
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Integration of lightweight cryptography and watermarking with compression for high speed and reliable communication of digital images in IoT
Hadi Nazari, Mahmoud Mahlouji Bidgoli, H. Ghasvari
IET Image Processing (2023) Vol. 17, Iss. 10, pp. 2984-3001
Open Access | Times Cited: 6
Hadi Nazari, Mahmoud Mahlouji Bidgoli, H. Ghasvari
IET Image Processing (2023) Vol. 17, Iss. 10, pp. 2984-3001
Open Access | Times Cited: 6
Showing 6 citing articles:
An Enhanced Encryption Scheme for IoT ‐Based Wireless Sensor Network Using DNA Enclosed Fully Homomorphic Approach
Alka P. Sawlikar, Devashri Raich, B. Ganguly, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Alka P. Sawlikar, Devashri Raich, B. Ganguly, et al.
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
A Novel System for Confidential Medical Data Storage Using Chaskey Encryption and Blockchain Technology
Aymen Mudheher Badr, Lamia Chaari Fourati, Samiha Ayed
Baghdad Science Journal (2023) Vol. 20, Iss. 6(Suppl.), pp. 2651-2651
Open Access | Times Cited: 3
Aymen Mudheher Badr, Lamia Chaari Fourati, Samiha Ayed
Baghdad Science Journal (2023) Vol. 20, Iss. 6(Suppl.), pp. 2651-2651
Open Access | Times Cited: 3
Lightweight Secure Compression Scheme for Green IoT Applications
Samia Al Fallah, Mounir Arioua, Ahmed El Oualkadi
Procedia Computer Science (2024) Vol. 236, pp. 363-370
Open Access
Samia Al Fallah, Mounir Arioua, Ahmed El Oualkadi
Procedia Computer Science (2024) Vol. 236, pp. 363-370
Open Access
A literature review on V2X communications security: Foundation, solutions, status, and future
Zuobin Ying, Kaichao Wang, Jinbo Xiong, et al.
IET Communications (2024)
Open Access
Zuobin Ying, Kaichao Wang, Jinbo Xiong, et al.
IET Communications (2024)
Open Access
AGFI-GAN: An Attention-Guided and Feature-Integrated Watermarking Model Based on Generative Adversarial Network Framework for Secure and Auditable Medical Imaging Application
Xinyun Liu, Ronghua Xu, Zhao Chen
Electronics (2024) Vol. 14, Iss. 1, pp. 86-86
Open Access
Xinyun Liu, Ronghua Xu, Zhao Chen
Electronics (2024) Vol. 14, Iss. 1, pp. 86-86
Open Access
A Review Study on various Image Security Techniques and Emerging trends for Visual Data Protection
Mrs. Dipali Ghatge Dr. K. Rajeswari
Tuijin Jishu/Journal of Propulsion Technology (2023) Vol. 44, Iss. 3, pp. 4213-4237
Open Access
Mrs. Dipali Ghatge Dr. K. Rajeswari
Tuijin Jishu/Journal of Propulsion Technology (2023) Vol. 44, Iss. 3, pp. 4213-4237
Open Access