
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Cryptanalysis of Biometric Based Secure User Authentication Protocol for IoT Applications
RVS Praveen, P. Pabitha
(2022), pp. 1-6
Closed Access | Times Cited: 23
RVS Praveen, P. Pabitha
(2022), pp. 1-6
Closed Access | Times Cited: 23
Showing 23 citing articles:
ASK-RAM-IMOT: Autonomous Shared Keys based Remote Authentication Method for Internet of Medical Things Applications
RVS Praveen, P. Pabitha
Wireless Personal Communications (2023) Vol. 131, Iss. 1, pp. 273-293
Closed Access | Times Cited: 35
RVS Praveen, P. Pabitha
Wireless Personal Communications (2023) Vol. 131, Iss. 1, pp. 273-293
Closed Access | Times Cited: 35
A Comparative Study of Deep Learning Models for ECG Signal-based User Classification
P. Pabitha, RVS Praveen, Kamma Cheruvu Jayaraja Chandana, et al.
(2023)
Closed Access | Times Cited: 17
P. Pabitha, RVS Praveen, Kamma Cheruvu Jayaraja Chandana, et al.
(2023)
Closed Access | Times Cited: 17
A Review on Machine Learning-based Malware Detection Techniques for Internet of Things (IoT) Environments
S. Sasikala, Sengathir Janakiraman
Wireless Personal Communications (2023) Vol. 132, Iss. 3, pp. 1961-1974
Closed Access | Times Cited: 6
S. Sasikala, Sengathir Janakiraman
Wireless Personal Communications (2023) Vol. 132, Iss. 3, pp. 1961-1974
Closed Access | Times Cited: 6
Teaching Learning-Based Optimization for Medical IoT applications Service Placement in Fog Computing
R Baskar, E. Mohanraj, T Sneka, et al.
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2024)
Closed Access | Times Cited: 2
R Baskar, E. Mohanraj, T Sneka, et al.
2020 IEEE International Students' Conference on Electrical,Electronics and Computer Science (SCEECS) (2024)
Closed Access | Times Cited: 2
LBA-PAKE: Lattice-Based Anonymous Password Based Authentication Key Exchange Scheme for VANET
Arman Ahmad, S. Jagatheswari
(2023), pp. 1-8
Closed Access | Times Cited: 5
Arman Ahmad, S. Jagatheswari
(2023), pp. 1-8
Closed Access | Times Cited: 5
Privacy-Preserving Brakerski-Gentry-Vaikuntanathan (BGV) Homomorphic Encryption for IoMT Data Security
V. Vinoth Kumar, P. Pabitha
(2024), pp. 1-6
Closed Access | Times Cited: 1
V. Vinoth Kumar, P. Pabitha
(2024), pp. 1-6
Closed Access | Times Cited: 1
A Case Study Using Companies to Examine the Nmap Tool’s Applicability for Network Security Assessment
J. Asokan, A. Kaleel Rahuman, B. Suganthi, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 3
J. Asokan, A. Kaleel Rahuman, B. Suganthi, et al.
(2023), pp. 1-6
Closed Access | Times Cited: 3
NeuroCluster: Neural Networks for Intelligent Energy-Aware Clustering in IIoT
R. Sujatha, Raghavan Gopalakrishnan, V Shreemitha, et al.
(2024), pp. 1-6
Closed Access
R. Sujatha, Raghavan Gopalakrishnan, V Shreemitha, et al.
(2024), pp. 1-6
Closed Access
Intelligent Decision-making Algorithm for IoT Enabled Smart shopping
J Mythili, S T Menmoli, S Dhanusuya, et al.
2022 International Conference on Communication, Computing and Internet of Things (IC3IoT) (2024), pp. 1-7
Closed Access
J Mythili, S T Menmoli, S Dhanusuya, et al.
2022 International Conference on Communication, Computing and Internet of Things (IC3IoT) (2024), pp. 1-7
Closed Access
Epileptic Seizure Diagnosis using Bayesian Belief Network and T-CNN
S Poovarasu, R. Gopinath, A Mohanraj, et al.
(2024), pp. 1-6
Closed Access
S Poovarasu, R. Gopinath, A Mohanraj, et al.
(2024), pp. 1-6
Closed Access
Enhancing Cyber-Attack Detection in IoT Networks through Deep Reinforcement Learning
T Subalaxmi, R Akalya, R Kaviya, et al.
(2024), pp. 1-6
Closed Access
T Subalaxmi, R Akalya, R Kaviya, et al.
(2024), pp. 1-6
Closed Access
Hybrid LSTM-RNN and Lion Optimization Algorithm for IoT-based Proactive Healthcare Data Management
R. Kabila, Shruthi Balaji, V Vikraam, et al.
(2024), pp. 1-7
Closed Access
R. Kabila, Shruthi Balaji, V Vikraam, et al.
(2024), pp. 1-7
Closed Access
Differential Privacy in Spatial Task Assignment for Cloud Crowdsourcing
S Santhosh, S. M. Vadivel, Prana Yoga, et al.
(2024), pp. 1-6
Closed Access
S Santhosh, S. M. Vadivel, Prana Yoga, et al.
(2024), pp. 1-6
Closed Access
Designing an Authentication Methodology in IoT Using Energy Consumption Patterns
Edi Marian Timofte, Alexandra Ligia Balan, Teodor Iftime
(2024), pp. 64-70
Closed Access
Edi Marian Timofte, Alexandra Ligia Balan, Teodor Iftime
(2024), pp. 64-70
Closed Access
An IoT-based Smart Grains Warehouse Monitoring System
R. Arun, J. Manju, A. G. Balamurugan, et al.
AIP conference proceedings (2024) Vol. 3075, pp. 020144-020144
Closed Access
R. Arun, J. Manju, A. G. Balamurugan, et al.
AIP conference proceedings (2024) Vol. 3075, pp. 020144-020144
Closed Access
Hybrid Multi-objective Harris-Hawks and Moth-Flame Optimization Algorithm for Efficient Task Offloading strategy in IoT-Based Fog Computing Applications
M. Saranya, P. Pabitha
(2024), pp. 1-6
Closed Access
M. Saranya, P. Pabitha
(2024), pp. 1-6
Closed Access
An Approach for Securing IoT Data using Blockchain and Proxy Re-Encryption
M. Saradha, B Keerthivasan, Mpl Arunachalam, et al.
(2024), pp. 1-6
Closed Access
M. Saradha, B Keerthivasan, Mpl Arunachalam, et al.
(2024), pp. 1-6
Closed Access
Improving Healthcare Data Security Using Cheon-Kim-Kim-Song (CKKS) Homomorphic Encryption
P. Sathishkumar, K Pugalarasan, C Ponnparamaguru, et al.
(2024), pp. 1-6
Closed Access
P. Sathishkumar, K Pugalarasan, C Ponnparamaguru, et al.
(2024), pp. 1-6
Closed Access
Recycling as a Service: IoT Enabled Smart Waste Management System with Machine Learning
R. Poonkuzhali, M Karamath, S. Poonkuzhali, et al.
(2024) Vol. 12, pp. 1-6
Closed Access
R. Poonkuzhali, M Karamath, S. Poonkuzhali, et al.
(2024) Vol. 12, pp. 1-6
Closed Access
An Efficacy Analysis of Data using Fuzzy Logic and Fractal Encryption Techniques for Cloud Platform Data Security
P Dineshkumar, V Jeeva, C Nithiesh, et al.
(2024), pp. 1-6
Closed Access
P Dineshkumar, V Jeeva, C Nithiesh, et al.
(2024), pp. 1-6
Closed Access
Predictive Power of Logistic Regression in Cryptocurrency Price Analysis
R Poonkuzhali, J Hitesh Paliwal, Govind Hariharan, et al.
(2024), pp. 1-6
Closed Access
R Poonkuzhali, J Hitesh Paliwal, Govind Hariharan, et al.
(2024), pp. 1-6
Closed Access
Enhancing IoT Data Security with Blockchain Based Inner Product Encryption Algorithm
Dr K Poongodi, C Gopica, Astuty Amrin, et al.
(2024), pp. 1-6
Closed Access
Dr K Poongodi, C Gopica, Astuty Amrin, et al.
(2024), pp. 1-6
Closed Access
Enhanced Cloud Data Security with Lightweight Chaotic Map and Quantum Key Distribution
M. V. Anjana Devi, G Aasha, Pandey Vimal, et al.
(2024), pp. 1-6
Closed Access
M. V. Anjana Devi, G Aasha, Pandey Vimal, et al.
(2024), pp. 1-6
Closed Access