OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Efficient Real-Time Integrity Auditing With Privacy-Preserving Arbitration for Images in Cloud Storage System
Xin Tang, Yongfeng Huang, Chinā€Chen Chang, et al.
IEEE Access (2019) Vol. 7, pp. 33009-33023
Open Access | Times Cited: 17

Showing 17 citing articles:

Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage
Ying Miao, Qiong Huang, Meiyan Xiao, et al.
IEEE Transactions on Information Forensics and Security (2022) Vol. 17, pp. 3663-3676
Closed Access | Times Cited: 33

An efficient data flow material model based cloud authentication data security and reduce a cloud storage cost using Index-level Boundary Pattern Convergent Encryption algorithm
Vidhyanandhini Krishnasamy, Saravanarajan Venkatachalam
Materials Today Proceedings (2021) Vol. 81, pp. 931-936
Closed Access | Times Cited: 16

A Systematic Review on Image Data Protection Methods
Faraj Ali Alyaqobi
IJIIS International Journal of Informatics and Information Systems (2022) Vol. 5, Iss. 3, pp. 131-141
Open Access | Times Cited: 11

Monitoring File Integrity Using Blockchain and Smart Contracts
Alexandre Pinheiro, Edna Dias Canedo, Rafael T. de Sousa, et al.
IEEE Access (2020) Vol. 8, pp. 198548-198579
Open Access | Times Cited: 16

SDVADC: Secure Deduplication and Virtual Auditing of Data in Cloud
C M Geeta, Shreyas Raju R. G., S Raghavendra, et al.
Procedia Computer Science (2020) Vol. 171, pp. 2225-2234
Open Access | Times Cited: 10

Survey on Data Integrity and Verification for Cloud Storage
Suchetha R. Pujar, Shilpa Chaudhari, R. Aparna
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2020), pp. 1-7
Closed Access | Times Cited: 10

Image Authentication Using QR Code Watermarking Approach Based on Image Segmentation
Xiaomei Liu, Xin Tang
2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2020), pp. 1572-1577
Closed Access | Times Cited: 9

Survey on Cloud Auditing by Using Integrity Checking Algorithm and Key Validation Mechanism
M. Mageshwari, R. Naresh
Lecture notes in networks and systems (2022), pp. 437-446
Closed Access | Times Cited: 6

An extensive research survey on data integrity and deduplication towards privacy in cloud storage
Anil Kumar G., C P Shantala
International Journal of Electrical and Computer Engineering (IJECE) (2020) Vol. 10, Iss. 2, pp. 2011-2011
Open Access | Times Cited: 7

An Improved Image Authentication Method Using QR Code Watermarking Approach
Xiaomei Liu, Bolin Zhang, Yuchen Wen, et al.
Lecture notes in computer science (2022), pp. 337-348
Closed Access | Times Cited: 4

Dynamic Evaluation Service for Safe Cloud Retention With Protection of Privacy and Reduction of Cyber Security Attacks
M. Mageshwari, D. Prabakar, S. Anitha, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 138-151
Closed Access

Authorization of Aadhar data using Diffie Helman key with enhanced security concerns
K. Karthika, R. Devi Priya
Journal of Intelligent & Fuzzy Systems (2024) Vol. 46, Iss. 4, pp. 8639-8658
Closed Access

Reversible Data Hiding Based on Improved Block Selection Strategy and Pixel Value Ordering
Xin Tang, Linna Zhou, Guang Tang, et al.
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) (2021) Vol. 16, pp. 619-627
Closed Access | Times Cited: 4

Stereo storage structure assisted one-way anonymous auditing protocol in e-health system
Ling-Hong Jiang, Chen Wang, Jian Shen
Journal of Surveillance Security and Safety (2020)
Open Access | Times Cited: 2

Validation of Architecture Effectiveness for the Continuous Monitoring of File Integrity Stored in the Cloud Using Blockchain and Smart Contracts
Alexandre Pinheiro, Edna Dias Canedo, Robson de Oliveira Albuquerque, et al.
Sensors (2021) Vol. 21, Iss. 13, pp. 4440-4440
Open Access | Times Cited: 1

Secure Auditing and Deduplicating Data in Cloud
Anil Kumar Singh
International Journal for Research in Applied Science and Engineering Technology (2023) Vol. 11, Iss. 5, pp. 6530-6534
Open Access

Blockchain-Based Integrity Auditing with Secure Deduplication in Cloud Storage
Yuhua Wang, Xin Tang, Yiteng Zhou, et al.
Communications in computer and information science (2022), pp. 303-318
Closed Access

Page 1

Scroll to top