
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones
Sana Javed, Muhammad Asghar Khan, Ako Muhammad Abdullah, et al.
Drones (2022) Vol. 6, Iss. 10, pp. 264-264
Open Access | Times Cited: 30
Sana Javed, Muhammad Asghar Khan, Ako Muhammad Abdullah, et al.
Drones (2022) Vol. 6, Iss. 10, pp. 264-264
Open Access | Times Cited: 30
Showing 1-25 of 30 citing articles:
Unleashing the power of internet of things and blockchain: A comprehensive analysis and future directions
Abderahman Rejeb, Karim Rejeb, Andrea Appolloni, et al.
Internet of Things and Cyber-Physical Systems (2023) Vol. 4, pp. 1-18
Open Access | Times Cited: 62
Abderahman Rejeb, Karim Rejeb, Andrea Appolloni, et al.
Internet of Things and Cyber-Physical Systems (2023) Vol. 4, pp. 1-18
Open Access | Times Cited: 62
Securing Wireless Sensor Networks Using Machine Learning and Blockchain: A Review
Shereen Ismail, Diana W. Dawoud, Hassan Reza
Future Internet (2023) Vol. 15, Iss. 6, pp. 200-200
Open Access | Times Cited: 24
Shereen Ismail, Diana W. Dawoud, Hassan Reza
Future Internet (2023) Vol. 15, Iss. 6, pp. 200-200
Open Access | Times Cited: 24
HCALA: Hyperelliptic curve-based anonymous lightweight authentication scheme for Internet of Drones
Aymen Dia Eddine Berini, Mohamed Amine Ferrag, Brahim Farou, et al.
Pervasive and Mobile Computing (2023) Vol. 92, pp. 101798-101798
Closed Access | Times Cited: 22
Aymen Dia Eddine Berini, Mohamed Amine Ferrag, Brahim Farou, et al.
Pervasive and Mobile Computing (2023) Vol. 92, pp. 101798-101798
Closed Access | Times Cited: 22
A biometric and physically unclonable function–Based authentication protocol for payload exchanges in internet of drones
Vincent Omollo Nyangaresi, Istabraq M. Al‐Joboury, Kareem Ali Malalah Al-sharhanee, et al.
e-Prime - Advances in Electrical Engineering Electronics and Energy (2024) Vol. 7, pp. 100471-100471
Open Access | Times Cited: 6
Vincent Omollo Nyangaresi, Istabraq M. Al‐Joboury, Kareem Ali Malalah Al-sharhanee, et al.
e-Prime - Advances in Electrical Engineering Electronics and Energy (2024) Vol. 7, pp. 100471-100471
Open Access | Times Cited: 6
Key Agreement and Authentication Protocols in the Internet of Things: A Survey
Sabina Szymoniak, Shalini Kesar
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 404-404
Open Access | Times Cited: 24
Sabina Szymoniak, Shalini Kesar
Applied Sciences (2022) Vol. 13, Iss. 1, pp. 404-404
Open Access | Times Cited: 24
Blockchain Applications in the Military Domain: A Systematic Review
Nikos Kostopoulos, Yannis C. Stamatiou, Constantinos Halkiopoulos, et al.
Technologies (2025) Vol. 13, Iss. 1, pp. 23-23
Open Access
Nikos Kostopoulos, Yannis C. Stamatiou, Constantinos Halkiopoulos, et al.
Technologies (2025) Vol. 13, Iss. 1, pp. 23-23
Open Access
A hyperelliptic curve-based authenticated key agreement scheme for unmanned aerial vehicles in cross-domain environments
Muhammad Asghar Khan, Insaf Ullah, Haralambos Mouratidis, et al.
Chinese Journal of Aeronautics (2025), pp. 103495-103495
Open Access
Muhammad Asghar Khan, Insaf Ullah, Haralambos Mouratidis, et al.
Chinese Journal of Aeronautics (2025), pp. 103495-103495
Open Access
Lightweight Drone-to-Ground Station and Drone-to-Drone Authentication Scheme for Internet of Drones
Qi Xie, Jilin Zhang
Symmetry (2025) Vol. 17, Iss. 4, pp. 556-556
Open Access
Qi Xie, Jilin Zhang
Symmetry (2025) Vol. 17, Iss. 4, pp. 556-556
Open Access
Towards Resilient Internet of Drones: A Systematic Survey on Authentication and GPS Spoofing Countermeasures
Aiswarya S. Nair, Sabu M. Thampi
(2025), pp. 299-344
Closed Access
Aiswarya S. Nair, Sabu M. Thampi
(2025), pp. 299-344
Closed Access
Cybersecurity Challenges for AGI Drones in Climate Change Missions
Yasir Ahmed Khan, Sadaf Manzoor
Advances in computational intelligence and robotics book series (2025), pp. 71-96
Closed Access
Yasir Ahmed Khan, Sadaf Manzoor
Advances in computational intelligence and robotics book series (2025), pp. 71-96
Closed Access
Biosensor-Based Drones Anomaly Detection Integration for Sustainable Agriculture Development
Wasswa Shafik
Advances in environmental engineering and green technologies book series (2024), pp. 283-316
Closed Access | Times Cited: 3
Wasswa Shafik
Advances in environmental engineering and green technologies book series (2024), pp. 283-316
Closed Access | Times Cited: 3
Advancing Drone Operations through Lightweight Blockchain and Fog Computing Integration: A Systematic Review
Rawabi Aldossri, Ahmed Aljughaiman, Abdullah Albuali
Drones (2024) Vol. 8, Iss. 4, pp. 153-153
Open Access | Times Cited: 2
Rawabi Aldossri, Ahmed Aljughaiman, Abdullah Albuali
Drones (2024) Vol. 8, Iss. 4, pp. 153-153
Open Access | Times Cited: 2
Quantum Computing - Navigating the Frontier with Shor's Algorithm and Quantum Cryptography
V. Thamilarasi, Pramod Kumar Naik, Isha Sharma, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 2
V. Thamilarasi, Pramod Kumar Naik, Isha Sharma, et al.
(2024), pp. 1-5
Closed Access | Times Cited: 2
A Survey on Cybersecurity in Unmanned Aerial Vehicles: Cyberattacks, Defense Techniques and Future Research Directions
Simon Niyonsaba, Karim Konaté, Moussa Moindze Soidridine
International Journal of Computer Networks And Applications (2023) Vol. 10, Iss. 5, pp. 688-688
Open Access | Times Cited: 5
Simon Niyonsaba, Karim Konaté, Moussa Moindze Soidridine
International Journal of Computer Networks And Applications (2023) Vol. 10, Iss. 5, pp. 688-688
Open Access | Times Cited: 5
BioKA-ASVN: Biometric-Based Key Agreement Scheme for Air Smart Vehicular Networks Using Blockchain Service
Basudeb Bera, Abhishek Bisht, Ashok Kumar Das, et al.
IEEE Transactions on Vehicular Technology (2024) Vol. 73, Iss. 7, pp. 9478-9494
Closed Access | Times Cited: 1
Basudeb Bera, Abhishek Bisht, Ashok Kumar Das, et al.
IEEE Transactions on Vehicular Technology (2024) Vol. 73, Iss. 7, pp. 9478-9494
Closed Access | Times Cited: 1
Unveiling Blockchain's Potential with Consensus Algorithms and Real-World Applications in Supply Chain Management
M. Balasubramani, K. Subathra, Swathi Agarwal, et al.
(2024) Vol. 9, pp. 1-5
Closed Access | Times Cited: 1
M. Balasubramani, K. Subathra, Swathi Agarwal, et al.
(2024) Vol. 9, pp. 1-5
Closed Access | Times Cited: 1
LWED: Lightweight white-box encryption communication system for drones over CARX algorithm
Yatao Yang, Hui Dong, Zhaofu Li, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101727-101727
Open Access | Times Cited: 2
Yatao Yang, Hui Dong, Zhaofu Li, et al.
Journal of King Saud University - Computer and Information Sciences (2023) Vol. 35, Iss. 9, pp. 101727-101727
Open Access | Times Cited: 2
Forensic Investigation of Malicious Activities in Digital Environments
A. Pasumpon Pandian, A. S. Anakath, R. Kannadasan, et al.
(2024), pp. 1-5
Closed Access
A. Pasumpon Pandian, A. S. Anakath, R. Kannadasan, et al.
(2024), pp. 1-5
Closed Access
An Efficient Authentication and Access Control Protocol for Securing UAV Networks Against Anomaly-Based Intrusion
Khaista Rahman, Muhammad Asghar Khan, Fatemeh Afghah, et al.
IEEE Access (2024) Vol. 12, pp. 62750-62764
Open Access
Khaista Rahman, Muhammad Asghar Khan, Fatemeh Afghah, et al.
IEEE Access (2024) Vol. 12, pp. 62750-62764
Open Access
A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments
Siwei Li, Hui Zhang, Hui Shi, et al.
The Journal of Supercomputing (2024) Vol. 80, Iss. 14, pp. 20682-20714
Closed Access
Siwei Li, Hui Zhang, Hui Shi, et al.
The Journal of Supercomputing (2024) Vol. 80, Iss. 14, pp. 20682-20714
Closed Access
Implementing a Novel Blockchain Algorithm for Enhanced Data Integrity in Cloud Systems
V. Balaji, S. Ambika, S Varshadevi, et al.
(2024), pp. 1-5
Closed Access
V. Balaji, S. Ambika, S Varshadevi, et al.
(2024), pp. 1-5
Closed Access
Leveraging Smart Contracts for Automated Freight and Logistics Management
Myasar Mundher Adnan, Bh. Prashanthi, M.S. Jyothi, et al.
(2024), pp. 1340-1344
Closed Access
Myasar Mundher Adnan, Bh. Prashanthi, M.S. Jyothi, et al.
(2024), pp. 1340-1344
Closed Access
Enhancing Supply Chain Regulatory Compliance with Blockchain and Lasso Regression Integration
Vivekanand Aelgani, E. Jothi, Ramy Hussein, et al.
(2024), pp. 1222-1227
Closed Access
Vivekanand Aelgani, E. Jothi, Ramy Hussein, et al.
(2024), pp. 1222-1227
Closed Access
Blockchain-Based Smart Contracts for Sustainable Supply Chain Practices
T. Saravanan, G. Ramesh, Ramy Hussein, et al.
(2024), pp. 1138-1143
Closed Access
T. Saravanan, G. Ramesh, Ramy Hussein, et al.
(2024), pp. 1138-1143
Closed Access
Blockchain Compliance in Supply Chain Regulations: A Comprehensive Overview
B Thamizhkani., Neeraj Varshney, Mallikarjuna Rao Gundavarapu, et al.
(2024), pp. 1244-1248
Closed Access
B Thamizhkani., Neeraj Varshney, Mallikarjuna Rao Gundavarapu, et al.
(2024), pp. 1244-1248
Closed Access