
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Privacy and Trust Models for Cloud-Based EHRs Using Multilevel Cryptography and Artificial Intelligence
Orobosade Alabi, Arome Junior Gabriel, Aderonke Favour-Bethy Thompson, et al.
Internet of things (2022), pp. 91-113
Closed Access | Times Cited: 7
Orobosade Alabi, Arome Junior Gabriel, Aderonke Favour-Bethy Thompson, et al.
Internet of things (2022), pp. 91-113
Closed Access | Times Cited: 7
Showing 7 citing articles:
Navigating the Future of Secure and Efficient Intelligent Transportation Systems using AI and Blockchain
Jyotsna Ghildiyal Bijalwan, Jagendra Singh, Vinayakumar Ravi, et al.
The Open Transportation Journal (2024) Vol. 18, Iss. 1
Open Access | Times Cited: 8
Jyotsna Ghildiyal Bijalwan, Jagendra Singh, Vinayakumar Ravi, et al.
The Open Transportation Journal (2024) Vol. 18, Iss. 1
Open Access | Times Cited: 8
Secure sharing of health records stored in cloud using cryptographic secret sharing schemes through computational intelligence
Sameera Mahammad, K. Usha Rani
Elsevier eBooks (2025), pp. 281-301
Closed Access
Sameera Mahammad, K. Usha Rani
Elsevier eBooks (2025), pp. 281-301
Closed Access
Intelligent transportation systems trusted user’s security and privacy
Priyanka Kaushik, Saurabh Pratap Singh Rathore, Lakshay Sachdeva, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 3
Priyanka Kaushik, Saurabh Pratap Singh Rathore, Lakshay Sachdeva, et al.
(2024), pp. 1-6
Closed Access | Times Cited: 3
Security, Privacy, and Trust Issues in Intelligent Transportation System
Amit Kumar Tyagi, N. Sreenath
Disruptive technologies and digital transformations for society 5.0 (2022), pp. 177-199
Closed Access | Times Cited: 4
Amit Kumar Tyagi, N. Sreenath
Disruptive technologies and digital transformations for society 5.0 (2022), pp. 177-199
Closed Access | Times Cited: 4
Fuzzy based trust model for cloud access control classification mechanism using ghost net architecture
D. Kalaiyarasi, R. Priscilla Joy, M. Victor Jose, et al.
Wireless Networks (2024)
Closed Access
D. Kalaiyarasi, R. Priscilla Joy, M. Victor Jose, et al.
Wireless Networks (2024)
Closed Access
A comprehensive review: State of art integrated technologies in IoHT applications
Tabasum Guledgudd, C. Noorullah Shariff, Sayed Abulhasan Quadri
African Journal of Science Technology Innovation and Development (2024), pp. 1-24
Closed Access
Tabasum Guledgudd, C. Noorullah Shariff, Sayed Abulhasan Quadri
African Journal of Science Technology Innovation and Development (2024), pp. 1-24
Closed Access
Artificial Intelligence based Security Solution for Data Encryption using AES Algorithm
Amit Kumar Mishra, Neha Tripathi, Musheer Vaqur, et al.
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2023), pp. 1685-1690
Closed Access | Times Cited: 1
Amit Kumar Mishra, Neha Tripathi, Musheer Vaqur, et al.
2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) (2023), pp. 1685-1690
Closed Access | Times Cited: 1