
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
A New Blockchain-Based Authentication Framework for Secure IoT Networks
Ahmad K. Al Hwaitat, Mohammed Amin Almaiah, Aitizaz Ali, et al.
Electronics (2023) Vol. 12, Iss. 17, pp. 3618-3618
Open Access | Times Cited: 41
Ahmad K. Al Hwaitat, Mohammed Amin Almaiah, Aitizaz Ali, et al.
Electronics (2023) Vol. 12, Iss. 17, pp. 3618-3618
Open Access | Times Cited: 41
Showing 1-25 of 41 citing articles:
Navigating the nexus of security and privacy in modern financial technologies
Florence Olweny
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 2, pp. 167-197
Open Access | Times Cited: 18
Florence Olweny
GSC Advanced Research and Reviews (2024) Vol. 18, Iss. 2, pp. 167-197
Open Access | Times Cited: 18
Blockchain-Enhanced Multi-Factor Authentication for Securing IoT Children's Toys
Ahmad AA Alkhatib, Layla Albdor, Seraj Fayyad, et al.
International Journal of Computational and Experimental Science and Engineering (2024) Vol. 10, Iss. 4
Open Access | Times Cited: 16
Ahmad AA Alkhatib, Layla Albdor, Seraj Fayyad, et al.
International Journal of Computational and Experimental Science and Engineering (2024) Vol. 10, Iss. 4
Open Access | Times Cited: 16
Resource Management and Secure Data Exchange for Mobile Sensors Using Ethereum Blockchain
Burhan Ul Islam Khan, Khang Wen Goh, Abdul Raouf Khan, et al.
Symmetry (2025) Vol. 17, Iss. 1, pp. 61-61
Open Access | Times Cited: 4
Burhan Ul Islam Khan, Khang Wen Goh, Abdul Raouf Khan, et al.
Symmetry (2025) Vol. 17, Iss. 1, pp. 61-61
Open Access | Times Cited: 4
Blockchain-Powered Healthcare Systems: Enhancing Scalability and Security with Hybrid Deep Learning
Aitizaz Ali, Hashim Ali, Aamir Saeed, et al.
Sensors (2023) Vol. 23, Iss. 18, pp. 7740-7740
Open Access | Times Cited: 27
Aitizaz Ali, Hashim Ali, Aamir Saeed, et al.
Sensors (2023) Vol. 23, Iss. 18, pp. 7740-7740
Open Access | Times Cited: 27
Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain
Megha Kuliha, Sunita Verma
International Journal of Intelligent Networks (2024) Vol. 5, pp. 161-174
Open Access | Times Cited: 8
Megha Kuliha, Sunita Verma
International Journal of Intelligent Networks (2024) Vol. 5, pp. 161-174
Open Access | Times Cited: 8
Enhancing IoT security: A comprehensive exploration of privacy, security measures, and advanced routing solutions
Azmera Chandu Naik, Lalit Kumar Awasthi, Priyanka Rathee, et al.
Computer Networks (2025), pp. 111045-111045
Closed Access | Times Cited: 1
Azmera Chandu Naik, Lalit Kumar Awasthi, Priyanka Rathee, et al.
Computer Networks (2025), pp. 111045-111045
Closed Access | Times Cited: 1
Integrating AI and Blockchain for Enhanced Data Security in IoT-Driven Smart Cities
Burhan Ul Islam Khan, Khang Wen Goh, Abdul Raouf Khan, et al.
Processes (2024) Vol. 12, Iss. 9, pp. 1825-1825
Open Access | Times Cited: 8
Burhan Ul Islam Khan, Khang Wen Goh, Abdul Raouf Khan, et al.
Processes (2024) Vol. 12, Iss. 9, pp. 1825-1825
Open Access | Times Cited: 8
A Review on Scalability Enhancement Through Sharding-Based Blockchain Verification for Resource-Constraint Devices
Siti Hajar Mohd Yusof, Raja Zahilah Raja Md Radzi, Siti Hajar Othman
Lecture notes in electrical engineering (2025), pp. 521-536
Closed Access
Siti Hajar Mohd Yusof, Raja Zahilah Raja Md Radzi, Siti Hajar Othman
Lecture notes in electrical engineering (2025), pp. 521-536
Closed Access
Transactive IoT : Merging Transactions and Connectivity
Bilal Khan, Aabid A. Mir, Naser S. Almutairi, et al.
(2025), pp. 63-85
Closed Access
Bilal Khan, Aabid A. Mir, Naser S. Almutairi, et al.
(2025), pp. 63-85
Closed Access
Challenges and Future Directions
Burhan Ul Islam Khan, Aabid A. Mir, Nur F.L.M. Rosely, et al.
(2025), pp. 363-385
Closed Access
Burhan Ul Islam Khan, Aabid A. Mir, Nur F.L.M. Rosely, et al.
(2025), pp. 363-385
Closed Access
Secure Transactions in IoT Network Using PINN ‐Based Intrusion Detection System and HDPoA Blockchain Protocol
Sourav Mishra, Vijay Kumar Chaurasiya
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 4
Closed Access
Sourav Mishra, Vijay Kumar Chaurasiya
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 4
Closed Access
Enhancing Cloud Security Through a Multi-Level Authentication Model: A QoS-Based Approach to Performance Measurement for Source Management
Bimal Kumar, Basant Sah
SN Computer Science (2025) Vol. 6, Iss. 4
Closed Access
Bimal Kumar, Basant Sah
SN Computer Science (2025) Vol. 6, Iss. 4
Closed Access
Securing electronic health records using blockchain-enabled federated learning for IoT-based smart healthcare
A. Althaf Ali, M. A. Gunavathie, V. Srinivasan, et al.
Clinical eHealth (2025)
Open Access
A. Althaf Ali, M. A. Gunavathie, V. Srinivasan, et al.
Clinical eHealth (2025)
Open Access
Shatakshi Kokate, Urmila Shrawankar
Transactions on Emerging Telecommunications Technologies (2025) Vol. 36, Iss. 5
Closed Access
Authentication and Access Control Mechanisms to Secure IoT Environments: A comprehensive SLR
Seetah Almarri, Mounir Frikha
(2024)
Open Access | Times Cited: 3
Seetah Almarri, Mounir Frikha
(2024)
Open Access | Times Cited: 3
A Scalability Enhancement Scheme for Ethereum Blockchains: A Graph-based Decentralized Approach
Burhan Ul Islam Khan, Khang Wen Goh, Megat F. Zuhairi, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 17725-17736
Open Access | Times Cited: 3
Burhan Ul Islam Khan, Khang Wen Goh, Megat F. Zuhairi, et al.
Engineering Technology & Applied Science Research (2024) Vol. 14, Iss. 6, pp. 17725-17736
Open Access | Times Cited: 3
Decentralized Multi-Layered Architecture to Strengthen the Security in the Internet of Things Environment Using Blockchain Technology
Ahmed Alhusayni, Vijey Thayananthan, Aiiad Albeshri, et al.
Electronics (2023) Vol. 12, Iss. 20, pp. 4314-4314
Open Access | Times Cited: 7
Ahmed Alhusayni, Vijey Thayananthan, Aiiad Albeshri, et al.
Electronics (2023) Vol. 12, Iss. 20, pp. 4314-4314
Open Access | Times Cited: 7
An efficient blockchain-based authentication scheme with transferability
Xiushu Jin, Kazumasa Omote
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0310094-e0310094
Open Access | Times Cited: 2
Xiushu Jin, Kazumasa Omote
PLoS ONE (2024) Vol. 19, Iss. 9, pp. e0310094-e0310094
Open Access | Times Cited: 2
BlockDLO: Blockchain computing with deep learning orchestration for secure data communication in IoT Environment
M. Kokila, K. Srinivasa Reddy
IEEE Access (2024) Vol. 12, pp. 134521-134540
Open Access | Times Cited: 2
M. Kokila, K. Srinivasa Reddy
IEEE Access (2024) Vol. 12, pp. 134521-134540
Open Access | Times Cited: 2
DBAC-DSR-BT: A secure and reliable deep speech recognition based-distributed biometric access control scheme over blockchain technology
Oussama Mounnan, Larbi Boubchir, Otman Manad, et al.
Computer Standards & Interfaces (2024), pp. 103929-103929
Closed Access | Times Cited: 2
Oussama Mounnan, Larbi Boubchir, Otman Manad, et al.
Computer Standards & Interfaces (2024), pp. 103929-103929
Closed Access | Times Cited: 2
Blockchain Technology for IoT Security and Trust: A Comprehensive SLR
Seetah Almarri, Ahmed Aljughaiman
Sustainability (2024) Vol. 16, Iss. 23, pp. 10177-10177
Open Access | Times Cited: 2
Seetah Almarri, Ahmed Aljughaiman
Sustainability (2024) Vol. 16, Iss. 23, pp. 10177-10177
Open Access | Times Cited: 2
Lightweight Privacy Preservation Blockchain Framework for Healthcare Applications using GM-SSO
Adla Padma, Mangayarkarasi Ramaiah
Results in Engineering (2024), pp. 103882-103882
Open Access | Times Cited: 2
Adla Padma, Mangayarkarasi Ramaiah
Results in Engineering (2024), pp. 103882-103882
Open Access | Times Cited: 2
A Trust-Based Framework for IoT Device Management Using Blockchain Technology
K. Sudharson, S Rajalalakshmi, Mohan Raj K R, et al.
International Journal of Electrical and Electronics Engineering (2023) Vol. 10, Iss. 10, pp. 32-39
Open Access | Times Cited: 5
K. Sudharson, S Rajalalakshmi, Mohan Raj K R, et al.
International Journal of Electrical and Electronics Engineering (2023) Vol. 10, Iss. 10, pp. 32-39
Open Access | Times Cited: 5
Enhancing IoT Network Security: ML and Blockchain for Intrusion Detection
N. Sunanda, K. Shailaja, Prabhakar Kandukuri, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 4
Open Access | Times Cited: 1
N. Sunanda, K. Shailaja, Prabhakar Kandukuri, et al.
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 4
Open Access | Times Cited: 1
Overview of Mobile Attack Detection and Prevention Techniques Using Machine Learning
Ahmad K. Al Hwaitat, Hussam N. Fakhouri, Moatsum Alawida, et al.
International Journal of Interactive Mobile Technologies (iJIM) (2024) Vol. 18, Iss. 10, pp. 125-157
Open Access | Times Cited: 1
Ahmad K. Al Hwaitat, Hussam N. Fakhouri, Moatsum Alawida, et al.
International Journal of Interactive Mobile Technologies (iJIM) (2024) Vol. 18, Iss. 10, pp. 125-157
Open Access | Times Cited: 1