
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Efficiency of Strategic Data Sharing and Management Protocols
Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela
(2016), pp. 198-201
Closed Access | Times Cited: 35
Lidia Ogiela, Marek R. Ogiela, Urszula Ogiela
(2016), pp. 198-201
Closed Access | Times Cited: 35
Showing 1-25 of 35 citing articles:
Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey
Dun Li, Dezhi Han, Tien‐Hsiung Weng, et al.
Soft Computing (2021) Vol. 26, Iss. 9, pp. 4423-4440
Open Access | Times Cited: 146
Dun Li, Dezhi Han, Tien‐Hsiung Weng, et al.
Soft Computing (2021) Vol. 26, Iss. 9, pp. 4423-4440
Open Access | Times Cited: 146
Linguistic techniques for cryptographic data sharing algorithms
Urszula Ogiela, Lidia Ogiela
Concurrency and Computation Practice and Experience (2017) Vol. 30, Iss. 3
Open Access | Times Cited: 39
Urszula Ogiela, Lidia Ogiela
Concurrency and Computation Practice and Experience (2017) Vol. 30, Iss. 3
Open Access | Times Cited: 39
Cognitive cryptography for data security in cloud computing
Urszula Ogiela
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 18
Closed Access | Times Cited: 31
Urszula Ogiela
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 18
Closed Access | Times Cited: 31
Securing PIN‐based authentication in smartwatches with just two gestures
Meriem Guerar, Mauro Migliardi, Francesco Palmieri, et al.
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 18
Open Access | Times Cited: 26
Meriem Guerar, Mauro Migliardi, Francesco Palmieri, et al.
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 18
Open Access | Times Cited: 26
A privacy preserving homomorphic computing toolkit for predictive computation
Kaiyang Zhao, Xu An Wang, Bo Yang, et al.
Information Processing & Management (2022) Vol. 59, Iss. 2, pp. 102880-102880
Closed Access | Times Cited: 12
Kaiyang Zhao, Xu An Wang, Bo Yang, et al.
Information Processing & Management (2022) Vol. 59, Iss. 2, pp. 102880-102880
Closed Access | Times Cited: 12
Cognitive solutions for security and cryptography
Marek R. Ogiela
Cognitive Systems Research (2019) Vol. 55, pp. 258-261
Closed Access | Times Cited: 10
Marek R. Ogiela
Cognitive Systems Research (2019) Vol. 55, pp. 258-261
Closed Access | Times Cited: 10
New public auditing protocol based on homomorphic tags for secure cloud storage
Jindan Zhang, Baocang Wang, Marek R. Ogiela, et al.
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 18
Closed Access | Times Cited: 10
Jindan Zhang, Baocang Wang, Marek R. Ogiela, et al.
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 18
Closed Access | Times Cited: 10
QoS‐aware big service composition using distributed co‐evolutionary algorithm
Avik Dutta, Chandrashekar Jatoth, G. R. Gangadharan, et al.
Concurrency and Computation Practice and Experience (2021) Vol. 33, Iss. 19
Closed Access | Times Cited: 8
Avik Dutta, Chandrashekar Jatoth, G. R. Gangadharan, et al.
Concurrency and Computation Practice and Experience (2021) Vol. 33, Iss. 19
Closed Access | Times Cited: 8
Visual CAPTCHA application in linguistic cryptography
Urszula Ogiela, Makoto Takizawa, Lidia Ogiela
Concurrency and Computation Practice and Experience (2017) Vol. 30, Iss. 2
Closed Access | Times Cited: 8
Urszula Ogiela, Makoto Takizawa, Lidia Ogiela
Concurrency and Computation Practice and Experience (2017) Vol. 30, Iss. 2
Closed Access | Times Cited: 8
Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT
Kyungroul Lee, Kangbin Yim
Digital Communications and Networks (2021) Vol. 8, Iss. 2, pp. 124-131
Open Access | Times Cited: 6
Kyungroul Lee, Kangbin Yim
Digital Communications and Networks (2021) Vol. 8, Iss. 2, pp. 124-131
Open Access | Times Cited: 6
Safety and Standardization of Data Sharing Techniques and Protocols for Management of Strategic Data
Lidia Ogiela, Marek R. Ogiela, Makoto Takizawa
(2017), pp. 1076-1081
Closed Access | Times Cited: 5
Lidia Ogiela, Marek R. Ogiela, Makoto Takizawa
(2017), pp. 1076-1081
Closed Access | Times Cited: 5
Authentication Protocols Using Multi-level Cognitive CAPTCHA
Marek R. Ogiela, Lidia Ogiela
Lecture notes on data engineering and communications technologies (2019), pp. 114-119
Closed Access | Times Cited: 4
Marek R. Ogiela, Lidia Ogiela
Lecture notes on data engineering and communications technologies (2019), pp. 114-119
Closed Access | Times Cited: 4
Minority oversampling based on the attraction‐repulsion Weber problem
Ugo Fiore
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 18
Closed Access | Times Cited: 4
Ugo Fiore
Concurrency and Computation Practice and Experience (2019) Vol. 32, Iss. 18
Closed Access | Times Cited: 4
Bio-metric authentication with electrocardiogram (ECG) by considering variable signals
Hoon Ko, KwangCheol Rim, Jong Youl Hong
Mathematical Biosciences & Engineering (2022) Vol. 20, Iss. 2, pp. 1716-1729
Open Access | Times Cited: 3
Hoon Ko, KwangCheol Rim, Jong Youl Hong
Mathematical Biosciences & Engineering (2022) Vol. 20, Iss. 2, pp. 1716-1729
Open Access | Times Cited: 3
Towards cognitive service management and semantic information sharing in the Cloud
Lidia Ogiela, Marek R. Ogiela
Multimedia Tools and Applications (2017) Vol. 77, Iss. 14, pp. 18625-18635
Closed Access | Times Cited: 3
Lidia Ogiela, Marek R. Ogiela
Multimedia Tools and Applications (2017) Vol. 77, Iss. 14, pp. 18625-18635
Closed Access | Times Cited: 3
Cognitive Personal Security Systems
Marek R. Ogiela, Lidia Ogiela
Advances in intelligent systems and computing (2019), pp. 87-90
Closed Access | Times Cited: 3
Marek R. Ogiela, Lidia Ogiela
Advances in intelligent systems and computing (2019), pp. 87-90
Closed Access | Times Cited: 3
Cognitive Approaches for Sensor Data Analysis in Transformative Computing
Marek R. Ogiela, Lidia Ogiela
Lecture notes on data engineering and communications technologies (2020), pp. 210-214
Closed Access | Times Cited: 3
Marek R. Ogiela, Lidia Ogiela
Lecture notes on data engineering and communications technologies (2020), pp. 210-214
Closed Access | Times Cited: 3
A machine learning‐based memory forensics methodology for TOR browser artifacts
Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, et al.
Concurrency and Computation Practice and Experience (2020) Vol. 33, Iss. 23
Closed Access | Times Cited: 3
Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, et al.
Concurrency and Computation Practice and Experience (2020) Vol. 33, Iss. 23
Closed Access | Times Cited: 3
Multi-level Authentication Protocols Using Scientific Expertise Approach
Marek R. Ogiela, Lidia Ogiela
Advances in intelligent systems and computing (2019), pp. 176-180
Closed Access | Times Cited: 2
Marek R. Ogiela, Lidia Ogiela
Advances in intelligent systems and computing (2019), pp. 176-180
Closed Access | Times Cited: 2
Application of Cognitive Protocols in Transformative Computing
Marek R. Ogiela, Lidia Ogiela
Lecture notes in networks and systems (2019), pp. 428-432
Closed Access | Times Cited: 2
Marek R. Ogiela, Lidia Ogiela
Lecture notes in networks and systems (2019), pp. 428-432
Closed Access | Times Cited: 2
Cognitive Approaches for Medicine in Cloud Computing
Urszula Ogiela, Makoto Takizawa, Lidia Ogiela
Journal of Medical Systems (2018) Vol. 42, Iss. 4
Closed Access | Times Cited: 1
Urszula Ogiela, Makoto Takizawa, Lidia Ogiela
Journal of Medical Systems (2018) Vol. 42, Iss. 4
Closed Access | Times Cited: 1
Visual Cognitive CAPTCHA Based on Expert Knowledge
Lidia Ogiela, Marek R. Ogiela
(2019), pp. 17-20
Closed Access | Times Cited: 1
Lidia Ogiela, Marek R. Ogiela
(2019), pp. 17-20
Closed Access | Times Cited: 1
Application of Perceptual Features for User Authentication in Distributed Systems
Marek R. Ogiela, Lidia Ogiela
Advances in intelligent systems and computing (2019), pp. 132-136
Closed Access | Times Cited: 1
Marek R. Ogiela, Lidia Ogiela
Advances in intelligent systems and computing (2019), pp. 132-136
Closed Access | Times Cited: 1
Eye Movement Patterns as a Cryptographic Lock
Marek R. Ogiela, Lidia Ogiela
Advances in intelligent systems and computing (2020), pp. 145-148
Closed Access | Times Cited: 1
Marek R. Ogiela, Lidia Ogiela
Advances in intelligent systems and computing (2020), pp. 145-148
Closed Access | Times Cited: 1
Intelligent Devices, Device Management, and Device Security for Cloud Platforms
M. Nalini
Advances in computational intelligence and robotics book series (2022), pp. 1-22
Closed Access | Times Cited: 1
M. Nalini
Advances in computational intelligence and robotics book series (2022), pp. 1-22
Closed Access | Times Cited: 1