“Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Grievance Cell and Complaints Tracking System for Citizens ₹4,500 Grievance Cell and Complaints Tracking System for Citizens quantity ₹4,500 × A Survey on Blood Vessel detection Methodologies in Retinal Images ₹4,500 A Survey on Blood Vessel detection Methodologies in Retinal Images quantity ₹4,500 × UWB Antenna for Brain stroke and Brain Tumour Detection ₹5,500 UWB Antenna for Brain stroke and Brain Tumour Detection quantity ₹5,500 × Hierarchical Cluster-based Routing in Wireless Sensor Networks ₹4,500 Hierarchical Cluster-based Routing in Wireless Sensor Networks quantity ₹4,500 × Secure Sensitive Data Sharing on a Big Data Platform ₹4,500 Secure Sensitive Data Sharing on a Big Data Platform quantity ₹4,500 × Securing Cognitive Radio Networks against Primary User Emulation Attacks ₹4,500 Securing Cognitive Radio Networks against Primary User Emulation Attacks quantity ₹4,500 × User-Centric Energy Efficiency Maximization for Wireless Powered Communications ₹5,500 User-Centric Energy Efficiency Maximization for Wireless Powered Communications quantity ₹5,500 × DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments ₹4,500 DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments quantity ₹4,500 × A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing ₹4,500 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing quantity ₹4,500 × Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks ₹4,500 Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc Networks quantity ₹4,500 × An Optimal Scheduling Algorithm for Maximizing Throughput in WiMAX Mesh Networks ₹4,500 An Optimal Scheduling Algorithm for Maximizing Throughput in WiMAX Mesh Networks quantity ₹4,500 × A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks ₹4,500 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks quantity ₹4,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 × Collaboratively Tracking Interests for User Clustering in Streams of Short Texts ₹4,500 Collaboratively Tracking Interests for User Clustering in Streams of Short Texts quantity ₹4,500 × Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks ₹4,500 Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹74,000 Total ₹74,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout