
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey
Sabina Szymoniak
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-31
Closed Access | Times Cited: 8
Sabina Szymoniak
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-31
Closed Access | Times Cited: 8
Showing 8 citing articles:
Light Weight Authentication of Devices in Wireless Sensor Network
Sanjay Kumar Soni, Muzzammil Hussain
Procedia Computer Science (2025) Vol. 252, pp. 1005-1013
Open Access
Sanjay Kumar Soni, Muzzammil Hussain
Procedia Computer Science (2025) Vol. 252, pp. 1005-1013
Open Access
A Survey on Energy Drainage Attacks and Countermeasures in Wireless Sensor Networks
J. W. Lee, You-Rak Choi, Beomkyu Suh, et al.
Applied Sciences (2025) Vol. 15, Iss. 4, pp. 2213-2213
Open Access
J. W. Lee, You-Rak Choi, Beomkyu Suh, et al.
Applied Sciences (2025) Vol. 15, Iss. 4, pp. 2213-2213
Open Access
Biometry-based verification system with symmetric key generation method for internet of things environments
Sabina Szymoniak, Mariusz Kubanek
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Sabina Szymoniak, Mariusz Kubanek
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
DeMiRaR-6T: A new defense method for detecting and mitigating rank attacks in RPL-based 6TiSCH networks
Hakan Aydın, Burak Aydın, Sedat Görmüş
Internet of Things (2025), pp. 101582-101582
Closed Access
Hakan Aydın, Burak Aydın, Sedat Görmüş
Internet of Things (2025), pp. 101582-101582
Closed Access
A Decentralized Proxy-JRC Authentication System for Scalable IETF 6TiSCH Networks
Hakan Aydın, Sedat Görmüş, Burak Aydın
IEEE Access (2024) Vol. 12, pp. 90952-90970
Open Access | Times Cited: 2
Hakan Aydın, Sedat Görmüş, Burak Aydın
IEEE Access (2024) Vol. 12, pp. 90952-90970
Open Access | Times Cited: 2
Lightweight Three-Factor Sensor and User Authentication for RPL-Based 6TiSCH Networks
Hakan Aydın, Burak Aydın, Sedat Görmüş
IEEE Sensors Journal (2024) Vol. 24, Iss. 17, pp. 28196-28209
Closed Access | Times Cited: 2
Hakan Aydın, Burak Aydın, Sedat Görmüş
IEEE Sensors Journal (2024) Vol. 24, Iss. 17, pp. 28196-28209
Closed Access | Times Cited: 2
Improving Wireless Sensor Network Security: Multifaceted 5G Protections Enhanced by Restoring Algorithm
Anagandula Nirisha, Aenugu Rasagnya, Sahiti Uriti, et al.
Indian Journal of Science and Technology (2024) Vol. 17, Iss. 30, pp. 3054-3061
Open Access
Anagandula Nirisha, Aenugu Rasagnya, Sahiti Uriti, et al.
Indian Journal of Science and Technology (2024) Vol. 17, Iss. 30, pp. 3054-3061
Open Access
Review of Monitoring and Control Systems Based on Internet of Things
Dawid Witczak, Sabina Szymoniak
Applied Sciences (2024) Vol. 14, Iss. 19, pp. 8943-8943
Open Access
Dawid Witczak, Sabina Szymoniak
Applied Sciences (2024) Vol. 14, Iss. 19, pp. 8943-8943
Open Access
Post-Quantum Cryptography for Wireless Sensor Network Using Key Agreement Super Singular on Hyperelliptic Curve
Mohamad Al-Samhouri, Nuria Novas, Maher Abur-rous and Jose Antonio Gazquez
IntechOpen eBooks (2024)
Open Access
Mohamad Al-Samhouri, Nuria Novas, Maher Abur-rous and Jose Antonio Gazquez
IntechOpen eBooks (2024)
Open Access