
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites
Farah Tawfiq Abdul Hussien, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 23
Farah Tawfiq Abdul Hussien, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab
Security and Communication Networks (2021) Vol. 2021, pp. 1-15
Open Access | Times Cited: 23
Showing 23 citing articles:
A Customer-Centric View of E-Commerce Security and Privacy
Saqib Saeed
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 1020-1020
Open Access | Times Cited: 46
Saqib Saeed
Applied Sciences (2023) Vol. 13, Iss. 2, pp. 1020-1020
Open Access | Times Cited: 46
Applying Detection Leakage on Hybrid Cryptography to Secure Transaction Information in E-Commerce Apps
Mishall Al-Zubaidie, Ghanima Sabr Shyaa
Future Internet (2023) Vol. 15, Iss. 8, pp. 262-262
Open Access | Times Cited: 12
Mishall Al-Zubaidie, Ghanima Sabr Shyaa
Future Internet (2023) Vol. 15, Iss. 8, pp. 262-262
Open Access | Times Cited: 12
User Experience Evaluation of B2C E-Commerce Websites Based on Fuzzy Information
Jieqiong Huang, Xiaozhi Wang
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 14
Jieqiong Huang, Xiaozhi Wang
Wireless Communications and Mobile Computing (2022) Vol. 2022, pp. 1-10
Open Access | Times Cited: 14
Performance Evaluation of AES, ECC and Logistic Chaotic Map Algorithms in Image Encryption
Farah Tawfiq Abdul Hussien, Teaba Wala Aldeen Khairi
International Journal of Interactive Mobile Technologies (iJIM) (2023) Vol. 17, Iss. 10, pp. 193-211
Open Access | Times Cited: 4
Farah Tawfiq Abdul Hussien, Teaba Wala Aldeen Khairi
International Journal of Interactive Mobile Technologies (iJIM) (2023) Vol. 17, Iss. 10, pp. 193-211
Open Access | Times Cited: 4
A Lightweight Image Encryption Algorithm Based on Secure Key Generation
Alaa.H. Ali, Ekhlas Khalaf Gbashi, Haya Alaskar, et al.
IEEE Access (2024) Vol. 12, pp. 95871-95883
Open Access | Times Cited: 1
Alaa.H. Ali, Ekhlas Khalaf Gbashi, Haya Alaskar, et al.
IEEE Access (2024) Vol. 12, pp. 95871-95883
Open Access | Times Cited: 1
Securing Signal Encryption Based on Reduced Round Homomorphic AES
Areej Ahmed, Magda Madboly, Shawkat K. Guirguis
International journal of intelligent engineering and systems (2023) Vol. 16, Iss. 3, pp. 440-454
Open Access | Times Cited: 2
Areej Ahmed, Magda Madboly, Shawkat K. Guirguis
International journal of intelligent engineering and systems (2023) Vol. 16, Iss. 3, pp. 440-454
Open Access | Times Cited: 2
Application of E-commerce Personalized Recommendation Algorithm Based on Collaborative Filtering
Gangzhi Guo
Lecture notes on data engineering and communications technologies (2022), pp. 959-966
Closed Access | Times Cited: 3
Gangzhi Guo
Lecture notes on data engineering and communications technologies (2022), pp. 959-966
Closed Access | Times Cited: 3
A Block Cipher Algorithm Based on Magic Square for Secure E-bank Systems
Farah Tawfiq Abdul Hussien, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 1, pp. 1329-1346
Open Access | Times Cited: 3
Farah Tawfiq Abdul Hussien, Abdul Monem S. Rahma, Hala Bahjat Abdul Wahab
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 1, pp. 1329-1346
Open Access | Times Cited: 3
An Encryption and Decryption Model for Data Security Using Vigenere With Advanced Encryption Standard
Udochukwu Iheanacho Erondu, Emmanuel Oluwatobi Asani, Micheal Olaolu Arowolo, et al.
Advances in medical technologies and clinical practice book series (2022), pp. 141-159
Closed Access | Times Cited: 3
Udochukwu Iheanacho Erondu, Emmanuel Oluwatobi Asani, Micheal Olaolu Arowolo, et al.
Advances in medical technologies and clinical practice book series (2022), pp. 141-159
Closed Access | Times Cited: 3
Design and implementation of a cryptographic algorithm based on the AES advanced encryption standard for UHF RFID systems
Sanae Habibi, Zahra Sahel, Abdelhak Bendali, et al.
TELKOMNIKA (Telecommunication Computing Electronics and Control) (2024) Vol. 22, Iss. 3, pp. 576-576
Open Access
Sanae Habibi, Zahra Sahel, Abdelhak Bendali, et al.
TELKOMNIKA (Telecommunication Computing Electronics and Control) (2024) Vol. 22, Iss. 3, pp. 576-576
Open Access
Intelligent Analysis of E-commerce Reviews based on Complex-Valued Spatio-temporal Graph Convolutional Neural Network Optimized Tyrannosaurus Optimization Algorithm
Ting Chen
Deleted Journal (2024) Vol. 20, Iss. 3s, pp. 2614-2624
Open Access
Ting Chen
Deleted Journal (2024) Vol. 20, Iss. 3s, pp. 2614-2624
Open Access
A Two-Factor Authenticated and Secure Credit Card System for E-Platforms
Aravind Karrothu, Upadrista Mahesh, P Yasmin Bhanu, et al.
(2024) Vol. 4, pp. 871-874
Closed Access
Aravind Karrothu, Upadrista Mahesh, P Yasmin Bhanu, et al.
(2024) Vol. 4, pp. 871-874
Closed Access
Palmprint Recognition Using AES Algorithm with Machine Learning
M. Sowmiya Manoj, Pavan Amarendra Babu, R. Praveenkumar, et al.
Lecture notes on multidisciplinary industrial engineering (2024), pp. 261-269
Closed Access
M. Sowmiya Manoj, Pavan Amarendra Babu, R. Praveenkumar, et al.
Lecture notes on multidisciplinary industrial engineering (2024), pp. 261-269
Closed Access
Hybrid Security Model for Medical Image Protection in Cloud
Mohammed Y. Shakor, Nigar M. Shafiq Surameery, Zuheir N. Khlaif
Diyala Journal of Engineering Sciences (2023), pp. 68-77
Open Access | Times Cited: 1
Mohammed Y. Shakor, Nigar M. Shafiq Surameery, Zuheir N. Khlaif
Diyala Journal of Engineering Sciences (2023), pp. 68-77
Open Access | Times Cited: 1
Securing Transactions Using Hybrid Cryptography in E-commerce Apps
Ghanima Sabr Shyaa, Mishall Al-Zubaidie
Journal of education for pure science. (2023) Vol. 13, Iss. 3
Open Access | Times Cited: 1
Ghanima Sabr Shyaa, Mishall Al-Zubaidie
Journal of education for pure science. (2023) Vol. 13, Iss. 3
Open Access | Times Cited: 1
Improve a secure blind watermarking technique for digital video
Faten H. Mohammed Sediq Al-Kadei, Sohaib Najat Hasan
Periodicals of Engineering and Natural Sciences (PEN) (2022) Vol. 10, Iss. 2, pp. 283-283
Open Access | Times Cited: 1
Faten H. Mohammed Sediq Al-Kadei, Sohaib Najat Hasan
Periodicals of Engineering and Natural Sciences (PEN) (2022) Vol. 10, Iss. 2, pp. 283-283
Open Access | Times Cited: 1
Modified Rijndael Algorithm for Resource-Constrained IoT-Based Wireless Sensor Networks
Mohammad Sirajuddin, B. Sateesh Kumar
ICST Transactions on Scalable Information Systems (2023)
Open Access
Mohammad Sirajuddin, B. Sateesh Kumar
ICST Transactions on Scalable Information Systems (2023)
Open Access
Code Obfuscation Technology Based on Chaotic Asymmetric Encryption Algorithm
Ying Ling, Dongmei Bin, Chunyan Yang, et al.
(2023), pp. 231-234
Closed Access
Ying Ling, Dongmei Bin, Chunyan Yang, et al.
(2023), pp. 231-234
Closed Access
Retracted: A Secure Environment Using a New Lightweight AES Encryption Algorithm for E-Commerce Websites
Security and Communication Networks
Security and Communication Networks (2023) Vol. 2023, pp. 1-1
Open Access
Security and Communication Networks
Security and Communication Networks (2023) Vol. 2023, pp. 1-1
Open Access
The Zero-Knowledge Proof Technique: Limitations and Challenges
Sajjad Mohammed Shlaka, Hala Bahjat Abdul Wahab
(2023), pp. 90-95
Closed Access
Sajjad Mohammed Shlaka, Hala Bahjat Abdul Wahab
(2023), pp. 90-95
Closed Access
FPGA Implementation of Modified Lightweight 128-Bit AES Algorithm for IoT Applications
Jeyvarshni Vimalkumar, Harshitha Ramesh Babu, M. Bhaskar
2021 IEEE International Symposium on Smart Electronic Systems (iSES) (2023), pp. 306-309
Closed Access
Jeyvarshni Vimalkumar, Harshitha Ramesh Babu, M. Bhaskar
2021 IEEE International Symposium on Smart Electronic Systems (iSES) (2023), pp. 306-309
Closed Access
Research on privacy protection scheme based on data fuzzy processing
Yewen Fu, Yongzhen Li, Zhexue Jin
(2023), pp. 96-100
Closed Access
Yewen Fu, Yongzhen Li, Zhexue Jin
(2023), pp. 96-100
Closed Access
Review and Comparison of Lightweight Modifications of the AES Cipher for a Network of Low-Power Devices
Olesya Berezovskaya, Sergey Chuprov, Evgeny A. Neverov, et al.
Automatic Control and Computer Sciences (2022) Vol. 56, Iss. 8, pp. 994-1006
Closed Access
Olesya Berezovskaya, Sergey Chuprov, Evgeny A. Neverov, et al.
Automatic Control and Computer Sciences (2022) Vol. 56, Iss. 8, pp. 994-1006
Closed Access