OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

New Observations on Zipf’s Law in Passwords
Zhenduo Hou, Ding Wang
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 517-532
Closed Access | Times Cited: 9

Showing 9 citing articles:

Distributional characteristics of Dimensions concepts: An Empirical Analysis using Zipf’s law
Solanki Gupta, Vivek Kumar Singh
Scientometrics (2024) Vol. 129, Iss. 2, pp. 1037-1053
Closed Access | Times Cited: 3

READ: Resource efficient authentication scheme for digital twin edge networks
Kai Wang, Jiankuo Dong, Yijie Xu, et al.
Future Generation Computer Systems (2024) Vol. 163, pp. 107498-107498
Closed Access | Times Cited: 2

Privacy-Preserving Password Cracking: How a Third Party can Crack our Password Hash Without Learning the Hash Value or the Cleartext
Norbert Tihanyi, Tamás Bisztray, Bertalan Borsos, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 2981-2996
Open Access | Times Cited: 1

Robust Multi-Factor Authentication for WSNs with Dynamic Password Recovery
Liufu Zhu, Ding Wang
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 8398-8413
Closed Access | Times Cited: 1

An efficient heterogeneous parallel password recovery system on MT-3000
Yongtao Luo, Jie Liu, Chunye Gong, et al.
The Journal of Supercomputing (2024) Vol. 81, Iss. 1
Closed Access | Times Cited: 1

A Provable Secure Cross-Verification Scheme for IoT Using Public Cloud Computing
Naveed Khan, Jianbiao Zhang, Jehad Ali, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-11
Open Access | Times Cited: 5

Knowledge Landscape and Trend Analysis of Chinese Rural Education Research in the Perspective of Rural Revitalization
Shuangliu Huang, Huazai Chen
Applied Mathematics and Nonlinear Sciences (2023) Vol. 9, Iss. 1
Open Access | Times Cited: 1

Using language-specific input methods and pronunciation rules to improve the guesses of passwords
Shin-Hung Yan, Cheng‐Yuan Ku
Journal of Information Security and Applications (2023) Vol. 77, pp. 103588-103588
Closed Access

Page 1

Scroll to top