“Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Channel Estimation and Detection in Satellite Communication Systems ₹5,500 Channel Estimation and Detection in Satellite Communication Systems quantity ₹5,500 × Text Detection and Recognition in Imagery: A Survey ₹4,500 Text Detection and Recognition in Imagery: A Survey quantity ₹4,500 × Low Power Address Generator for Memory Built-In Self Test ₹4,500 Low Power Address Generator for Memory Built-In Self Test quantity ₹4,500 × QoS-aware Node Selection Algorithm for Routing Protocols in VANETs ₹4,500 QoS-aware Node Selection Algorithm for Routing Protocols in VANETs quantity ₹4,500 × Privacy Preserving Key Exchange Over Internet ₹4,500 Privacy Preserving Key Exchange Over Internet quantity ₹4,500 × Diversity Backpressure Scheduling and Routing With Mutual Information Accumulation in Wireless Ad-Hoc Networks ₹5,500 Diversity Backpressure Scheduling and Routing With Mutual Information Accumulation in Wireless Ad-Hoc Networks quantity ₹5,500 × A Survey on Blood Vessel detection Methodologies in Retinal Images ₹4,500 A Survey on Blood Vessel detection Methodologies in Retinal Images quantity ₹9,000 × Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks ₹4,500 Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks quantity ₹4,500 × Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? ₹4,500 Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? quantity ₹4,500 × Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks ₹4,500 Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks quantity ₹4,500 × SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays ₹4,500 SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays quantity ₹4,500 × A Low-Power High-Speed Accuracy-Controllable Approximate Multiplier Design ₹4,500 A Low-Power High-Speed Accuracy-Controllable Approximate Multiplier Design quantity ₹4,500 × oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks ₹4,500 oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks quantity ₹4,500 × Simultaneous Sensing and Transmission for Cognitive Radios With Imperfect Signal Cancellation ₹4,500 Simultaneous Sensing and Transmission for Cognitive Radios With Imperfect Signal Cancellation quantity ₹4,500 × Security and Privacy of Connected Vehicular Cloud Computing ₹4,500 Security and Privacy of Connected Vehicular Cloud Computing quantity ₹4,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 × Hierarchical Cluster-based Routing in Wireless Sensor Networks ₹4,500 Hierarchical Cluster-based Routing in Wireless Sensor Networks quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹87,500 Total ₹87,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout