication protocol for vehicular ad-hoc network
Tarak Nandy, Mohd Yamani Idna Idris, Rafidah Md Noor, et al.
Computer Communications (2021) Vol. 177, pp. 57-76
Closed Access | Times Cited: 32

An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
Waseem Akram, Khalid Mahmood, Xiong Li, et al.
Computer Networks (2022) Vol. 217, pp. 109335-109335
Closed Access | Times Cited: 27

RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure
Vinod Kumar, Mahmoud Shuker Mahmoud, Ahmed Alkhayyat, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 14, pp. 16167-16196
Open Access | Times Cited: 25

PPRP: Preserving-Privacy Route Planning Scheme in VANETs
Yangfan Liang, Yining Liu, Brij B. Gupta
ACM Transactions on Internet Technology (2022) Vol. 22, Iss. 4, pp. 1-18
Closed Access | Times Cited: 24

VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV
Yinyan Gong, Kuan‐Ching Li, Lijun Xiao, et al.
Sensors (2023) Vol. 23, Iss. 11, pp. 5198-5198
Open Access | Times Cited: 11

A Comparative analysis of MQTT and IoT application protocols
Marwa O Al Enany, Hany Harb, Gamal Attiya
(2021), pp. 1-6
Closed Access | Times Cited: 24

An Improved and Privacy-Preserving Mutual Authentication Scheme with Forward Secrecy in VANETs
Mengting Yao, Xiaoming Wang, Qingqing Gan, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-12
Open Access | Times Cited: 23

An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing
Vikas Kumar, Rahul Kumar, Srinivas Jangirala, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-18
Open Access | Times Cited: 16

RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing
Masoumeh Safkhani, Carmen Cámara, Pedro Peris-López, et al.
Vehicular Communications (2020) Vol. 28, pp. 100311-100311
Closed Access | Times Cited: 26

A novel vector-space-based lightweight privacy-preserving RFID authentication protocol for IoT environment
Mohd Shariq, Karan Singh
The Journal of Supercomputing (2021) Vol. 77, Iss. 8, pp. 8532-8562
Closed Access | Times Cited: 21

A lightweight authentication protocol for IoT‐based cloud environment
Sadra Zargar, Ali Shahidinejad, Mostafa Ghobaei‐Arani
International Journal of Communication Systems (2021) Vol. 34, Iss. 11
Closed Access | Times Cited: 21

A secure and efficient key agreement framework for critical energy infrastructure using mobile device
Akber Ali Khan, Vinod Kumar, Musheer Ahmad, et al.
Telecommunication Systems (2021) Vol. 78, Iss. 4, pp. 539-557
Closed Access | Times Cited: 19

Red Kite Optimization Algorithm With Average Ensemble Model for Intrusion Detection for Secure IoT
Fahad F. Alruwaili, Mashael M. Asiri, Fatma S. Alrayes, et al.
IEEE Access (2023) Vol. 11, pp. 131749-131758
Open Access | Times Cited: 7

Page 1 - Next Page

Scroll to top