
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Efficient heterogeneous signcryption scheme based on Edge Computing for Industrial Internet of Things
Shufen Niu, Honglin Shao, Yun Su, et al.
Journal of Systems Architecture (2023) Vol. 136, pp. 102836-102836
Closed Access | Times Cited: 15
Shufen Niu, Honglin Shao, Yun Su, et al.
Journal of Systems Architecture (2023) Vol. 136, pp. 102836-102836
Closed Access | Times Cited: 15
Showing 15 citing articles:
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access | Times Cited: 2
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev, et al.
Sensors (2025) Vol. 25, Iss. 1, pp. 213-213
Open Access | Times Cited: 2
A Survey on Integrating Edge Computing With AI and Blockchain in Maritime Domain, Aerial Systems, IoT, and Industry 4.0
Amad Alanhdi, László Toka
IEEE Access (2024) Vol. 12, pp. 28684-28709
Open Access | Times Cited: 6
Amad Alanhdi, László Toka
IEEE Access (2024) Vol. 12, pp. 28684-28709
Open Access | Times Cited: 6
Digital transformation and visual knowledge map analysis of intelligent factory for sensor information of internet of things
Honglv Wang, Dingke Shi, Chengting Zhang, et al.
Intelligent Decision Technologies (2025)
Closed Access
Honglv Wang, Dingke Shi, Chengting Zhang, et al.
Intelligent Decision Technologies (2025)
Closed Access
A secure and efficient authentication key agreement scheme for industrial internet of things based on edge computing
Wenlong Zhu, Xinzhang Chen, Linmei Jiang
Alexandria Engineering Journal (2024) Vol. 101, pp. 52-61
Open Access | Times Cited: 3
Wenlong Zhu, Xinzhang Chen, Linmei Jiang
Alexandria Engineering Journal (2024) Vol. 101, pp. 52-61
Open Access | Times Cited: 3
Efficient and secure heterogeneous online/offline signcryption for wireless body area network
Huihui Zhu, Chunhua Jin, Yongliang Xu, et al.
Pervasive and Mobile Computing (2024) Vol. 99, pp. 101893-101893
Closed Access | Times Cited: 2
Huihui Zhu, Chunhua Jin, Yongliang Xu, et al.
Pervasive and Mobile Computing (2024) Vol. 99, pp. 101893-101893
Closed Access | Times Cited: 2
Secure pairing-free certificateless aggregate signcryption scheme for IoT
Dongmei Chen, Fei Zhou, Yining Liu, et al.
Journal of Systems Architecture (2024) Vol. 156, pp. 103268-103268
Closed Access | Times Cited: 2
Dongmei Chen, Fei Zhou, Yining Liu, et al.
Journal of Systems Architecture (2024) Vol. 156, pp. 103268-103268
Closed Access | Times Cited: 2
Enabling blockchain-assisted certificateless public integrity checking for industrial cloud storage systems
Qing Liu, Xiaojun Zhang, Jingting Xue, et al.
Journal of Systems Architecture (2023) Vol. 140, pp. 102898-102898
Closed Access | Times Cited: 5
Qing Liu, Xiaojun Zhang, Jingting Xue, et al.
Journal of Systems Architecture (2023) Vol. 140, pp. 102898-102898
Closed Access | Times Cited: 5
ABCNN-IDS: Attention-Based Convolutional Neural Network for Intrusion Detection in IoT Networks
Asadullah Momand, Sana Ullah Jan, Naeem Ramzan
Wireless Personal Communications (2024) Vol. 136, Iss. 4, pp. 1981-2003
Open Access | Times Cited: 1
Asadullah Momand, Sana Ullah Jan, Naeem Ramzan
Wireless Personal Communications (2024) Vol. 136, Iss. 4, pp. 1981-2003
Open Access | Times Cited: 1
Path Planning and Control of Intelligent Delivery UAV Based on Internet of Things and Edge Computing
Xiuzhu Zhang
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access
Xiuzhu Zhang
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 3
Open Access
An efficient online/offline heterogeneous proxy signcryption for secure communication in UAV networks
Negalign Wake Hundera, Wang Shumeng, Dagmawit Mesfin, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 5, pp. 102044-102044
Open Access
Negalign Wake Hundera, Wang Shumeng, Dagmawit Mesfin, et al.
Journal of King Saud University - Computer and Information Sciences (2024) Vol. 36, Iss. 5, pp. 102044-102044
Open Access
An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles
Negalign Wake Hundera, Muhammad Umar Aftab, Dagmawit Mesfin, et al.
Vehicular Communications (2024) Vol. 49, pp. 100811-100811
Closed Access
Negalign Wake Hundera, Muhammad Umar Aftab, Dagmawit Mesfin, et al.
Vehicular Communications (2024) Vol. 49, pp. 100811-100811
Closed Access
Securing Unmanned Aerial Vehicles Networks Using Pairing Free Aggregate Signcryption Scheme
Eman Abouelkheir
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 7552-7566
Open Access
Eman Abouelkheir
IEEE Open Journal of the Communications Society (2024) Vol. 5, pp. 7552-7566
Open Access
Digital transformation and visual knowledge map analysis of intelligent factory for sensor information of Internet of Things
Honglv Wang, Dingke Shi, Chengting Zhang, et al.
Intelligent Decision Technologies (2024) Vol. 18, Iss. 4, pp. 3437-3451
Closed Access
Honglv Wang, Dingke Shi, Chengting Zhang, et al.
Intelligent Decision Technologies (2024) Vol. 18, Iss. 4, pp. 3437-3451
Closed Access
Guest editorial: Special issue on edge computing optimization and security
Meikang Qiu, Cheng Zhang
Journal of Systems Architecture (2023) Vol. 145, pp. 103026-103026
Closed Access
Meikang Qiu, Cheng Zhang
Journal of Systems Architecture (2023) Vol. 145, pp. 103026-103026
Closed Access
Proving Mutual Authentication Property of Industrial Internet of Things Multi-Factor Authentication Protocol Based on Logic of Events
Meihua Xiao, Yuqiong Chen, Zehuan Li, et al.
Electronics (2023) Vol. 13, Iss. 1, pp. 177-177
Open Access
Meihua Xiao, Yuqiong Chen, Zehuan Li, et al.
Electronics (2023) Vol. 13, Iss. 1, pp. 177-177
Open Access