OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Beyond Passwords—Challenges and Opportunities of Future Authentication
Florian Alt, Stefan Schneegaß
IEEE Security & Privacy (2022) Vol. 20, Iss. 1, pp. 82-86
Closed Access | Times Cited: 16

Showing 16 citing articles:

Kinetic Signatures: A Systematic Investigation of Movement-Based User Identification in Virtual Reality
Jonathan Liebers, Patrick Laskowski, Florian Rademaker, et al.
(2024), pp. 1-19
Open Access | Times Cited: 3

”Your Eyes Tell You Have Used This Password Before”: Identifying Password Reuse from Gaze and Keystroke Dynamics
Yasmeen Abdrabou, Johannes Schütte, Ahmed Shams, et al.
CHI Conference on Human Factors in Computing Systems (2022)
Open Access | Times Cited: 10

Using Motion Forecasting for Behavior-Based Virtual Reality (VR) Authentication
Ming-Jun Li, Natasha Kholgade Banerjee, Sean Banerjee
(2024), pp. 31-40
Open Access | Times Cited: 1

Biometrics-Based Mobile User Authentication for the Elderly: Accessibility, Performance, and Method Design
Kanlun Wang, Lina Zhou, Dongsong Zhang
International Journal of Human-Computer Interaction (2023) Vol. 40, Iss. 9, pp. 2153-2167
Closed Access | Times Cited: 3

WristConduct: Biometric User Authentication Using Bone Conduction at the Wrist
Jessica Sehrt, Lu Feng, Leonard Husske, et al.
(2022), pp. 371-375
Closed Access | Times Cited: 5

Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT
Xin'an Zhou, Jiale Guan, Luyi Xing, et al.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (2022), pp. 3285-3299
Open Access | Times Cited: 5

Wearable Security-Authentication using Smartwatches
Sanyam Bhardwaj, R Dhaksana, Katari Amrutha Varshini, et al.
(2024) Vol. 5, pp. 858-863
Closed Access

Internet Users' Willingness to Disclose Biometric Data for Continuous Online Account Protection: An Empirical Investigation
Florian Dehling, Jan Tolsdorf, Hannes Federrath, et al.
Proceedings on Privacy Enhancing Technologies (2024) Vol. 2024, Iss. 2, pp. 479-508
Open Access

Biometrics
Omi Hodwitz, Steff King
Elsevier eBooks (2024), pp. 1161-1176
Closed Access

Useckit: An Open-Source Deep-Learning Toolkit Bundling State-Of-The-Art Algorithms for Evaluating Behavioral Biometrics
Jonathan Liebers, Tristan Kley, Carina Liebers, et al.
(2024), pp. 1-10
Closed Access

HotFoot: Foot-Based User Identification Using Thermal Imaging
Alia Saad, Kian Izadi, Anam Ahmad Khan, et al.
(2023), pp. 1-13
Closed Access | Times Cited: 1

Introduction to Authentication using Behavioral Biometrics
Jonathan Liebers, Uwe Gruenefeld, Daniel Buschek, et al.
(2023), pp. 1-4
Closed Access | Times Cited: 1

Detecting Risky Authentication Using the OpenID Connect Token Exchange Time
Alex Heunhe Han, Dong Hoon Lee
Sensors (2023) Vol. 23, Iss. 19, pp. 8256-8256
Open Access | Times Cited: 1

Hand-in-Hand: Investigating Mechanical Tracking for User Identification in Cobot Interaction
Alia Saad, Max Pascher, Khaled Kassem, et al.
(2023)
Closed Access | Times Cited: 1

Empowering Users: Leveraging Interface Cues to Enhance Password Security
Yasmeen Abdrabou, Marco Asbeck, Ken Pfeuffer, et al.
Lecture notes in computer science (2023), pp. 359-368
Closed Access

Page 1

Scroll to top