OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Provably Secure Three-Factor Authentication Protocol for Wireless Sensor Networks
Tsu‐Yang Wu, Lei Yang, Zhiyuan Lee, et al.
Wireless Communications and Mobile Computing (2021) Vol. 2021, Iss. 1
Open Access | Times Cited: 29

Showing 1-25 of 29 citing articles:

Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices
Qingxuan Wang, Ding Wang
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 597-612
Closed Access | Times Cited: 55

Implication of Lightweight and Robust Hash Function to Support Key Exchange in Health Sensor Networks
Mishall Al-Zubaidie
Symmetry (2023) Vol. 15, Iss. 1, pp. 152-152
Open Access | Times Cited: 21

A Provably Secure Three-Factor Authentication Protocol Based on Chebyshev Chaotic Mapping for Wireless Sensor Network
Jiaqing Mo, Zhongwang Hu, Wei Shen
IEEE Access (2022) Vol. 10, pp. 12137-12152
Open Access | Times Cited: 24

PSAP-WSN: A Provably Secure Authentication Protocol for 5G-Based Wireless Sensor Networks
Xuanang Li, Shuangshuang Liu, Saru Kumari, et al.
Computer Modeling in Engineering & Sciences (2022) Vol. 135, Iss. 1, pp. 711-732
Open Access | Times Cited: 21

A Lightweight and Secure Authentication Scheme for Remote Monitoring of Patients in IoMT
Zohaib Ali, Saba Mahmood, Khwaja Mansoor ul Hassan, et al.
IEEE Access (2024) Vol. 12, pp. 73004-73020
Open Access | Times Cited: 4

A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks
Tsu‐Yang Wu, Zhiyuan Lee, Lei Yang, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-17
Open Access | Times Cited: 25

A provably secure lightweight authentication protocol in mobile edge computing environments
Tsu‐Yang Wu, Qian Meng, Lei Yang, et al.
The Journal of Supercomputing (2022) Vol. 78, Iss. 12, pp. 13893-13914
Closed Access | Times Cited: 18

Key Distribution and Authentication Protocols in Wireless Sensor Networks: A Survey
Sabina Szymoniak
ACM Computing Surveys (2023) Vol. 56, Iss. 6, pp. 1-31
Closed Access | Times Cited: 9

Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks
Vincent Omollo Nyangaresi, Ganesh Yenurkar
High-Confidence Computing (2023) Vol. 4, Iss. 2, pp. 100178-100178
Open Access | Times Cited: 7

Attacks and Solutions for a Two-Factor Authentication Protocol for Wireless Body Area Networks
Chien‐Ming Chen, Zhen Li, Shehzad Ashraf Chaudhry, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-12
Open Access | Times Cited: 16

Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration
Ajay Chaudhary, Sateesh K. Peddoju, Vikas Chouhan
Journal of Grid Computing (2023) Vol. 21, Iss. 3
Closed Access | Times Cited: 6

Energy Efficient Three-Factor Authentication in Wireless Sensor Networks With Resisting Insider Attacks
Guangyong Gao, Zhao Feng, Zhihua Xia
IEEE Transactions on Green Communications and Networking (2023) Vol. 7, Iss. 3, pp. 1297-1308
Closed Access | Times Cited: 5

A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments
Tsu‐Yang Wu, Lei Yang, Jia-Ning Luo, et al.
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 12

Efficient Unbounded Fully Attribute Hiding Inner Product Encryption in Cloud-Aided WBANs
Hu Xiong, Minghao Yang, Ting Yao, et al.
IEEE Systems Journal (2021) Vol. 16, Iss. 4, pp. 5424-5432
Closed Access | Times Cited: 12

Implementing Biometric or Graphical Password Authentication in a Universal Three-Factor Authentication System
Mohammad Naveed Hossain, Sheikh Fahim Uz Zaman, Tazria Zerin Khan, et al.
(2022), pp. 72-77
Closed Access | Times Cited: 8

Robust Multi-Factor Authentication for WSNs with Dynamic Password Recovery
Liufu Zhu, Ding Wang
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 8398-8413
Closed Access | Times Cited: 1

EnSKM-FTOPSIS: Enhanced Secure Key Management Framework in Dynamic Mobile Wireless Sensor Networks
K. R. Kusha, Purohit Shrinivasacharya
SN Computer Science (2024) Vol. 5, Iss. 8
Closed Access | Times Cited: 1

Multi-factor user authentication and key agreement scheme for wireless sensor networks using Chinese remainder theorem
Gaurav Tyagi, Rahul Kumar
Peer-to-Peer Networking and Applications (2022) Vol. 16, Iss. 1, pp. 260-276
Closed Access | Times Cited: 6

Cryptanalysis and improvement of an authentication protocol for wireless sensor networks
Neerul, Devender Kumar
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 5
Closed Access | Times Cited: 3

Blockchain-Oriented Data Exchange Protocol With Traceability and Revocation for Smart Grid
Prince Silas Kwesi Oberko Prince Silas Kwesi Oberko, Tianang Yao Prince Silas Kwesi Oberko, Hu Xiong Tianang Yao, et al.
網際網路技術學刊 (2023) Vol. 24, Iss. 2, pp. 519-529
Open Access | Times Cited: 2

An Automated Multi-Layered Methodology to Assist the Secure and Risk-Aware Design of Multi-Factor Authentication Protocols
Marco Pernpruner, Roberto Carbone, Giada Sciarretta, et al.
IEEE Transactions on Dependable and Secure Computing (2023) Vol. 21, Iss. 4, pp. 1935-1950
Open Access | Times Cited: 2

TFPPASV: A Three-Factor Privacy Preserving Authentication Scheme for VANETs
Zongtao Duan, Jabar Mahmood, Yun Yang, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-15
Open Access | Times Cited: 4

Design and Analysis of a Provable Secure Two-Factor Authentication Protocol for Internet of Things
Chien‐Ming Chen, Shuangshuang Liu, Xuanang Li, et al.
Security and Communication Networks (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 3

Understanding the security failures of four user authentication schemes for wireless sensor networks in IoT environment
Gaurav Tyagi, Rahul Kumar
International Journal of Computers and Applications (2024) Vol. 46, Iss. 9, pp. 769-784
Closed Access

Page 1 - Next Page

Scroll to top