
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices
Qingxuan Wang, Ding Wang
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 597-612
Closed Access | Times Cited: 54
Qingxuan Wang, Ding Wang
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 597-612
Closed Access | Times Cited: 54
Showing 1-25 of 54 citing articles:
Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication
Ayman Mohamed Mostafa, Mohamed Ezz, Murtada K. Elbashir, et al.
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 10871-10871
Open Access | Times Cited: 27
Ayman Mohamed Mostafa, Mohamed Ezz, Murtada K. Elbashir, et al.
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 10871-10871
Open Access | Times Cited: 27
Security Control and Data Planes of SDN: A Comprehensive Review of Traditional, AI, and MTD Approaches to Security Solutions
Abdinasir Hirsi, Lukman Audah, Adeb Salh, et al.
IEEE Access (2024) Vol. 12, pp. 69941-69980
Open Access | Times Cited: 12
Abdinasir Hirsi, Lukman Audah, Adeb Salh, et al.
IEEE Access (2024) Vol. 12, pp. 69941-69980
Open Access | Times Cited: 12
Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review
Zinniya Taffannum Pritee, Mehedi Hasan Anik, Saida Binta Alam, et al.
Computers & Security (2024) Vol. 140, pp. 103747-103747
Closed Access | Times Cited: 11
Zinniya Taffannum Pritee, Mehedi Hasan Anik, Saida Binta Alam, et al.
Computers & Security (2024) Vol. 140, pp. 103747-103747
Closed Access | Times Cited: 11
Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication
Javier José Díaz Rivera, Afaq Muhammad, Wang‐Cheol Song
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 2792-2814
Open Access | Times Cited: 11
Javier José Díaz Rivera, Afaq Muhammad, Wang‐Cheol Song
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 2792-2814
Open Access | Times Cited: 11
A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things
Yimin Guo, Ya-Jun Guo, Ping Xiong, et al.
Pervasive and Mobile Computing (2024) Vol. 98, pp. 101877-101877
Closed Access | Times Cited: 5
Yimin Guo, Ya-Jun Guo, Ping Xiong, et al.
Pervasive and Mobile Computing (2024) Vol. 98, pp. 101877-101877
Closed Access | Times Cited: 5
User security authentication protocol in multi gateway scenarios of the Internet of Things
Junhui Zhao, Fanwei Huang, Huanhuan Hu, et al.
Ad Hoc Networks (2024), pp. 103427-103427
Closed Access | Times Cited: 5
Junhui Zhao, Fanwei Huang, Huanhuan Hu, et al.
Ad Hoc Networks (2024), pp. 103427-103427
Closed Access | Times Cited: 5
Two-Factor Authentication for Keyless Entry System via Finger-Induced Vibrations
Hongbo Jiang, Panyi Ji, Taiyuan Zhang, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 10, pp. 9708-9720
Closed Access | Times Cited: 5
Hongbo Jiang, Panyi Ji, Taiyuan Zhang, et al.
IEEE Transactions on Mobile Computing (2024) Vol. 23, Iss. 10, pp. 9708-9720
Closed Access | Times Cited: 5
A Modular Sharing Scheme for EMRs Using Consortium Blockchain and Proxy Re-encryption
Junjie Quan, Niefeng Wu, Hu Chen, et al.
Lecture notes in computer science (2025), pp. 60-79
Closed Access
Junjie Quan, Niefeng Wu, Hu Chen, et al.
Lecture notes in computer science (2025), pp. 60-79
Closed Access
SLMAS: a secure and lightweight mutual authentication scheme for telecare medical information system based on ECC
Khushboo Gupta, Vinod Kumar, Ram Prakash, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 5
Closed Access
Khushboo Gupta, Vinod Kumar, Ram Prakash, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 5
Closed Access
Future of cyberspace: A critical review of standard security protocols in the post-quantum era
Milad Taleby Ahvanooey, Wojciech Mazurczyk, Jun Zhao, et al.
Computer Science Review (2025) Vol. 57, pp. 100738-100738
Closed Access
Milad Taleby Ahvanooey, Wojciech Mazurczyk, Jun Zhao, et al.
Computer Science Review (2025) Vol. 57, pp. 100738-100738
Closed Access
A Physician’s Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT
Shihong Zou, Qiang Cao, Chonghui Huangqi, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 17, pp. 29174-29189
Closed Access | Times Cited: 3
Shihong Zou, Qiang Cao, Chonghui Huangqi, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 17, pp. 29174-29189
Closed Access | Times Cited: 3
An agnostic and secure interoperability protocol for seamless asset movement
El-hacen Diallo, Mohameden Dieye, Omar Dib, et al.
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103930-103930
Open Access | Times Cited: 3
El-hacen Diallo, Mohameden Dieye, Omar Dib, et al.
