
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Online Banking User Authentication Methods: A Systematic Literature Review
Nader Abdel Karim, Osama A. Khashan, Hasan Kanaker, et al.
IEEE Access (2023) Vol. 12, pp. 741-757
Open Access | Times Cited: 7
Nader Abdel Karim, Osama A. Khashan, Hasan Kanaker, et al.
IEEE Access (2023) Vol. 12, pp. 741-757
Open Access | Times Cited: 7
Showing 7 citing articles:
Artificial Intelligence in the Indian Banking System: A Systematic Literature Review
Karan Kumar, Nikita Kuhar, Manu Vineet Sharma
SSRN Electronic Journal (2025)
Closed Access
Karan Kumar, Nikita Kuhar, Manu Vineet Sharma
SSRN Electronic Journal (2025)
Closed Access
Authentication system selection for performance appraisal in human resource management using an intuitionistic fuzzy CIMAS-ARLON model
Galip Cihan Yalçın, Karahan Kara, Sercan EDİNSEL, et al.
Applied Soft Computing (2025) Vol. 171, pp. 112786-112786
Closed Access
Galip Cihan Yalçın, Karahan Kara, Sercan EDİNSEL, et al.
Applied Soft Computing (2025) Vol. 171, pp. 112786-112786
Closed Access
A systematic review of multi-factor authentication in digital payment systems: NIST standards alignment and industry implementation analysis
Phat T. Tran-Truong, Phạm Minh Quân, Ha Xuan Son, et al.
Journal of Systems Architecture (2025), pp. 103402-103402
Open Access
Phat T. Tran-Truong, Phạm Minh Quân, Ha Xuan Son, et al.
Journal of Systems Architecture (2025), pp. 103402-103402
Open Access
Augmented Ebola Optimization Algorithm for Anomaly-Based Intrusion Detection System
Mohammad Alshinwan, Abeer Awad, Ahmadi Mohammad, et al.
Advances in information security, privacy, and ethics book series (2025), pp. 343-366
Closed Access
Mohammad Alshinwan, Abeer Awad, Ahmadi Mohammad, et al.
Advances in information security, privacy, and ethics book series (2025), pp. 343-366
Closed Access
A comprehensive review of visual cryptography for enhancing high-security applications
Pramod M. Bachiphale, Nitish S. Zulpe
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Pramod M. Bachiphale, Nitish S. Zulpe
Multimedia Tools and Applications (2024)
Closed Access | Times Cited: 1
Reviewing the Effectiveness of Multi-factor Authentication (MFA) Methods in Preventing Phishing Attacks
Andrew J. Muir, Karen V. Brown, Anteneh Girma
Lecture notes in networks and systems (2024), pp. 597-607
Closed Access
Andrew J. Muir, Karen V. Brown, Anteneh Girma
Lecture notes in networks and systems (2024), pp. 597-607
Closed Access
A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol
Laerte Melo, Dino Amaral, Robson de Oliveira Albuquerque, et al.
Cryptography (2024) Vol. 8, Iss. 4, pp. 51-51
Open Access
Laerte Melo, Dino Amaral, Robson de Oliveira Albuquerque, et al.
Cryptography (2024) Vol. 8, Iss. 4, pp. 51-51
Open Access
Enhanced Dynamic S-Box Design Based on Adaptive Heuristic Evolution and Multi-Stage Nonlinearity for Securing IoT-Based Remote Health Monitoring Systems
Anand Prakash Dube, Raghav Yadav
(2024), pp. 1-8
Closed Access
Anand Prakash Dube, Raghav Yadav
(2024), pp. 1-8
Closed Access