
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption
Na Wang, Wen Zhou, Jingjing Wang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 2454-2469
Closed Access | Times Cited: 7
Na Wang, Wen Zhou, Jingjing Wang, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 2454-2469
Closed Access | Times Cited: 7
Showing 7 citing articles:
Sublinear smart semantic search based on knowledge graph over encrypted database
Jiaxin Li, Haipeng Peng, Lixiang Li
Computers & Security (2025), pp. 104319-104319
Closed Access
Jiaxin Li, Haipeng Peng, Lixiang Li
Computers & Security (2025), pp. 104319-104319
Closed Access
Zero Trust Network Access (ZTNA) Architecture: A Novel Perspective to Cloud Security
Priyanka Das, Sangram Ray, Mahesh Chandra Govil
Lecture notes in networks and systems (2025), pp. 89-99
Closed Access
Priyanka Das, Sangram Ray, Mahesh Chandra Govil
Lecture notes in networks and systems (2025), pp. 89-99
Closed Access
Low Complexity Speech Secure Hash Retrieval Algorithm Based on KDTree Nearest Neighbor Search
Y Huang, An Li, Qiuyu Zhang
ACM Transactions on Asian and Low-Resource Language Information Processing (2025)
Closed Access
Y Huang, An Li, Qiuyu Zhang
ACM Transactions on Asian and Low-Resource Language Information Processing (2025)
Closed Access
Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing
Yandong Zheng, Hui Zhu, Rongxing Lu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 6237-6251
Closed Access | Times Cited: 2
Yandong Zheng, Hui Zhu, Rongxing Lu, et al.
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 6237-6251
Closed Access | Times Cited: 2
Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing
Yuan Tian, Tanping Zhou, Xuan Zhou, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 6, pp. 102114-102114
Open Access | Times Cited: 1
Yuan Tian, Tanping Zhou, Xuan Zhou, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 6, pp. 102114-102114
Open Access | Times Cited: 1
A lattice-based multi-authority updatable searchable encryption scheme for serverless architecture with scalable on-demand result processing
Bin Tang, Yi‐Hua Zhou, Yu‐Guang Yang, et al.
Computer Standards & Interfaces (2024) Vol. 93, pp. 103956-103956
Closed Access
Bin Tang, Yi‐Hua Zhou, Yu‐Guang Yang, et al.
Computer Standards & Interfaces (2024) Vol. 93, pp. 103956-103956
Closed Access
Efficient and Lightweight Medical Record Query Scheme Based on Homomorphism in Wireless Body Area Networks
Min Wang, Q. Li, Ling Xiong
Communications in computer and information science (2024), pp. 217-230
Closed Access
Min Wang, Q. Li, Ling Xiong
Communications in computer and information science (2024), pp. 217-230
Closed Access