
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Nayeem Ahmad Khan, Adnan Shahid Khan, Hushmat Amin Kar, et al.
(2022), pp. 126-130
Closed Access | Times Cited: 5
Nayeem Ahmad Khan, Adnan Shahid Khan, Hushmat Amin Kar, et al.
(2022), pp. 126-130
Closed Access | Times Cited: 5
Showing 5 citing articles:
Transforming healthcare and fitness with AI powered next-generation smart clothing
Anurag Yadav, Kusum Yadav
Discover Electrochemistry. (2025) Vol. 2, Iss. 1
Open Access
Anurag Yadav, Kusum Yadav
Discover Electrochemistry. (2025) Vol. 2, Iss. 1
Open Access
Information Security: A Coordinated Strategy to Guarantee Data Security in Cloud Computing
Kofi Immanuel Jones, R. Suchithra
International Journal of Data Informatics and Intelligent Computing (2023) Vol. 2, Iss. 1, pp. 11-31
Open Access | Times Cited: 9
Kofi Immanuel Jones, R. Suchithra
International Journal of Data Informatics and Intelligent Computing (2023) Vol. 2, Iss. 1, pp. 11-31
Open Access | Times Cited: 9
Securing Hypervisors in Cloud Computing Environments against Malware Injection
Mohammed Al Qurashi
Indian Journal of Science and Technology (2023) Vol. 16, Iss. 39, pp. 3386-3393
Open Access | Times Cited: 2
Mohammed Al Qurashi
Indian Journal of Science and Technology (2023) Vol. 16, Iss. 39, pp. 3386-3393
Open Access | Times Cited: 2
Employing Incremental Learning for the Detection of Multiclass New Malware Variants
Mohammad Eid Alzahrani
Indian Journal of Science and Technology (2024) Vol. 17, Iss. 10, pp. 941-948
Open Access
Mohammad Eid Alzahrani
Indian Journal of Science and Technology (2024) Vol. 17, Iss. 10, pp. 941-948
Open Access
Assessing the Efficiency of Contemporary Cybersecurity Protocols in Nigeria
Oyetunde Christian Oyedeji., Mubarak A Moronkunbi, Adebayo Adeyinka Victor, et al.
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. 13, Iss. 7, pp. 52-58
Open Access
Oyetunde Christian Oyedeji., Mubarak A Moronkunbi, Adebayo Adeyinka Victor, et al.
International Journal of Latest Technology in Engineering Management & Applied Science (2024) Vol. 13, Iss. 7, pp. 52-58
Open Access
SSL/TLS PROTOCOL ON POST-QUANTUM ALGORITHMS
Stanislav Milevskyi, Natalia Voropay, Olha Korol, et al.
Ukrainian Scientific Journal of Information Security (2024) Vol. 30, Iss. 1, pp. 150-156
Open Access
Stanislav Milevskyi, Natalia Voropay, Olha Korol, et al.
Ukrainian Scientific Journal of Information Security (2024) Vol. 30, Iss. 1, pp. 150-156
Open Access