Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Verifiable secret sharing with changeable access structure

  • articleNo Access

    Several Generalizations of Shamir's Secret Sharing Scheme

  • articleNo Access

    Secret Sharing Schemes from Linear Codes overFp+vFp

  • articleNo Access

    A NEURAL-NETWORK APPROACH FOR VISUAL CRYPTOGRAPHY AND AUTHORIZATION

  • articleNo Access

    SHARING SECRETS USING ELEMENTARY CELLULAR AUTOMATA

  • articleNo Access

    A (2, n)-SECRET SHARING SCHEME BASED ON LINEAR CELLULAR AUTOMATA

  • articleNo Access

    Multiparty semi-quantum secret sharing protocol based on single photon sequence and permutation

  • articleNo Access

    LOSSLESS SECRET SHARING SCHEME WITH HIGH QUALITY SHARES BASED ON VQ-COMPRESSED IMAGES

  • articleNo Access

    An Outsourced Decryption ABE Model using ECC in Internet of Things

  • articleNo Access

    SECURE QUANTUM CARRIERS FOR QUANTUM STATE SHARING

  • chapterNo Access

    A Secure Scheme of Biometric Key Generation from Biometric Features

  • chapterNo Access

    N out of N Extended Color Visual Cryptography Scheme

  • chapterNo Access

    Chapter 2: A Survey: Shamir Threshold Scheme and Its Enhancements

  • chapterNo Access

    An Anti-Cheating Visual Cryptography Scheme Based on Chaotic Encryption System

  • chapterNo Access

    A security digital image transmission method based on data segmentation and non-linear encryptions