“A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Error analysis for high data rate applications using Welch?s power spectral by Cognitive Radio Users ₹5,500 Error analysis for high data rate applications using Welch?s power spectral by Cognitive Radio Users quantity ₹5,500 × User-Defined Privacy Grid System for Continuous Location-Based Services ₹4,500 User-Defined Privacy Grid System for Continuous Location-Based Services quantity ₹4,500 × An 8T Low-Voltage and Low-Leakage Half-Selection Disturb-Free SRAM Using Bulk-CMOS and FinFETs ₹4,500 An 8T Low-Voltage and Low-Leakage Half-Selection Disturb-Free SRAM Using Bulk-CMOS and FinFETs quantity ₹4,500 × Network Intrusion Detection for IoT Security based on Learning Techniques ₹4,500 Network Intrusion Detection for IoT Security based on Learning Techniques quantity ₹4,500 × On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users ₹4,500 On the Performance of Non-Orthogonal Multiple Access in 5G Systems with Randomly Deployed Users quantity ₹4,500 × Sum capacity maximization for MIMO?OFDMA based cognitive radio networks ₹3,500 Sum capacity maximization for MIMO?OFDMA based cognitive radio networks quantity ₹3,500 × New power-Aware multicast for mobile Adhoc networks ₹5,500 New power-Aware multicast for mobile Adhoc networks quantity ₹5,500 × QoS-aware Node Selection Algorithm for Routing Protocols in VANETs ₹4,500 QoS-aware Node Selection Algorithm for Routing Protocols in VANETs quantity ₹4,500 × Joint Physical-Layer and System-Level Power Management for Delay-Sensitive Wireless Communications ₹4,500 Joint Physical-Layer and System-Level Power Management for Delay-Sensitive Wireless Communications quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 × Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? ₹4,500 Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy? quantity ₹4,500 × DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments ₹4,500 DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments quantity ₹4,500 × A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks ₹4,500 A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹59,500 Total ₹59,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout