
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems
R. St. Denis, P. Madhubala
Multimedia Tools and Applications (2021) Vol. 80, Iss. 14, pp. 21165-21202
Closed Access | Times Cited: 63
R. St. Denis, P. Madhubala
Multimedia Tools and Applications (2021) Vol. 80, Iss. 14, pp. 21165-21202
Closed Access | Times Cited: 63
Showing 1-25 of 63 citing articles:
An Efficient and Secure Big Data Storage in Cloud Environment by Using Triple Data Encryption Standard
Mohan Naik Ramachandra, Madala Srinivasa Rao, Wen‐Cheng Lai, et al.
Big Data and Cognitive Computing (2022) Vol. 6, Iss. 4, pp. 101-101
Open Access | Times Cited: 62
Mohan Naik Ramachandra, Madala Srinivasa Rao, Wen‐Cheng Lai, et al.
Big Data and Cognitive Computing (2022) Vol. 6, Iss. 4, pp. 101-101
Open Access | Times Cited: 62
A security model to protect the isolation of medical data in the cloud using hybrid cryptography
Swetha Gadde, J. Amutharaj, S. Usha
Journal of Information Security and Applications (2023) Vol. 73, pp. 103412-103412
Closed Access | Times Cited: 23
Swetha Gadde, J. Amutharaj, S. Usha
Journal of Information Security and Applications (2023) Vol. 73, pp. 103412-103412
Closed Access | Times Cited: 23
Optimal multiple key‐based homomorphic encryption with deep neural networks to secure medical data transmission and diagnosis
Jafar A. Alzubi, Omar A. Alzubi, Majdi Beseiso, et al.
Expert Systems (2021) Vol. 39, Iss. 4
Closed Access | Times Cited: 37
Jafar A. Alzubi, Omar A. Alzubi, Majdi Beseiso, et al.
Expert Systems (2021) Vol. 39, Iss. 4
Closed Access | Times Cited: 37
Double layer security using crypto-stego techniques: a comprehensive review
Aiman Jan, Shabir A. Parah, Muzamil Hussan, et al.
Health and Technology (2021) Vol. 12, Iss. 1, pp. 9-31
Open Access | Times Cited: 35
Aiman Jan, Shabir A. Parah, Muzamil Hussan, et al.
Health and Technology (2021) Vol. 12, Iss. 1, pp. 9-31
Open Access | Times Cited: 35
Designing a Healthcare-Enabled Software-Defined Wireless Body Area Network Architecture for Secure Medical Data and Efficient Diagnosis
Jawaid Iqbal, Muhammad Adnan, Younas Khan, et al.
Journal of Healthcare Engineering (2022) Vol. 2022, pp. 1-19
Open Access | Times Cited: 23
Jawaid Iqbal, Muhammad Adnan, Younas Khan, et al.
Journal of Healthcare Engineering (2022) Vol. 2022, pp. 1-19
Open Access | Times Cited: 23
Cloud-Based Digital Twins’ Storage in Emergency Healthcare
Erdan Wang, Pouria Tayebi, Yeong-Tae Song
The International journal of networked and distributed computing (2023) Vol. 11, Iss. 2, pp. 75-87
Open Access | Times Cited: 15
Erdan Wang, Pouria Tayebi, Yeong-Tae Song
The International journal of networked and distributed computing (2023) Vol. 11, Iss. 2, pp. 75-87
Open Access | Times Cited: 15
Reference Image Aided Color Matching Design Based on Interactive Genetic Algorithm
Yubin Wu
Deleted Journal (2024) Vol. 20, Iss. 2, pp. 400-410
Open Access | Times Cited: 5
Yubin Wu
Deleted Journal (2024) Vol. 20, Iss. 2, pp. 400-410
Open Access | Times Cited: 5
Implementing the Triple-Data Encryption Standard for Secure and Efficient Healthcare Data Storage in Cloud Computing Environments
Wid Akeel Awadh, Mohammed Hashim, Ali Salah Alasady
Informatica (2024) Vol. 48, Iss. 6
Open Access | Times Cited: 5
Wid Akeel Awadh, Mohammed Hashim, Ali Salah Alasady
Informatica (2024) Vol. 48, Iss. 6
Open Access | Times Cited: 5
Securing healthcare big data in industry 4.0: cryptography encryption with hybrid optimization algorithm for IoT applications
Chandrashekhar Goswami, P. Tamil Selvi, Velagapudi Sreenivas, et al.
