OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things
Chenyu Wang, Ding Wang, Yihe Duan, et al.
IEEE Transactions on Information Forensics and Security (2023) Vol. 18, pp. 2961-2976
Closed Access | Times Cited: 56

Showing 1-25 of 56 citing articles:

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
Mohammad Kamrul Hasan, Zhou Weichen, Nurhizam Safie, et al.
IEEE Access (2024) Vol. 12, pp. 61642-61666
Open Access | Times Cited: 27

Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication
Ayman Mohamed Mostafa, Mohamed Ezz, Murtada K. Elbashir, et al.
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 10871-10871
Open Access | Times Cited: 27

A UAV-Assisted Authentication Protocol for Internet of Vehicles
Junfeng Miao, Zhaoshun Wang, Xin Ning, et al.
IEEE Transactions on Intelligent Transportation Systems (2024) Vol. 25, Iss. 8, pp. 10286-10297
Closed Access | Times Cited: 11

User security authentication protocol in multi gateway scenarios of the Internet of Things
Junhui Zhao, Fanwei Huang, Huanhuan Hu, et al.
Ad Hoc Networks (2024), pp. 103427-103427
Closed Access | Times Cited: 5

A Modular Sharing Scheme for EMRs Using Consortium Blockchain and Proxy Re-encryption
Junjie Quan, Niefeng Wu, Hu Chen, et al.
Lecture notes in computer science (2025), pp. 60-79
Closed Access

An efficient mobile cloud security method based on strong multi-factor authentication and smart card technology
Cherif Ghazel, Imen Merdassi, Leı̈la Azouz Saı̈dane
Annals of Telecommunications (2025)
Closed Access

A Robust Lattice‐Based Post‐Quantum Three‐Party Key Exchange Scheme for Mobile Devices
Akanksha Singh, H. Chandra, Saurabh Rana
Concurrency and Computation Practice and Experience (2025) Vol. 37, Iss. 6-8
Open Access

SLMAS: a secure and lightweight mutual authentication scheme for telecare medical information system based on ECC
Khushboo Gupta, Vinod Kumar, Ram Prakash, et al.
The Journal of Supercomputing (2025) Vol. 81, Iss. 5
Closed Access

Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid
Huanhuan Ma, Chenyu Wang, Guosheng Xu, et al.
IEEE Systems Journal (2023), pp. 1-12
Closed Access | Times Cited: 12

Intelligent interaction using gesture recognition and building information modeling
Zixuan Li, Yukang Wang, Xiaoping Zhou, et al.
Intelligent Buildings International (2025), pp. 1-18
Closed Access

Lightweight batch authentication and key agreement scheme for IIoT gateways
Xiaohui Ding, Jian Wang, Yue Zhao, et al.
Journal of Systems Architecture (2025), pp. 103368-103368
Closed Access

A secure and lightweight authentication scheme for digital forensics in industrial internet of things
Nan Xiao, Zhaoshun Wang, Xiaoxue Sun
Alexandria Engineering Journal (2025) Vol. 121, pp. 117-127
Closed Access

An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs
T. Sudhakar, RVS Praveen, V. Natarajan
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access

A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT
Zhishuo Zhang, Wen Huang, Ying Huang, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 15616-15632
Closed Access | Times Cited: 3

SAKMS: A Secure Authentication and Key Management Scheme for IETF 6TiSCH Industrial Wireless Networks Based on Improved Elliptic-Curve Cryptography
Wei Yang, Chengqi Hou, Yu Wang, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 3, pp. 3174-3188
Closed Access | Times Cited: 3

A Physician’s Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT
Shihong Zou, Qiang Cao, Chonghui Huangqi, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 17, pp. 29174-29189
Closed Access | Times Cited: 3

Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network
Amar Rasheed, Mohamed Baza, Mahmoud M. Badr, et al.
IEEE Transactions on Network Science and Engineering (2023) Vol. 11, Iss. 1, pp. 1008-1025
Closed Access | Times Cited: 10

RDAF-IIoT: Reliable Device-Access Framework for the Industrial Internet of Things
Hisham Alasmary
Mathematics (2023) Vol. 11, Iss. 12, pp. 2710-2710
Open Access | Times Cited: 7

PrivSSO: Practical Single-sign-on Authentication against Subscription/Access Pattern Leakage
Ge Gao, Yuan Zhang, Yaqing Song, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 5075-5089
Closed Access | Times Cited: 2

PSAF-IoT: Physically Secure Authentication Framework for the Internet of Things
Omar Alruwaili, Faisal Mohammed Alotaibi, Muhammad Tanveer, et al.
IEEE Access (2024) Vol. 12, pp. 78549-78561
Open Access | Times Cited: 2

Two-Layered Multi-Factor Authentication Using Decentralized Blockchain in an IoT Environment
Saeed Bamashmos, Naveen Chilamkurti, Ahmad Salehi S.
Sensors (2024) Vol. 24, Iss. 11, pp. 3575-3575
Open Access | Times Cited: 2

Secure and Efficient Biometric-Based Anonymous Authentication Scheme for Mobile-Edge Computing
Qiang Zhu, Lin You, Gengran Hu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 33604-33623
Closed Access | Times Cited: 2

Device-Side Lightweight Mutual Authentication and Key Agreement Scheme based on Chameleon Hashing for Industrial Internet of Things
Qingyang Zhang, Xiaolong Zhou, Hong Zhong, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 7895-7907
Closed Access | Times Cited: 2

Blockchain-Based Self-Certified Key Exchange Protocol for Hybrid Electric Vehicles
Ali Shahidinejad, Jemal Abawajy
IEEE Transactions on Consumer Electronics (2023) Vol. 70, Iss. 1, pp. 543-553
Closed Access | Times Cited: 4

Page 1 - Next Page

Scroll to top