
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Provably Secure Protocol for 5G HetNets
Vincent Omollo Nyangaresi
2021 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS) (2021), pp. 17-22
Closed Access | Times Cited: 34
Vincent Omollo Nyangaresi
2021 IEEE International Conference on Microwaves, Antennas, Communications and Electronic Systems (COMCAS) (2021), pp. 17-22
Closed Access | Times Cited: 34
Showing 1-25 of 34 citing articles:
A Formally Validated Authentication Algorithm for Secure Message Forwarding in Smart Home Networks
Vincent Omollo Nyangaresi
SN Computer Science (2022) Vol. 3, Iss. 5
Closed Access | Times Cited: 40
Vincent Omollo Nyangaresi
SN Computer Science (2022) Vol. 3, Iss. 5
Closed Access | Times Cited: 40
Symmetric Key Based Scheme for Verification Token Generation in Internet of Things Communication Environment
Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, et al.
(2022), pp. 46-64
Closed Access | Times Cited: 27
Keyan Abdul-Aziz Mutlaq, Vincent Omollo Nyangaresi, Mohd Adib Omar, et al.
(2022), pp. 46-64
Closed Access | Times Cited: 27
Anonymity preserving security protocol for wireless body area networks: towards the secure remote patient healthcare monitoring
Vincent Omollo Nyangaresi
Elsevier eBooks (2025), pp. 293-312
Closed Access
Vincent Omollo Nyangaresi
Elsevier eBooks (2025), pp. 293-312
Closed Access
A comparative analysis of recurrent neural network and support vector machine for binary classification of spam short message service
David Odera, Gloria Odiaga
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 9, Iss. 1, pp. 127-152
Open Access | Times Cited: 7
David Odera, Gloria Odiaga
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 9, Iss. 1, pp. 127-152
Open Access | Times Cited: 7
Safeguarding the future: A comprehensive analysis of security measures for smart grids
Sharmwey A. Wasumwa
World Journal of Advanced Research and Reviews (2023) Vol. 19, Iss. 1, pp. 847-871
Open Access | Times Cited: 6
Sharmwey A. Wasumwa
World Journal of Advanced Research and Reviews (2023) Vol. 19, Iss. 1, pp. 847-871
Open Access | Times Cited: 6
Security risks in the software development lifecycle: A review
David Odera, Martin Otieno, Jairus Ekume Ounza
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 2, pp. 230-253
Open Access | Times Cited: 5
David Odera, Martin Otieno, Jairus Ekume Ounza
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 2, pp. 230-253
Open Access | Times Cited: 5
An extensive survey of smart agriculture technologies: Current security posture
Martin Otieno
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 1207-1231
Open Access | Times Cited: 5
Martin Otieno
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 1207-1231
Open Access | Times Cited: 5
A survey on security challenges in the current MANET routing protocols
Fridah Chepkemoi Korir, Wilson Cheruiyot
Global Journal of Engineering and Technology Advances (2022) Vol. 12, Iss. 1, pp. 078-091
Open Access | Times Cited: 8
Fridah Chepkemoi Korir, Wilson Cheruiyot
Global Journal of Engineering and Technology Advances (2022) Vol. 12, Iss. 1, pp. 078-091
Open Access | Times Cited: 8
Techniques and protocols for enhancing data privacy in cloud computing: A review
MARTIN OTIENO
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 1, pp. 391-404
Open Access | Times Cited: 4
MARTIN OTIENO
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 1, pp. 391-404
Open Access | Times Cited: 4
A taxonomical survey of 5G and 6G security and privacy issues
Jairus Ekume Ounza
Global Journal of Engineering and Technology Advances (2023) Vol. 14, Iss. 3, pp. 042-060
Open Access | Times Cited: 4
Jairus Ekume Ounza
Global Journal of Engineering and Technology Advances (2023) Vol. 14, Iss. 3, pp. 042-060
Open Access | Times Cited: 4
Assessment of existing cyber-attack detection models for web-based systems
Odiaga Gloria Awuor
Global Journal of Engineering and Technology Advances (2023) Vol. 15, Iss. 1, pp. 070-089
Open Access | Times Cited: 4
Odiaga Gloria Awuor
Global Journal of Engineering and Technology Advances (2023) Vol. 15, Iss. 1, pp. 070-089
Open Access | Times Cited: 4
Theory and practice in secure software development lifecycle: A comprehensive survey
Martin Otieno, David Odera, Jairus Ekume Ounza
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 053-078
Open Access | Times Cited: 4
Martin Otieno, David Odera, Jairus Ekume Ounza
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 053-078
Open Access | Times Cited: 4
Security challenges in cloud computing: A comprehensive analysis
Janet Julia Ang'udi
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 10, Iss. 2, pp. 155-181
Open Access | Times Cited: 4
Janet Julia Ang'udi
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 10, Iss. 2, pp. 155-181
Open Access | Times Cited: 4
Temporary Symmetric Key Based Message Verification Protocol for Smart Energy Networks
Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Junchao Ma, et al.
2022 IEEE 7th International Energy Conference (ENERGYCON) (2022), pp. 1-6
Closed Access | Times Cited: 6
Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Junchao Ma, et al.
2022 IEEE 7th International Energy Conference (ENERGYCON) (2022), pp. 1-6
Closed Access | Times Cited: 6
Transient Session Key Derivation Protocol for Key Escrow Prevention in Public Key Infrastructure
Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Ismail Yaqub Maolood, et al.
(2023), pp. 103-116
Closed Access | Times Cited: 3
Vincent Omollo Nyangaresi, Zaid Ameen Abduljabbar, Ismail Yaqub Maolood, et al.
(2023), pp. 103-116
Closed Access | Times Cited: 3
A survey of healthcare sector digitization strategies: Vulnerabilities, countermeasures and opportunities
Judith Nyakanga Nyakina, Bahaa Hussein Taher
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 1, pp. 282-301
Open Access | Times Cited: 3
Judith Nyakanga Nyakina, Bahaa Hussein Taher
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 1, pp. 282-301
Open Access | Times Cited: 3
Federated learning and differential privacy in clinical health: Extensive survey
David Odera
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 2, pp. 305-329
Open Access | Times Cited: 3
David Odera
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 2, pp. 305-329
Open Access | Times Cited: 3
Review of the techniques and mechanisms for enhancing trust in internet of things for smart agriculture
Martin Otieno
Global Journal of Engineering and Technology Advances (2023) Vol. 15, Iss. 1, pp. 050-063
Open Access | Times Cited: 2
Martin Otieno
Global Journal of Engineering and Technology Advances (2023) Vol. 15, Iss. 1, pp. 050-063
Open Access | Times Cited: 2
Security challenges in civil registration: safeguarding vital information in an evolving landscape
Peter Kennedy Okoth
World Journal of Advanced Research and Reviews (2023) Vol. 19, Iss. 1, pp. 1051-1071
Open Access | Times Cited: 2
Peter Kennedy Okoth
World Journal of Advanced Research and Reviews (2023) Vol. 19, Iss. 1, pp. 1051-1071
Open Access | Times Cited: 2
Low Bandwidth and Side-Channeling Resilient Algorithm for Pervasive Computing Systems
Vincent Omollo Nyangaresi, Mustafa S. Khalefa, Zaid Ameen Abduljabbar, et al.
Algorithms for intelligent systems (2022), pp. 193-208
Closed Access | Times Cited: 4
Vincent Omollo Nyangaresi, Mustafa S. Khalefa, Zaid Ameen Abduljabbar, et al.
Algorithms for intelligent systems (2022), pp. 193-208
Closed Access | Times Cited: 4
Software security models and frameworks: an overview and current trends
Fridah C. Korir
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 2, pp. 086-109
Open Access | Times Cited: 1
Fridah C. Korir
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 2, pp. 086-109
Open Access | Times Cited: 1
Review of the security challenges in web-based systems
Odiaga Gloria Awuor
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 2, pp. 204-216
Open Access | Times Cited: 1
Odiaga Gloria Awuor
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 8, Iss. 2, pp. 204-216
Open Access | Times Cited: 1
Current security and privacy posture in wireless body area networks
Joshua Auko
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 1185-1206
Open Access | Times Cited: 1
Joshua Auko
World Journal of Advanced Research and Reviews (2023) Vol. 18, Iss. 3, pp. 1185-1206
Open Access | Times Cited: 1
Health information systems security: Risks, prospects and frameworks
Henry Mathews Odiango, Silvance O. Abeka, Samuel Liyala
World Journal of Advanced Engineering Technology and Sciences (2022) Vol. 6, Iss. 2, pp. 057-070
Open Access | Times Cited: 2
Henry Mathews Odiango, Silvance O. Abeka, Samuel Liyala
World Journal of Advanced Engineering Technology and Sciences (2022) Vol. 6, Iss. 2, pp. 057-070
Open Access | Times Cited: 2
Wireless body area networks: A critical review of the state-of-the-art security schemes
Joshua Auko, Silvance O. Abeka
Global Journal of Engineering and Technology Advances (2022) Vol. 12, Iss. 1, pp. 131-146
Open Access | Times Cited: 2
Joshua Auko, Silvance O. Abeka
Global Journal of Engineering and Technology Advances (2022) Vol. 12, Iss. 1, pp. 131-146
Open Access | Times Cited: 2