OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application
Qikun Zhang, Yong Gan, Quanxin Zhang, et al.
IEEE Access (2018) Vol. 6, pp. 24064-24074
Open Access | Times Cited: 60

Showing 1-25 of 60 citing articles:

BLA: Blockchain-Assisted Lightweight Anonymous Authentication for Distributed Vehicular Fog Services
Yingying Yao, Xiaolin Chang, Jelena Mišić, et al.
IEEE Internet of Things Journal (2019) Vol. 6, Iss. 2, pp. 3775-3784
Closed Access | Times Cited: 197

A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0
Zisang Xu, Wei Liang, Kuan‐Ching Li, et al.
IEEE Transactions on Industrial Informatics (2021) Vol. 18, Iss. 10, pp. 7118-7127
Closed Access | Times Cited: 60

A secure blockchain-based group key agreement protocol for IoT
Chien‐Ming Chen, Xiaoting Deng, Wensheng Gan, et al.
The Journal of Supercomputing (2021) Vol. 77, Iss. 8, pp. 9046-9068
Closed Access | Times Cited: 58

A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning With Revocation for Medical Consortiums
Lingyan Xue, Haiping Huang, Fu Xiao, et al.
IEEE Transactions on Network and Service Management (2022) Vol. 19, Iss. 3, pp. 2409-2420
Closed Access | Times Cited: 37

MalInsight: A systematic profiling based malware detection framework
Weijie Han, Jingfeng Xue, Yong Wang, et al.
Journal of Network and Computer Applications (2018) Vol. 125, pp. 236-250
Open Access | Times Cited: 78

An authenticated asymmetric group key agreement based on attribute encryption
Qikun Zhang, Yong Gan, Lu Liu, et al.
Journal of Network and Computer Applications (2018) Vol. 123, pp. 1-10
Closed Access | Times Cited: 50

A hierarchical group key agreement protocol using orientable attributes for cloud computing
Qikun Zhang, Xianmin Wang, Junling Yuan, et al.
Information Sciences (2018) Vol. 480, pp. 55-69
Closed Access | Times Cited: 47

Data security sharing model based on privacy protection for blockchain‐enabled industrial Internet of Things
Qikun Zhang, Yongjiao Li, Ruifang Wang, et al.
International Journal of Intelligent Systems (2020) Vol. 36, Iss. 1, pp. 94-111
Open Access | Times Cited: 45

Anonymous Dynamic Group Authenticated Key Agreements Using Physical Unclonable Functions for Internet of Medical Things
Tian‐Fu Lee, Xiucai Ye, Syuan-Han Lin
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 16, pp. 15336-15348
Closed Access | Times Cited: 24

Network Security Situation Prediction Based on MR-SVM
Jingjing Hu, Dongyan Ma, Chen Liu, et al.
IEEE Access (2019) Vol. 7, pp. 130937-130945
Open Access | Times Cited: 42

A Smartcard-Based User-Controlled Single Sign-On for Privacy Preservation in 5G-IoT Telemedicine Systems
Tzu‐Wei Lin, Chien-Lung Hsu, Tuan‐Vinh Le, et al.
Sensors (2021) Vol. 21, Iss. 8, pp. 2880-2880
Open Access | Times Cited: 26

A secured and lightweight RFID-tag based authentication protocol with privacy-preserving in Telecare medicine information system
Bhanu Chander, G. Kumaravelan
Computer Communications (2022) Vol. 191, pp. 425-437
Closed Access | Times Cited: 18

A Blockchain-Based Cross-Domain Authentication Management System for IoT Devices
Yizhong Liu, A. X. Liu, Yu Xia, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 1, pp. 115-127
Closed Access | Times Cited: 10

Secure Distribution of Protected Content in Information-Centric Networking
Muhammad Bilal, Sangheon Pack
IEEE Systems Journal (2019) Vol. 14, Iss. 2, pp. 1921-1932
Open Access | Times Cited: 27

Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication
Qikun Zhang, Yongjiao Li, Yong Gan, et al.
IEEE Access (2019) Vol. 7, pp. 87085-87096
Open Access | Times Cited: 26

HCDA: Efficient Pairing-Free Homographic Key Management for Dynamic Cross-Domain Authentication in VANETs
Haowen Tan, Shichang Xuan, Ilyong Chung
Symmetry (2020) Vol. 12, Iss. 6, pp. 1003-1003
Open Access | Times Cited: 21

Group key agreement protocol among terminals of the intelligent information system for mobile edge computing
Qikun Zhang, Liang Zhu, Ruifang Wang, et al.
International Journal of Intelligent Systems (2021) Vol. 37, Iss. 12, pp. 10442-10461
Open Access | Times Cited: 19

Cross domain-based ontology construction via Jaccard Semantic Similarity with hybrid optimization model
Shital Kakad, Sudhir Dhage
Expert Systems with Applications (2021) Vol. 178, pp. 115046-115046
Closed Access | Times Cited: 18

Practical Homomorphic Authentication in Cloud-Assisted VANETs with Blockchain-Based Healthcare Monitoring for Pandemic Control
Haowen Tan, Pankoo Kim, Ilyong Chung
Electronics (2020) Vol. 9, Iss. 10, pp. 1683-1683
Open Access | Times Cited: 19

Blockchain-based asymmetric group key agreement protocol for internet of vehicles
Qikun Zhang, Yongjiao Li, Ruifang Wang, et al.
Computers & Electrical Engineering (2020) Vol. 86, pp. 106713-106713
Closed Access | Times Cited: 18

CDAKA: A Provably-Secure Heterogeneous Cross-Domain Authenticated Key Agreement Protocol with Symptoms-Matching in TMIS
Xiaoxue Liu, Wenping Ma
Journal of Medical Systems (2018) Vol. 42, Iss. 8
Closed Access | Times Cited: 20

I-HMM-Based Multidimensional Network Security Risk Assessment
Jingjing Hu, Shuangshuang Guo, Xiaohui Kuang, et al.
IEEE Access (2019) Vol. 8, pp. 1431-1442
Open Access | Times Cited: 14

Lightweight Noninteractive Membership Authentication and Group Key Establishment for WSNs
Qi Cheng, Ching-Fang Hsu, Lein Harn
Mathematical Problems in Engineering (2020) Vol. 2020, pp. 1-9
Open Access | Times Cited: 14

A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol
Zisang Xu, Feng Li, Han Deng, et al.
Sensors (2020) Vol. 20, Iss. 17, pp. 4835-4835
Open Access | Times Cited: 13

Distributed Group Key Management Based on Blockchain
Jia Ni, Guowei Fang, Yekang Zhao, et al.
Electronics (2024) Vol. 13, Iss. 11, pp. 2216-2216
Open Access | Times Cited: 1

Page 1 - Next Page

Scroll to top