
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Efficient Signature Scheme Based on Mobile Edge Computing in the NDN-IoT Environment
Haiping Huang, Yuhan Wu, Fu Xiao, et al.
IEEE Transactions on Computational Social Systems (2021) Vol. 8, Iss. 5, pp. 1108-1120
Closed Access | Times Cited: 33
Haiping Huang, Yuhan Wu, Fu Xiao, et al.
IEEE Transactions on Computational Social Systems (2021) Vol. 8, Iss. 5, pp. 1108-1120
Closed Access | Times Cited: 33
Showing 1-25 of 33 citing articles:
Efficient Blockchain-Based Mutual Authentication and Session Key Agreement for Cross-Domain IIoT
Jie Cui, Yihu Zhu, Hong Zhong, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 16325-16338
Closed Access | Times Cited: 12
Jie Cui, Yihu Zhu, Hong Zhong, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 16325-16338
Closed Access | Times Cited: 12
The Emerging of Named Data Networking: Architecture, Application, and Technology
Wan Muhd Hazwan Azamuddin, Azana Hafizah Mohd Aman, Hasimi Sallehuddin, et al.
IEEE Access (2023) Vol. 11, pp. 23620-23633
Open Access | Times Cited: 17
Wan Muhd Hazwan Azamuddin, Azana Hafizah Mohd Aman, Hasimi Sallehuddin, et al.
IEEE Access (2023) Vol. 11, pp. 23620-23633
Open Access | Times Cited: 17
Towards named data networking technology: Emerging applications, use cases, and challenges for secure data communication
Afia Anjum, Paul Agbaje, Arkajyoti Mitra, et al.
Future Generation Computer Systems (2023) Vol. 151, pp. 12-31
Closed Access | Times Cited: 17
Afia Anjum, Paul Agbaje, Arkajyoti Mitra, et al.
Future Generation Computer Systems (2023) Vol. 151, pp. 12-31
Closed Access | Times Cited: 17
A Content Poisoning Attack Detection and Prevention System in Vehicular Named Data Networking
Arif Hussain Magsi, Leanna Vidya Yovita, Ali Ghulam, et al.
Sustainability (2023) Vol. 15, Iss. 14, pp. 10931-10931
Open Access | Times Cited: 11
Arif Hussain Magsi, Leanna Vidya Yovita, Ali Ghulam, et al.
Sustainability (2023) Vol. 15, Iss. 14, pp. 10931-10931
Open Access | Times Cited: 11
ECAE: An Efficient Certificateless Aggregate Signature Scheme Based on Elliptic Curves for NDN-IoT Environments
Cong Wang, Haoyu Wu, Yulong Gan, et al.
Entropy (2025) Vol. 27, Iss. 5, pp. 471-471
Open Access
Cong Wang, Haoyu Wu, Yulong Gan, et al.
Entropy (2025) Vol. 27, Iss. 5, pp. 471-471
Open Access
Machine Learning Method with Applications in Hardware Security of Post-Quantum Cryptography
Haibo Yi
Journal of Grid Computing (2023) Vol. 21, Iss. 2
Closed Access | Times Cited: 7
Haibo Yi
Journal of Grid Computing (2023) Vol. 21, Iss. 2
Closed Access | Times Cited: 7
An Advanced Hierarchical Identity-Based Security Mechanism by Blockchain in Named Data Networking
Bing Li, Maode Ma
Journal of Network and Systems Management (2022) Vol. 31, Iss. 1
Open Access | Times Cited: 12
Bing Li, Maode Ma
Journal of Network and Systems Management (2022) Vol. 31, Iss. 1
Open Access | Times Cited: 12
Two-Way Reliable Forwarding Strategy of RIS Symbiotic Communications for Vehicular Named Data Networks
Kai Fang, Boyu Yang, Han Zhu, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 22, pp. 19385-19398
Closed Access | Times Cited: 12
Kai Fang, Boyu Yang, Han Zhu, et al.
IEEE Internet of Things Journal (2022) Vol. 10, Iss. 22, pp. 19385-19398
Closed Access | Times Cited: 12
Data Inspection and Access Control for 5G Edge Computing-Enabled Internet of Medical Things
Mohammad Ali, Amin Hosseingholizadeh, Ximeng Liu
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 5, pp. 4120-4133
Closed Access | Times Cited: 2
Mohammad Ali, Amin Hosseingholizadeh, Ximeng Liu
IEEE Transactions on Network Science and Engineering (2024) Vol. 11, Iss. 5, pp. 4120-4133
Closed Access | Times Cited: 2
Secure and pervasive communication framework using Named Data Networking for connected healthcare
Rajan Kumar Dudeja, Rasmeet Singh Bali, Gagangeet Singh Aujla
Computers & Electrical Engineering (2022) Vol. 100, pp. 107806-107806
Open Access | Times Cited: 11
Rajan Kumar Dudeja, Rasmeet Singh Bali, Gagangeet Singh Aujla
Computers & Electrical Engineering (2022) Vol. 100, pp. 107806-107806
Open Access | Times Cited: 11
Quantum Secure Undeniable Signature for Blockchain-Enabled Cold-Chain Logistics System
Chaoyang Li, Hongxue Shen, Xiayang Shi, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 2, pp. 3941-3956
Open Access | Times Cited: 4
Chaoyang Li, Hongxue Shen, Xiayang Shi, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2023) Vol. 75, Iss. 2, pp. 3941-3956
Open Access | Times Cited: 4
PSCLS: provably secure certificateless signature scheme for IoT device on cloud
Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, et al.
The Journal of Supercomputing (2022) Vol. 79, Iss. 5, pp. 4962-4982
Closed Access | Times Cited: 7
Vijay Kumar Yadav, Nitish Andola, Shekhar Verma, et al.
The Journal of Supercomputing (2022) Vol. 79, Iss. 5, pp. 4962-4982
Closed Access | Times Cited: 7
A Novel Security Scheme Supported by Certificateless Digital Signature and Blockchain in Named Data Networking
Bing Li, Mingxuan Zheng, Maode Ma
IET Information Security (2024) Vol. 2024, pp. 1-21
Open Access | Times Cited: 1
Bing Li, Mingxuan Zheng, Maode Ma
IET Information Security (2024) Vol. 2024, pp. 1-21
Open Access | Times Cited: 1
An anonymous and efficient certificateless signature scheme based on blockchain in NDN‐IoT environments
Cong Wang, Xu Deng, Maode Ma, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 4
Closed Access | Times Cited: 1
Cong Wang, Xu Deng, Maode Ma, et al.
Transactions on Emerging Telecommunications Technologies (2024) Vol. 35, Iss. 4
Closed Access | Times Cited: 1
An Efficient Certificateless Blockchain-enabled Authentication Scheme to Secure Producer Mobility in Named Data Networks
Cong Wang, Tong Zhou, Maode Ma, et al.
Journal of Network and Computer Applications (2024) Vol. 232, pp. 104007-104007
Closed Access | Times Cited: 1
Cong Wang, Tong Zhou, Maode Ma, et al.
Journal of Network and Computer Applications (2024) Vol. 232, pp. 104007-104007
Closed Access | Times Cited: 1
CSEVP: A Collaborative, Secure, and Efficient Content Validation Protection Framework for Information Centric Networking
Kaiping Xue, Jiayu Yang, Qiudong Xia, et al.
IEEE Transactions on Network and Service Management (2021) Vol. 19, Iss. 2, pp. 1761-1775
Closed Access | Times Cited: 8
Kaiping Xue, Jiayu Yang, Qiudong Xia, et al.
IEEE Transactions on Network and Service Management (2021) Vol. 19, Iss. 2, pp. 1761-1775
Closed Access | Times Cited: 8
Latency-aware computation offloading and DQN-based resource allocation approaches in SDN-enabled MEC
Tianyu Du, Chunlin Li, Youlong Luo
Ad Hoc Networks (2022) Vol. 135, pp. 102950-102950
Open Access | Times Cited: 6
Tianyu Du, Chunlin Li, Youlong Luo
Ad Hoc Networks (2022) Vol. 135, pp. 102950-102950
Open Access | Times Cited: 6
APPLICATION OF BLOCKCHAIN IN ENERGY
Jiaqi Wu, Yujuan Zhou, Yuhao Zhang, et al.
International Journal of Engineering Technologies and Management Research (2023) Vol. 10, Iss. 4
Open Access | Times Cited: 3
Jiaqi Wu, Yujuan Zhou, Yuhao Zhang, et al.
International Journal of Engineering Technologies and Management Research (2023) Vol. 10, Iss. 4
Open Access | Times Cited: 3
Selective Content Retrieval in Information-Centric Networking
José Quevedo, Daniel Corujo
Sensors (2022) Vol. 22, Iss. 22, pp. 8742-8742
Open Access | Times Cited: 5
José Quevedo, Daniel Corujo
Sensors (2022) Vol. 22, Iss. 22, pp. 8742-8742
Open Access | Times Cited: 5
Certificateless Batch Authentication Scheme and Intrusion Detection Model Based on the Mobile Edge Computing Technology NDN-IoT Environment
Jianzhao Sun
Journal of Function Spaces (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 4
Jianzhao Sun
Journal of Function Spaces (2022) Vol. 2022, pp. 1-9
Open Access | Times Cited: 4
Lightweight Transmission Behavior Audit Scheme for NDN Industrial Internet Identity Resolution and Transmission Based on Blockchain
Yunhua He, Yuliang Ma, Qing Hu, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2538-2538
Open Access | Times Cited: 2
Yunhua He, Yuliang Ma, Qing Hu, et al.
Electronics (2023) Vol. 12, Iss. 11, pp. 2538-2538
Open Access | Times Cited: 2
RPBV: Reputation-Based Probabilistic Batch Verification Scheme for Named Data Networking
Kunpeng Ding, Jiayu Yang, Jiangping Han, et al.
(2023), pp. 01-10
Closed Access | Times Cited: 1
Kunpeng Ding, Jiayu Yang, Jiangping Han, et al.
(2023), pp. 01-10
Closed Access | Times Cited: 1
Zero-Knowledge Proofs based delegation authentication for Industrial Internet of Things in certificateless proxy signatures
Rafiqullah, Amjad Mehmood, Muhammad Altaf Khan, et al.
(2023)
Closed Access | Times Cited: 1
Rafiqullah, Amjad Mehmood, Muhammad Altaf Khan, et al.
(2023)
Closed Access | Times Cited: 1
Cyber-Physical Power Systems: Exploring a Streamlined Signcryption Scheme for Resource-Limited Smart Terminals
Xue Li, Cheng Jiang, Dajun Du, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 7, pp. 9749-9760
Closed Access
Xue Li, Cheng Jiang, Dajun Du, et al.
IEEE Transactions on Industrial Informatics (2024) Vol. 20, Iss. 7, pp. 9749-9760
Closed Access
ECMHP: ECC-Based Secure Handshake Protocol for Multicasting in CCN-IoT Environment
Kundan Kanti Saha, Sangram Ray, Mou Dasgupta
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 5, pp. 5826-5842
Closed Access
Kundan Kanti Saha, Sangram Ray, Mou Dasgupta
IEEE Transactions on Network and Service Management (2024) Vol. 21, Iss. 5, pp. 5826-5842
Closed Access