Processing math: 100%
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Power Trading and Access Control Scheme Based on IPFS and Blockchain

  • articleNo Access

    Prevention of Insider Attacks Using Block Chain with Hierarchical Auto-Associative Polynomial Convolutional Neural Network in Cloud Platform

  • articleNo Access

    Integrating Fuzzy Graph Theory into Cryptography: A Survey of Techniques and Security Applications

  • articleNo Access

    A NOVEL EFFICIENT ACCESS CONTROL SCHEME FOR LARGE-SCALE DISTRIBUTED WIRELESS SENSOR NETWORKS

  • articleOpen Access

    TECHNOLOGIES FOR LARGE DATA MANAGEMENT IN SCIENTIFIC COMPUTING

  • articleNo Access

    A QUANTUM CRYPTOGRAPHIC SOLUTION TO THE PROBLEM OF ACCESS CONTROL IN A HIERARCHY

  • articleNo Access

    The Importance of Applying Security Practices in Wireless Communication: Bluetooth Low Energy and RFID

  • articleNo Access

    Access Control Policy Maintenance in IoT Based on Machine Learning

  • articleNo Access

    Adding Flexibility in Information Flow Control for Object-Oriented Systems Using Versions

  • articleNo Access

    AN INFERENCE-ENABLED ACCESS CONTROL MODEL FOR RDF ONTOLOGY

  • articleNo Access

    MODEL CHECKING FOR VERIFICATION OF MANDATORY ACCESS CONTROL MODELS AND PROPERTIES

  • articleNo Access

    A Tool Supporting End-User Development of Access Control in Web Applications

  • articleNo Access

    Secure, Dynamic and Distributed Access Control Stack for Database Applications

  • articleNo Access

    Fine-Grained Access Control via XACML Policy Optimization in Cloud Computing

  • articleNo Access

    Formalization and Verification of TESAC Using CSP

  • articleNo Access

    DetAC: Approach to Detect Access Control Vulnerability in Web Application Based on Sitemap Model with Global Information Representation

  • articleNo Access

    W-RBAC — A Workflow Security Model Incorporating Controlled Overriding of Constraints

  • articleNo Access

    APPROXIMATE QUERY PROCESSING USING MULTILAYERED DATA MODEL TO HANDLE ENVIRONMENTAL CONSTRAINTS, PRIVACY AND AVOIDING INFERENCES

  • articleNo Access

    Object-Specific Role-Based Access Control

  • articleNo Access

    LOCKING PROTOCOL FOR INFORMATION FLOW CONTROL