OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Designing Secure User Authentication Protocol for Big Data Collection in IoT-Based Intelligent Transportation System
Srinivas Jangirala, Ashok Kumar Das, Mohammad Wazid, et al.
IEEE Internet of Things Journal (2020) Vol. 8, Iss. 9, pp. 7727-7744
Closed Access | Times Cited: 93

Showing 1-25 of 93 citing articles:

Internet of Things: Security and Solutions Survey
Pintu Kumar Sadhu, Venkata P. Yanambaka, Ahmed Abdelgawad
Sensors (2022) Vol. 22, Iss. 19, pp. 7433-7433
Open Access | Times Cited: 148

Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things
Chenyu Wang, Ding Wang, Yihe Duan, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 2961-2976
Closed Access | Times Cited: 56

RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones
Muhammad Tanveer, Abd Ullah Khan, Neeraj Kumar, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 2, pp. 1339-1353
Closed Access | Times Cited: 89

Application of IoT in Healthcare: Keys to Implementation of the Sustainable Development Goals
Ángeles Verdejo Espinosa, José Luis López Ruiz, Francisco Mata, et al.
Sensors (2021) Vol. 21, Iss. 7, pp. 2330-2330
Open Access | Times Cited: 74

Survey on Enterprise Internet-of-Things systems (E-IoT): A security perspective
Luis Puche Rondon, Leonardo Babun, Ahmet Arış, et al.
Ad Hoc Networks (2021) Vol. 125, pp. 102728-102728
Open Access | Times Cited: 63

Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices
Qingxuan Wang, Ding Wang
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 597-612
Closed Access | Times Cited: 54

CMAF-IIoT: Chaotic map-based authentication framework for Industrial Internet of Things
Muhammad Tanveer, Akhtar Badshah, Abd Ullah Khan, et al.
Internet of Things (2023) Vol. 23, pp. 100902-100902
Closed Access | Times Cited: 38

SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things
Yunru Zhang, Debiao He, Pandi Vijayakumar, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 11, pp. 9716-9726
Closed Access | Times Cited: 24

PAF-IoD: PUF-Enabled Authentication Framework for the Internet of Drones
Muhammad Tanveer, Abdallah Aldosary, Salah-ud-din Khokhar, et al.
IEEE Transactions on Vehicular Technology (2024) Vol. 73, Iss. 7, pp. 9560-9574
Closed Access | Times Cited: 10

LEAF-IIoT: Lightweight and Efficient Authentication Framework for the Industrial Internet of Things
Muhammad Tanveer, Ahmed A. Abd El‐Latif, Abd Ullah Khan, et al.
IEEE Access (2024) Vol. 12, pp. 31771-31787
Open Access | Times Cited: 8

RUAM-IoD: A Robust User Authentication Mechanism for the Internet of Drones
Muhammad Tanveer, Ahmed Alkhayyat, Alamgir Naushad, et al.
IEEE Access (2022) Vol. 10, pp. 19836-19851
Open Access | Times Cited: 35

Practical and secure multifactor authentication protocol for autonomous vehicles in 5G
Junfeng Miao, Zhaoshun Wang, Xin Ning, et al.
Software Practice and Experience (2022) Vol. 54, Iss. 10, pp. 1852-1869
Closed Access | Times Cited: 34

Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments From a Pragmatic Perspective
Kanneboina Ashok, S. Gopikrishnan
IEEE Access (2023) Vol. 11, pp. 2621-2651
Open Access | Times Cited: 18

ESCI-AKA: Enabling Secure Communication in an IoT-Enabled Smart Home Environment Using Authenticated Key Agreement Framework
Hisham Alasmary, Muhammad Tanveer
Mathematics (2023) Vol. 11, Iss. 16, pp. 3450-3450
Open Access | Times Cited: 16

Decentralized identifiers based IoT data trusted collection
Baitao Zhang, Rui Shi, Xiaolin Li, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

An efficient mobile cloud security method based on strong multi-factor authentication and smart card technology
Cherif Ghazel, Imen Merdassi, Leı̈la Azouz Saı̈dane
Annals of Telecommunications (2025)
Closed Access

Big data applications in intelligent transport systems: a bibliometric analysis and review
Mahbub Hassan, Hridoy Deb Mahin, Abdullah Al Nafees, et al.
Deleted Journal (2025) Vol. 2, Iss. 1
Open Access

A Secure and Efficient Authentication Protocol for Satellite-Terrestrial Networks
Yang Liu, Leiqing Ni, Mugen Peng
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 7, pp. 5810-5822
Closed Access | Times Cited: 26

An Efficient and Physically Secure Privacy-Preserving Key-Agreement Protocol for Vehicular Ad-Hoc Network
Muhammad Asad Saleem, Xiong Li, Muhammad Faizan Ayub, et al.
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 9, pp. 9940-9951
Closed Access | Times Cited: 13

SEAF-IoD: Secure and efficient user authentication framework for the Internet of Drones
Muhammad Tanveer, Abdallah Aldosary, Neeraj Kumar, et al.
Computer Networks (2024) Vol. 247, pp. 110449-110449
Closed Access | Times Cited: 4

Securing Cyber Physical Systems: Lightweight Industrial Internet of Things Authentication (LI2A) for Critical Infrastructure and Manufacturing
Alaa T. Al Ghazo, Mohammed Abu Mallouh, Sa’ed Alajlouni, et al.
Applied System Innovation (2025) Vol. 8, Iss. 1, pp. 11-11
Open Access

Lightweight batch authentication and key agreement scheme for IIoT gateways
Xiaohui Ding, Jian Wang, Yue Zhao, et al.
Journal of Systems Architecture (2025), pp. 103368-103368
Closed Access

Integrating ABHA for authentication and key exchange: A hybrid security framework for smart healthcare in India
Riaz Ahmed Khan, Saba Mushtaq, Sajaad Ahmed Lone, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 3
Closed Access

Resource Management and Security Scheme of ICPSs and IoT Based on VNE Algorithm
Peiying Zhang, Chao Wang, Chunxiao Jiang, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 22, pp. 22071-22080
Open Access | Times Cited: 31

A reputation mechanism based Deep Reinforcement Learning and blockchain to suppress selfish node attack motivation in Vehicular Ad-Hoc Network
Bowei Zhang, Xiaoliang Wang, Ru Xie, et al.
Future Generation Computer Systems (2022) Vol. 139, pp. 17-28
Closed Access | Times Cited: 19

Page 1 - Next Page

Scroll to top