“User-Defined Privacy Grid System for Continuous Location-Based Services” has been added to your cart. Continue shopping “Securing Cognitive Radio Networks against Primary User Emulation Attacks” has been added to your cart. Continue shopping “A Key-Policy Attribute-Based Temporary Keyword Search Scheme for Secure Cloud Storage” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation ₹4,500 Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation quantity ₹4,500 × User-Defined Privacy Grid System for Continuous Location-Based Services ₹4,500 User-Defined Privacy Grid System for Continuous Location-Based Services quantity ₹4,500 × Securing Cognitive Radio Networks against Primary User Emulation Attacks ₹4,500 Securing Cognitive Radio Networks against Primary User Emulation Attacks quantity ₹4,500 × A Key-Policy Attribute-Based Temporary Keyword Search Scheme for Secure Cloud Storage ₹4,500 A Key-Policy Attribute-Based Temporary Keyword Search Scheme for Secure Cloud Storage quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹18,000 Total ₹18,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout