
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
LCDMA: Lightweight Cross-Domain Mutual Identity Authentication Scheme for Internet of Things
Bei Gong, Guiping Zheng, Muhammad Waqas, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 14, pp. 12590-12602
Open Access | Times Cited: 29
Bei Gong, Guiping Zheng, Muhammad Waqas, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 14, pp. 12590-12602
Open Access | Times Cited: 29
Showing 1-25 of 29 citing articles:
A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
Mohammad Kamrul Hasan, Zhou Weichen, Nurhizam Safie, et al.
IEEE Access (2024) Vol. 12, pp. 61642-61666
Open Access | Times Cited: 27
Mohammad Kamrul Hasan, Zhou Weichen, Nurhizam Safie, et al.
IEEE Access (2024) Vol. 12, pp. 61642-61666
Open Access | Times Cited: 27
EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable Computing
Shanshan Tu, Akhtar Badshah, Hisham Alasmary, et al.
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 5, pp. 4752-4763
Open Access | Times Cited: 15
Shanshan Tu, Akhtar Badshah, Hisham Alasmary, et al.
IEEE Transactions on Mobile Computing (2023) Vol. 23, Iss. 5, pp. 4752-4763
Open Access | Times Cited: 15
BCAE: A Blockchain-Based Cross Domain Authentication Scheme for Edge Computing
Shiwen Zhang, Ziwei Yan, Wei Liang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 24035-24048
Closed Access | Times Cited: 6
Shiwen Zhang, Ziwei Yan, Wei Liang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 13, pp. 24035-24048
Closed Access | Times Cited: 6
Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review
Nazhatul Hafizah Kamarudin, Nur Hanis Sabrina Suhaimi, Fadilla ’Atyka Nor Rashid, et al.
Symmetry (2024) Vol. 16, Iss. 2, pp. 171-171
Open Access | Times Cited: 5
Nazhatul Hafizah Kamarudin, Nur Hanis Sabrina Suhaimi, Fadilla ’Atyka Nor Rashid, et al.
Symmetry (2024) Vol. 16, Iss. 2, pp. 171-171
Open Access | Times Cited: 5
An efficient conjunctive keyword searchable encryption for cloud-based IoT systems
Tianqi Peng, Bei Gong, Chong Guo, et al.
Digital Communications and Networks (2025)
Open Access
Tianqi Peng, Bei Gong, Chong Guo, et al.
Digital Communications and Networks (2025)
Open Access
Enhancing Security in ZigBee Wireless Sensor Networks: A New Approach and Mutual Authentication Scheme for D2D Communication
Alaa Allakany, Abeer Saber, Samih M. Mostafa, et al.
Sensors (2023) Vol. 23, Iss. 12, pp. 5703-5703
Open Access | Times Cited: 12
Alaa Allakany, Abeer Saber, Samih M. Mostafa, et al.
Sensors (2023) Vol. 23, Iss. 12, pp. 5703-5703
Open Access | Times Cited: 12
A Decentralized Proxy-JRC Authentication System for Scalable IETF 6TiSCH Networks
Hakan Aydın, Sedat Görmüş, Burak Aydın
IEEE Access (2024) Vol. 12, pp. 90952-90970
Open Access | Times Cited: 2
Hakan Aydın, Sedat Görmüş, Burak Aydın
IEEE Access (2024) Vol. 12, pp. 90952-90970
Open Access | Times Cited: 2
AP-CDE: Cost-Efficient Authentication Protocol for Cross-Domain Data Exchange in IIoT
Kai Wang, Kaisheng Sun, Jiankuo Dong, et al.
IEEE Systems Journal (2023) Vol. 17, Iss. 3, pp. 3882-3893
Closed Access | Times Cited: 5
Kai Wang, Kaisheng Sun, Jiankuo Dong, et al.
IEEE Systems Journal (2023) Vol. 17, Iss. 3, pp. 3882-3893
Closed Access | Times Cited: 5
CABC: A Cross-Domain Authentication Method Combining Blockchain with Certificateless Signature for IIoT
Libo Feng, Qiu Fei, Kai Hu, et al.
Future Generation Computer Systems (2024) Vol. 158, pp. 516-529
Closed Access | Times Cited: 1
Libo Feng, Qiu Fei, Kai Hu, et al.
Future Generation Computer Systems (2024) Vol. 158, pp. 516-529
Closed Access | Times Cited: 1
ECC-PDGPP: ECC-Based Parallel Dependency RFID-Grouping-Proof Protocol Using Zero-Knowledge Property in the Internet of Things Environment
Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, et al.
IEEE Open Journal of the Computer Society (2024) Vol. 5, pp. 329-342
Open Access | Times Cited: 1
Suman Majumder, Sangram Ray, Dipanwita Sadhukhan, et al.
IEEE Open Journal of the Computer Society (2024) Vol. 5, pp. 329-342
Open Access | Times Cited: 1
A Method for Detecting LDoS Attacks in SDWSN Based on Compressed Hilbert–Huang Transform and Convolutional Neural Networks
Yazhi Liu, Ding Sun, Rundong Zhang, et al.
Sensors (2023) Vol. 23, Iss. 10, pp. 4745-4745
Open Access | Times Cited: 4
Yazhi Liu, Ding Sun, Rundong Zhang, et al.
