
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Blockchain-based Multifactor Authentication for Future 6G Cellular Networks: A Systematic Review
Jamil Asim, Adnan Shahid Khan, Rashad Mahmood Saqib, et al.
Applied Sciences (2022) Vol. 12, Iss. 7, pp. 3551-3551
Open Access | Times Cited: 18
Jamil Asim, Adnan Shahid Khan, Rashad Mahmood Saqib, et al.
Applied Sciences (2022) Vol. 12, Iss. 7, pp. 3551-3551
Open Access | Times Cited: 18
Showing 18 citing articles:
An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT
Ali Shahidinejad, Jemal Abawajy
ACM Computing Surveys (2024) Vol. 56, Iss. 7, pp. 1-38
Open Access | Times Cited: 43
Ali Shahidinejad, Jemal Abawajy
ACM Computing Surveys (2024) Vol. 56, Iss. 7, pp. 1-38
Open Access | Times Cited: 43
Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions
Syed Hussain Ali Kazmi, Rosilah Hassan, Faizan Qamar, et al.
Symmetry (2023) Vol. 15, Iss. 6, pp. 1147-1147
Open Access | Times Cited: 30
Syed Hussain Ali Kazmi, Rosilah Hassan, Faizan Qamar, et al.
Symmetry (2023) Vol. 15, Iss. 6, pp. 1147-1147
Open Access | Times Cited: 30
On the Applications of Blockchain in FinTech: Advancements and Opportunities
Christian Baliker, Mohamed Baza, Abdullah Alourani, et al.
IEEE Transactions on Engineering Management (2023) Vol. 71, pp. 6338-6355
Closed Access | Times Cited: 21
Christian Baliker, Mohamed Baza, Abdullah Alourani, et al.
IEEE Transactions on Engineering Management (2023) Vol. 71, pp. 6338-6355
Closed Access | Times Cited: 21
Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain
Wajid Rafique, Junaid Qadir
Computer Science Review (2024) Vol. 54, pp. 100678-100678
Open Access | Times Cited: 7
Wajid Rafique, Junaid Qadir
Computer Science Review (2024) Vol. 54, pp. 100678-100678
Open Access | Times Cited: 7
A Comprehensive Review of Block Chain Based Multi Factor Authentication
Abdul Rahman Khan, Parma Nand, Bharat Bhushan, et al.
Lecture notes in networks and systems (2025), pp. 713-726
Closed Access
Abdul Rahman Khan, Parma Nand, Bharat Bhushan, et al.
Lecture notes in networks and systems (2025), pp. 713-726
Closed Access
TPAAD: Two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, et al.
International Journal of Network Management (2024) Vol. 34, Iss. 3
Open Access | Times Cited: 4
Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad, et al.
International Journal of Network Management (2024) Vol. 34, Iss. 3
Open Access | Times Cited: 4
Blockchain-Based Lightweight Multifactor Authentication for Cell-Free in Ultra-Dense 6G-Based (6-CMAS) Cellular Network
Adnan Shahid Khan, Mohd Izzat Bin Yahya, Kartinah Zen, et al.
IEEE Access (2023) Vol. 11, pp. 20524-20541
Open Access | Times Cited: 9
Adnan Shahid Khan, Mohd Izzat Bin Yahya, Kartinah Zen, et al.
IEEE Access (2023) Vol. 11, pp. 20524-20541
Open Access | Times Cited: 9
A Survey on 6G Enabled Light Weight Authentication Protocol for UAVs, Security, Open Research Issues and Future Directions
Adnan Shahid Khan, Muhammad Ali Sattar, Kashif Nisar, et al.
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 277-277
Open Access | Times Cited: 15
Adnan Shahid Khan, Muhammad Ali Sattar, Kashif Nisar, et al.
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 277-277
Open Access | Times Cited: 15
Zeeshan Ahmad, Adnan Shahid Khan, Kartinah Zen, et al.
Transactions on Emerging Telecommunications Technologies (2023) Vol. 34, Iss. 8
Open Access | Times Cited: 6
Hybrid Architectures Used in the Protection of Large Healthcare Records Based on Cloud and Blockchain Integration: A Review
Leonardo Ramı́rez, David Millan Mayorga, Luis Hernando Martinez Poveda, et al.
Computers (2024) Vol. 13, Iss. 6, pp. 152-152
Open Access | Times Cited: 1
Leonardo Ramı́rez, David Millan Mayorga, Luis Hernando Martinez Poveda, et al.
Computers (2024) Vol. 13, Iss. 6, pp. 152-152
Open Access | Times Cited: 1
S-ADS: Spectrogram Image-based Anomaly Detection System for IoT networks
Zeeshan Ahmad, Adnan Shahid Khan, Sehrish Aqeel, et al.
(2022), pp. 105-110
Closed Access | Times Cited: 6
Zeeshan Ahmad, Adnan Shahid Khan, Sehrish Aqeel, et al.
(2022), pp. 105-110
Closed Access | Times Cited: 6
Evolution of Wireless Communication Networks from 5G to 6G: Future Perspective
Mohammad Shabbir Alam, Shams Tabrez Siddiqui, Khalid Ali Qidwai, et al.
Radioelectronics and Communications Systems (2023) Vol. 66, Iss. 5, pp. 213-222
Closed Access | Times Cited: 3
Mohammad Shabbir Alam, Shams Tabrez Siddiqui, Khalid Ali Qidwai, et al.
Radioelectronics and Communications Systems (2023) Vol. 66, Iss. 5, pp. 213-222
Closed Access | Times Cited: 3
A Review and Bibliometric Analysis of the Current Studies for the 6G Networks
Qusay Medhat Salih, Md. Arafatur Rahman, Ahmad Firdaus, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 140, Iss. 3, pp. 2165-2206
Open Access
Qusay Medhat Salih, Md. Arafatur Rahman, Ahmad Firdaus, et al.
Computer Modeling in Engineering & Sciences (2024) Vol. 140, Iss. 3, pp. 2165-2206
Open Access
Future Directions for Secure IoT Frameworks: Insights from Blockchain-Based Solutions: A Comprehensive Review and Future Analysis
Priya Batta, Sachin Ahuja, Abhishek Kumar
Wireless Personal Communications (2024) Vol. 139, Iss. 3, pp. 1749-1781
Closed Access
Priya Batta, Sachin Ahuja, Abhishek Kumar
Wireless Personal Communications (2024) Vol. 139, Iss. 3, pp. 1749-1781
Closed Access
A Novel Two-Factor Authentication Scheme for Increased Security in Accessing the Moodle E-Learning Platform
Vasile Baneș, Cristian Ravariu, Bhargav Appasani, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9675-9675
Open Access
Vasile Baneș, Cristian Ravariu, Bhargav Appasani, et al.
Applied Sciences (2023) Vol. 13, Iss. 17, pp. 9675-9675
Open Access
Prevent Data in Embedded Based Customized Wireless Message Transmitting System Using AES Algorithm with Artificial Bee Colony Optimisation Techniques
Sathia Priya M, Bhagavathi Priya M, B. Manojkumar, et al.
(2023), pp. 1-6
Closed Access
Sathia Priya M, Bhagavathi Priya M, B. Manojkumar, et al.
(2023), pp. 1-6
Closed Access
Securing Blockchain Technology: A Comprehensive Analysis of Vulnerabilities and Mitigation Strategies
Bharathi Putta, Dulal C. Kar
(2023), pp. 2486-2493
Closed Access
Bharathi Putta, Dulal C. Kar
(2023), pp. 2486-2493
Closed Access