
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
Wencheng Yang, Song Wang, Hui Cui, et al.
Sensors (2023) Vol. 23, Iss. 7, pp. 3566-3566
Open Access | Times Cited: 25
Wencheng Yang, Song Wang, Hui Cui, et al.
Sensors (2023) Vol. 23, Iss. 7, pp. 3566-3566
Open Access | Times Cited: 25
Showing 25 citing articles:
QP-ChainSZKP: A Quantum-Proof Blockchain Framework for Scalable and Secure Cloud Applications
V. Ananthakrishna, Chandra Shekhar Yadav
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 3
V. Ananthakrishna, Chandra Shekhar Yadav
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 3
An Overview of Privacy-Enhancing Technologies in Biometric Recognition
Pietro Melzi, Christian Rathgeb, Rubén Tolosana, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 12, pp. 1-28
Open Access | Times Cited: 7
Pietro Melzi, Christian Rathgeb, Rubén Tolosana, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 12, pp. 1-28
Open Access | Times Cited: 7
Privacy-Preserving Face Recognition Using Trainable Feature Subtraction
Yuxi Mi, Z. Zhong, Yuge Huang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024), pp. 297-307
Closed Access | Times Cited: 5
Yuxi Mi, Z. Zhong, Yuge Huang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024), pp. 297-307
Closed Access | Times Cited: 5
A review of privacy-preserving biometric identification and authentication protocols
Li Zeng, Peisong Shen, Xiaojie Zhu, et al.
Computers & Security (2025), pp. 104309-104309
Closed Access
Li Zeng, Peisong Shen, Xiaojie Zhu, et al.
Computers & Security (2025), pp. 104309-104309
Closed Access
Introduction to Network Sensing Systems in Society 5.0
Ankit Kumar, Anurag Kumar Kanojiya, D Subitha
(2025), pp. 1-29
Closed Access
Ankit Kumar, Anurag Kumar Kanojiya, D Subitha
(2025), pp. 1-29
Closed Access
ABCD: advanced blockchain DSR algorithm for MANET to mitigate the different security threats
Sayan Majumder, Debika Bhattacharyya, Swati Chowdhuri
EURASIP Journal on Wireless Communications and Networking (2025) Vol. 2025, Iss. 1
Open Access
Sayan Majumder, Debika Bhattacharyya, Swati Chowdhuri
EURASIP Journal on Wireless Communications and Networking (2025) Vol. 2025, Iss. 1
Open Access
Optimizing Privacy-Preserving Continuous Authentication of Mobile Devices
David Monschein, Oliver P. Waldhorst
Lecture notes in computer science (2025), pp. 63-81
Closed Access
David Monschein, Oliver P. Waldhorst
Lecture notes in computer science (2025), pp. 63-81
Closed Access
Preliminary Experiments of a Real-World Authentication Mechanism Based on Facial Recognition and Fully Homomorphic Encryption
Georgiana Crihan, Luminiţa Dumitriu, Marian Crăciun
Applied Sciences (2024) Vol. 14, Iss. 2, pp. 718-718
Open Access | Times Cited: 4
Georgiana Crihan, Luminiţa Dumitriu, Marian Crăciun
Applied Sciences (2024) Vol. 14, Iss. 2, pp. 718-718
Open Access | Times Cited: 4
Privacy-preserving predictive modeling for early detection of chronic kidney disease
Prokash Gogoi, J. Arul Valan
Network Modeling Analysis in Health Informatics and Bioinformatics (2024) Vol. 13, Iss. 1
Closed Access | Times Cited: 3
Prokash Gogoi, J. Arul Valan
Network Modeling Analysis in Health Informatics and Bioinformatics (2024) Vol. 13, Iss. 1
Closed Access | Times Cited: 3
Recent Advances in Steganography
Bamanga Mahmud Ahmad, Aliyu Kamalu Babando, Mohammed Ahmed Shehu
IntechOpen eBooks (2024)
Open Access | Times Cited: 1
Bamanga Mahmud Ahmad, Aliyu Kamalu Babando, Mohammed Ahmed Shehu
IntechOpen eBooks (2024)
Open Access | Times Cited: 1
A Modern Approach to Securing Critical Infrastructure in Energy Transmission Networks: Integration of Cryptographic Mechanisms and Biometric Data
Anna Manowska, Martin Boroš, Muhammad Hassan, et al.
Electronics (2024) Vol. 13, Iss. 14, pp. 2849-2849
Open Access | Times Cited: 1
Anna Manowska, Martin Boroš, Muhammad Hassan, et al.
Electronics (2024) Vol. 13, Iss. 14, pp. 2849-2849
Open Access | Times Cited: 1
UniHENN: Designing Faster and More Versatile Homomorphic Encryption-Based CNNs Without im2col
Hyunmin Choi, Jihun Kim, S. Kim, et al.
IEEE Access (2024) Vol. 12, pp. 109323-109341
Open Access | Times Cited: 1
Hyunmin Choi, Jihun Kim, S. Kim, et al.
IEEE Access (2024) Vol. 12, pp. 109323-109341
Open Access | Times Cited: 1
A Stealthy Communication Model for Protecting Aggregated Results Integrity in Federated Learning
Lu Li, Xuan Sun, Ning Shi, et al.
Electronics (2024) Vol. 13, Iss. 19, pp. 3870-3870
Open Access | Times Cited: 1
Lu Li, Xuan Sun, Ning Shi, et al.
Electronics (2024) Vol. 13, Iss. 19, pp. 3870-3870
Open Access | Times Cited: 1
Comprehensive on Exploring Advanced Ciphering and Steganography Techniques for Enhanced Data Protection: Review
Sajaa G. Mohammed
Wasit Journal of Pure sciences (2023) Vol. 2, Iss. 4, pp. 116-130
Open Access | Times Cited: 2
Sajaa G. Mohammed
Wasit Journal of Pure sciences (2023) Vol. 2, Iss. 4, pp. 116-130
Open Access | Times Cited: 2
PDPHE: Personal Data Protection for Trans-Border Transmission Based on Homomorphic Encryption
Yan Liu, Changshui Yang, Qiang Liu, et al.
Electronics (2024) Vol. 13, Iss. 10, pp. 1959-1959
Open Access
Yan Liu, Changshui Yang, Qiang Liu, et al.
Electronics (2024) Vol. 13, Iss. 10, pp. 1959-1959
Open Access
Security Protection Method for Electronic Archives Based on Homomorphic Aggregation Signature Scheme in Mobile Network
Junwei Li, Huaquan Su, Guo Li, et al.
International Journal of Network Management (2024) Vol. 35, Iss. 1
Closed Access
Junwei Li, Huaquan Su, Guo Li, et al.
International Journal of Network Management (2024) Vol. 35, Iss. 1
Closed Access
Privacy-Preserving Decentralized Biometric Identity Verification in Car-Sharing System
Saprunov Vadim, Muhammad Firdaus, Kyung-Hyune Rhee
Journal of Multimedia Information System (2024) Vol. 11, Iss. 1, pp. 17-34
Open Access
Saprunov Vadim, Muhammad Firdaus, Kyung-Hyune Rhee
Journal of Multimedia Information System (2024) Vol. 11, Iss. 1, pp. 17-34
Open Access
Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification
Alberto Ibarrondo, Ismet Kerenciler, Hervé Chabanne, et al.
(2024), pp. 211-222
Open Access
Alberto Ibarrondo, Ismet Kerenciler, Hervé Chabanne, et al.
(2024), pp. 211-222
Open Access
Secure federated learning in the Internet of Health Things for improved patient privacy and data security
Kassim Kalinaki, Adam A. Alli, Baguma Asuman, et al.
Elsevier eBooks (2024), pp. 387-408
Closed Access
Kassim Kalinaki, Adam A. Alli, Baguma Asuman, et al.
Elsevier eBooks (2024), pp. 387-408
Closed Access
Secure wireless sensor network transmission using reinforcement learning and homomorphic encryption
M. Sahaya Sheela, J. J. Jayakanth, A. Ramathilagam, et al.
International Journal of Data Science and Analytics (2024)
Closed Access
M. Sahaya Sheela, J. J. Jayakanth, A. Ramathilagam, et al.
International Journal of Data Science and Analytics (2024)
Closed Access
Application of Homomorphic Encryption in Machine Learning Based Chronic Kidney Disease Prediction
Prokash Gogoi, J. Arul Valan
(2024), pp. 1-6
Closed Access
Prokash Gogoi, J. Arul Valan
(2024), pp. 1-6
Closed Access
Homomorphic Encryption Applications for IoT and Light-Weighted Environments: A Review
Shamsher Ullah, Jianqiang Li, Jie Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 12, Iss. 2, pp. 1222-1246
Closed Access
Shamsher Ullah, Jianqiang Li, Jie Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 12, Iss. 2, pp. 1222-1246
Closed Access
Privacy-preserving Hybrid Learning Framework for Healthcare
Orhan Ermiş, Jensen Selwyn Joymangul, Redouane Bouhamoum, et al.
Procedia Computer Science (2024) Vol. 246, pp. 3420-3429
Open Access
Orhan Ermiş, Jensen Selwyn Joymangul, Redouane Bouhamoum, et al.
Procedia Computer Science (2024) Vol. 246, pp. 3420-3429
Open Access
Comparative Analysis of Basic Operations of Helib and Microsoft Seal Libraries for Cloud Computing
Maria Lapina, Subramani Neelakandan, Maxim Donchenko, et al.
Advances in computer and electrical engineering book series (2024), pp. 331-344
Closed Access
Maria Lapina, Subramani Neelakandan, Maxim Donchenko, et al.
Advances in computer and electrical engineering book series (2024), pp. 331-344
Closed Access
Fully Homomorphic Encryption Scheme Over Integers Based on DGHV Scheme
Zainab H. Mahmood, Mahmood Khalel Ibrahem
Control Systems and Optimization Letters (2023) Vol. 1, Iss. 3, pp. 169-173
Open Access | Times Cited: 1
Zainab H. Mahmood, Mahmood Khalel Ibrahem
Control Systems and Optimization Letters (2023) Vol. 1, Iss. 3, pp. 169-173
Open Access | Times Cited: 1