
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security
Rashad Mahmood Saqib, Adnan Shahid Khan, Yasir Javed, et al.
Intelligent Automation & Soft Computing (2021) Vol. 32, Iss. 3, pp. 1633-1647
Open Access | Times Cited: 19
Rashad Mahmood Saqib, Adnan Shahid Khan, Yasir Javed, et al.
Intelligent Automation & Soft Computing (2021) Vol. 32, Iss. 3, pp. 1633-1647
Open Access | Times Cited: 19
Showing 19 citing articles:
Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication
Ayman Mohamed Mostafa, Mohamed Ezz, Murtada K. Elbashir, et al.
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 10871-10871
Open Access | Times Cited: 27
Ayman Mohamed Mostafa, Mohamed Ezz, Murtada K. Elbashir, et al.
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 10871-10871
Open Access | Times Cited: 27
Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review
Jamil Asim, Adnan Shahid Khan, Rashad Mahmood Saqib, et al.
Applied Sciences (2022) Vol. 12, Iss. 7, pp. 3551-3551
Open Access | Times Cited: 18
Jamil Asim, Adnan Shahid Khan, Rashad Mahmood Saqib, et al.
Applied Sciences (2022) Vol. 12, Iss. 7, pp. 3551-3551
Open Access | Times Cited: 18
Lightweight Multifactor Authentication Scheme for NextGen Cellular Networks
Adnan Shahid Khan, Yasir Javed, Rashad Mahmood Saqib, et al.
IEEE Access (2022) Vol. 10, pp. 31273-31288
Open Access | Times Cited: 18
Adnan Shahid Khan, Yasir Javed, Rashad Mahmood Saqib, et al.
IEEE Access (2022) Vol. 10, pp. 31273-31288
Open Access | Times Cited: 18
Blockchain-Based Lightweight Multifactor Authentication for Cell-Free in Ultra-Dense 6G-Based (6-CMAS) Cellular Network
Adnan Shahid Khan, Mohd Izzat Bin Yahya, Kartinah Zen, et al.
IEEE Access (2023) Vol. 11, pp. 20524-20541
Open Access | Times Cited: 9
Adnan Shahid Khan, Mohd Izzat Bin Yahya, Kartinah Zen, et al.
IEEE Access (2023) Vol. 11, pp. 20524-20541
Open Access | Times Cited: 9
A Survey on 6G Enabled Light Weight Authentication Protocol for UAVs, Security, Open Research Issues and Future Directions
Adnan Shahid Khan, Muhammad Ali Sattar, Kashif Nisar, et al.
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 277-277
Open Access | Times Cited: 15
Adnan Shahid Khan, Muhammad Ali Sattar, Kashif Nisar, et al.
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 277-277
Open Access | Times Cited: 15
Zeeshan Ahmad, Adnan Shahid Khan, Kartinah Zen, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 8
Open Access | Times Cited: 6
Reflection of Federal Data Protection Standards on Cloud Governance
Olga Dye, Justin Heo, Ebru Çelikel Çankaya
(2024), pp. 303-316
Open Access | Times Cited: 1
Olga Dye, Justin Heo, Ebru Çelikel Çankaya
(2024), pp. 303-316
Open Access | Times Cited: 1
S-ADS: Spectrogram Image-based Anomaly Detection System for IoT networks
Zeeshan Ahmad, Adnan Shahid Khan, Sehrish Aqeel, et al.
(2022), pp. 105-110
Closed Access | Times Cited: 6
Zeeshan Ahmad, Adnan Shahid Khan, Sehrish Aqeel, et al.
(2022), pp. 105-110
Closed Access | Times Cited: 6
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Nayeem Ahmad Khan, Adnan Shahid Khan, Hushmat Amin Kar, et al.
(2022), pp. 126-130
Closed Access | Times Cited: 5
Nayeem Ahmad Khan, Adnan Shahid Khan, Hushmat Amin Kar, et al.
(2022), pp. 126-130
Closed Access | Times Cited: 5
IoT Networks: Security Vulnerabilities of Application Layer Protocols
Mohit Lalit, Sunil Kumar Chawla, Arun Kumar Rana, et al.
2022 14th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS) (2022)
Closed Access | Times Cited: 4
Mohit Lalit, Sunil Kumar Chawla, Arun Kumar Rana, et al.
2022 14th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS) (2022)
Closed Access | Times Cited: 4
CNN-Based Multi-Factor Authentication System for Mobile Devices Using Faces and Passwords
Jinho Han
Applied Sciences (2024) Vol. 14, Iss. 12, pp. 5019-5019
Open Access
Jinho Han
Applied Sciences (2024) Vol. 14, Iss. 12, pp. 5019-5019
Open Access
Cyber-Threat-Intelligence: Detection of Selective Packet Drops and Fake Packet Attacks in Opportunistic Networks (DOSFAN)
Waqar Khalid, Naveed Ahmad, Yasir Javed, et al.
(2024), pp. 50-56
Closed Access
Waqar Khalid, Naveed Ahmad, Yasir Javed, et al.
(2024), pp. 50-56
Closed Access
Challenge/Response-Lifecycle development for Multi-Factor Self-Sovereign Identity Authentication
Aleksandr Kormiltsyn, Vimal Dwivedi, Alex Norta
(2024), pp. 36-41
Closed Access
Aleksandr Kormiltsyn, Vimal Dwivedi, Alex Norta
(2024), pp. 36-41
Closed Access
PERTAHANAN PENCEGAHAN SERANGAN SOCIAL ENGINEERING MENGGUNAKAN TWO FACTOR AUTHENTICATION (2FA) BERBASIS SMS (SHORT MESSAGE SYSTEM)
Slamet Slamet
Jurnal Spirit STMIK Yadika Journal of Computing and Cybernetic System (2023) Vol. 14, Iss. 2
Open Access | Times Cited: 1
Slamet Slamet
Jurnal Spirit STMIK Yadika Journal of Computing and Cybernetic System (2023) Vol. 14, Iss. 2
Open Access | Times Cited: 1
Conceptual Review of DoS Attacks in Software Defined Networks
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, et al.
(2022), pp. 154-158
Closed Access | Times Cited: 1
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, et al.
(2022), pp. 154-158
Closed Access | Times Cited: 1
Anonymity Preserving Secure Authentication for a Transparent Internet Voting Process
Khan Farhan Rafat
(2022), pp. 22-27
Closed Access | Times Cited: 1
Khan Farhan Rafat
(2022), pp. 22-27
Closed Access | Times Cited: 1
Comparison of information security methods of information-communication infrastructure: Multi-Factor Authentication
Rafail Safin, Aliya Abdiraman, Assel Nurusheva, et al.
Bulletin of L N Gumilyov Eurasian National University Technical Science and Technology Series (2022) Vol. 140, Iss. 3, pp. 114-124
Open Access | Times Cited: 1
Rafail Safin, Aliya Abdiraman, Assel Nurusheva, et al.
Bulletin of L N Gumilyov Eurasian National University Technical Science and Technology Series (2022) Vol. 140, Iss. 3, pp. 114-124
Open Access | Times Cited: 1
Sensitive Information Protection Model Based on Bayesian Game
Yuzhen Liu, Zhe Liu, Xiaoliang Wang, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 1, pp. 883-898
Open Access
Yuzhen Liu, Zhe Liu, Xiaoliang Wang, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2022) Vol. 73, Iss. 1, pp. 883-898
Open Access
Perspicacious Apprehension of HDTbNB Algorithm Opposed to Security Contravention
Shyla, Vishal Bhatnagar
Intelligent Automation & Soft Computing (2022) Vol. 35, Iss. 2, pp. 2431-2447
Open Access
Shyla, Vishal Bhatnagar
Intelligent Automation & Soft Computing (2022) Vol. 35, Iss. 2, pp. 2431-2447
Open Access