OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Simple Secret Key Generation by Using a Combination of Pre-Processing Method with a Multilevel Quantization
Mike Yuliana, Wirawan Wirawan, Suwadi Suwadi
Entropy (2019) Vol. 21, Iss. 2, pp. 192-192
Open Access | Times Cited: 32

Showing 1-25 of 32 citing articles:

A Lightweight Key Generation Scheme for the Internet of Things
Dengke Guo, Kuo Cao, Jun Xiong, et al.
IEEE Internet of Things Journal (2021) Vol. 8, Iss. 15, pp. 12137-12149
Closed Access | Times Cited: 31

Physical Key Generation Using Modified Discrete Wavelet Transforms For The Internet of Things
Rakesh Kumar Sharma, Poonam Jindal, Brahmjit Singh
International Journal of Computing and Digital Systems (2024) Vol. 15, Iss. 1, pp. 207-220
Open Access | Times Cited: 2

An Efficient Key Generation for the Internet of Things Based Synchronized Quantization
Mike Yuliana, Wirawan Wirawan, Suwadi Suwadi
Sensors (2019) Vol. 19, Iss. 12, pp. 2674-2674
Open Access | Times Cited: 20

Sustainable Network by Enhancing Attribute-Based Selection Mechanism Using Lagrange Interpolation
Chetna Monga, Deepali Gupta, Devendra Prasad, et al.
Sustainability (2022) Vol. 14, Iss. 10, pp. 6082-6082
Open Access | Times Cited: 10

Physical layer security techniques for data transmission for future wireless networks
Weiping Shi, Xinyi Jiang, Jinsong Hu, et al.
Security and Safety (2022) Vol. 1, pp. 2022007-2022007
Open Access | Times Cited: 9

Wireless Channel Key Generation Based on Multisubcarrier Phase Difference
Xiaowei Yuan, Yu Jiang, Guyue Li, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 20, pp. 32939-32955
Closed Access | Times Cited: 1

Comparative research on block design-based protocol and blowfish for secured key generation and data sharing on cloud
Uma Hombal, D R Basavaraju, Ashwini Shinde
Soft Computing (2024)
Closed Access | Times Cited: 1

A Secret Key Generation Scheme Exploiting Spatio-temporal Acoustic Channel Characteristics for Underwater Sensor Networks
Pan Pan, Yishan Su, Rong Fan, et al.
IEEE Sensors Journal (2024) Vol. 24, Iss. 19, pp. 31188-31200
Closed Access | Times Cited: 1

Improved Channel Reciprocity for Secure Communication in Next Generation Wireless Systems
Imtisal Qadeer, Muhammad Khurram Ehsan
Computers, materials & continua/Computers, materials & continua (Print) (2021) Vol. 67, Iss. 2, pp. 2619-2630
Open Access | Times Cited: 9

Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm
Sahar Najah Hussein, Ali Hamzah Obaid, Ali A. Jabbar
Iraqi Journal of Science (2022), pp. 5037-5045
Open Access | Times Cited: 4

Quantization at the Physical layer using Affinity Propagation Clustering
Sujata Kadam, Joanne Gomes
(2023), pp. 1-6
Closed Access | Times Cited: 2

Blind Twins: Siamese Networks for Non-Interactive Information Reconciliation
Paul Walther, Thorsten Strufe
(2020), pp. 1-7
Closed Access | Times Cited: 5

Intelligent Reflecting Surface Assisted Multi-User Robust Secret Key Generation for Low-Entropy Environments
Yuwei Gao, Dengke Guo, Jun Xiong, et al.
Entropy (2021) Vol. 23, Iss. 10, pp. 1342-1342
Open Access | Times Cited: 5

Secret Key Generation Schemes for Physical Layer Security
Megha S. Kumar, R. Ramanathan, M Jayakumar, et al.
Defence Science Journal (2021) Vol. 71, Iss. 4, pp. 545-555
Open Access | Times Cited: 5

Adaptive key generation algorithm based on software engineering methodology
Muayad Sadik Croock, Zahraa Abbas Hassan, Saja Dhyaa Khudhur
International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering (2020) Vol. 11, Iss. 1, pp. 589-589
Open Access | Times Cited: 4

Cryptobiometrics for the Generation of Cancellable Symmetric and Asymmetric Ciphers with Perfect Secrecy
Vicente Jara Vera, Carmen Sánchez Ávila
Mathematics (2020) Vol. 8, Iss. 9, pp. 1536-1536
Open Access | Times Cited: 4

Comparative Analysis of Quantization Schemes for Physical Layer Key generation
Sujata Kadam, Joanne Gomes
(2022), pp. 548-553
Closed Access | Times Cited: 3

A Lightweight CIR-Based Physical Layer Key Generation Scheme for UWB
Eshagh Dehmollaian, Bernhard Etzlinger, Andreas Springer
2022 IEEE Wireless Communications and Networking Conference (WCNC) (2024), pp. 1-6
Closed Access

Shared secret key extraction from atmospheric optical wireless channels with multi-scale information reconciliation
Gang Pan, Chunyi Chen, Haifeng Yao, et al.
Ad Hoc Networks (2024) Vol. 164, pp. 103638-103638
Closed Access

Assessment of the risk of a dangerous event of a human collision with a remote-controlled robot
Olena Yavorska, Serhii Khudolii, Yu.I. Cheberiachko, et al.
E3S Web of Conferences (2024) Vol. 567, pp. 01018-01018
Open Access

Performance Evaluation of Secret Key Generation System for Static and Dynamic Condition
Suwadi Suwadi, Wirawan Wirawan, Mike Yuliana
(2020), pp. 423-428
Closed Access | Times Cited: 2

Secret Keys Extraction Using Light Weight Schemes for Data Ciphering
Sahar Najah Hussein, Saif Al-Alak
Journal of Physics Conference Series (2021) Vol. 1999, Iss. 1, pp. 012114-012114
Open Access | Times Cited: 2

Analysis of Key Generation Which Extracted from RSS for Handover System in V2I Communication
Isna Yaumirrahma Saniyyah, Mike Yuliana, Amang Sudarsono
2022 International Electronics Symposium (IES) (2021), pp. 144-150
Closed Access | Times Cited: 2

Performance Evaluation of Savitzky Golay Filter Method that Implement within Key Generation
Mike Yuliana, Suwadi Suwadi, Wirawan Wirawan
(2021), pp. 343-348
Closed Access | Times Cited: 2

RSS-based Secret Key Establishment using Middle-Point Quantization and Clover Filter Algorithm
Choirun Nisa, Amang Sudarsono, Mike Yuliana
2022 International Electronics Symposium (IES) (2020), pp. 131-138
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top