“Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications ₹4,500 Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications quantity ₹4,500 × Prediction of Heart Disease Using Machine Learning Algorithms ₹4,500 Prediction of Heart Disease Using Machine Learning Algorithms quantity ₹4,500 × Enhancing Heart-Beat-Based Security for mHealth Applications ₹4,500 Enhancing Heart-Beat-Based Security for mHealth Applications quantity ₹9,000 × On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users ₹4,500 On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users quantity ₹4,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 × Data Mining for Patient Friendly Apnea Detection ₹4,500 Data Mining for Patient Friendly Apnea Detection quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹36,000 Total ₹36,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout