Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Research on Image Recognition Technology in the Encryption and Decryption Process of Electronic Archives Driven by Computer Vision

  • articleNo Access

    A new coding algorithm using Fibonacci numbers, linear mappings, and change of basis

  • articleNo Access

    Modified security and cryptography-based data deduplication in cloud environment

  • articleNo Access

    A Steganography Embedding Method Based on CDF-DWT Technique for Reversible Data Hiding Application Using Elgamal Algorithm

  • articleNo Access

    A NEW CHAOTIC ENCRYPTION ALGORITHM BASED ON THE ERGODICITY OF CHAOS

  • articleNo Access

    A MULTIPLE-PLAINTEXTS-ORIENTED CHAOTIC CRYPTOSYSTEM

  • articleNo Access

    RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique

  • articleNo Access

    Enhancing Iris Authentication for Managing Multiple Cancellations: Leveraging Quotient Filters

  • articleNo Access

    PIRAP: Intelligent Hybrid Approach for Secure Data Transmission in Wireless Sensor Networks

  • articleFree Access

    PIRAP: AASM: An Advanced Attribute-Based Security Model for Enhancing Trustworthy Data Sharing in Cloud Computing

  • articleNo Access

    Crypto-stego System for Securing Text and Image Data

  • articleNo Access

    Security of Digital Images Based on 3D Arnold Cat Map and Elliptic Curve

  • articleNo Access

    Analysis of Various Visual Cryptographic Techniques and their Issues Based on Optimization Algorithms

  • articleNo Access

    Representation of integers by kk-generalized Fibonacci sequences and applications in cryptography

  • articleNo Access

    INTERACTIVE DATA ENCRYPTION STRATEGY FOR DISTRIBUTED SIMULATION SYSTEM