
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Authentication Technology in Internet of Things and Privacy Security Issues in Typical Application Scenarios
Junhui Zhao, Huanhuan Hu, Fanwei Huang, et al.
Electronics (2023) Vol. 12, Iss. 8, pp. 1812-1812
Open Access | Times Cited: 12
Junhui Zhao, Huanhuan Hu, Fanwei Huang, et al.
Electronics (2023) Vol. 12, Iss. 8, pp. 1812-1812
Open Access | Times Cited: 12
Showing 12 citing articles:
Secure WSN Architecture Utilizing Hybrid Encryption with DKM to Ensure Consistent IoV Communication
Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, et al.
Wireless Personal Communications (2024)
Closed Access | Times Cited: 6
Umesh Kumar Lilhore, Sarita Simaiya, Surjeet Dalal, et al.
Wireless Personal Communications (2024)
Closed Access | Times Cited: 6
Analyzing the impact of quantum computing on IoT security using computational based data analytics techniques
Wael Alosaimi, Abdullah Alharbi, Hashem Alyami, et al.
AIMS Mathematics (2024) Vol. 9, Iss. 3, pp. 7017-7039
Open Access | Times Cited: 2
Wael Alosaimi, Abdullah Alharbi, Hashem Alyami, et al.
AIMS Mathematics (2024) Vol. 9, Iss. 3, pp. 7017-7039
Open Access | Times Cited: 2
Understanding the Limitations of Authentication Protocols Employed by Existing Information Security Models for Networked Applications
Ritu Shree, Vivek Kumar, A Prabhu
(2024), pp. 1-7
Closed Access | Times Cited: 1
Ritu Shree, Vivek Kumar, A Prabhu
(2024), pp. 1-7
Closed Access | Times Cited: 1
Authentication protocols for securing IoMT: current state and technological advancements
Anuj Kumar Singh, Ankit Garg
Elsevier eBooks (2024), pp. 1-29
Closed Access | Times Cited: 1
Anuj Kumar Singh, Ankit Garg
Elsevier eBooks (2024), pp. 1-29
Closed Access | Times Cited: 1
Deep-Reinforcement-Learning-Based Wireless IoT Device Identification Using Channel State Information
Yuanlong Li, Yiyang Wang, Xuewen Liu, et al.
Symmetry (2023) Vol. 15, Iss. 7, pp. 1404-1404
Open Access | Times Cited: 2
Yuanlong Li, Yiyang Wang, Xuewen Liu, et al.
Symmetry (2023) Vol. 15, Iss. 7, pp. 1404-1404
Open Access | Times Cited: 2
Lightweight Block and Stream Cipher Algorithm: A Review
Suaad Ali Abead, Nada Hussein M. Ali
Journal of Applied Engineering and Technological Science (JAETS) (2024) Vol. 5, Iss. 2, pp. 860-874
Open Access
Suaad Ali Abead, Nada Hussein M. Ali
Journal of Applied Engineering and Technological Science (JAETS) (2024) Vol. 5, Iss. 2, pp. 860-874
Open Access
The Applications of Federated Learning Algorithm in the Federated Cloud Environment: A Systematic Review
Ademolu Ajao, O Jonathan, Emmanuel Adetiba
(2024), pp. 1-15
Closed Access
Ademolu Ajao, O Jonathan, Emmanuel Adetiba
(2024), pp. 1-15
Closed Access
Unraveling trust management in cybersecurity: insights from a systematic literature review
Angélica Pigola, Fernando de Souza Meirelles
Information Technology and Management (2024)
Closed Access
Angélica Pigola, Fernando de Souza Meirelles
Information Technology and Management (2024)
Closed Access
Authentication-Centric and Access-Controlled Architecture for Edge-Empowered SDN-IoT Networks
D S Sahana, S. H. Brahmananda
Journal of The Institution of Engineers (India) Series B (2024) Vol. 105, Iss. 6, pp. 1497-1509
Closed Access
D S Sahana, S. H. Brahmananda
Journal of The Institution of Engineers (India) Series B (2024) Vol. 105, Iss. 6, pp. 1497-1509
Closed Access
IoT Data Stream Handling, Analysis, Communication and Security Issues: A Systematic Survey
Sanjay Patidar, Neetesh Kumar, Rajni Jindal
Wireless Personal Communications (2024)
Closed Access
Sanjay Patidar, Neetesh Kumar, Rajni Jindal
Wireless Personal Communications (2024)
Closed Access
Achieving Improved Security in UAV-Assisted Covert Communication Networks
X. L. Chen, Zheng Chang, Timo Hämäläinen
(2024), pp. 323-328
Closed Access
X. L. Chen, Zheng Chang, Timo Hämäläinen
(2024), pp. 323-328
Closed Access
Securing Crowdsourced Localization to Resist Attack Based on Service Security Value Assessment
Guanghui Wang, Lingyun Li, Lingfeng Shen, et al.
(2024), pp. 369-374
Closed Access
Guanghui Wang, Lingyun Li, Lingfeng Shen, et al.
(2024), pp. 369-374
Closed Access