“Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding” has been added to your cart. Continue shopping
“A Key-Policy Attribute-Based Temporary Keyword Search Scheme for Secure Cloud Storage” has been added to your cart. Continue shopping
“Crowdsourcing based Description of Urban Emergency Events using Social Media Big Data” has been added to your cart. Continue shopping
“Delay-Aware Wireless Powered Communication Networks?Energy Balancing and Optimization” has been added to your cart. Continue shopping