“Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications” has been added to your cart. Continue shopping “Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Recursive Approach to the Design of a Parallel Self-Timed Adder ₹5,500 Recursive Approach to the Design of a Parallel Self-Timed Adder quantity ₹5,500 × Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services ₹4,500 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services quantity ₹4,500 × Sum capacity maximization for MIMO?OFDMA based cognitive radio networks ₹3,500 Sum capacity maximization for MIMO?OFDMA based cognitive radio networks quantity ₹3,500 × Application of Data Mining Techniques in Weather Prediction and Climate Change Studies ₹4,500 Application of Data Mining Techniques in Weather Prediction and Climate Change Studies quantity ₹4,500 × Network Intrusion Detection for IoT Security based on Learning Techniques ₹4,500 Network Intrusion Detection for IoT Security based on Learning Techniques quantity ₹4,500 × Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications ₹4,500 Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications quantity ₹4,500 × Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing ₹4,500 Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹31,500 Total ₹31,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout