OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Privacy-enhancing distributed protocol for data aggregation based on blockchain and homomorphic encryption
Cristina Regueiro, Iñaki Seco, Santiago de Diego, et al.
Information Processing & Management (2021) Vol. 58, Iss. 6, pp. 102745-102745
Open Access | Times Cited: 36

Showing 1-25 of 36 citing articles:

A Blockchain-Based Deep-Learning-Driven Architecture for Quality Routing in Wireless Sensor Networks
Zahoor Ali Khan, Sana Amjad, Farwa Ahmed, et al.
IEEE Access (2023) Vol. 11, pp. 31036-31051
Open Access | Times Cited: 17

Blockchain from the information systems perspective: Literature review, synthesis, and directions for future research
Chun Lei, Eric W.T. Ngai
Information & Management (2023) Vol. 60, Iss. 7, pp. 103856-103856
Closed Access | Times Cited: 16

A Robust Privacy-Preserving Data Aggregation Scheme for Edge-Supported IIoT
Shuai Shang, Xiong Li, Ke Gu, et al.
IEEE Transactions on Industrial Informatics (2023) Vol. 20, Iss. 3, pp. 4305-4316
Closed Access | Times Cited: 12

Privacy-preserving generation and publication of synthetic trajectory microdata: A comprehensive survey
Jong Wook Kim, Beakcheol Jang
Journal of Network and Computer Applications (2024) Vol. 230, pp. 103951-103951
Closed Access | Times Cited: 4

Advancement of Smart Contract Administration in a Virtual Environment through Blockchain Technology and Optimization Tools
B. Sai Chandana, Hasan Hussain S, Ravi Kishore Veluri, et al.
SSRN Electronic Journal (2025)
Closed Access

A contracted container-based code component collaboration model with reusable but invisible right management
Wei Wang, Zhenping Xie
Information Processing & Management (2025) Vol. 62, Iss. 3, pp. 104057-104057
Closed Access

Privacy-preserving candidate assessment and selection frameworks in e-recruitment system
Gaurav Baranwal, Anubhav Yadav
Journal of Information Security and Applications (2025) Vol. 90, pp. 104043-104043
Closed Access

POSMETER: proof-of-stake blockchain for enhanced smart meter data security
Divya Singhal, Laxmi Ahuja, Ashish Seth
International Journal of Information Technology (2023) Vol. 16, Iss. 2, pp. 1171-1184
Closed Access | Times Cited: 9

Blockchain-based multi-institution collaborative credit evaluation modeling method
Yuncheng Qiao, Qiujun Lan, Shiyu Jia, et al.
Computer Networks (2024) Vol. 240, pp. 110187-110187
Closed Access | Times Cited: 3

How to drive sustainable economic development: The role of fintech, natural resources, and social vulnerability
Chengyuan Xie, Lu Huang
Resources Policy (2024) Vol. 94, pp. 105104-105104
Closed Access | Times Cited: 3

MuKGB-CRS: Guarantee privacy and authenticity of cross-domain recommendation via multi-feature knowledge graph integrated blockchain
Li-e Wang, Yuelan Qi, Yan Bai, et al.
Information Sciences (2023) Vol. 638, pp. 118915-118915
Closed Access | Times Cited: 9

A privacy preserving homomorphic computing toolkit for predictive computation
Kaiyang Zhao, Xu An Wang, Bo Yang, et al.
Information Processing & Management (2022) Vol. 59, Iss. 2, pp. 102880-102880
Closed Access | Times Cited: 14

FGDB‐MLPP: A fine‐grained data‐sharing scheme with blockchain based on multi‐level privacy protection
Junyu Lin, Libo Feng, Jinli Wang, et al.
IET Communications (2024) Vol. 18, Iss. 4, pp. 309-321
Open Access | Times Cited: 2

PEvaChain: Privacy-preserving ridge regression-based credit evaluation system using Hyperledger Fabric blockchain
Yuncheng Qiao, Qiujun Lan, Yiran Wang, et al.
Expert Systems with Applications (2023) Vol. 223, pp. 119844-119844
Closed Access | Times Cited: 6

An Optimized Concurrent Proof of Authority Consensus Protocol
Ahsan Nazir, M. Singh, Giuseppe Destefanis, et al.
2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER) (2023), pp. 874-877
Closed Access | Times Cited: 5

Exploiting Security Issues in Human Activity Recognition Systems (HARSs)
Sofia Sakka, Vasiliki Liagkou, Chrysostomos Stylios
Information (2023) Vol. 14, Iss. 6, pp. 315-315
Open Access | Times Cited: 4

Smart Contract-Enabled Blockchain Framework for Electronic Medical Health Records
Amit Kumar Mishra, Rahul Sharma, Jagendra Singh, et al.
(2024), pp. 124-129
Closed Access | Times Cited: 1

Securing the Future: Harnessing Blockchain's Power Against New-Age Vulnerabilities
Rihab Benaich, Saida El Mendili, Youssef Gahi
(2024), pp. 1-8
Closed Access | Times Cited: 1

Integration of Ethereum Blockchain with Cloud Computing for Secure Healthcare Data Management System
S. Prasanna Ginavanee A.
Deleted Journal (2024) Vol. 20, Iss. 4s, pp. 111-124
Open Access | Times Cited: 1

A Comparative Assessment of Homomorphic Encryption Algorithms Applied to Biometric Information
Georgiana Crihan, Marian Crăciun, Luminiţa Dumitriu
Inventions (2023) Vol. 8, Iss. 4, pp. 102-102
Open Access | Times Cited: 3

Privacy and Auditability in the Local Energy Market of an Energy Community with Homomorphic Encryption
Davide Strepparava, Federico Rosato, Lorenzo Nespoli, et al.
Energies (2022) Vol. 15, Iss. 15, pp. 5386-5386
Open Access | Times Cited: 5

Blockchain based voting system using secure hash algorithm 384-bit (SHA-384) to enhance accuracy and comparing with secure hash algorithm 256-bit (SHA-256)
R. Pattem, S. Gomathi, D. Sungeetha, et al.
AIP conference proceedings (2024) Vol. 3161, pp. 020224-020224
Closed Access

Verifiable computation over encrypted data via MPC-in-the-head zero-knowledge proofs
Joohee Lee, Sangrae Cho, Soohyung Kim, et al.
International Journal of Information Security (2024) Vol. 24, Iss. 1
Closed Access

Page 1 - Next Page

Scroll to top