“A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing” has been added to your cart. Continue shopping Cart Summary Remove item Thumbnail image Product Price Quantity Subtotal Use GET20OFF coupon code to get 20% off on minimum order above $100GET20OFF × SIR: a secure and intelligent routing protocol for vehicular adhoc network ₹4,500 SIR: a secure and intelligent routing protocol for vehicular adhoc network quantity ₹13,500 × A Low-Power High-Speed Accuracy-Controllable Approximate Multiplier Design ₹4,500 A Low-Power High-Speed Accuracy-Controllable Approximate Multiplier Design quantity ₹4,500 × Design Space?Time Trellis-Coded Intercarrier Interference Parallel Cancelation Architectures for OFDM Systems ₹4,500 Design Space?Time Trellis-Coded Intercarrier Interference Parallel Cancelation Architectures for OFDM Systems quantity ₹9,000 × Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation ₹4,500 Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation quantity ₹4,500 × An Energy-Ef?cient Mobile-Sink Path Selection Strategy for Wireless Sensor Networks ₹4,500 An Energy-Ef?cient Mobile-Sink Path Selection Strategy for Wireless Sensor Networks quantity ₹4,500 × Pupil Dynamics for Iris Liveness Detection ₹3,500 Pupil Dynamics for Iris Liveness Detection quantity ₹3,500 × An 8T Low-Voltage and Low-Leakage Half-Selection Disturb-Free SRAM Using Bulk-CMOS and FinFETs ₹4,500 An 8T Low-Voltage and Low-Leakage Half-Selection Disturb-Free SRAM Using Bulk-CMOS and FinFETs quantity ₹4,500 × Generating Correlated Digital Certificates: Framework and Applications ₹5,500 Generating Correlated Digital Certificates: Framework and Applications quantity ₹5,500 × A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing ₹4,500 A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing quantity ₹9,000 × Text Detection and Recognition in Imagery: A Survey ₹4,500 Text Detection and Recognition in Imagery: A Survey quantity ₹4,500 × Network Intrusion Detection for IoT Security based on Learning Techniques ₹4,500 Network Intrusion Detection for IoT Security based on Learning Techniques quantity ₹4,500 × Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services ₹4,500 Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services quantity ₹4,500 × Dynamic Spectrum Allocation for the Downlink of OFDMA-Based Hybrid-Access Cognitive Femtocell Networks ₹5,500 Dynamic Spectrum Allocation for the Downlink of OFDMA-Based Hybrid-Access Cognitive Femtocell Networks quantity ₹5,500 × Unified Opportunistic Scheduling for Layered Multicast over Cognitive Radio Networks ₹5,500 Unified Opportunistic Scheduling for Layered Multicast over Cognitive Radio Networks quantity ₹5,500 × User-Defined Privacy Grid System for Continuous Location-Based Services ₹4,500 User-Defined Privacy Grid System for Continuous Location-Based Services quantity ₹4,500 × DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments ₹4,500 DDoS Attack Detection using Machine Learning Techniques in Cloud Computing Environments quantity ₹4,500 × Relevance Feature Discovery for Text Mining ₹4,500 Relevance Feature Discovery for Text Mining quantity ₹4,500 × A Key-Policy Attribute-Based Temporary Keyword Search Scheme for Secure Cloud Storage ₹4,500 A Key-Policy Attribute-Based Temporary Keyword Search Scheme for Secure Cloud Storage quantity ₹4,500 Coupon: Apply coupon Update cart Cart totals Subtotal ₹101,000 Total ₹101,000 Proceed to checkout Visa CardMasterCardAmerican ExpressDiscover CardPayPalApple PayGuaranteed Safe And Secure Checkout