OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

SAPFS: An Efficient Symmetric-Key Authentication Key Agreement Scheme With Perfect Forward Secrecy for Industrial Internet of Things
Yunru Zhang, Debiao He, Pandi Vijayakumar, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 11, pp. 9716-9726
Closed Access | Times Cited: 24

Showing 24 citing articles:

An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT
Ali Shahidinejad, Jemal Abawajy
ACM Computing Surveys (2024) Vol. 56, Iss. 7, pp. 1-38
Open Access | Times Cited: 45

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
Mohammad Kamrul Hasan, Zhou Weichen, Nurhizam Safie, et al.
IEEE Access (2024) Vol. 12, pp. 61642-61666
Open Access | Times Cited: 27

An Enhanced Multifactor Authentication and Key Agreement Protocol in Industrial Internet of Things
Yiran Han, Hua Guo, Jianwei Liu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 16243-16254
Closed Access | Times Cited: 12

Efficient Blockchain-Based Mutual Authentication and Session Key Agreement for Cross-Domain IIoT
Jie Cui, Yihu Zhu, Hong Zhong, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 16325-16338
Closed Access | Times Cited: 11

LEAF-IIoT: Lightweight and Efficient Authentication Framework for the Industrial Internet of Things
Muhammad Tanveer, Ahmed A. Abd El‐Latif, Abd Ullah Khan, et al.
IEEE Access (2024) Vol. 12, pp. 31771-31787
Open Access | Times Cited: 8

BCAE: A Blockchain-Based Cross Domain Authentication Scheme for Edge Computing
Shiwen Zhang, Ziwei Yan, Wei Liang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 24035-24048
Closed Access | Times Cited: 6

Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review
Nazhatul Hafizah Kamarudin, Nur Hanis Sabrina Suhaimi, Fadilla ’Atyka Nor Rashid, et al.
Symmetry (2024) Vol. 16, Iss. 2, pp. 171-171
Open Access | Times Cited: 5

A Secure Authentication Algorithm for Medical IoT using Steganography and Cryptography
Wubie Engdew Hailu, B. Ravindra Babu, B KrishnaPrasad, et al.
Journal of Machine and Computing (2025), pp. 409-420
Closed Access

Securing Cyber Physical Systems: Lightweight Industrial Internet of Things Authentication (LI2A) for Critical Infrastructure and Manufacturing
Alaa T. Al Ghazo, Mohammed Abu Mallouh, Sa’ed Alajlouni, et al.
Applied System Innovation (2025) Vol. 8, Iss. 1, pp. 11-11
Open Access

Optimizing Industrial IoT Data Security Through Blockchain-Enabled Incentive-Driven Game Theoretic Approach for Data Sharing
Muhammad Noman Sohail, Adeel Anjum, Iftikhar Ahmed Saeed, et al.
IEEE Access (2024) Vol. 12, pp. 51176-51192
Open Access | Times Cited: 2

Secure and Efficient Biometric-Based Anonymous Authentication Scheme for Mobile-Edge Computing
Qiang Zhu, Lin You, Gengran Hu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33604-33623
Closed Access | Times Cited: 2

V2X Application Server and Vehicle Centric Distribution of Commitments for V2V Message Authentication
Mujahid Muhammad, Ghazanfar Ali Safdar
Ad Hoc Networks (2024) Vol. 167, pp. 103701-103701
Closed Access | Times Cited: 2

Designing Anonymous Key Agreement Scheme for Secure Vehicular Ad-Hoc Networks
Md Ismail, Santanu Chatterjee, Jamuna Kanta Sing, et al.
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 9, pp. 11382-11396
Closed Access | Times Cited: 1

Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired Security
Yimin Guo, Guo Ya-jun, Ping Xiong, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4615-4627
Closed Access | Times Cited: 1

A robust and effective 3-factor authentication protocol for smart factory in IIoT
Shihong Zou, Qiang Cao, Ruichao Lu, et al.
Computer Communications (2024) Vol. 220, pp. 81-93
Closed Access | Times Cited: 1

A Lightweight Authentication Protocol for IoT-Based Applications Using Reconfigurable Noisy PUFs
Amir Masoud Aminian Modarres, Ghazaleh Sarbishaei
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 9, pp. 11384-11392
Closed Access | Times Cited: 1

Sustainable Authentication and Key Agreement Protocol Using Chaotic Maps for Industry 5.0
Tao Zhang, Jian Shen, Huijie Yang, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 1580-1589
Closed Access | Times Cited: 4

A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks
Zhiyu Xu, Liangliang Wang, Yiyuan Luo, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 8, pp. 13482-13495
Closed Access | Times Cited: 2

ECC based Authentication Approach for Secure Communication in IoT Application
S. Thanga Revathi, A. Gayathri, A. Sathya, et al.
Journal of Internet Services and Information Security (2023) Vol. 13, Iss. 4, pp. 88-103
Open Access | Times Cited: 2

SLMA: Secure and Lightweight Mutual Authentication Scheme for IoT-Based Healthcare
Preeti Dhankar, Priya Sharma, Bhargavi Singh
Lecture notes in networks and systems (2024), pp. 303-310
Closed Access

A Secure and Efficient Authentication Scheme for Large-Scale IoT Devices Based on Zero-Knowledge Proof
Ziyi Su, Shiwei Wang, Hongliu Cai, et al.
Electronics (2024) Vol. 13, Iss. 18, pp. 3735-3735
Open Access

DEAC-IoT: Design of lightweight authenticated key agreement protocol for Intra and Inter-IoT device communication using ECC with FPGA implementation
Mohammad Abdussami, Sanjeev Kumar Dwivedi, Taher Al‐Shehari, et al.
Computers & Electrical Engineering (2024) Vol. 120, pp. 109696-109696
Closed Access

Page 1

Scroll to top