OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

An Efficient and Provably Secure Certificateless Protocol for Industrial Internet of Things
F. Rafique, Mohammad S. Obaidat, Khalid Mahmood, et al.
IEEE Transactions on Industrial Informatics (2022) Vol. 18, Iss. 11, pp. 8039-8046
Closed Access | Times Cited: 29

Showing 1-25 of 29 citing articles:

Understanding Failures in Security Proofs of Multi-Factor Authentication for Mobile Devices
Qingxuan Wang, Ding Wang
IEEE Transactions on Information Forensics and Security (2022) Vol. 18, pp. 597-612
Closed Access | Times Cited: 55

An Enhanced Multifactor Authentication and Key Agreement Protocol in Industrial Internet of Things
Yiran Han, Hua Guo, Jianwei Liu, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 9, pp. 16243-16254
Closed Access | Times Cited: 13

A Provable Secure and Efficient Authentication Framework for Smart Manufacturing Industry
Muhammad Hammad, Akhtar Badshah, Ghulam Abbas, et al.
IEEE Access (2023) Vol. 11, pp. 67626-67639
Open Access | Times Cited: 13

An Enhanced Authentication and Key Agreement Protocol for Smart Grid Communication
Zewei Liu, Chunqiang Hu, Conghao Ruan, et al.
IEEE Internet of Things Journal (2024) Vol. 11, Iss. 12, pp. 22413-22428
Closed Access | Times Cited: 5

A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture
Shivangi Shukla, Sankita J. Patel
Cluster Computing (2023) Vol. 27, Iss. 2, pp. 1559-1580
Closed Access | Times Cited: 12

A Zero-Trust Network-Based Access Control Scheme for Sustainable and Resilient Industry 5.0
Khaled Ali Abuhasel
IEEE Access (2023) Vol. 11, pp. 116398-116409
Open Access | Times Cited: 12

An efficient mobile cloud security method based on strong multi-factor authentication and smart card technology
Cherif Ghazel, Imen Merdassi, Leı̈la Azouz Saı̈dane
Annals of Telecommunications (2025)
Closed Access

A novel lightweight authentication protocol for WBAN based on Stern–Brocot tree
Yuxuan Zhao, Junfeng Tian
Journal of Information Security and Applications (2025) Vol. 90, pp. 104031-104031
Closed Access

Enhanced lightweight and secure certificateless authentication scheme (ELWSCAS) for Internet of Things environment
Usman Ali, Mohd Yamani Idna Idris, Jaroslav Frnda, et al.
Internet of Things (2023) Vol. 24, pp. 100923-100923
Open Access | Times Cited: 9

An optimal secure and reliable certificateless proxy signature for industrial internet of things
Rafiq Ullah, Amjad Mehmood, Muhammad Altaf Khan, et al.
Peer-to-Peer Networking and Applications (2024) Vol. 17, Iss. 4, pp. 2205-2220
Closed Access | Times Cited: 2

WSNEAP: An Efficient Authentication Protocol for IIoT-Oriented Wireless Sensor Networks
Fumin Yi, Lei Zhang, Lijuan Xu, et al.
Sensors (2022) Vol. 22, Iss. 19, pp. 7413-7413
Open Access | Times Cited: 9

A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability
Behnam Zahednejad, Teng Huang, Saeed Kosari, et al.
International Journal of Intelligent Systems (2023) Vol. 2023, pp. 1-19
Open Access | Times Cited: 5

Quantum secure two party authentication protocol for mobile devices
Bshisht Moony, Amit K. Barnwal, Mrityunjay Singh, et al.
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 5, pp. 2548-2559
Closed Access | Times Cited: 4

Robust Multi-Factor Authentication for WSNs with Dynamic Password Recovery
Liufu Zhu, Ding Wang
IEEE Transactions on Information Forensics and Security (2024) Vol. 19, pp. 8398-8413
Closed Access | Times Cited: 1

Dependability of Embedded Systems in the Industrial Internet of Things: Information Security and Reliability of the Communication Cluster
Andrii Yarmilko, Інна Розломій, S. Naumenko
Lecture notes on data engineering and communications technologies (2024), pp. 235-249
Closed Access | Times Cited: 1

Physical Unclonable Function-Based Lightweight and Verifiable Data Stream Transmission for Industrial IoT
Xiaohu Shan, Haiyang Yu, Yuwen Chen, et al.
IEEE Transactions on Industrial Informatics (2023) Vol. 19, Iss. 12, pp. 11573-11583
Closed Access | Times Cited: 3

A Lightweight authentication approach based on linear feedback shift register and majority function for internet of things
Elham Ebrahimpour, Shahram Babaie
Peer-to-Peer Networking and Applications (2023) Vol. 16, Iss. 4, pp. 1900-1915
Closed Access | Times Cited: 3

Deep Learning for Enhanced Security in the Internet of Nano Things: A Study on Data Classification for Normal and Abnormal Behavior
Sherif El‐Gendy, Nashwa Abdelbaki, Marianne A. Azer
(2023), pp. 276-283
Closed Access | Times Cited: 3

Increasing the Speed and Performance of the Drupal CMS Server for Industrial IoT Technologies
Viktor Satsyk, Dagmar Cagáňová, Oleksandr Reshetylo, et al.
EAI/Springer Innovations in Communication and Computing (2023), pp. 81-92
Closed Access | Times Cited: 2

Designing access control security protocol for Industry 4.0 using Blockchain‐as‐a‐Service
Anusha Vangala, Ashok Kumar Das, Neeraj Kumar, et al.
Security and Privacy (2023) Vol. 7, Iss. 2
Closed Access | Times Cited: 2

A Provably Secure Two-Way Authenticated Key Agreement Protocol for IioT Environments
Ahmad M. Manasrah, Hussain Al-Aqrabi, Qussai Yaseen
(2024)
Closed Access

Secure access technology for industrial internet of things
Bingquan Wang, Peng Jin, Meili Cui
Concurrency and Computation Practice and Experience (2024)
Closed Access

A Cost-Effective Key Agreement Encryption Protocol for Securing IIoT-Enabled WSN Communication
Khalid Mahmood, Mah Noor Fatima, Salman Shamshad, et al.
IEEE Internet of Things Journal (2024) Vol. 12, Iss. 5, pp. 5185-5193
Closed Access

An Enhanced Multi-Factor Device Authentication Protocol in IoLT Healthcare Environment
Tuan‐Vinh Le, Ming‐Hour Yang, Khalid Mahmood, et al.
IEEE Transactions on Network Science and Engineering (2024) Vol. 12, Iss. 2, pp. 571-583
Closed Access

A Novel Certificateless Authentication and Key Agreement Protocol for Smart Grid
Zewei Liu, Chunqiang Hu, Conghao Ruan, et al.
GLOBECOM 2022 - 2022 IEEE Global Communications Conference (2023), pp. 3288-3293
Closed Access | Times Cited: 1

Page 1 - Next Page

Scroll to top