“Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm” has been added to your cart. Continue shopping “Delay-Aware Wireless Powered Communication Networks?Energy Balancing and Optimization” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Generating Correlated Digital Certificates: Framework and Applications ₹5,500 Generating Correlated Digital Certificates: Framework and Applications quantity ₹5,500 × Data Mining for Patient Friendly Apnea Detection ₹4,500 Data Mining for Patient Friendly Apnea Detection quantity ₹4,500 × Lifetime & Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks ₹5,500 Lifetime & Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks quantity ₹5,500 × Low-Complexity Channel Estimation and Detection for MIMO-OFDM Receiver With ESPAR Antenna ₹5,500 Low-Complexity Channel Estimation and Detection for MIMO-OFDM Receiver With ESPAR Antenna quantity ₹5,500 × Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data ₹4,500 Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data quantity ₹4,500 × User-Defined Privacy Grid System for Continuous Location-Based Services ₹4,500 User-Defined Privacy Grid System for Continuous Location-Based Services quantity ₹4,500 × A Key-Policy Attribute-Based Temporary Keyword Search Scheme for Secure Cloud Storage ₹4,500 A Key-Policy Attribute-Based Temporary Keyword Search Scheme for Secure Cloud Storage quantity ₹4,500 × Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm ₹4,500 Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm quantity ₹4,500 × A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection ₹4,500 A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection quantity ₹4,500 × CSR: Classi?ed Source Routing in DHT-Based Networks ₹4,500 CSR: Classi?ed Source Routing in DHT-Based Networks quantity ₹4,500 × Stocks Market Prediction Using Support Vector Machine ₹4,500 Stocks Market Prediction Using Support Vector Machine quantity ₹4,500 × Supervised Classification Analysis with Information-Theoretic Methods ₹4,500 Supervised Classification Analysis with Information-Theoretic Methods quantity ₹4,500 × Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud ₹5,500 Attribute-Based Storage Supporting Secure Deduplication of Encrypted Data in Cloud quantity ₹5,500 × Neuro Fuzzy Systems: State-of-the-art Modeling Techniques ₹4,500 Neuro Fuzzy Systems: State-of-the-art Modeling Techniques quantity ₹4,500 × Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm ₹4,500 Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm quantity ₹4,500 × Delay-Aware Wireless Powered Communication Networks?Energy Balancing and Optimization ₹5,500 Delay-Aware Wireless Powered Communication Networks?Energy Balancing and Optimization quantity ₹5,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹77,000 Total ₹77,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout