“Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × A new data hiding method based on chaos embedded genetic algorithm for color image ₹4,500 A new data hiding method based on chaos embedded genetic algorithm for color image quantity ₹4,500 × Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds ₹4,500 Time-and-Energy-Aware Computation Offloading in Handheld Devices to Coprocessors and Clouds quantity ₹4,500 × Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage ₹4,500 Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹18,000 Total ₹18,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout