Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    A Homomorphic Encryption Algorithm Based on Communication and Sensing Integration

  • articleNo Access

    A Study on AG-Groups in Spherical Fuzzy Environment

  • articleOpen Access

    TECHNOLOGIES FOR LARGE DATA MANAGEMENT IN SCIENTIFIC COMPUTING

  • articleNo Access

    Probabilistic Buckshot-Driven Cluster Head Identification and Accumulative Data Encryption in WSN

  • articleNo Access

    A FIRST CRYPTOSYSTEM FOR SECURITY OF TWO-DIMENSIONAL DATA

    Fractals01 Feb 2017
  • articleNo Access

    Application of algebra and discrete wavelet transform in two-dimensional data (RGB-images) security

  • chapterNo Access

    A data encryption scheme for cloud storage security