[vc_row][vc_column] Add to wishlistCompareQuick viewA Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing0 out of 5 ₹4,500 Add to cartContinue Loading Done Add to wishlistCompareQuick viewFine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services0 out of 5 ₹4,500 Add to cartContinue Loading Done Add to wishlistCompareQuick viewA Tracking System With High Accuracy Using Location Prediction And Dynamic Threshold0 out of 5 ₹3,500 Add to cartContinue Loading Done Add to wishlistCompareQuick viewAn 8T Low-Voltage and Low-Leakage Half-Selection Disturb-Free SRAM Using Bulk-CMOS and FinFETs0 out of 5 ₹4,500 Add to cartContinue Loading Done Add to wishlistCompareQuick viewUser-Defined Privacy Grid System for Continuous Location-Based Services0 out of 5 ₹4,500 Add to cartContinue Loading Done Add to wishlistCompareQuick viewTowards Open-World Person Re-Identification by One-Shot Group-based Verification0 out of 5 ₹4,500 Add to cartContinue Loading Done Add to wishlistCompareQuick viewTopic Model for Graph Mining0 out of 5 ₹4,500 Add to cartContinue Loading Done Add to wishlistCompareQuick viewText Detection and Recognition in Imagery: A Survey0 out of 5 ₹4,500 Add to cartContinue Loading Done Add to wishlistCompareQuick viewA Time Ef?cient Approach for Detecting Errors in Big Sensor Data on Cloud0 out of 5 ₹4,500 Add to cartContinue Loading Done Add to wishlistCompareQuick viewA Survey on Blood Vessel detection Methodologies in Retinal Images0 out of 5 ₹4,500 Add to cartContinue Loading Done Add to wishlistCompareQuick viewSOLOR: Self-Optimizing WLANs with Legacy-Compatible Opportunistic Relays0 out of 5 ₹4,500 Add to cartContinue Loading Done Add to wishlistCompareQuick viewA Survey of Key Management for Secure Group Communication0 out of 5 ₹4,500 Add to cartContinue Loading Done [/vc_column][/vc_row]