Optical and Quantum Electronics (2023) Vol. 56, Iss. 3
Closed Access | Times Cited: 11
Chandrashekhar Goswami, P. Tamil Selvi, Velagapudi Sreenivas, et al.
Optical and Quantum Electronics (2023) Vol. 56, Iss. 3
Closed Access | Times Cited: 11
A novel three-factor authentication and optimal mapreduce frameworks for secure medical big data transmission over the cloud with shaxecc
K. Rajeshkumar, S. Dhanasekaran, V. Vasudevan
Multimedia Tools and Applications (2024) Vol. 83, Iss. 26, pp. 68363-68391
Closed Access | Times Cited: 4
K. Rajeshkumar, S. Dhanasekaran, V. Vasudevan
Multimedia Tools and Applications (2024) Vol. 83, Iss. 26, pp. 68363-68391
Closed Access | Times Cited: 4
A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm
Sahaya Stalin Jose G, G. Sugitha, Ayshwarya Lakshmi S, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 2, pp. 911-923
Closed Access | Times Cited: 4
Sahaya Stalin Jose G, G. Sugitha, Ayshwarya Lakshmi S, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 2, pp. 911-923
Closed Access | Times Cited: 4
An improved image compression framework in modern multimedia applications using tetrolet transformation
Satya Prakash Yadav
Multimedia Tools and Applications (2025)
Closed Access
Satya Prakash Yadav
Multimedia Tools and Applications (2025)
Closed Access
Strengthening file encryption with AES-RSA hybrid algorithm: A critical review of strengths, weaknesses, and future directions
Manar K. Najm, A. Noor
AIP conference proceedings (2025) Vol. 3224, pp. 040006-040006
Closed Access
Manar K. Najm, A. Noor
AIP conference proceedings (2025) Vol. 3224, pp. 040006-040006
Closed Access
Edge-Guided Dual-Stream U-Net for Secure Image Steganography
Peng Ji, Y. W. Zhang, Zhuo‐Lin Lv
Applied Sciences (2025) Vol. 15, Iss. 8, pp. 4413-4413
Open Access
Peng Ji, Y. W. Zhang, Zhuo‐Lin Lv
Applied Sciences (2025) Vol. 15, Iss. 8, pp. 4413-4413
Open Access
Variable-Fractional-Order Nosé–Hoover System: Chaotic Dynamics and Numerical Simulations
D. K. Almutairi, Dalal Almutairi, Nidal E. Taha, et al.
Fractal and Fractional (2025) Vol. 9, Iss. 5, pp. 277-277
Open Access
D. K. Almutairi, Dalal Almutairi, Nidal E. Taha, et al.
Fractal and Fractional (2025) Vol. 9, Iss. 5, pp. 277-277
Open Access
Enhancing Data Security in Multi-Cloud Environments: A Product Cipher-Based Distributed Steganography Approach
Syed Shakeel Hashmi, Arshad Ahmad Khan Mohammad, Arif Mohammad Abdul, et al.
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 1, pp. 47-61
Open Access | Times Cited: 2
Syed Shakeel Hashmi, Arshad Ahmad Khan Mohammad, Arif Mohammad Abdul, et al.
