OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Encryption Approach Using Information Fusion Techniques Involving Prime Numbers and Face Biometrics
Gerardo Iovane, Carmen Bisogni, Luigi De Maio, et al.
IEEE Transactions on Sustainable Computing (2018) Vol. 5, Iss. 2, pp. 260-267
Closed Access | Times Cited: 26

Showing 1-25 of 26 citing articles:

Towards open-set touchless palmprint recognition via weight-based meta metric learning
Huikai Shao, Dexing Zhong
Pattern Recognition (2021) Vol. 121, pp. 108247-108247
Open Access | Times Cited: 40

Towards the Use of Blockchain in Mobile Health Services and Applications
João Santos, Pedro R. M. Inácio, Bruno M. C. Silva
Journal of Medical Systems (2021) Vol. 45, Iss. 2
Closed Access | Times Cited: 22

ECB2: A novel encryption scheme using face biometrics for signing blockchain transactions
Carmen Bisogni, Gerardo Iovane, Riccardo Emanuele Landi, et al.
Journal of Information Security and Applications (2021) Vol. 59, pp. 102814-102814
Closed Access | Times Cited: 22

HYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFHYBRID CRYPTOGRAPHIC APPROACH FOR INTERNET OFTHINGS APPLICATIONS: A REVIEW
Nur Nabila Mohamed, Yusnani Mohd Yussoff, Mohammed A. Saleh, et al.
Journal of Information and Communication Technology (2020) Vol. 19
Open Access | Times Cited: 23

An IoT-Oriented Privacy-Preserving Fingerprint Authentication System
Xuefei Yin, Song Wang, Muhammad Shahzad, et al.
IEEE Internet of Things Journal (2021) Vol. 9, Iss. 14, pp. 11760-11771
Closed Access | Times Cited: 19

Application of Blockchain Technology to Smart City Service: A Case of Ridesharing
Shuchih Ernest Chang, Chi-Yin Chang
(2018), pp. 664-671
Closed Access | Times Cited: 21

Enhanced computer vision applications with blockchain: A review of applications and opportunities
Najmath Ottakath, Abdulla Al‐Ali, Somaya Al‐Maadeed, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 10, pp. 101801-101801
Open Access | Times Cited: 5

Privacy preserving biometric‐based remote authentication with secure processing unit on untrusted server
Thi Ai Thao Nguyen, Tran Khanh Dang
IET Biometrics (2018) Vol. 8, Iss. 1, pp. 79-91
Closed Access | Times Cited: 15

A New Biometric Template Protection Using Random Orthonormal Projection and Fuzzy Commitment
Thi Ai Thao Nguyen, Tran Khanh Dang, Dinh Thanh Nguyen
Advances in intelligent systems and computing (2019), pp. 723-733
Closed Access | Times Cited: 12

Encrypted face recognition algorithm based on Ridgelet-DCT transform and THM chaos
Zilong Liu, Jingbing Li, Jing Liu
Mathematical Biosciences & Engineering (2021) Vol. 19, Iss. 2, pp. 1373-1387
Open Access | Times Cited: 7

Online Behavior Recognition: Can We Consider It Biometric Data under GDPR?
Alžběta Krausová
Masaryk University Journal of Law and Technology (2018) Vol. 12, Iss. 2, pp. 161-178
Open Access | Times Cited: 7

Efficient biometric identity-based encryption
Xiaoguo Li, Tao Xiang, Fei Chen, et al.
Information Sciences (2018) Vol. 465, pp. 248-264
Closed Access | Times Cited: 6

A Novel Blockchain Scheme Combining Prime Numbers and Iris for Encrypting Coding
Gerardo Iovane, Michele Nappi, Marta Chinnici, et al.
2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) (2019)
Closed Access | Times Cited: 6

Identity Solutions for Verification using Blockchain Technology
Dipti Ashok Belurgikar, J Kanak Kshirsagar, K Kanchan Dhananjaya, et al.
(2019), pp. 121-126
Closed Access | Times Cited: 6

Design of a Blockchain-Powered Biometric Template Security Framework Using Augmented Sharding
Sarika Khandelwal, Shaleen Bhatnagar, Nirmal Mungale, et al.
Advances in data mining and database management book series (2022), pp. 80-101
Closed Access | Times Cited: 4

Design and Implementation of Blockchain-Enabled Immutability Mechanism for Enhanced Machine Visual Data Integrity
Hafiz Gulfam Ahmad Umar, Muhammad Uzair Jatoi, Muhammad Shoaib Abid, et al.
Research Square (Research Square) (2024)
Open Access

Authentication that Combines rPPG Information with Face Detection on the Blockchain
Mao-Ying Wu, Wu Zeng, Ruochen Tan, et al.
Communications in computer and information science (2024), pp. 80-94
Closed Access

Enhancing IoT Security: A Comprehensive Review of Lightweight Security Mechanisms for IoT
Aditya Pradana, Fahmi Candra Permana, Kusprasapta Mutijarsa, et al.
(2024), pp. 1-7
Closed Access

A New Biometric Template Protection using Random Orthonormal Projection and Fuzzy Commitment
Thi Ai Thao Nguyen, Tran Khanh Dang, Dinh Thanh Nguyen
arXiv (Cornell University) (2019)
Closed Access | Times Cited: 2

Adversarial Attacks Impact on the Neural Network Performance and Visual Perception of Data under Attack
Yakov Usoltsev, B. Lodonova, Alexander Shelupanov, et al.
Information (2022) Vol. 13, Iss. 2, pp. 77-77
Open Access | Times Cited: 1

Generation of an EDS Key Based on a Graphic Image of a Subject’s Face Using the RC4 Algorithm
Alexey Semenkov, Dmitry S. Bragin, Yakov Usoltsev, et al.
Information (2021) Vol. 12, Iss. 1, pp. 19-19
Open Access | Times Cited: 1

ALTERNATIVE PROOF OF THE INFINITUDE PRIMES AND PRIME PROPERTIES
Dinni Rahma Oktaviani, Muhammad Habiburrohman, Fiki Syaban Nugroho
BAREKENG JURNAL ILMU MATEMATIKA DAN TERAPAN (2023) Vol. 17, Iss. 1, pp. 0475-0480
Open Access

Communication Network with Secure, Reputable Mobile Agent Structure
Neera Yadav, Dharamveer Singh, Anil Kumar
International Journal for Research in Applied Science and Engineering Technology (2023) Vol. 11, Iss. 6, pp. 3213-3223
Open Access

Biometric Face-code DNA Colour Vector: A Unique Identity with Double Layer Encryption Approach
R Kavya
International Journal for Research in Applied Science and Engineering Technology (2018) Vol. 6, Iss. 4, pp. 5118-5123
Open Access

Authentic Face Detection and Encryption for Security Assurance
Lahari Vaidya, V. Veena Devi Shastrimath
(2018), pp. 131-135
Closed Access

Page 1 - Next Page

Scroll to top