“Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications” has been added to your cart. Continue shopping “Visual voice activity detection as a help for speech source separation from convolutive mixtures” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹9,000 × Service Class Resource Management for Green Wireless-Optical Broadband Access Networks (WOBAN) ₹4,500 Service Class Resource Management for Green Wireless-Optical Broadband Access Networks (WOBAN) quantity ₹4,500 × Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications ₹4,500 Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications quantity ₹4,500 × Visual voice activity detection as a help for speech source separation from convolutive mixtures ₹4,500 Visual voice activity detection as a help for speech source separation from convolutive mixtures quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹22,500 Total ₹22,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout