Product | Details | Total |
---|---|---|
![]() | Vulnerable Concealed Map-Reading Inside Mobile Ad Hoc Networks Rs4,500.00 Number of techniques has been used based on packet encryption to protect the data forwarding… | Rs4,500.00 |
![]() | Visual Role Mining A Picture Is Worth a Thousand Roles Rs2,500.00 ACCESS control is the process of mediating requests to data and services maintained by a… | Rs2,500.00 |
![]() | Zone Trust Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using SHT Rs2,500.00 Abstract—Due to the unattended nature of wireless sensor networks, an adversary can physically capture and… | Rs2,500.00 |
![]() | A Game-Theoretic Approach to the Formation of Clustered Overlay Networks Rs2,500.00 In many large-scale content sharing applications, participants or nodes are connected with each other based… | Rs2,500.00 |
Cart totals
Add a coupon
SubtotalRs12,000.00
9% CGSTRs1,080.00
9% SGSTRs1,080.00
Total
Rs14,160.00