Processing math: 100%
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    TUHTC: Two-Stage Unsupervised Hierarchical Text Classification of Power Grid Data Assets

  • articleNo Access

    Provably Secure (Broadcast) Homomorphic Signcryption

  • articleOpen Access

    TECHNOLOGIES FOR LARGE DATA MANAGEMENT IN SCIENTIFIC COMPUTING

  • articleNo Access

    ADVANCED TECHNOLOGIES FOR DISTRIBUTED DATABASE SERVICES HYPERINFRASTRUCTURE

  • articleNo Access

    Certificateless Public Verification for the Outsourced Data Integrity in Cloud Storage

  • articleNo Access

    Secure Multi-Subinterval Data Aggregation Scheme with Interval Privacy Preservation for Vehicle Sensing Systems

  • articleNo Access

    Confidentiality and Integrity Schemes for Multicore Shared Memory Systems

  • articleNo Access

    Blockchain for Edge Computing in Smart Environments: Use Cases, Issues, and Challenges

  • articleNo Access

    Protected and Energy-Efficient E-Healthcare System Based on Internet of Healthcare Services

  • articleNo Access

    Advanced Authentication and Energy-Efficient Routing Protocol for Wireless Body Area Networks

  • articleNo Access

    Decentralized CP-ABE Scheme for Enhanced University Data Security Using Blockchain

  • articleNo Access

    A Pseudorandom Number Generator Based on a 4D Piecewise Logistic Map with Coupled Parameters

  • articleNo Access

    AN INFERENCE-ENABLED ACCESS CONTROL MODEL FOR RDF ONTOLOGY

  • articleNo Access

    A RAID-BASED SECURE AND FAULT-TOLERANT MODEL FOR CLOUD INFORMATION STORAGE

  • articleNo Access

    Reliable and Secure Distributed Cloud Data Storage Using Reed-Solomon Codes

  • articleNo Access

    TWO LAYERS OF SECURITY FOR COLOR VIDEO BY MATRIX AFFINE CIPHER WITH TWO-DIMENSIONAL DISCRETE WAVELET TRANSFORM

    Fractals01 Dec 2015
  • articleNo Access

    ON THE SECURITY OF MICROAGGREGATION WITH INDIVIDUAL RANKING: ANALYTICAL ATTACKS

  • articleNo Access

    HAND SURGERY AND THE INTERNET: RESULTS OF A WORLDWIDE SURVEY

    Hand Surgery01 Dec 2002
  • articleNo Access

    CNS: Research on Data Security Technology and Network Data Security Regulations Driven by Digital Economy

  • articleNo Access

    COVER NOISE INTERFERENCE SUPPRESSION IN MULTIMEDIA DATA HIDING