International Journal of Safety and Security Engineering (2024) Vol. 14, Iss. 1, pp. 47-61
Open Access | Times Cited: 2
Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm
N. Jayapandian
Wireless Personal Communications (2021) Vol. 120, Iss. 3, pp. 2427-2447
Closed Access | Times Cited: 15
N. Jayapandian
Wireless Personal Communications (2021) Vol. 120, Iss. 3, pp. 2427-2447
Closed Access | Times Cited: 15
Polynomial cryptographic optical steganography substitution model for the telehealth system with multimedia data
Gnanajeyaraman Rajaram, Satyabrata Dash, Farrukh Arslan, et al.
Optical and Quantum Electronics (2023) Vol. 55, Iss. 9
Closed Access | Times Cited: 6
Gnanajeyaraman Rajaram, Satyabrata Dash, Farrukh Arslan, et al.
Optical and Quantum Electronics (2023) Vol. 55, Iss. 9
Closed Access | Times Cited: 6
An overview of the status, challenges, and trends of the advanced crypto algorithms to enhance the security of wireless networks
Rana Abbas Al-Kaabi, Hassan Falah Fakhruldeen, Heba Abdul-Jaleel Al-Asady
AIP conference proceedings (2023) Vol. 2591, pp. 030039-030039
Open Access | Times Cited: 5
Rana Abbas Al-Kaabi, Hassan Falah Fakhruldeen, Heba Abdul-Jaleel Al-Asady
AIP conference proceedings (2023) Vol. 2591, pp. 030039-030039
Open Access | Times Cited: 5
Random Matrix Transformation and Its Application in Image Hiding
Jijun Wang, Fun Soo Tan, Yi Yuan
Sensors (2023) Vol. 23, Iss. 2, pp. 1017-1017
Open Access | Times Cited: 4
Jijun Wang, Fun Soo Tan, Yi Yuan
Sensors (2023) Vol. 23, Iss. 2, pp. 1017-1017
Open Access | Times Cited: 4
IoT-based Secure Data Transmission Prediction using Deep Learning Model in Cloud Computing
Narender Chinthamu, Satheesh Kumar Gooda, Chandrasekar Venkatachalam, et al.
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 4s, pp. 68-76
Open Access | Times Cited: 4
Narender Chinthamu, Satheesh Kumar Gooda, Chandrasekar Venkatachalam, et al.
International Journal on Recent and Innovation Trends in Computing and Communication (2023) Vol. 11, Iss. 4s, pp. 68-76
Open Access | Times Cited: 4
Secure monitoring model for smart agriculture using an optimized attribute-based access control centralized authority system
Nagarajan Mahalingam, Priyanka Sharma
Multimedia Tools and Applications (2023) Vol. 83, Iss. 15, pp. 44781-44798
Closed Access | Times Cited: 4
Nagarajan Mahalingam, Priyanka Sharma
Multimedia Tools and Applications (2023) Vol. 83, Iss. 15, pp. 44781-44798
Closed Access | Times Cited: 4
Secure medical sensor monitoring framework using novel optimal encryption algorithm driven by Internet of Things
J Lekha, K. Sandhya, Archana Uriti, et al.
Measurement Sensors (2023) Vol. 30, pp. 100929-100929
Open Access | Times Cited: 4
J Lekha, K. Sandhya, Archana Uriti, et al.
Measurement Sensors (2023) Vol. 30, pp. 100929-100929
Open Access | Times Cited: 4
Secured and efficient MLP algorithm based on Sand Cat Swarm Optimization and homomorphic encryption for healthcare data
Bhawana S. Dakhare, Lata Ragha
Progress in Artificial Intelligence (2024)
Closed Access | Times Cited: 1
Bhawana S. Dakhare, Lata Ragha
Progress in Artificial Intelligence (2024)
Closed Access | Times Cited: 1
Advanced Encryption Standard based Secure IoT Data Transfer Model for Cloud Analytics Applications
Dinesh Kumar Anguraj
Journal of Information Technology and Digital World (2022) Vol. 4, Iss. 2, pp. 114-124
Open Access | Times Cited: 7
Dinesh Kumar Anguraj
Journal of Information Technology and Digital World (2022) Vol. 4, Iss. 2, pp. 114-124
Open Access | Times Cited: 7