OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Enhanced Architecture to Resolve Public-Key Cryptographic Issues in the Internet of Things (IoT), Employing Quantum Computing Supremacy
Shuhab Shamshad, Farina Riaz, Rabia Riaz, et al.
Sensors (2022) Vol. 22, Iss. 21, pp. 8151-8151
Open Access | Times Cited: 17

Showing 17 citing articles:

Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing
Sarra Cherbal, Abdelhak Zier, Sara Hebal, et al.
The Journal of Supercomputing (2023) Vol. 80, Iss. 3, pp. 3738-3816
Closed Access | Times Cited: 43

Harnessing quantum computing for smart agriculture: Empowering sustainable crop management and yield optimization
Chrysanthos Maraveas, Debanjan Konar, Dimosthenis K. Michopoulos, et al.
Computers and Electronics in Agriculture (2024) Vol. 218, pp. 108680-108680
Closed Access | Times Cited: 21

Artificial intelligence and quantum cryptography
Petar Radanliev
Journal of Analytical Science & Technology (2024) Vol. 15, Iss. 1
Open Access | Times Cited: 13

Revolutionizing Internet of Vehicles with Quantum Key Distribution on Blockchain for Unprecedented Security
Hong Seng Phil
Journal of Machine and Computing (2025), pp. 496-508
Closed Access

Advances and Strategies in Quantum Computing Integration for Cybersecurity: A Systematic Literature Review
Sebastián Berríos, Francisco Alonso, Bady Gana, et al.
Communications in computer and information science (2025), pp. 269-282
Closed Access

Quantum Computers—Security Threats and Solutions
Sára Szatmáry
Advanced sciences and technologies for security applications (2024), pp. 431-441
Closed Access | Times Cited: 2

Uncovering the Risk of Academic Information System Vulnerability through PTES and OWASP Method
Ferzha Putra Utama, Raden Muhammad Hilmi Nurhadi
CommIT (Communication and Information Technology) Journal (2024) Vol. 18, Iss. 1, pp. 39-51
Open Access | Times Cited: 2

Secure IoT Communication: Implementing a One-Time Pad Protocol with True Random Numbers and Secure Multiparty Sums
Julio López Fenner, Patricio Galeas, Francisco Escobar, et al.
Applied Sciences (2024) Vol. 14, Iss. 12, pp. 5354-5354
Open Access | Times Cited: 1

SOA Based BB84 Protocol for Enhancing Quantum Key Distribution in Cloud Environment
Shravan Kumar Sehgal, Rashmi Gupta
Wireless Personal Communications (2023) Vol. 130, Iss. 3, pp. 1759-1793
Closed Access | Times Cited: 4

Secure IoT communication: Implementing a One-Time-Pad Protocol with True Random Numbers and Secure Multiparty Sums
Julio López Fenner, Patricio Galeas, Francisco Escobar, et al.
(2024)
Open Access | Times Cited: 1

Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review
Md. Ataullah, Naveen Chauhan
Security and Privacy (2024) Vol. 7, Iss. 6
Closed Access | Times Cited: 1

Review on lightweight cryptography techniques and steganography techniques for IoT environment
Sangeetha Supriya K., Jeno Lovesum S. P.
International Journal of Systems Assurance Engineering and Management (2024) Vol. 15, Iss. 9, pp. 4210-4228
Closed Access | Times Cited: 1

Securing Digital Ecosystems
Mario Casillo, Francesco Colace, Brij B. Gupta, et al.
Advances in computational intelligence and robotics book series (2023), pp. 50-74
Closed Access | Times Cited: 3

Exploring the Frontier
Navya Sree Anagani, Rajesh Doriya, Chandrasekhar Jatoth
Advances in information security, privacy, and ethics book series (2024), pp. 1-36
Closed Access

GS3: A Lightweight Method of Generating Data Blocks With Shuffling, Scrambling, and Substituting Data for Constrained IoT Devices
Francisco Alcaraz-Velasco, José M. Palomares, Joaquín Olivares
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 15, pp. 25782-25801
Open Access

HAETAE on ARMv8
Minjoo Sim, Minwoo Lee, Hwajeong Seo
Electronics (2024) Vol. 13, Iss. 19, pp. 3863-3863
Open Access

Hybridization of Learning Techniques and Quantum Mechanism for IIoT Security: Applications, Challenges, and Prospects
Ismaeel A. Sikiru, Ahmed Dooguy Kora, Eugène C. Ezin, et al.
Electronics (2024) Vol. 13, Iss. 21, pp. 4153-4153
Open Access

Resource Limitations for Wireless Sensor Networks to Establish a Comprehensive Security System in the 5G Network
Muhammad Muntasir Yakubu, Umar Danjuma Maiwada
UMYU Scientifica (2023) Vol. 2, Iss. 2, pp. 44-52
Open Access

Page 1

Scroll to top