Product | Details | Total |
---|---|---|
![]() | Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data Rs3,000.00 Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data. Access control mechanisms protect sensitive information from… | Rs3,000.00 |
![]() | Transformer-Based Attention Network for In-Vehicle Intrusion Detection Previous price: Save Rs1,000.00 Despite the significant advantages of communication systems between electronic control units, the controller area network… | Rs5,500.00 |
![]() | Secured Trust A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems Rs2,500.00 Security and privacy issues have become critically important with the fast expansion of multiagent systems… | Rs2,500.00 |
![]() | Towards Online Shortest Path Computation Previous price: Save Rs100.00 Towards Online Shortest Path Computation. The online shortest path problem aims at computing the shortest… | Rs2,900.00 |
![]() | Automatic Change Analysis in Satellite Images Using Binary Descriptors and Lloyd–Max Quantization Rs3,500.00 The classic signal quantization problem was introduced by Lloyd. We formulate another, similar problem: The… | Rs3,500.00 |
![]() | Panda Public Auditing for Shared Data with Efficient User Revocation in the Cloud Rs3,000.00 Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud. With data… | Rs3,000.00 |
Cart totals
Add a coupon
SubtotalRs20,400.00
9% CGSTRs1,836.00
9% SGSTRs1,836.00
Total
Rs24,072.00