
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Enhanced Approach to Improve the Security and Performance for Deduplication
Nourah Almrezeq Et al.
Türk bilgisayar ve matematik eğitimi dergisi (2021) Vol. 12, Iss. 6, pp. 2866-2882
Open Access | Times Cited: 8
Nourah Almrezeq Et al.
Türk bilgisayar ve matematik eğitimi dergisi (2021) Vol. 12, Iss. 6, pp. 2866-2882
Open Access | Times Cited: 8
Showing 8 citing articles:
Health Monitoring System Using Internet of Things (IoT) Sensing for Elderly People
Ibrar Hussain, Sidra Tahir, Mamoona Humayun, et al.
2022 14th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS) (2022), pp. 1-5
Closed Access | Times Cited: 20
Ibrar Hussain, Sidra Tahir, Mamoona Humayun, et al.
2022 14th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS) (2022), pp. 1-5
Closed Access | Times Cited: 20
Improvisation of data security in mobile based data by using novel blowfish algorithm over DES algorithm
V. Vijayarama Raju, T. P. Anithaashri
AIP conference proceedings (2024) Vol. 2729, pp. 040005-040005
Open Access | Times Cited: 1
V. Vijayarama Raju, T. P. Anithaashri
AIP conference proceedings (2024) Vol. 2729, pp. 040005-040005
Open Access | Times Cited: 1
A Secure and Efficient Data Deduplication Scheme with Dynamic Ownership Management in Cloud Computing
Xuewei Ma, Wenyuan Yang, Yuesheng Zhu, et al.
(2022), pp. 194-201
Open Access | Times Cited: 4
Xuewei Ma, Wenyuan Yang, Yuesheng Zhu, et al.
(2022), pp. 194-201
Open Access | Times Cited: 4
An innovative approach for runtime analysis of 128 bits AES algorithm by comparing with DES algorithm using VHDL
G S Vijay, Prabhudev Jagadeesh
AIP conference proceedings (2024) Vol. 2729, pp. 060017-060017
Open Access
G S Vijay, Prabhudev Jagadeesh
AIP conference proceedings (2024) Vol. 2729, pp. 060017-060017
Open Access
Enhancing Data Aggregation in Cluster-Based Wireless Sensor Networks with LCSS: Longest Common Subsequence Empowerment
Muhammad Jamil, Umer Farooq, Noshina Tariq, et al.
Lecture notes in networks and systems (2024), pp. 41-52
Closed Access
Muhammad Jamil, Umer Farooq, Noshina Tariq, et al.
Lecture notes in networks and systems (2024), pp. 41-52
Closed Access
Time-conserving deduplicated data retrieval framework for the cloud computing environment
P. Swathika, J. Raja Sekar
Automatika (2023) Vol. 64, Iss. 4, pp. 681-688
Open Access | Times Cited: 1
P. Swathika, J. Raja Sekar
Automatika (2023) Vol. 64, Iss. 4, pp. 681-688
Open Access | Times Cited: 1
Improve the security for voice cryptography in the RSA algorithm
Sara Al-Ghamdi, Hala Al-Sharari
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2022), pp. 1-4
Closed Access | Times Cited: 2
Sara Al-Ghamdi, Hala Al-Sharari
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2022), pp. 1-4
Closed Access | Times Cited: 2
A Comparative Analysis Of Data Integrity In Healthcare
Ebtehal Al-Omrani, Hadel Al-Khabour, Anfal Al-Ruwaili
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2022), pp. 1-5
Closed Access | Times Cited: 1
Ebtehal Al-Omrani, Hadel Al-Khabour, Anfal Al-Ruwaili
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2022), pp. 1-5
Closed Access | Times Cited: 1