Sensors (2023) Vol. 23, Iss. 10, pp. 4745-4745
Open Access | Times Cited: 4
A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things
Shaha Al‐Otaibi, Rahim Khan, Hashim Ali, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 3, pp. 3805-3823
Open Access | Times Cited: 1
Shaha Al‐Otaibi, Rahim Khan, Hashim Ali, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 78, Iss. 3, pp. 3805-3823
Open Access | Times Cited: 1
Lightweight Cross-Domain Authentication Scheme for Securing Wireless IoT Devices Using Backscatter Communication
Guoqiang Zhang, Qiwei Hu, Yu Zhang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 22021-22035
Closed Access | Times Cited: 1
Guoqiang Zhang, Qiwei Hu, Yu Zhang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 22021-22035
Closed Access | Times Cited: 1
Smart Farming with Improved Security using Ascon Encryption and Authentication
R. Rahul, R. Venkatesan, T. Jemima Jebaseeli
(2024), pp. 365-373
Closed Access | Times Cited: 1
R. Rahul, R. Venkatesan, T. Jemima Jebaseeli
(2024), pp. 365-373
Closed Access | Times Cited: 1
A post-quantum secure PUF based cross-domain authentication mechanism for Internet of drones
Aiswarya S. Nair, Sabu M. Thampi, V. Jafeel
Vehicular Communications (2024) Vol. 47, pp. 100780-100780
Closed Access | Times Cited: 1
Aiswarya S. Nair, Sabu M. Thampi, V. Jafeel
Vehicular Communications (2024) Vol. 47, pp. 100780-100780
Closed Access | Times Cited: 1
An Efficient Consensus Algorithm for Blockchain-Based Cross-Domain Authentication in Bandwidth-Constrained Wide-Area IoT Networks
Deyu Luo, Youchi Zhang, Gang Sun, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31917-31931
Closed Access | Times Cited: 1
Deyu Luo, Youchi Zhang, Gang Sun, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 19, pp. 31917-31931
Closed Access | Times Cited: 1
Efficient and Secure Whole-network Authentication Protocol
Zhiwei Wang
IEEE Transactions on Vehicular Technology (2024) Vol. 73, Iss. 7, pp. 10478-10486
Closed Access
Zhiwei Wang
IEEE Transactions on Vehicular Technology (2024) Vol. 73, Iss. 7, pp. 10478-10486
Closed Access
Biometric Holographic Encryption and Authentication with Multiple Optics-Biology Keys Based on Inhomogeneous Media Optics
Rui Xu, Ming Feng, Jiaxin Yang, et al.
Chinese Journal of Physics (2024) Vol. 91, pp. 743-756
Closed Access
Rui Xu, Ming Feng, Jiaxin Yang, et al.
Chinese Journal of Physics (2024) Vol. 91, pp. 743-756
Closed Access
Enhance IoT Security: A Blockchain and Chameleon Hashing-Based Scheme for Authentication
Zixuan Zeng, Xu Zhou, Bin Luo, et al.
Communications in computer and information science (2024), pp. 237-254
Closed Access
Zixuan Zeng, Xu Zhou, Bin Luo, et al.
Communications in computer and information science (2024), pp. 237-254
Closed Access
Chebyshev Polynomial and Private Blockchain Based Cross-Domain Authentication Protocol for IoD Networks
Cong Pu, Kim‐Kwang Raymond Choo, Image Bhattarai
(2024), pp. 931-936
Closed Access
Cong Pu, Kim‐Kwang Raymond Choo, Image Bhattarai
(2024), pp. 931-936
Closed Access
MDIAM: A Multi-Device Identity Authentication Mechanism Based on Blockchain and Fuzzy Extractor
Liang Wang, Zhipeng Wang, Lina Zuo, et al.
Research Square (Research Square) (2024)
Open Access
Liang Wang, Zhipeng Wang, Lina Zuo, et al.
Research Square (Research Square) (2024)
Open Access
A Secure Authentication Scheme for Satellite-Terrestrial Networks
Shanyao Ren, Jianwei Liu, Ruihang Ji, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 6, pp. 6470-6482
Closed Access
Shanyao Ren, Jianwei Liu, Ruihang Ji, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 6, pp. 6470-6482
Closed Access
A Lightweight Cross-Domain Direct Identity Authentication Protocol for VANETs
Yasi Zhu, Yanwei Zhou, Jing Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 23, pp. 37741-37757
Closed Access
Yasi Zhu, Yanwei Zhou, Jing Wang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 23, pp. 37741-37757
Closed Access
Blockchain-Based Cross-Domain Authentication With Dynamic Domain Participation in IoT
Deyu Luo, Gang Sun, Hongfang Yu, et al.
IEEE Internet of Things Journal (2024) Vol. 12, Iss. 5, pp. 5385-5395
Closed Access
Deyu Luo, Gang Sun, Hongfang Yu, et al.
IEEE Internet of Things Journal (2024) Vol. 12, Iss. 5, pp. 5385-5395
Closed Access
ZFort: A scalable zero-trust approach for trust management and traffic engineering in SDN based IoTs
Usman Ashraf, Mohammed Al-Naeem, Muhammad Nasir Mumtaz Bhutta, et al.
Internet of Things (2024), pp. 101419-101419
Closed Access
Usman Ashraf, Mohammed Al-Naeem, Muhammad Nasir Mumtaz Bhutta, et al.
Internet of Things (2024), pp. 101419-101419
Closed Access