
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Efficient and Privacy-Preserving Authentication Protocol for Heterogeneous Systems in IIoT
Hu Xiong, Yan Wu, Chuanjie Jin, et al.
IEEE Internet of Things Journal (2020) Vol. 7, Iss. 12, pp. 11713-11724
Closed Access | Times Cited: 65
Hu Xiong, Yan Wu, Chuanjie Jin, et al.
IEEE Internet of Things Journal (2020) Vol. 7, Iss. 12, pp. 11713-11724
Closed Access | Times Cited: 65
Showing 1-25 of 65 citing articles:
Blockchain-Assisted Distributed and Lightweight Authentication Service for Industrial Unmanned Aerial Vehicles
Yawen Tan, Jiadai Wang, Jiajia Liu, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 18, pp. 16928-16940
Closed Access | Times Cited: 70
Yawen Tan, Jiadai Wang, Jiajia Liu, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 18, pp. 16928-16940
Closed Access | Times Cited: 70
A secure blockchain-based group key agreement protocol for IoT
Chien‐Ming Chen, Xiaoting Deng, Wensheng Gan, et al.
The Journal of Supercomputing (2021) Vol. 77, Iss. 8, pp. 9046-9068
Closed Access | Times Cited: 58
Chien‐Ming Chen, Xiaoting Deng, Wensheng Gan, et al.
The Journal of Supercomputing (2021) Vol. 77, Iss. 8, pp. 9046-9068
Closed Access | Times Cited: 58
An enhanced pairing-based authentication scheme for smart grid communications
Tsu‐Yang Wu, Yu-Qi Lee, Chien‐Ming Chen, et al.
Journal of Ambient Intelligence and Humanized Computing (2021)
Closed Access | Times Cited: 56
Tsu‐Yang Wu, Yu-Qi Lee, Chien‐Ming Chen, et al.
Journal of Ambient Intelligence and Humanized Computing (2021)
Closed Access | Times Cited: 56
An Enhanced Multifactor Authentication and Key Agreement Protocol in Industrial Internet of Things
Yiran Han, Hua Guo, Jianwei Liu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 16243-16254
Closed Access | Times Cited: 13
Yiran Han, Hua Guo, Jianwei Liu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 16243-16254
Closed Access | Times Cited: 13
Blockchain applications in UAV industry: Review, opportunities, and challenges
Diana Hawashin, Mohamed Nemer, Senay A. Gebreab, et al.
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103932-103932
Closed Access | Times Cited: 8
Diana Hawashin, Mohamed Nemer, Senay A. Gebreab, et al.
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103932-103932
Closed Access | Times Cited: 8
An Improved Blockchain-Based Authentication Protocol for IoT Network Management
Mostafa Yavari, Masoumeh Safkhani, Saru Kumari, et al.
Security and Communication Networks (2020) Vol. 2020, pp. 1-16
Open Access | Times Cited: 50
Mostafa Yavari, Masoumeh Safkhani, Saru Kumari, et al.
Security and Communication Networks (2020) Vol. 2020, pp. 1-16
Open Access | Times Cited: 50
Improved ECC-Based Three-Factor Multiserver Authentication Scheme
Tsu‐Yang Wu, Lei Yang, Zhiyuan Lee, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-14
Open Access | Times Cited: 48
Tsu‐Yang Wu, Lei Yang, Zhiyuan Lee, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-14
Open Access | Times Cited: 48
Data Harmonization for Heterogeneous Datasets: A Systematic Literature Review
Ganesh Kumar, Shuib Basri, Abdullahi Abubakar Imam, et al.
Applied Sciences (2021) Vol. 11, Iss. 17, pp. 8275-8275
Open Access | Times Cited: 48
Ganesh Kumar, Shuib Basri, Abdullahi Abubakar Imam, et al.
Applied Sciences (2021) Vol. 11, Iss. 17, pp. 8275-8275
Open Access | Times Cited: 48
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions
Ashish Kumar, Rahul Saha, Mauro Conti, et al.
Journal of Network and Computer Applications (2022) Vol. 204, pp. 103414-103414
Closed Access | Times Cited: 37
Ashish Kumar, Rahul Saha, Mauro Conti, et al.
Journal of Network and Computer Applications (2022) Vol. 204, pp. 103414-103414
Closed Access | Times Cited: 37
BP-AKAA: Blockchain-enforced Privacy-preserving Authentication and Key Agreement and Access Control for IIoT
Suhui Liu, Liquan Chen, Hongtao Yu, et al.
Journal of Information Security and Applications (2023) Vol. 73, pp. 103443-103443
Closed Access | Times Cited: 20
Suhui Liu, Liquan Chen, Hongtao Yu, et al.
Journal of Information Security and Applications (2023) Vol. 73, pp. 103443-103443
Closed Access | Times Cited: 20
Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things
Hong Zhong, Chengdong Gu, Qingyang Zhang, et al.
Ad Hoc Networks (2023) Vol. 144, pp. 103137-103137
Closed Access | Times Cited: 19
Hong Zhong, Chengdong Gu, Qingyang Zhang, et al.
Ad Hoc Networks (2023) Vol. 144, pp. 103137-103137
Closed Access | Times Cited: 19
PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system
Wei Zhang, Zhishuo Zhang, Hu Xiong, et al.
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 13, Iss. 1, pp. 613-627
Closed Access | Times Cited: 36
Wei Zhang, Zhishuo Zhang, Hu Xiong, et al.
Journal of Ambient Intelligence and Humanized Computing (2021) Vol. 13, Iss. 1, pp. 613-627
Closed Access | Times Cited: 36
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
Tsu‐Yang Wu, Zhiyuan Lee, Lei Yang, et al.
The Journal of Supercomputing (2021) Vol. 77, Iss. 7, pp. 6992-7020
Closed Access | Times Cited: 34
Tsu‐Yang Wu, Zhiyuan Lee, Lei Yang, et al.
The Journal of Supercomputing (2021) Vol. 77, Iss. 7, pp. 6992-7020
Closed Access | Times Cited: 34
Blockchain-based identity authentication and data interaction scheme for Industrial Internet of Things
Chao Geng, Yang Zhang, Xin Xu, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110143-110143
Closed Access
Chao Geng, Yang Zhang, Xin Xu, et al.
Computers & Electrical Engineering (2025) Vol. 123, pp. 110143-110143
Closed Access
Enhancing Security in IIoT: RFID Authentication Protocol for Edge Computing and Blockchain-enabled Supply Chain
Vikash Kumar, Santosh Kumar Das
Cyber Security and Applications (2025), pp. 100087-100087
Open Access
Vikash Kumar, Santosh Kumar Das
Cyber Security and Applications (2025), pp. 100087-100087
Open Access
Fault-Tolerant Mechanism for Edge-Based IoT Networks With Demand Uncertainty
Amit Samanta, Flavio Esposito, Tri Gia Nguyen
IEEE Internet of Things Journal (2021) Vol. 8, Iss. 23, pp. 16963-16971
Closed Access | Times Cited: 30
Amit Samanta, Flavio Esposito, Tri Gia Nguyen
IEEE Internet of Things Journal (2021) Vol. 8, Iss. 23, pp. 16963-16971
Closed Access | Times Cited: 30
A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks
Tsu‐Yang Wu, Lei Yang, Zhiyuan Lee, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 29
Tsu‐Yang Wu, Lei Yang, Zhiyuan Lee, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 29
A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments
Seunghwan Son, Yohan Park, Youngho Park
Sustainability (2021) Vol. 13, Iss. 16, pp. 9241-9241
Open Access | Times Cited: 29
Seunghwan Son, Yohan Park, Youngho Park
Sustainability (2021) Vol. 13, Iss. 16, pp. 9241-9241
Open Access | Times Cited: 29
Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things
Hu Xiong, Xin Huang, Minghao Yang, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 4, pp. 3097-3111
Closed Access | Times Cited: 29
Hu Xiong, Xin Huang, Minghao Yang, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 4, pp. 3097-3111
Closed Access | Times Cited: 29
Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives
Mahdi R. Alagheband, Atefeh Mashatan
Internet of Things (2022) Vol. 18, pp. 100492-100492
Closed Access | Times Cited: 21
Mahdi R. Alagheband, Atefeh Mashatan
Internet of Things (2022) Vol. 18, pp. 100492-100492
Closed Access | Times Cited: 21
Quantum secured 6G technology-based applications in Internet of Everything
Kumar Prateek, Nitish Kumar Ojha, Fahiem Altaf, et al.
Telecommunication Systems (2022) Vol. 82, Iss. 2, pp. 315-344
Closed Access | Times Cited: 20
Kumar Prateek, Nitish Kumar Ojha, Fahiem Altaf, et al.
Telecommunication Systems (2022) Vol. 82, Iss. 2, pp. 315-344
Closed Access | Times Cited: 20
Efficient Revocable Storage Attribute-based Encryption With Arithmetic Span Programs in Cloud-Assisted Internet of Things
Xin Huang, Hu Xiong, Jinhao Chen, et al.
IEEE Transactions on Cloud Computing (2021) Vol. 11, Iss. 2, pp. 1273-1285
Closed Access | Times Cited: 26
Xin Huang, Hu Xiong, Jinhao Chen, et al.
IEEE Transactions on Cloud Computing (2021) Vol. 11, Iss. 2, pp. 1273-1285
Closed Access | Times Cited: 26
A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks
Tsu‐Yang Wu, Zhiyuan Lee, Lei Yang, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-17
Open Access | Times Cited: 25
Tsu‐Yang Wu, Zhiyuan Lee, Lei Yang, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-17
Open Access | Times Cited: 25
A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing
Zhishuo Zhang, Wei Zhang, Zhiguang Qin
Future Generation Computer Systems (2021) Vol. 123, pp. 181-195
Closed Access | Times Cited: 24
Zhishuo Zhang, Wei Zhang, Zhiguang Qin
Future Generation Computer Systems (2021) Vol. 123, pp. 181-195
Closed Access | Times Cited: 24
Challenges in Integration of Heterogeneous Internet of Things
Muhammad Noaman, Muhammad Sohail Khan, Muhammad Faisal Abrar, et al.
Scientific Programming (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 17
Muhammad Noaman, Muhammad Sohail Khan, Muhammad Faisal Abrar, et al.
Scientific Programming (2022) Vol. 2022, pp. 1-14
Open Access | Times Cited: 17