OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing
Waseem Akram, Khalid Mahmood, Xiong Li, et al.
Computer Networks (2022) Vol. 217, pp. 109335-109335
Closed Access | Times Cited: 28

Showing 1-25 of 28 citing articles:

An Efficient Task Scheduling for Cloud Computing Platforms Using Energy Management Algorithm: A Comparative Analysis of Workflow Execution Time
Adeel Ahmed, Muhammad Adnan Khan, Saima Abdullah, et al.
IEEE Access (2024) Vol. 12, pp. 34208-34221
Open Access | Times Cited: 6

A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems
S. V. N. Santhosh Kumar, Rajkumar Yesuraj, M. Selvi, et al.
Sensors (2023) Vol. 23, Iss. 5, pp. 2682-2682
Open Access | Times Cited: 15

Secure authentication protocol for home area network in smart grid-based smart cities
Hafiz Muhammad Sanaullah Badar, Khalid Mahmood, Waseem Akram, et al.
Computers & Electrical Engineering (2023) Vol. 108, pp. 108721-108721
Closed Access | Times Cited: 13

Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs
Xiaohong Zhang, Jiaming Lai, Ata Jahangir Moshayedi
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2349-2366
Open Access | Times Cited: 13

VASERP: An Adaptive, Lightweight, Secure, and Efficient RFID-Based Authentication Scheme for IoV
Yinyan Gong, Kuan‐Ching Li, Lijun Xiao, et al.
Sensors (2023) Vol. 23, Iss. 11, pp. 5198-5198
Open Access | Times Cited: 11

Internet of Things Authentication Protocols: Comparative Study
Souhayla Dargaoui, Mourade Azrour, Ahmad El Allaoui, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 79, Iss. 1, pp. 65-91
Open Access | Times Cited: 4

Enhancing Security and Trust Using Efficient Privacy-Preserving Authentication in Vehicular Edge Computing Networks
Anwar Ghani, Saeed Ullah Jan, Shehzad Ashraf Chaudhry, et al.
Vehicular Communications (2025), pp. 100921-100921
Closed Access

An Exhaustive Survey on Authentication Classes in the IoT Environments
Souhayla Dargaoui, Mourade Azrour, Ahmad El Allaoui, et al.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) (2024) Vol. 12, Iss. 1
Open Access | Times Cited: 2

CPPA-RORS: A conditional privacy-preserving authentication scheme based on revocable one-time ring signature for VANETs
Xu Han, Zuodong Wu, Yang Li, et al.
Internet of Things (2024) Vol. 27, pp. 101257-101257
Closed Access | Times Cited: 1

Pupil Refinement Recognition Method Based on Deep Residual Network and Attention Mechanism
Zehui Chen, Changyuan Wang, Gongpu Wu
Applied Sciences (2024) Vol. 14, Iss. 23, pp. 10971-10971
Open Access | Times Cited: 1

Traffic data security sharing scheme based on blockchain and traceable ring signature for VANETs
Xiaohong Zhang, Jiaming Lai, Ata Jahangir Moshayedi
Research Square (Research Square) (2023)
Open Access | Times Cited: 3

Unlocking the Potential of VANETs: Trust-Based Authentication and Deep Learning for Enhanced Security and Efficiency
T. Manikandan, M. A. George, Arul Uthirapathy, et al.
Research Square (Research Square) (2023)
Open Access | Times Cited: 2

Cloud Computing Services and Security Challenges: A Review
Sabreena Nawaz
Lahore Garrison University Research Journal of Computer Science and Information Technology (2023) Vol. 7, Iss. 02, pp. 17-28
Open Access | Times Cited: 2

Cloud Gaming Approach To Learn Programming Concepts
Daniyal Baig, Waseem Akram, Hafiz Burhan Ul Haq, et al.
Artificial Intelligence and Applications (2023)
Open Access | Times Cited: 2

Enhancing customer satisfaction in e-commerce: The role of service quality and brand trust
Muneeb Iqbal, Aqdas Tanveer, Hafiz Burhan Ul Haq, et al.
Deleted Journal (2023) Vol. 1, Iss. 1, pp. 287-287
Open Access | Times Cited: 2

Leaf diseases detection empowered with transfer learning model
Muhamamd Daniyal Baig, Hafiz Burhan Ul Haq, Muhammad Asif, et al.
Deleted Journal (2024) Vol. 2, Iss. 1
Open Access

A comprehensive and secure scheme for privacy-preserving smart meter data aggregation in the smart grid
Ram Baksh, Samiulla Itoo, Musheer Ahmad
Sustainable Energy Grids and Networks (2024) Vol. 39, pp. 101461-101461
Closed Access

Authentication in QoS Aware VANET: An Approach Based on Enhanced Digital Certificates
Mouna Garai, Maha Sliti, Manel Mrabet, et al.
IEEE Access (2024) Vol. 12, pp. 124452-124477
Open Access

Privacy Preserving Multi Factor Authentication Protocol for Next Generation Grids Deployed in Smart Cities
Osama Ahmed, Hiroshi Kamabe
Communications in computer and information science (2024), pp. 233-247
Closed Access

Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies
Waseem Akram, Khalid Mahmood, Hafiz Burhan Ul Haq, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2024) Vol. 80, Iss. 1, pp. 263-280
Open Access

A Provable Secure RFID Mutual Authentication Protocol
Feng Xiao
(2024), pp. 62-66
Closed Access

Overview of Vehicular Resource Allocation: Review and Future Directions
Raouia Bouabdallah, Fairouz Fakhfakh, Faten Fakhfakh
Lecture notes in networks and systems (2024), pp. 267-276
Closed Access

A Secure Authentication Scheme for Satellite-Terrestrial Networks
Shanyao Ren, Jianwei Liu, Ruihang Ji, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 6, pp. 6470-6482
Closed Access

Securing Vehicle-to-Cloud Communication: A Lightweight Approach with SCDSA
M. Krishna Paramathma, N. Likhitha Varma, D. Satya Bhavani
(2024), pp. 1-6
Closed Access

Page 1 - Next Page

Scroll to top