
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Providing End-to-End Security Using Quantum Walks in IoT Networks
Ahmed A. Abd El‐Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, et al.
IEEE Access (2020) Vol. 8, pp. 92687-92696
Open Access | Times Cited: 79
Ahmed A. Abd El‐Latif, Bassem Abd-El-Atty, Salvador E. Venegas-Andraca, et al.
IEEE Access (2020) Vol. 8, pp. 92687-92696
Open Access | Times Cited: 79
Showing 1-25 of 79 citing articles:
A 3-D Multi-Stable System With a Peanut-Shaped Equilibrium Curve: Circuit Design, FPGA Realization, and an Application to Image Encryption
Aceng Sambas, Sundarapandian Vaıdyanathan, Esteban Tlelo‐Cuautle, et al.
IEEE Access (2020) Vol. 8, pp. 137116-137132
Open Access | Times Cited: 150
Aceng Sambas, Sundarapandian Vaıdyanathan, Esteban Tlelo‐Cuautle, et al.
IEEE Access (2020) Vol. 8, pp. 137116-137132
Open Access | Times Cited: 150
Joint computation offloading and task caching for multi-user and multi-task MEC systems: reinforcement learning-based algorithms
Ibrahim A. Elgendy, Wei-Zhe Zhang, Hui He, et al.
Wireless Networks (2021) Vol. 27, Iss. 3, pp. 2023-2038
Closed Access | Times Cited: 147
Ibrahim A. Elgendy, Wei-Zhe Zhang, Hui He, et al.
Wireless Networks (2021) Vol. 27, Iss. 3, pp. 2023-2038
Closed Access | Times Cited: 147
A New Chaotic Map With Dynamic Analysis and Encryption Application in Internet of Health Things
Nestor Tsafack, Syam Sankar, Bassem Abd-El-Atty, et al.
IEEE Access (2020) Vol. 8, pp. 137731-137744
Open Access | Times Cited: 128
Nestor Tsafack, Syam Sankar, Bassem Abd-El-Atty, et al.
IEEE Access (2020) Vol. 8, pp. 137731-137744
Open Access | Times Cited: 128
Leveraging blockchain for ensuring trust in IoT: A survey
Rajesh Kumar, Rewa Sharma
Journal of King Saud University - Computer and Information Sciences (2021) Vol. 34, Iss. 10, pp. 8599-8622
Open Access | Times Cited: 90
Rajesh Kumar, Rewa Sharma
Journal of King Saud University - Computer and Information Sciences (2021) Vol. 34, Iss. 10, pp. 8599-8622
Open Access | Times Cited: 90
A Novel Modular Approach Based Substitution-Box Design for Image Encryption
Amjad Hussain Zahid, Eesa Alsolami, Musheer Ahmad
IEEE Access (2020) Vol. 8, pp. 150326-150340
Open Access | Times Cited: 88
Amjad Hussain Zahid, Eesa Alsolami, Musheer Ahmad
IEEE Access (2020) Vol. 8, pp. 150326-150340
Open Access | Times Cited: 88
Blockchain-assisted secured data management framework for health information analysis based on Internet of Medical Things
Asad Abbas, Roobaea Alroobaea, Moez Krichen, et al.
Personal and Ubiquitous Computing (2021) Vol. 28, Iss. 1, pp. 59-72
Closed Access | Times Cited: 82
Asad Abbas, Roobaea Alroobaea, Moez Krichen, et al.
Personal and Ubiquitous Computing (2021) Vol. 28, Iss. 1, pp. 59-72
Closed Access | Times Cited: 82
Optical image encryption based on quantum walks
Bassem Abd-El-Atty, Abdullah M. Iliyasu, Ahmad Alanezi, et al.
Optics and Lasers in Engineering (2020) Vol. 138, pp. 106403-106403
Closed Access | Times Cited: 81
Bassem Abd-El-Atty, Abdullah M. Iliyasu, Ahmad Alanezi, et al.
Optics and Lasers in Engineering (2020) Vol. 138, pp. 106403-106403
Closed Access | Times Cited: 81
An intelligent cluster optimization algorithm based on Whale Optimization Algorithm for VANETs (WOACNET)
Ghassan Husnain, Shahzad Anwar
PLoS ONE (2021) Vol. 16, Iss. 4, pp. e0250271-e0250271
Open Access | Times Cited: 64
Ghassan Husnain, Shahzad Anwar
PLoS ONE (2021) Vol. 16, Iss. 4, pp. e0250271-e0250271
Open Access | Times Cited: 64
Security and Internet of Things: Benefits, Challenges, and Future Perspectives
Hamed Taherdoost
Electronics (2023) Vol. 12, Iss. 8, pp. 1901-1901
Open Access | Times Cited: 38
Hamed Taherdoost
Electronics (2023) Vol. 12, Iss. 8, pp. 1901-1901
Open Access | Times Cited: 38
A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions
Diksha Chawla, Pawan Singh Mehra
Internet of Things (2023) Vol. 24, pp. 100950-100950
Closed Access | Times Cited: 29
Diksha Chawla, Pawan Singh Mehra
Internet of Things (2023) Vol. 24, pp. 100950-100950
Closed Access | Times Cited: 29
A survey on post‐quantum based approaches for edge computing security
Aykut Karakaya, Ahmet Ulu
Wiley Interdisciplinary Reviews Computational Statistics (2024) Vol. 16, Iss. 1
Open Access | Times Cited: 9
Aykut Karakaya, Ahmet Ulu
Wiley Interdisciplinary Reviews Computational Statistics (2024) Vol. 16, Iss. 1
Open Access | Times Cited: 9
Bijective S-Boxes Method Using Improved Chaotic Map-Based Heuristic Search and Algebraic Group Structures
Musheer Ahmad, Eesa Alsolami, Ahmed Mohammed Alghamdi, et al.
IEEE Access (2020) Vol. 8, pp. 110397-110411
Open Access | Times Cited: 58
Musheer Ahmad, Eesa Alsolami, Ahmed Mohammed Alghamdi, et al.
IEEE Access (2020) Vol. 8, pp. 110397-110411
Open Access | Times Cited: 58
IoE-supported smart logistics network communication with optimization and security
Jinsong Zhan, Shaofeng Dong, Wei Hu
Sustainable Energy Technologies and Assessments (2022) Vol. 52, pp. 102052-102052
Closed Access | Times Cited: 35
Jinsong Zhan, Shaofeng Dong, Wei Hu
Sustainable Energy Technologies and Assessments (2022) Vol. 52, pp. 102052-102052
Closed Access | Times Cited: 35
A secure image encryption mechanism using biased Fourier quantum walk and addition-crossover structure in the Internet of Things
Hesheng Huang, Zhenhao Liu, Zhiyuan Wang, et al.
Internet of Things (2025), pp. 101559-101559
Closed Access
Hesheng Huang, Zhenhao Liu, Zhiyuan Wang, et al.
Internet of Things (2025), pp. 101559-101559
Closed Access
Advances and Strategies in Quantum Computing Integration for Cybersecurity: A Systematic Literature Review
Sebastián Berríos, Francisco Alonso, Bady Gana, et al.
Communications in computer and information science (2025), pp. 269-282
Closed Access
Sebastián Berríos, Francisco Alonso, Bady Gana, et al.
Communications in computer and information science (2025), pp. 269-282
Closed Access
A New 4-D Multi-Stable Hyperchaotic System With No Balance Point: Bifurcation Analysis, Circuit Simulation, FPGA Realization and Image Cryptosystem
Sundarapandian Vaidyanathan, Aceng Sambas, Esteban Tlelo‐Cuautle, et al.
IEEE Access (2021) Vol. 9, pp. 144555-144573
Open Access | Times Cited: 37
Sundarapandian Vaidyanathan, Aceng Sambas, Esteban Tlelo‐Cuautle, et al.
IEEE Access (2021) Vol. 9, pp. 144555-144573
Open Access | Times Cited: 37
A secure medical image transmission scheme aided by quantum representation
T. Janani, M. Brindha
Journal of Information Security and Applications (2021) Vol. 59, pp. 102832-102832
Closed Access | Times Cited: 33
T. Janani, M. Brindha
Journal of Information Security and Applications (2021) Vol. 59, pp. 102832-102832
Closed Access | Times Cited: 33
A Novel Virtual Optical Image Encryption Scheme Created by Combining Chaotic S-Box with Double Random Phase Encoding
Peiran Tian, Runzhou Su
Sensors (2022) Vol. 22, Iss. 14, pp. 5325-5325
Open Access | Times Cited: 26
Peiran Tian, Runzhou Su
Sensors (2022) Vol. 22, Iss. 14, pp. 5325-5325
Open Access | Times Cited: 26
Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches
Mohammed Mudassir, Devrim Ünal, Mohammad Hammoudeh, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 24
Mohammed Mudassir, Devrim Ünal, Mohammad Hammoudeh, et al.
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 24
Asymmetric Group Key Agreement Protocol Based on Blockchain and Attribute for Industrial Internet of Things
Juyan Li, Zhiqi Qiao, Jialiang Peng
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 11, pp. 8326-8335
Closed Access | Times Cited: 22
Juyan Li, Zhiqi Qiao, Jialiang Peng
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 11, pp. 8326-8335
Closed Access | Times Cited: 22
On The Use of Quantum Communications for Securing IoT Devices in the 6G Era
Hasan Abbas Al-Mohammed, Elias Yaacoub
2022 IEEE International Conference on Communications Workshops (ICC Workshops) (2021), pp. 1-6
Closed Access | Times Cited: 31
Hasan Abbas Al-Mohammed, Elias Yaacoub
2022 IEEE International Conference on Communications Workshops (ICC Workshops) (2021), pp. 1-6
Closed Access | Times Cited: 31
Current Research Trends in IoT Security: A Systematic Mapping Study
Jee Young Lee, Jungwoo Lee
Mobile Information Systems (2021) Vol. 2021, pp. 1-25
Open Access | Times Cited: 28
Jee Young Lee, Jungwoo Lee
Mobile Information Systems (2021) Vol. 2021, pp. 1-25
Open Access | Times Cited: 28
Journey from cloud of things to fog of things: Survey, new trends, and research directions
Ananya Chakraborty, Mohit Kumar, Nisha Chaurasia, et al.
Software Practice and Experience (2022) Vol. 53, Iss. 2, pp. 496-551
Closed Access | Times Cited: 19
Ananya Chakraborty, Mohit Kumar, Nisha Chaurasia, et al.
Software Practice and Experience (2022) Vol. 53, Iss. 2, pp. 496-551
Closed Access | Times Cited: 19
A Novel Group Theoretic and Graphical Approach for Designing Cryptographically Strong Nonlinear Components of Block Ciphers
Abdul Razaq, Atta Ullah, Hanan Alolaiyan, et al.
Wireless Personal Communications (2020) Vol. 116, Iss. 4, pp. 3165-3190
Closed Access | Times Cited: 27
Abdul Razaq, Atta Ullah, Hanan Alolaiyan, et al.
Wireless Personal Communications (2020) Vol. 116, Iss. 4, pp. 3165-3190
Closed Access | Times Cited: 27
Quantum Key Distribution Protocol Selector Based on Machine Learning for Next-Generation Networks
Ogobuchi Daniel Okey, Siti Sarah Maidin, Renata Lopes Rosa, et al.
Sustainability (2022) Vol. 14, Iss. 23, pp. 15901-15901
Open Access | Times Cited: 16
Ogobuchi Daniel Okey, Siti Sarah Maidin, Renata Lopes Rosa, et al.
Sustainability (2022) Vol. 14, Iss. 23, pp. 15901-15901
Open Access | Times Cited: 16