Product | Details | Total |
---|---|---|
![]() | Swiper Exploiting Virtual Machine Vulnerability in Third-Party Rs3,000.00 Swiper: Exploiting Virtual Machine Vulnerability In Third-Party Clouds with Competition for I/O Resources. The… | Rs3,000.00 |
![]() | EDAL An Energy-Efficient Delay-Aware and Lifetime-Balancing Data Collection Protocol for Heterogeneous Wireless Sensor Networks Rs3,000.00 stems from our insight that recent research efforts on open vehicle routing (OVR) problems… | Rs3,000.00 |
![]() | Attribute Couplet Attacks and Privacy Preservation in Social Networks Rs3,500.00 The emerging of social networks, e.g., Facebook, Twitter, Instagram has eventually changed the way in… | Rs3,500.00 |
![]() | Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation Rs3,500.00 The advent of the cloud computing makes storage outsourcing become a rising trend, which promotes… | Rs3,500.00 |
Cart totals
Add a coupon
SubtotalRs13,000.00
9% CGSTRs1,170.00
9% SGSTRs1,170.00
Total
Rs15,340.00