“Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × New power-Aware multicast for mobile Adhoc networks ₹5,500 New power-Aware multicast for mobile Adhoc networks quantity ₹5,500 × Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data ₹4,500 Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data quantity ₹4,500 × SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays ₹4,500 SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays quantity ₹4,500 × Low Power Address Generator for Memory Built-In Self Test ₹4,500 Low Power Address Generator for Memory Built-In Self Test quantity ₹4,500 × Weakly-Supervised Network for Detection of COVID-19 in Chest CT Scans ₹5,500 Weakly-Supervised Network for Detection of COVID-19 in Chest CT Scans quantity ₹5,500 × A Survey on Blood Vessel detection Methodologies in Retinal Images ₹4,500 A Survey on Blood Vessel detection Methodologies in Retinal Images quantity ₹9,000 × QoS-aware Node Selection Algorithm for Routing Protocols in VANETs ₹4,500 QoS-aware Node Selection Algorithm for Routing Protocols in VANETs quantity ₹4,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 × Achieving Arbitrary Multiplexing Rates for MIMO-OFDM Systems by Mimo-OFDM Systems by Hybrid Cyclic Delay Diversity ₹4,500 Achieving Arbitrary Multiplexing Rates for MIMO-OFDM Systems by Mimo-OFDM Systems by Hybrid Cyclic Delay Diversity quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × Error analysis for high data rate applications using Welch?s power spectral by Cognitive Radio Users ₹5,500 Error analysis for high data rate applications using Welch?s power spectral by Cognitive Radio Users quantity ₹5,500 × Relevance Feature Discovery for Text Mining ₹4,500 Relevance Feature Discovery for Text Mining quantity ₹4,500 × Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications ₹4,500 Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹66,000 Total ₹66,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout