
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things
Yizhi Liu, Xiaohan Hao, Wei Ren, et al.
IEEE Transactions on Computers (2022) Vol. 72, Iss. 2, pp. 501-512
Open Access | Times Cited: 83
Yizhi Liu, Xiaohan Hao, Wei Ren, et al.
IEEE Transactions on Computers (2022) Vol. 72, Iss. 2, pp. 501-512
Open Access | Times Cited: 83
Showing 1-25 of 83 citing articles:
Web3: A comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions
Partha Pratim Ray
Internet of Things and Cyber-Physical Systems (2023) Vol. 3, pp. 213-248
Open Access | Times Cited: 76
Partha Pratim Ray
Internet of Things and Cyber-Physical Systems (2023) Vol. 3, pp. 213-248
Open Access | Times Cited: 76
A Review of Anomaly Detection Strategies to Detect Threats to Cyber-Physical Systems
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 56
Nicholas Jeffrey, Qing Tan, José R. Villar
Electronics (2023) Vol. 12, Iss. 15, pp. 3283-3283
Open Access | Times Cited: 56
Enhancing Zero Trust Models in the Financial Industry through Blockchain Integration: A Proposed Framework
Clement Daah, Amna Qureshi, Irfan Awan, et al.
Electronics (2024) Vol. 13, Iss. 5, pp. 865-865
Open Access | Times Cited: 16
Clement Daah, Amna Qureshi, Irfan Awan, et al.
Electronics (2024) Vol. 13, Iss. 5, pp. 865-865
Open Access | Times Cited: 16
Blockchain-Based Distributed Multiagent Reinforcement Learning for Collaborative Multiobject Tracking Framework
Jiahao Shen, Hao Sheng, Shuai Wang, et al.
IEEE Transactions on Computers (2023) Vol. 73, Iss. 3, pp. 778-788
Closed Access | Times Cited: 26
Jiahao Shen, Hao Sheng, Shuai Wang, et al.
IEEE Transactions on Computers (2023) Vol. 73, Iss. 3, pp. 778-788
Closed Access | Times Cited: 26
Blockchain-Based Fair and Fine-Grained Data Trading With Privacy Preservation
Liang Xue, Jianbing Ni, Dongxiao Liu, et al.
IEEE Transactions on Computers (2023) Vol. 72, Iss. 9, pp. 2440-2453
Closed Access | Times Cited: 23
Liang Xue, Jianbing Ni, Dongxiao Liu, et al.
IEEE Transactions on Computers (2023) Vol. 72, Iss. 9, pp. 2440-2453
Closed Access | Times Cited: 23
Verify and trust: A multidimensional survey of zero-trust security in the age of IoT
Muhammad Ajmal Azad, Sidrah Abdullah, Junaid Arshad, et al.
Internet of Things (2024) Vol. 27, pp. 101227-101227
Open Access | Times Cited: 11
Muhammad Ajmal Azad, Sidrah Abdullah, Junaid Arshad, et al.
Internet of Things (2024) Vol. 27, pp. 101227-101227
Open Access | Times Cited: 11
A Review and Comparative Analysis of Relevant Approaches of Zero Trust Network Model
Poonam Dhiman, Neha Saini, Yonis Gulzar, et al.
Sensors (2024) Vol. 24, Iss. 4, pp. 1328-1328
Open Access | Times Cited: 8
Poonam Dhiman, Neha Saini, Yonis Gulzar, et al.
Sensors (2024) Vol. 24, Iss. 4, pp. 1328-1328
Open Access | Times Cited: 8
Zero-Trust Access Control Mechanism Based on Blockchain and Inner-Product Encryption in the Internet of Things in a 6G Environment
Shaoping Nie, Jingjing Ren, Rui Wu, et al.
Sensors (2025) Vol. 25, Iss. 2, pp. 550-550
Open Access | Times Cited: 1
Shaoping Nie, Jingjing Ren, Rui Wu, et al.
Sensors (2025) Vol. 25, Iss. 2, pp. 550-550
Open Access | Times Cited: 1
Enhancing cloud-native DevSecOps: A Zero Trust approach for the financial sector
Dong‐Hwan Shin, Jiyoon Kim, I Wayan Adi Juliawan Pawana, et al.
Computer Standards & Interfaces (2025), pp. 103975-103975
Closed Access | Times Cited: 1
Dong‐Hwan Shin, Jiyoon Kim, I Wayan Adi Juliawan Pawana, et al.
Computer Standards & Interfaces (2025), pp. 103975-103975
Closed Access | Times Cited: 1
An Anonymous and Supervisory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application
Yinghong Yang, Fenhua Bai, Zhuo Yu, et al.
ACM Transactions on Sensor Networks (2023) Vol. 20, Iss. 2, pp. 1-20
Closed Access | Times Cited: 21
Yinghong Yang, Fenhua Bai, Zhuo Yu, et al.
ACM Transactions on Sensor Networks (2023) Vol. 20, Iss. 2, pp. 1-20
Closed Access | Times Cited: 21
Exploring Authentication Paradigms in the Internet of Things: A Comprehensive Scoping Review
Nazhatul Hafizah Kamarudin, Nur Hanis Sabrina Suhaimi, Fadilla ’Atyka Nor Rashid, et al.
Symmetry (2024) Vol. 16, Iss. 2, pp. 171-171
Open Access | Times Cited: 7
Nazhatul Hafizah Kamarudin, Nur Hanis Sabrina Suhaimi, Fadilla ’Atyka Nor Rashid, et al.
Symmetry (2024) Vol. 16, Iss. 2, pp. 171-171
Open Access | Times Cited: 7
Blockchain Applications for Internet of Things — A Survey
Imran Khan, Yasar Majib, Rehmat Ullah, et al.
Internet of Things (2024) Vol. 27, pp. 101254-101254
Closed Access | Times Cited: 7
Imran Khan, Yasar Majib, Rehmat Ullah, et al.
Internet of Things (2024) Vol. 27, pp. 101254-101254
Closed Access | Times Cited: 7
A Reputation-Enhanced Shard-Based Byzantine Fault-Tolerant Scheme for Secure Data Sharing in Zero Trust Human Digital Twin Systems
Samuel D. Okegbile, Jun Cai, Jiayuan Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 22726-22741
Open Access | Times Cited: 6
Samuel D. Okegbile, Jun Cai, Jiayuan Chen, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 22726-22741
Open Access | Times Cited: 6
Dissecting zero trust: research landscape and its implementation in IoT
Chunwen Liu, Ru Tan, Yang Wu, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 6
Chunwen Liu, Ru Tan, Yang Wu, et al.
Cybersecurity (2024) Vol. 7, Iss. 1
Open Access | Times Cited: 6
Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm
Umair B. Chaudhry, Aysha Kattakath Mulangat Hydros
IET Blockchain (2023) Vol. 3, Iss. 2, pp. 98-115
Open Access | Times Cited: 16
Umair B. Chaudhry, Aysha Kattakath Mulangat Hydros
IET Blockchain (2023) Vol. 3, Iss. 2, pp. 98-115
Open Access | Times Cited: 16
BLAST-IoT: BLockchain Assisted Scalable Trust in Internet of Things
Avani Sharma, Emmanuel S. Pilli, Arka Prokash Mazumdar, et al.
Computers & Electrical Engineering (2023) Vol. 109, pp. 108752-108752
Closed Access | Times Cited: 13
Avani Sharma, Emmanuel S. Pilli, Arka Prokash Mazumdar, et al.
Computers & Electrical Engineering (2023) Vol. 109, pp. 108752-108752
Closed Access | Times Cited: 13
Research on Medical Security System Based on Zero Trust
Zhiqiang Wang, Xinyue Yu, Peiyang Xue, et al.
Sensors (2023) Vol. 23, Iss. 7, pp. 3774-3774
Open Access | Times Cited: 12
Zhiqiang Wang, Xinyue Yu, Peiyang Xue, et al.
Sensors (2023) Vol. 23, Iss. 7, pp. 3774-3774
Open Access | Times Cited: 12
A Dynamic Adaptive Framework for Practical Byzantine Fault Tolerance Consensus Protocol in the Internet of Things
Chunpei Li, Wangjie Qiu, Xianxian Li, et al.
IEEE Transactions on Computers (2024) Vol. 73, Iss. 7, pp. 1669-1682
Closed Access | Times Cited: 4
Chunpei Li, Wangjie Qiu, Xianxian Li, et al.
IEEE Transactions on Computers (2024) Vol. 73, Iss. 7, pp. 1669-1682
Closed Access | Times Cited: 4
FutureDID: A Fully Decentralized Identity System With Multi-Party Verification
Haotian Deng, Jinwen Liang, Chuan Zhang, et al.
IEEE Transactions on Computers (2024) Vol. 73, Iss. 8, pp. 2051-2065
Closed Access | Times Cited: 4
Haotian Deng, Jinwen Liang, Chuan Zhang, et al.
IEEE Transactions on Computers (2024) Vol. 73, Iss. 8, pp. 2051-2065
Closed Access | Times Cited: 4
A Secure Authentication Algorithm for Medical IoT using Steganography and Cryptography
Wubie Engdew Hailu, B. Ravindra Babu, B KrishnaPrasad, et al.
Journal of Machine and Computing (2025), pp. 409-420
Closed Access
Wubie Engdew Hailu, B. Ravindra Babu, B KrishnaPrasad, et al.
Journal of Machine and Computing (2025), pp. 409-420
Closed Access
A contracted container-based code component collaboration model with reusable but invisible right management
Wei Wang, Zhenping Xie
Information Processing & Management (2025) Vol. 62, Iss. 3, pp. 104057-104057
Closed Access
Wei Wang, Zhenping Xie
Information Processing & Management (2025) Vol. 62, Iss. 3, pp. 104057-104057
Closed Access
Dezenformasyonun Önlenmesine Yönelik Blok Zinciri Teknolojisinin Kullanımı
Bahar Kayıhan
TRT Akademi (2025) Vol. 10, Iss. 23, pp. 266-303
Closed Access
Bahar Kayıhan
TRT Akademi (2025) Vol. 10, Iss. 23, pp. 266-303
Closed Access
A distributed zero-trust scheme for airborne wireless sensor networks using dynamic identity authentication
Kenian Wang, Yuan Hong, Yue Li, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Kenian Wang, Yuan Hong, Yue Li, et al.
Scientific Reports (2025) Vol. 15, Iss. 1
Open Access
Three-factor authentication and key agreement protocol with collusion resistance in VANETs
G.Q. Pan, Haowen Tan, Wenying Zheng, et al.
Journal of Information Security and Applications (2025) Vol. 90, pp. 104029-104029
Closed Access
G.Q. Pan, Haowen Tan, Wenying Zheng, et al.
Journal of Information Security and Applications (2025) Vol. 90, pp. 104029-104029
Closed Access
A Multi‐cluster Security Framework for Healthcare IoT : The Synergy of Redundant Byzantine Fault Tolerance with Extensions and Coati‐Based Network
Rohit Beniwal, Vinod Kumar, Vishal Sharma
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access
Rohit Beniwal, Vinod Kumar, Vishal Sharma
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 3
Closed Access