“Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × Towards Open-World Person Re-Identification by One-Shot Group-based Verification ₹4,500 Towards Open-World Person Re-Identification by One-Shot Group-based Verification quantity ₹4,500 × Chronic Diseases and Health Monitoring Big Data: A Survey ₹4,500 Chronic Diseases and Health Monitoring Big Data: A Survey quantity ₹4,500 × Geo-Fencing: Geographical-Fencing based Energy-Aware Proactive Framework for Mobile Devices ₹4,500 Geo-Fencing: Geographical-Fencing based Energy-Aware Proactive Framework for Mobile Devices quantity ₹4,500 × Low-Power and Fast Full Adder by Exploring New XOR and XNOR Gates ₹4,500 Low-Power and Fast Full Adder by Exploring New XOR and XNOR Gates quantity ₹4,500 × Grievance Cell and Complaints Tracking System for Citizens ₹4,500 Grievance Cell and Complaints Tracking System for Citizens quantity ₹4,500 × Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework ₹4,500 Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework quantity ₹4,500 × Automated Phrase Mining from Massive Text Corpora ₹4,500 Automated Phrase Mining from Massive Text Corpora quantity ₹4,500 × SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays ₹4,500 SOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays quantity ₹4,500 × Low Power Address Generator for Memory Built-In Self Test ₹4,500 Low Power Address Generator for Memory Built-In Self Test quantity ₹4,500 × Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm ₹4,500 Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm quantity ₹4,500 × Network Intrusion Detection for IoT Security based on Learning Techniques ₹4,500 Network Intrusion Detection for IoT Security based on Learning Techniques quantity ₹4,500 × Relevance Feature Discovery for Text Mining ₹4,500 Relevance Feature Discovery for Text Mining quantity ₹4,500 × An 8T Low-Voltage and Low-Leakage Half-Selection Disturb-Free SRAM Using Bulk-CMOS and FinFETs ₹4,500 An 8T Low-Voltage and Low-Leakage Half-Selection Disturb-Free SRAM Using Bulk-CMOS and FinFETs quantity ₹4,500 × SIR: a secure and intelligent routing protocol for vehicular adhoc network ₹4,500 SIR: a secure and intelligent routing protocol for vehicular adhoc network quantity ₹4,500 × A Survey on Blood Vessel detection Methodologies in Retinal Images ₹4,500 A Survey on Blood Vessel detection Methodologies in Retinal Images quantity ₹4,500 × Pupil Dynamics for Iris Liveness Detection ₹3,500 Pupil Dynamics for Iris Liveness Detection quantity ₹3,500 × Application of Data Mining Techniques in Weather Prediction and Climate Change Studies ₹4,500 Application of Data Mining Techniques in Weather Prediction and Climate Change Studies quantity ₹4,500 × An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation ₹4,500 An Efficient VLSI Architecture for Data Encryption Standard and its FPGA Implementation quantity ₹4,500 × Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding ₹4,500 Combating Data Leakage Trojans in Commercial and ASIC Applications With Time-Division Multiplexing and Random Encoding quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹84,500 Total ₹84,500 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout