
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Authentication by Humans
Advances in multimedia and interactive technologies book series (2018), pp. 87-103
Closed Access | Times Cited: 18
Advances in multimedia and interactive technologies book series (2018), pp. 87-103
Closed Access | Times Cited: 18
Showing 18 citing articles:
Security and identification indicators for browsers against spoofing and phishing attacks
Amir Herzberg, Ahmad Jbara
ACM Transactions on Internet Technology (2008) Vol. 8, Iss. 4, pp. 1-36
Closed Access | Times Cited: 102
Amir Herzberg, Ahmad Jbara
ACM Transactions on Internet Technology (2008) Vol. 8, Iss. 4, pp. 1-36
Closed Access | Times Cited: 102
A survey of privacy in multi-agent systems
José M. Such, Agustín Espinosa, Ana García‐Fornes
The Knowledge Engineering Review (2013) Vol. 29, Iss. 3, pp. 314-344
Open Access | Times Cited: 68
José M. Such, Agustín Espinosa, Ana García‐Fornes
The Knowledge Engineering Review (2013) Vol. 29, Iss. 3, pp. 314-344
Open Access | Times Cited: 68
TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks
Amir Herzberg, Ahmad Gbara
(2004)
Closed Access | Times Cited: 81
Amir Herzberg, Ahmad Gbara
(2004)
Closed Access | Times Cited: 81
Security in mobile communications: challenges and opportunities
Audun Jøsang, Gunnar Sanderud
(2003), pp. 43-48
Closed Access | Times Cited: 41
Audun Jøsang, Gunnar Sanderud
(2003), pp. 43-48
Closed Access | Times Cited: 41
Authentication interface evaluation and design for mobile devices
Benjamin J. Halpert
(2005), pp. 112-117
Closed Access | Times Cited: 22
Benjamin J. Halpert
(2005), pp. 112-117
Closed Access | Times Cited: 22
User interface requirements for authentication of communication
Audun Jøsang, Mary Anne Patton
Australasian User Interface Conference (2003), pp. 75-80
Closed Access | Times Cited: 13
Audun Jøsang, Mary Anne Patton
Australasian User Interface Conference (2003), pp. 75-80
Closed Access | Times Cited: 13
Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks.
Amir Herzberg, Ahmad Jbara
IACR Cryptology ePrint Archive (2004) Vol. 2004, pp. 155
Closed Access | Times Cited: 11
Amir Herzberg, Ahmad Jbara
IACR Cryptology ePrint Archive (2004) Vol. 2004, pp. 155
Closed Access | Times Cited: 11
Relying Party Credentials Framework
Amir Herzberg, Yosi Mass
Electronic Commerce Research (2003) Vol. 4, Iss. 1/2, pp. 23-39
Closed Access | Times Cited: 12
Amir Herzberg, Yosi Mass
Electronic Commerce Research (2003) Vol. 4, Iss. 1/2, pp. 23-39
Closed Access | Times Cited: 12
Web Security: The Emperor's New Armour.
Adund Josang, Peter M. Mollerund, Eddy Cheung
European Conference on Information Systems (2001), pp. 166-176
Closed Access | Times Cited: 6
Adund Josang, Peter M. Mollerund, Eddy Cheung
European Conference on Information Systems (2001), pp. 166-176
Closed Access | Times Cited: 6
Usability of authentication in web applications - a literature review
Anders Bjerg Pedersen
(2010)
Closed Access | Times Cited: 2
Anders Bjerg Pedersen
(2010)
Closed Access | Times Cited: 2
Algorithm Exchange of a Security Control System for Web Services Applications
Benny Benyamin Nasution, Elizabeth Kendall, Asad I. Khan
(2005), pp. 167a-167a
Closed Access | Times Cited: 3
Benny Benyamin Nasution, Elizabeth Kendall, Asad I. Khan
(2005), pp. 167a-167a
Closed Access | Times Cited: 3
Dynamic Data Protocol Exchange to Handle Passive Attacks on Trusted Transient Simple Network (TTSN) Transactions
Benny Benyamin Nasution, Elizabeth Kendall, Asad I. Khan, et al.
(2006) Vol. 1, pp. 541-546
Closed Access | Times Cited: 2
Benny Benyamin Nasution, Elizabeth Kendall, Asad I. Khan, et al.
(2006) Vol. 1, pp. 541-546
Closed Access | Times Cited: 2
ENHANCING PRIVACY IN MULTI-AGENT SYSTEMS
José Miguel Such Aparicio
(2011)
Open Access | Times Cited: 1
José Miguel Such Aparicio
(2011)
Open Access | Times Cited: 1
Leveraging Attestation Techniques for Trust Establishment in Distributed Systems
Vom Fachbereich, Doktor der Naturwissenschaften
(2010)
Closed Access
Vom Fachbereich, Doktor der Naturwissenschaften
(2010)
Closed Access
Bridging the gap between human and machine trust : applying methods of user-centred design and usability to computer security
Kristiina Karvonen
(2008)
Closed Access
Kristiina Karvonen
(2008)
Closed Access
Analysis of the Level of Security Provided by Advanced Information and Communication Technologies
Vladimir Budzko, Dmitry Melnikov, Peter Keyer, et al.
(2019), pp. 29-34
Closed Access
Vladimir Budzko, Dmitry Melnikov, Peter Keyer, et al.
(2019), pp. 29-34
Closed Access