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103930-103930
Open Access | Times Cited: 3
Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network
Amar Rasheed, Mohamed Baza, Mahmoud M. Badr, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 1, pp. 1008-1025
Closed Access | Times Cited: 10
Amar Rasheed, Mohamed Baza, Mahmoud M. Badr, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 1, pp. 1008-1025
Closed Access | Times Cited: 10
A privacy preserving four-factor authentication protocol for internet of medical things
Ping Guo, Wenfeng Liang, Shuilong Xu
Computers & Security (2023) Vol. 137, pp. 103632-103632
Closed Access | Times Cited: 10
Ping Guo, Wenfeng Liang, Shuilong Xu
Computers & Security (2023) Vol. 137, pp. 103632-103632
Closed Access | Times Cited: 10
FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite–Terrestrial-Integrated Networks
Yuanyuan Yang, Jin Cao, Ruhui Ma, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 15, pp. 13959-13973
Closed Access | Times Cited: 9
Yuanyuan Yang, Jin Cao, Ruhui Ma, et al.
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 15, pp. 13959-13973
Closed Access | Times Cited: 9
Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings
Chuang Tian, Jianfeng Ma, Teng Li, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4448-4463
Closed Access | Times Cited: 3
Chuang Tian, Jianfeng Ma, Teng Li, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 4448-4463
Closed Access | Times Cited: 3
An Enhanced Cross-Network-Slice Authentication Protocol for 5G
Awaneesh Kumar Yadav, Shalitha Wijethilaka, An Braeken, et al.
IEEE Transactions on Sustainable Computing (2023) Vol. 8, Iss. 4, pp. 555-573
Closed Access | Times Cited: 7
Awaneesh Kumar Yadav, Shalitha Wijethilaka, An Braeken, et al.
IEEE Transactions on Sustainable Computing (2023) Vol. 8, Iss. 4, pp. 555-573
Closed Access | Times Cited: 7
Low Communication-Cost PSI Protocol for Unbalanced Two-Party Private Sets
Jingyu Ning, Zhenhua Tan, K Zhang, et al.
IET Information Security (2024) Vol. 2024, pp. 1-12
Open Access | Times Cited: 2
Jingyu Ning, Zhenhua Tan, K Zhang, et al.
IET Information Security (2024) Vol. 2024, pp. 1-12
Open Access | Times Cited: 2
Achieving Privacy-Preserving Online Multi-Layer Perceptron Model in Smart Grid
Chunqiang Hu, Huijun Zhuang, Jiajun Chen, et al.
IEEE Transactions on Cloud Computing (2024) Vol. 12, Iss. 2, pp. 777-788
Closed Access | Times Cited: 2
Chunqiang Hu, Huijun Zhuang, Jiajun Chen, et al.
IEEE Transactions on Cloud Computing (2024) Vol. 12, Iss. 2, pp. 777-788
Closed Access | Times Cited: 2
Adaptive edge security framework for dynamic IoT security policies in diverse environments
Malka N. Halgamuge, Dusit Niyato
Computers & Security (2024), pp. 104128-104128
Open Access | Times Cited: 2
Malka N. Halgamuge, Dusit Niyato
Computers & Security (2024), pp. 104128-104128
Open Access | Times Cited: 2
A Robust and Effective Two-Factor Authentication (2FA) Protocol Based on ECC for Mobile Computing
Kaijun Liu, Zhou Zhou, Qiang Cao, et al.
Applied Sciences (2023) Vol. 13, Iss. 7, pp. 4425-4425
Open Access | Times Cited: 6
Kaijun Liu, Zhou Zhou, Qiang Cao, et al.
Applied Sciences (2023) Vol. 13, Iss. 7, pp. 4425-4425
Open Access | Times Cited: 6
The Assistance of Eye Blink Detection for Two- Factor Authentication
Wei-Hoong Chuah, Siew-Chin Chong, Lee-Ying Chong
Journal of Informatics and Web Engineering (2023) Vol. 2, Iss. 2, pp. 111-121
Open Access | Times Cited: 6
Wei-Hoong Chuah, Siew-Chin Chong, Lee-Ying Chong
Journal of Informatics and Web Engineering (2023) Vol. 2, Iss. 2, pp. 111-121
Open Access | Times Cited: 6
Secure Access Control for Electronic Health Records in Blockchain-Enabled Consumer Internet of Medical Things
Yujie Hong, Liang Yang, Wei Liang, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 4574-4584
Closed Access | Times Cited: 6
Yujie Hong, Liang Yang, Wei Liang, et al.
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 4574-4584
Closed Access | Times Cited: 6
Lattice-Based Threshold Signcryption for Blockchain Oracle Data Transmission
Huifang Yu, Han Wang
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 10, pp. 11057-11065
Closed Access | Times Cited: 5
Huifang Yu, Han Wang
IEEE Transactions on Intelligent Transportation Systems (2023) Vol. 24, Iss. 10, pp. 11057-11065
Closed Access | Times Cited: 5
Secure Control Using Homomorphic Encryption and Efficiency Analysis
Jingshan Pan, Tongtong Sui, Wen Liu, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-12
Open Access | Times Cited: 5
Jingshan Pan, Tongtong Sui, Wen Liu, et al.
Security and Communication Networks (2023) Vol. 2023, pp. 1-12
Open Access | Times Cited: 5