Processing math: 100%
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security

  • articleNo Access

    Secure Data Deduplication with Reliable Data Deletion in Cloud

  • articleOpen Access

    TECHNOLOGIES FOR LARGE DATA MANAGEMENT IN SCIENTIFIC COMPUTING

  • articleNo Access

    Certificateless Public Verification for the Outsourced Data Integrity in Cloud Storage

  • articleNo Access

    Thumbnail-Preserving Encryption Based on Binary–Decimal Hybrid and a Generalized Coupled Logistic Map

  • articleNo Access

    Optimizing Imperfect Coverage Cloud-RAID Systems Considering Reliability and Cost

  • articleNo Access

    PIRAP: Chaotic Fuzzy Encryption (CFE) Technique and Greedy Chemical Reaction Optimization (GCRO) Algorithm-Based Secured Mobi-Cloud Framework

  • articleNo Access

    A crop yield prediction model based on an improved artificial neural network and yield monitoring using a blockchain technique

  • chapterNo Access

    A data encryption scheme for cloud storage security

  • chapterNo Access

    A Cloud Storage Encryption Scheme in the Limited Bandwidth Environment

  • chapterNo Access

    Privacy-Preserving Multi-Keyword Fuzzy Search over Outsourced Encrypted Cloud Data

  • chapterNo Access

    An Attribute-based Access Control Scheme in Cloud Storage Environment