
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Strengthening Cloud Security: An Innovative Multi-Factor Multi-Layer Authentication Framework for Cloud User Authentication
Ayman Mohamed Mostafa, Mohamed Ezz, Murtada K. Elbashir, et al.
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 10871-10871
Open Access | Times Cited: 27
Ayman Mohamed Mostafa, Mohamed Ezz, Murtada K. Elbashir, et al.
Applied Sciences (2023) Vol. 13, Iss. 19, pp. 10871-10871
Open Access | Times Cited: 27
Showing 1-25 of 27 citing articles:
DATA PRIVACY AND SECURITY IN IT: A REVIEW OF TECHNIQUES AND CHALLENGES
Oluwatoyin Ajoke Fayayola, Oluwabukunmi Latifat Olorunfemi, Philip Olaseni Shoetan
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 3, pp. 606-615
Open Access | Times Cited: 49
Oluwatoyin Ajoke Fayayola, Oluwabukunmi Latifat Olorunfemi, Philip Olaseni Shoetan
Computer Science & IT Research Journal (2024) Vol. 5, Iss. 3, pp. 606-615
Open Access | Times Cited: 49
Navigating the nexus of security and privacy in modern financial technologies
Florence Olweny
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 2, pp. 167-197
Open Access | Times Cited: 17
Florence Olweny
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 2, pp. 167-197
Open Access | Times Cited: 17
The Future of Education: A Multi-Layered Metaverse Classroom Model for Immersive and Inclusive Learning
Leyli Nouraei Yeganeh, Nicole S. Fenty, Yu Chen, et al.
Future Internet (2025) Vol. 17, Iss. 2, pp. 63-63
Open Access | Times Cited: 1
Leyli Nouraei Yeganeh, Nicole S. Fenty, Yu Chen, et al.
Future Internet (2025) Vol. 17, Iss. 2, pp. 63-63
Open Access | Times Cited: 1
Multi-layer access control for cloud data using improved DBSCAN, AES, homomorphic encryption, and RMAAC for text, image, and video
A. Jeneba Mary, K. Kuppusamy, A. Senthilrajan
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access
A. Jeneba Mary, K. Kuppusamy, A. Senthilrajan
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access
An analytical study on safety measures concerns in cloud computing technology
A. Sharma, Sandeep Rana, Alok Sharma, et al.
AIP conference proceedings (2025) Vol. 3224, pp. 020060-020060
Closed Access
A. Sharma, Sandeep Rana, Alok Sharma, et al.
AIP conference proceedings (2025) Vol. 3224, pp. 020060-020060
Closed Access
Ensuring Financial Security: Approaches to Risk Management and Protection in the Digital Economy
Oksana Desyatnyuk, Olеna Ptashchеnko, Iryna Murenets, et al.
Data & Metadata (2025) Vol. 4, pp. 674-674
Closed Access
Oksana Desyatnyuk, Olеna Ptashchеnko, Iryna Murenets, et al.
Data & Metadata (2025) Vol. 4, pp. 674-674
Closed Access
A Survey of the Real-Time Metaverse: Challenges and Opportunities
Mohsen Hatami, Qian Qu, Yu Chen, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 379-379
Open Access | Times Cited: 3
Mohsen Hatami, Qian Qu, Yu Chen, et al.
Future Internet (2024) Vol. 16, Iss. 10, pp. 379-379
Open Access | Times Cited: 3
Securing the Supply Chain
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 300-365
Closed Access | Times Cited: 2
Siva Raja Sindiramutty, Chong Eng Tan, Wei Wei Goh, et al.
Advances in information security, privacy, and ethics book series (2024), pp. 300-365
Closed Access | Times Cited: 2
Blockchain Technology for Monitoring Energy Production for Reliable and Secure Big Data
Marco Gerardi, Francesca Fallucchi, Fabio Orecchini
Electronics (2023) Vol. 12, Iss. 22, pp. 4660-4660
Open Access | Times Cited: 5
Marco Gerardi, Francesca Fallucchi, Fabio Orecchini
Electronics (2023) Vol. 12, Iss. 22, pp. 4660-4660
Open Access | Times Cited: 5
Multi-Factor Authentication for Cloud
International Research Journal of Modernization in Engineering Technology and Science (2024)
Open Access | Times Cited: 1
International Research Journal of Modernization in Engineering Technology and Science (2024)
Open Access | Times Cited: 1
Dwindling DCNN Training Time and Improving Authentication by Spurring Algorithm in Cloud Computing
K. Gowri, Banthumy Lingam Shivakumar
International journal of intelligent engineering and systems (2024) Vol. 17, Iss. 3, pp. 503-514
Open Access | Times Cited: 1
K. Gowri, Banthumy Lingam Shivakumar
International journal of intelligent engineering and systems (2024) Vol. 17, Iss. 3, pp. 503-514
Open Access | Times Cited: 1
Transforming Banking Experiences: The Effectiveness of Sharia Management in Boosting Customer Satisfaction in Makassar
Awaluddin Awaluddin, Haeruddin Saleh
Journal of Ecohumanism (2024) Vol. 3, Iss. 4, pp. 1794-1810
Open Access | Times Cited: 1
Awaluddin Awaluddin, Haeruddin Saleh
Journal of Ecohumanism (2024) Vol. 3, Iss. 4, pp. 1794-1810
Open Access | Times Cited: 1
Security challenges in cloud computing: A comprehensive analysis
Janet Julia Ang'udi
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 10, Iss. 2, pp. 155-181
Open Access | Times Cited: 3
Janet Julia Ang'udi
World Journal of Advanced Engineering Technology and Sciences (2023) Vol. 10, Iss. 2, pp. 155-181
Open Access | Times Cited: 3
Designing Secure IoT Systems: A Survey of Existing Approaches and Future Directions
Praveen Tnvs, Rama Devi Odugu, L. Sumalatha
(2024), pp. 1-8
Closed Access
Praveen Tnvs, Rama Devi Odugu, L. Sumalatha
(2024), pp. 1-8
Closed Access
Emerging Cyber Risks & Threats in Healthcare Systems: A Case Study in Resilient Cybersecurity Solutions
Abdiaziz Abdi, Hajar Bennouri, Anthony Keane
2022 11th Mediterranean Conference on Embedded Computing (MECO) (2024), pp. 1-8
Closed Access
Abdiaziz Abdi, Hajar Bennouri, Anthony Keane
2022 11th Mediterranean Conference on Embedded Computing (MECO) (2024), pp. 1-8
Closed Access
Enhancing Cybersecurity in Cloud - Based Banking - Best Practices and Technologies
Ravi Jagadish
International Journal of Science and Research (IJSR) (2024) Vol. 13, Iss. 3, pp. 422-426
Open Access
Ravi Jagadish
International Journal of Science and Research (IJSR) (2024) Vol. 13, Iss. 3, pp. 422-426
Open Access
Multi User Authentication for Reliable Data Storage in Cloud Computing
Richa Shah, Shatendra Dubey
International Journal of Scientific Research in Computer Science Engineering and Information Technology (2024) Vol. 10, Iss. 2, pp. 82-89
Open Access
Richa Shah, Shatendra Dubey
International Journal of Scientific Research in Computer Science Engineering and Information Technology (2024) Vol. 10, Iss. 2, pp. 82-89
Open Access
Enhancing data security in cloud computing: a blockchain-based Feistel cipher encryption and multiclass vector side-channel attack detection approach
Ramakrishna Subbareddy, Tamil selvan
International Journal of Advanced Technology and Engineering Exploration (2024) Vol. 11, Iss. 112
Open Access
Ramakrishna Subbareddy, Tamil selvan
International Journal of Advanced Technology and Engineering Exploration (2024) Vol. 11, Iss. 112
Open Access
Research on health evaluation method of data center security protection system
Ranxin Gao, Sen Jing, Min Li, et al.
(2024), pp. 72-72
Closed Access
Ranxin Gao, Sen Jing, Min Li, et al.
(2024), pp. 72-72
Closed Access
Multi-Factor Authentication: A User Experience Study
Shagufta Baseer
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 06, pp. 1-5
Open Access
Shagufta Baseer
INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (2024) Vol. 08, Iss. 06, pp. 1-5
Open Access
Protecting Instant Messaging Notifications against Physical Attacks: A Novel Instant Messaging Notification Protocol Based on Signal Protocol
Raghad Almari, Abdullah Almosallam, Saleh Almousa, et al.
Applied Sciences (2024) Vol. 14, Iss. 14, pp. 6348-6348
Open Access
Raghad Almari, Abdullah Almosallam, Saleh Almousa, et al.
Applied Sciences (2024) Vol. 14, Iss. 14, pp. 6348-6348
Open Access
A Higher Performance Data Backup Scheme Based on Multi-Factor Authentication
Lingfeng Wu, Yunhua Wen, Jinghai Yi
Entropy (2024) Vol. 26, Iss. 8, pp. 667-667
Open Access
Lingfeng Wu, Yunhua Wen, Jinghai Yi
Entropy (2024) Vol. 26, Iss. 8, pp. 667-667
Open Access
Using ASCON-Based Fuzzy Hashing for Efficient Malware Analysis
Noman Nasir Minhas, Maida Naveed
(2024)
Open Access
Noman Nasir Minhas, Maida Naveed
(2024)
Open Access
Enhanced Cloud Computing Security Based on Single to Multi Cloud Systems
Pranav Ojha
Journal of Research in Science and Engineering (2024) Vol. 6, Iss. 8, pp. 52-56
Open Access
Pranav Ojha
Journal of Research in Science and Engineering (2024) Vol. 6, Iss. 8, pp. 52-56
Open Access
Multi-cloud security model: establishment of inter-server communication for authentication integrity
Sukhjeet Kaur, Mayank Deep Khare, Manoj Bhatt, et al.
International Journal of Systems Assurance Engineering and Management (2024)
Closed Access
Sukhjeet Kaur, Mayank Deep Khare, Manoj Bhatt, et al.
International Journal of Systems Assurance Engineering and Management (2024)
Closed Access