Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud

  • articleNo Access

    Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud

  • articleNo Access

    Optimal Key Generation for Data Sanitization and Restoration of Cloud Data: Future of Financial Cyber Security

  • articleNo Access

    Privacy Protection in Outsourced Spatial Databases

  • chapterNo Access

    A Cloud Storage Encryption Scheme in the Limited Bandwidth Environment

  • chapterNo Access

    Research on Security Mechanism of Cloud Security Immune System