OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments
Tsu‐Yang Wu, Lei Yang, Jia-Ning Luo, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 12

Showing 12 citing articles:

Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment
Chien‐Ming Chen, Zhaoting Chen, Saru Kumari, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 14, pp. 25394-25412
Closed Access | Times Cited: 6

Enhancing the Security: A Lightweight Authentication and Key Agreement Protocol for Smart Medical Services in the IoHT
Tsu‐Yang Wu, Liyang Wang, Chien‐Ming Chen
Mathematics (2023) Vol. 11, Iss. 17, pp. 3701-3701
Open Access | Times Cited: 11

Healthcare Security: Post-Quantum Continuous Authentication with Behavioral Biometrics using Vector Similarity Search
Basudeb Bera, Sutanu Nandi, Ashok Kumar Das, et al.
IEEE Transactions on Information Forensics and Security (2025) Vol. 20, pp. 1597-1612
Closed Access

Rotating behind Security: A Lightweight Authentication Protocol Based on IoT-Enabled Cloud Computing Environments
Tsu‐Yang Wu, Qian Meng, Saru Kumari, et al.
Sensors (2022) Vol. 22, Iss. 10, pp. 3858-3858
Open Access | Times Cited: 16

Privacy-Enabling Framework for Cloud-Assisted Digital Healthcare Industry
Aman Ahmad Ansari, Bharavi Mishra, Poonam Gera, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 11, pp. 8316-8325
Closed Access | Times Cited: 15

Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration
Ajay Chaudhary, Sateesh K. Peddoju, Vikas Chouhan
Journal of Grid Computing (2023) Vol. 21, Iss. 3
Closed Access | Times Cited: 6

Toward Smart Home Authentication Using PUF and Edge-Computing Paradigm
Tsu‐Yang Wu, Fangfang Kong, Liyang Wang, et al.
Sensors (2022) Vol. 22, Iss. 23, pp. 9174-9174
Open Access | Times Cited: 9

Design of Inter-BAN Authentication Protocols for WBAN in a Cloud-Assisted Environment
Abdullah M. Almuhaideb, Huda AlGhamdi
Big Data and Cognitive Computing (2022) Vol. 6, Iss. 4, pp. 124-124
Open Access | Times Cited: 6

Traceable Attribute-Based Encryption With Equality Test for Cloud Enabled E-Health System
Zheng Qu, Saru Kumari, Mohammad S. Obaidat, et al.
IEEE Journal of Biomedical and Health Informatics (2023) Vol. 28, Iss. 9, pp. 5033-5042
Closed Access | Times Cited: 3

A Privacy-Aware Provably Secure Smart Card Authentication Protocol Based on Physically Unclonable Functions
Chun‐I Fan, Arijit Karati, Shou-Li Wu
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 4, pp. 2766-2778
Closed Access | Times Cited: 1

Secure lightweight multi‐party key agreement based on hyperelliptic curve Diffie–Hellman for constraint networks
Vankamamidi S. Naresh, Sivaranjani Reddi
Concurrency and Computation Practice and Experience (2022) Vol. 34, Iss. 13
Closed Access | Times Cited: 2

A Secured Framework for Emergency Care in the E-Healthcare System
Aman Ahmad Ansari, Bharavi Mishra, Poonam Gera
Lecture notes in electrical engineering (2023), pp. 319-332
Closed Access

Page 1

Scroll to top