Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    Secret Sharing Schemes from Linear Codes overFp+vFp

  • articleNo Access

    An Outsourced Decryption ABE Model using ECC in Internet of Things

  • articleNo Access

    Verifiable quantum secret sharing scheme using Bell states for a class of special access structures

  • articleNo Access

    A survey on attribute-based encryption for Internet of Things

  • chapterNo Access

    Chapter 2: A Survey: Shamir Threshold Scheme and Its Enhancements