
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Searchable Encryption Scheme Based on Lattice for Log Systems in燘lockchain
Gang Xu, Yibo Cao, Shiyuan Xu, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 72, Iss. 3, pp. 5429-5441
Open Access | Times Cited: 6
Gang Xu, Yibo Cao, Shiyuan Xu, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 72, Iss. 3, pp. 5429-5441
Open Access | Times Cited: 6
Showing 6 citing articles:
AAQ-PEKS: An Attribute-based Anti-Quantum Public Key Encryption Scheme with Keyword Search for E-healthcare Scenarios
Gang Xu, Shiyuan Xu, Yibo Cao, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
Gang Xu, Shiyuan Xu, Yibo Cao, et al.
Peer-to-Peer Networking and Applications (2025) Vol. 18, Iss. 2
Closed Access
Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications
Shiyuan Xu, Yibo Cao, Xue Chen, et al.
Lecture notes in computer science (2024), pp. 274-298
Closed Access | Times Cited: 3
Shiyuan Xu, Yibo Cao, Xue Chen, et al.
Lecture notes in computer science (2024), pp. 274-298
Closed Access | Times Cited: 3
A New Lattice-Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems
Yiyang Xie, Xiu‐Bo Chen, Yixian Yang
Security and Communication Networks (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 4
Yiyang Xie, Xiu‐Bo Chen, Yixian Yang
Security and Communication Networks (2022) Vol. 2022, pp. 1-12
Open Access | Times Cited: 4
Authentication and Key Agreement Algorithm for Handover of Next-Generation High-Speed Railway
Yong Chen, Wen Liu, Wei Zhang
Security and Communication Networks (2023) Vol. 2023, pp. 1-12
Open Access | Times Cited: 2
Yong Chen, Wen Liu, Wei Zhang
Security and Communication Networks (2023) Vol. 2023, pp. 1-12
Open Access | Times Cited: 2
Log Preservation in Custody Dual Blockchain With Energy Regime and Obfuscation Shuffle
Chit-Jie Chew, Wei‐Bin Lee, Tzu-Hao Chen, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 4, pp. 3495-3511
Closed Access
Chit-Jie Chew, Wei‐Bin Lee, Tzu-Hao Chen, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 4, pp. 3495-3511
Closed Access
A Privacy-Preserving Searchable Encryption Scheme for Data Protection in Smart Grid
Xun Zhang, Hong Zhao, Lei Di, et al.
Communications in computer and information science (2024), pp. 135-148
Closed Access
Xun Zhang, Hong Zhao, Lei Di, et al.
Communications in computer and information science (2024), pp. 135-148
Closed Access