OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

A Review of Homomorphic Encryption for Privacy-Preserving Biometrics
Wencheng Yang, Song Wang, Hui Cui, et al.
Sensors (2023) Vol. 23, Iss. 7, pp. 3566-3566
Open Access | Times Cited: 25

Showing 25 citing articles:

QP-ChainSZKP: A Quantum-Proof Blockchain Framework for Scalable and Secure Cloud Applications
V. Ananthakrishna, Chandra Shekhar Yadav
International Journal of Computational and Experimental Science and Engineering (2025) Vol. 11, Iss. 1
Open Access | Times Cited: 3

An Overview of Privacy-Enhancing Technologies in Biometric Recognition
Pietro Melzi, Christian Rathgeb, Rubén Tolosana, et al.
ACM Computing Surveys (2024) Vol. 56, Iss. 12, pp. 1-28
Open Access | Times Cited: 7

Privacy-Preserving Face Recognition Using Trainable Feature Subtraction
Yuxi Mi, Z. Zhong, Yuge Huang, et al.
2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) (2024), pp. 297-307
Closed Access | Times Cited: 5

A review of privacy-preserving biometric identification and authentication protocols
Li Zeng, Peisong Shen, Xiaojie Zhu, et al.
Computers & Security (2025), pp. 104309-104309
Closed Access

Introduction to Network Sensing Systems in Society 5.0
Ankit Kumar, Anurag Kumar Kanojiya, D Subitha
(2025), pp. 1-29
Closed Access

ABCD: advanced blockchain DSR algorithm for MANET to mitigate the different security threats
Sayan Majumder, Debika Bhattacharyya, Swati Chowdhuri
EURASIP Journal on Wireless Communications and Networking (2025) Vol. 2025, Iss. 1
Open Access

Optimizing Privacy-Preserving Continuous Authentication of Mobile Devices
David Monschein, Oliver P. Waldhorst
Lecture notes in computer science (2025), pp. 63-81
Closed Access

Preliminary Experiments of a Real-World Authentication Mechanism Based on Facial Recognition and Fully Homomorphic Encryption
Georgiana Crihan, Luminiţa Dumitriu, Marian Crăciun
Applied Sciences (2024) Vol. 14, Iss. 2, pp. 718-718
Open Access | Times Cited: 4

Privacy-preserving predictive modeling for early detection of chronic kidney disease
Prokash Gogoi, J. Arul Valan
Network Modeling Analysis in Health Informatics and Bioinformatics (2024) Vol. 13, Iss. 1
Closed Access | Times Cited: 3

Recent Advances in Steganography
Bamanga Mahmud Ahmad, Aliyu Kamalu Babando, Mohammed Ahmed Shehu
IntechOpen eBooks (2024)
Open Access | Times Cited: 1

A Modern Approach to Securing Critical Infrastructure in Energy Transmission Networks: Integration of Cryptographic Mechanisms and Biometric Data
Anna Manowska, Martin Boroš, Muhammad Hassan, et al.
Electronics (2024) Vol. 13, Iss. 14, pp. 2849-2849
Open Access | Times Cited: 1

UniHENN: Designing Faster and More Versatile Homomorphic Encryption-Based CNNs Without im2col
Hyunmin Choi, Jihun Kim, S. Kim, et al.
IEEE Access (2024) Vol. 12, pp. 109323-109341
Open Access | Times Cited: 1

A Stealthy Communication Model for Protecting Aggregated Results Integrity in Federated Learning
Lu Li, Xuan Sun, Ning Shi, et al.
Electronics (2024) Vol. 13, Iss. 19, pp. 3870-3870
Open Access | Times Cited: 1

Comprehensive on Exploring Advanced Ciphering and Steganography Techniques for Enhanced Data Protection: Review
Sajaa G. Mohammed
Wasit Journal of Pure sciences (2023) Vol. 2, Iss. 4, pp. 116-130
Open Access | Times Cited: 2

PDPHE: Personal Data Protection for Trans-Border Transmission Based on Homomorphic Encryption
Yan Liu, Changshui Yang, Qiang Liu, et al.
Electronics (2024) Vol. 13, Iss. 10, pp. 1959-1959
Open Access

Security Protection Method for Electronic Archives Based on Homomorphic Aggregation Signature Scheme in Mobile Network
Junwei Li, Huaquan Su, Guo Li, et al.
International Journal of Network Management (2024) Vol. 35, Iss. 1
Closed Access

Privacy-Preserving Decentralized Biometric Identity Verification in Car-Sharing System
Saprunov Vadim, Muhammad Firdaus, Kyung-Hyune Rhee
Journal of Multimedia Information System (2024) Vol. 11, Iss. 1, pp. 17-34
Open Access

Monchi: Multi-scheme Optimization For Collaborative Homomorphic Identification
Alberto Ibarrondo, Ismet Kerenciler, Hervé Chabanne, et al.
(2024), pp. 211-222
Open Access

Secure federated learning in the Internet of Health Things for improved patient privacy and data security
Kassim Kalinaki, Adam A. Alli, Baguma Asuman, et al.
Elsevier eBooks (2024), pp. 387-408
Closed Access

Secure wireless sensor network transmission using reinforcement learning and homomorphic encryption
M. Sahaya Sheela, J. J. Jayakanth, A. Ramathilagam, et al.
International Journal of Data Science and Analytics (2024)
Closed Access

Homomorphic Encryption Applications for IoT and Light-Weighted Environments: A Review
Shamsher Ullah, Jianqiang Li, Jie Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 12, Iss. 2, pp. 1222-1246
Closed Access

Privacy-preserving Hybrid Learning Framework for Healthcare
Orhan Ermiş, Jensen Selwyn Joymangul, Redouane Bouhamoum, et al.
Procedia Computer Science (2024) Vol. 246, pp. 3420-3429
Open Access

Comparative Analysis of Basic Operations of Helib and Microsoft Seal Libraries for Cloud Computing
Maria Lapina, Subramani Neelakandan, Maxim Donchenko, et al.
Advances in computer and electrical engineering book series (2024), pp. 331-344
Closed Access

Fully Homomorphic Encryption Scheme Over Integers Based on DGHV Scheme
Zainab H. Mahmood, Mahmood Khalel Ibrahem
Control Systems and Optimization Letters (2023) Vol. 1, Iss. 3, pp. 169-173
Open Access | Times Cited: 1

Page 1

Scroll to top