
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Security, Privacy, and Usability in Continuous Authentication: A Survey
Ahmed Fraz Baig, Sigurd Eskeland
Sensors (2021) Vol. 21, Iss. 17, pp. 5967-5967
Open Access | Times Cited: 55
Ahmed Fraz Baig, Sigurd Eskeland
Sensors (2021) Vol. 21, Iss. 17, pp. 5967-5967
Open Access | Times Cited: 55
Showing 1-25 of 55 citing articles:
Deep Learning Approaches for Continuous Authentication Based on Activity Patterns Using Mobile Sensing
Sakorn Mekruksavanich, Anuchit Jitpattanakul
Sensors (2021) Vol. 21, Iss. 22, pp. 7519-7519
Open Access | Times Cited: 74
Sakorn Mekruksavanich, Anuchit Jitpattanakul
Sensors (2021) Vol. 21, Iss. 22, pp. 7519-7519
Open Access | Times Cited: 74
Digital body, identity and privacy in social virtual reality: A systematic review
Jinghuai Lin, Marc Erich Latoschik
Frontiers in Virtual Reality (2022) Vol. 3
Open Access | Times Cited: 47
Jinghuai Lin, Marc Erich Latoschik
Frontiers in Virtual Reality (2022) Vol. 3
Open Access | Times Cited: 47
Continuous user authentication on smartphone via behavioral biometrics: a survey
Praveen Kumar Rayani, Suvamoy Changder
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 1633-1667
Closed Access | Times Cited: 27
Praveen Kumar Rayani, Suvamoy Changder
Multimedia Tools and Applications (2022) Vol. 82, Iss. 2, pp. 1633-1667
Closed Access | Times Cited: 27
Digital health technology in clinical trials
Mirja Mittermaier, Kaushik P. Venkatesh, Joseph C. Kvedar
npj Digital Medicine (2023) Vol. 6, Iss. 1
Open Access | Times Cited: 18
Mirja Mittermaier, Kaushik P. Venkatesh, Joseph C. Kvedar
npj Digital Medicine (2023) Vol. 6, Iss. 1
Open Access | Times Cited: 18
A Comprehensive Review on Secure Biometric-Based Continuous Authentication and User Profiling
S. Ayeswarya, K. John Singh
IEEE Access (2024) Vol. 12, pp. 82996-83021
Open Access | Times Cited: 5
S. Ayeswarya, K. John Singh
IEEE Access (2024) Vol. 12, pp. 82996-83021
Open Access | Times Cited: 5
A Review on Secure Authentication Mechanisms for Mobile Security
Syed Shabih Hasan, Anwar Ghani, Ali Daud, et al.
Sensors (2025) Vol. 25, Iss. 3, pp. 700-700
Open Access
Syed Shabih Hasan, Anwar Ghani, Ali Daud, et al.
Sensors (2025) Vol. 25, Iss. 3, pp. 700-700
Open Access
A Secure Privacy-Preserving Multimodal Continuous Authentication Protocol for Healthcare Systems
Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang, et al.
Communications in computer and information science (2025), pp. 67-86
Closed Access
Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang, et al.
Communications in computer and information science (2025), pp. 67-86
Closed Access
A Critical Overview of Industrial Internet of Things Security and Privacy Issues Using a Layer-Based Hacking Scenario
Anselme Herman Eyeleko, Tao Feng
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21917-21941
Open Access | Times Cited: 13
Anselme Herman Eyeleko, Tao Feng
IEEE Internet of Things Journal (2023) Vol. 10, Iss. 24, pp. 21917-21941
Open Access | Times Cited: 13
Strengthening Internet of Things Security: Surveying Physical Unclonable Functions for Authentication, Communication Protocols, Challenges, and Applications
Raed Ahmed Alhamarneh, Manmeet Mahinderjit Singh
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 1700-1700
Open Access | Times Cited: 4
Raed Ahmed Alhamarneh, Manmeet Mahinderjit Singh
Applied Sciences (2024) Vol. 14, Iss. 5, pp. 1700-1700
Open Access | Times Cited: 4
Multimodal biometric user authentication using improved decentralized fuzzy vault scheme based on Blockchain network
Shreyansh Sharma, Anil Kumar Saini, Santanu Chaudhury
Journal of Information Security and Applications (2024) Vol. 82, pp. 103740-103740
Closed Access | Times Cited: 4
Shreyansh Sharma, Anil Kumar Saini, Santanu Chaudhury
Journal of Information Security and Applications (2024) Vol. 82, pp. 103740-103740
Closed Access | Times Cited: 4
Identity Threats in the Metaverse and Future Research Opportunities
Abeer Awadallah, Ernesto Damiani, Mohamed Jamal Zemerly, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-6
Closed Access | Times Cited: 11
Abeer Awadallah, Ernesto Damiani, Mohamed Jamal Zemerly, et al.
2022 International Conference on Business Analytics for Technology and Security (ICBATS) (2023), pp. 1-6
Closed Access | Times Cited: 11
Data Is the New Oil–Sort of: A View on Why This Comparison Is Misleading and Its Implications for Modern Data Administration
Christoph Stach
Future Internet (2023) Vol. 15, Iss. 2, pp. 71-71
Open Access | Times Cited: 9
Christoph Stach
Future Internet (2023) Vol. 15, Iss. 2, pp. 71-71
Open Access | Times Cited: 9
Securing Access to Internet of Medical Things Using a Graphical-Password-Based User Authentication Scheme
Mudassar Ali Khan, Ikram Ud Din, Ahmad Almogren
Sustainability (2023) Vol. 15, Iss. 6, pp. 5207-5207
Open Access | Times Cited: 9
Mudassar Ali Khan, Ikram Ud Din, Ahmad Almogren
Sustainability (2023) Vol. 15, Iss. 6, pp. 5207-5207
Open Access | Times Cited: 9
Privacy-preserving continuous authentication using behavioral biometrics
Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang
International Journal of Information Security (2023) Vol. 22, Iss. 6, pp. 1833-1847
Open Access | Times Cited: 8
Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang
International Journal of Information Security (2023) Vol. 22, Iss. 6, pp. 1833-1847
Open Access | Times Cited: 8
Novel and Efficient Privacy-Preserving Continuous Authentication
Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang
Cryptography (2024) Vol. 8, Iss. 1, pp. 3-3
Open Access | Times Cited: 2
Ahmed Fraz Baig, Sigurd Eskeland, Bian Yang
Cryptography (2024) Vol. 8, Iss. 1, pp. 3-3
Open Access | Times Cited: 2
Enhancing security through continuous biometric authentication using wearable sensors
Laxmi Divya Chhibbar, Sujay Patni, Siddarth Todi, et al.
Internet of Things (2024), pp. 101374-101374
Closed Access | Times Cited: 2
Laxmi Divya Chhibbar, Sujay Patni, Siddarth Todi, et al.
Internet of Things (2024), pp. 101374-101374
Closed Access | Times Cited: 2
SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays
Reyhan Düzgün, Naheem Noah, Peter Mayer, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2022), pp. 1-12
Open Access | Times Cited: 9
Reyhan Düzgün, Naheem Noah, Peter Mayer, et al.
Proceedings of the 17th International Conference on Availability, Reliability and Security (2022), pp. 1-12
Open Access | Times Cited: 9
Cryptanalysis of a privacy-preserving authentication scheme based on private set intersection
Sigurd Eskeland
Journal of Mathematical Cryptology (2024) Vol. 18, Iss. 1
Open Access | Times Cited: 1
Sigurd Eskeland
Journal of Mathematical Cryptology (2024) Vol. 18, Iss. 1
Open Access | Times Cited: 1
Siamese Neural Network for User Authentication in Field-Programmable Gate Arrays (FPGAs) for Wearable Applications
Hyun‐Sik Choi
Electronics (2023) Vol. 12, Iss. 19, pp. 4030-4030
Open Access | Times Cited: 4
Hyun‐Sik Choi
Electronics (2023) Vol. 12, Iss. 19, pp. 4030-4030
Open Access | Times Cited: 4
CT-Auth: Capacitive Touchscreen-Based Continuous Authentication on Smartphones
Zhihao Shen, Shun Li, Xi Zhao, et al.
IEEE Transactions on Knowledge and Data Engineering (2023) Vol. 36, Iss. 1, pp. 90-106
Closed Access | Times Cited: 4
Zhihao Shen, Shun Li, Xi Zhao, et al.
IEEE Transactions on Knowledge and Data Engineering (2023) Vol. 36, Iss. 1, pp. 90-106
Closed Access | Times Cited: 4
Multi-motion sensor behavior based continuous authentication on smartphones using gated two-tower transformer fusion networks
Chengmei Zhao, Feng Gao, Zhihao Shen
Computers & Security (2024) Vol. 139, pp. 103698-103698
Closed Access | Times Cited: 1
Chengmei Zhao, Feng Gao, Zhihao Shen
Computers & Security (2024) Vol. 139, pp. 103698-103698
Closed Access | Times Cited: 1
Continuous Authentication Methods for Zero-Trust Cybersecurity Architecture
Iurii Matiushin, Vladimir Korkhov
Lecture notes in computer science (2023), pp. 334-351
Closed Access | Times Cited: 2
Iurii Matiushin, Vladimir Korkhov
Lecture notes in computer science (2023), pp. 334-351
Closed Access | Times Cited: 2
Reviewing the Usability of Web Authentication Procedures: Comparing the Current Procedures of 20 Websites
Abdulmohsen Saud Albesher
Sustainability (2023) Vol. 15, Iss. 14, pp. 11043-11043
Open Access | Times Cited: 2
Abdulmohsen Saud Albesher
Sustainability (2023) Vol. 15, Iss. 14, pp. 11043-11043
Open Access | Times Cited: 2
A Generic Privacy-preserving Protocol for Keystroke Dynamics-based Continuous Authentication
Ahmed Fraz Baig, Sigurd Eskeland
(2022), pp. 491-498
Open Access | Times Cited: 4
Ahmed Fraz Baig, Sigurd Eskeland
(2022), pp. 491-498
Open Access | Times Cited: 4
Continuous User Authentication using WiFi
Pengcheng Huang, Dongheng Zhang, Ruixu Geng, et al.
2022 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) (2022), pp. 2083-2088
Closed Access | Times Cited: 4
Pengcheng Huang, Dongheng Zhang, Ruixu Geng, et al.
2022 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) (2022), pp. 2083-2088
Closed Access | Times Cited: 4