Product | Details | Total |
---|---|---|
![]() | Low Cost High Performance VLSI Architecture for Montgomery Modular Multiplication Rs3,500.00 The digital architecture is mainly used in all type of real world application architectures and… | Rs3,500.00 |
![]() | QoS Oriented Mode,Spectrum,and Power Allocation for D2D Communication Under laying LTE A Network Rs4,500.00 In this Proposed work, the problem of resource al location for device-to-device (D2D) communication in… | Rs4,500.00 |
![]() | GIVE 2 GET FORWARDING IN SOCIAL MOBILE WIRELESS N/W OF SELFISH NODES Rs2,500.00 In this paper, we present two forwarding protocols for mobile wireless networks of selfish individuals… | Rs2,500.00 |
![]() | Run-Time Defense against Code Injection Attacks using Replicated Execution Rs2,500.00 The number and complexity of attacks on computer systems are increasing. This growth necessitates proper… | Rs2,500.00 |
![]() | Detecting Malicious Facebook Applications JAVA Rs4,500.00 With 20 million installs a day[1],third-party apps are a major Reason for the popularity… | Rs4,500.00 |
Cart totals
Add a coupon
SubtotalRs17,500.00
9% CGSTRs1,575.00
9% SGSTRs1,575.00
Total
Rs20,650.00