Your shopping cart is empty!
Hi there! Click one of our representatives below and we will get back to you as soon as possible.
Product Compare (0)
In the Infrastructure as a Service (IaaS) paradigm of cloud computing, computational resources are a..
Classification is one of the core function in network infrastructure for
various purposes. ..
Due to the centralized control, network-wide monitoring and flow-level scheduling of Software-Define..
Due to the increasing popularity of cloud computing,
more and more data owners are motivated to ou..
Due to the increasing popularity of cloud computing, more and more data owners are motivated to outs..
Affording secure and efficient big data aggregation
methods is very attractive in the field of wir..
Due to the complexity and volume, outsourcing ciphertexts to a cloud is deemed to be one of the most..
Convergent encryption, also known as content hash keying, is a cryptosystem that produces identical ..
In this project prop..
secure protocol for spontaneous wireless ad hoc networks which uses an hybrid
Authentication thwarts unauthorised users from accessing resources in insecure network
A Secure Transmission Scheme for Textual Data with Least Overhead
To fulfill the needs for secur..
Nowadays, telemedicine is an emerging healthcare
service where the healthcare professionals can dia..
The rising need for security in S..
Instance selection is a pre-processing technique for machine learning and data mining. The main prob..