“Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks ₹4,500 Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks quantity ₹4,500 × Minimax Robust Relay Selection Based on Uncertain Long-Term CSI ₹4,500 Minimax Robust Relay Selection Based on Uncertain Long-Term CSI quantity ₹4,500 × A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing ₹4,500 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing quantity ₹4,500 × Neuro Fuzzy Systems: State-of-the-art Modeling Techniques ₹4,500 Neuro Fuzzy Systems: State-of-the-art Modeling Techniques quantity ₹4,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 × A Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold ₹3,500 A Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold quantity ₹3,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹30,500 Total ₹30,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout