“A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × A Location-Wise Predetermined Deployment for Optimizing Lifetime in Visual Sensor Networks ₹5,500 A Location-Wise Predetermined Deployment for Optimizing Lifetime in Visual Sensor Networks quantity ₹5,500 × Securing Cognitive Radio Networks against Primary User Emulation Attacks ₹4,500 Securing Cognitive Radio Networks against Primary User Emulation Attacks quantity ₹4,500 × Network Intrusion Detection for IoT Security based on Learning Techniques ₹4,500 Network Intrusion Detection for IoT Security based on Learning Techniques quantity ₹4,500 × Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm ₹4,500 Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm quantity ₹4,500 × Towards Open-World Person Re-Identification by One-Shot Group-based Verification ₹4,500 Towards Open-World Person Re-Identification by One-Shot Group-based Verification quantity ₹4,500 × SIR: a secure and intelligent routing protocol for vehicular adhoc network ₹4,500 SIR: a secure and intelligent routing protocol for vehicular adhoc network quantity ₹4,500 × Low Power Address Generator for Memory Built-In Self Test ₹4,500 Low Power Address Generator for Memory Built-In Self Test quantity ₹4,500 × Stocks Market Prediction Using Support Vector Machine ₹4,500 Stocks Market Prediction Using Support Vector Machine quantity ₹4,500 × Learning Customer Behaviors for Effective Load Forecasting ₹4,500 Learning Customer Behaviors for Effective Load Forecasting quantity ₹4,500 × Relevance Feature Discovery for Text Mining ₹4,500 Relevance Feature Discovery for Text Mining quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × On Increasing the Slow-Fading Channel Diversity Using Block-Coded MIMO-OFDM With Reconfigurable Antennas ₹5,500 On Increasing the Slow-Fading Channel Diversity Using Block-Coded MIMO-OFDM With Reconfigurable Antennas quantity ₹5,500 × A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing ₹4,500 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹60,500 Total ₹60,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout