Skip to:
Search Results
|
Bottom
|
Search Facets
|
Content
Log In
|
My Account
|
My Lists
|
Send a Request
|
Select Language
English
Türkçe
|
|
Remember to clear the cache and close the browser window.
Search Limit
Everything
Ferit Melen Library
Ilahiyat Library
IIBF Library
Rooms Restriction Values
All Fields
Title
Author
Subject
ISBN
15
Search Field
All Fields
Target Value
Limit Value
Restriction Value
Search For:
Advanced Search
Limit Search Results
Author
Include
Exclude
SpringerLink (Online service)
(4)
Jia, Xiaohua. editor.
(3)
Cao, Jiannong. editor.
(1)
Das, Sajal K. editor.
(1)
He, Yanxiang. editor.
(1)
Jia, Xiaohua. author.
(1)
Liang, Weifa. editor.
(1)
Liu, Xue. editor.
(1)
Ren, Kui. editor.
(1)
Stojmenovic, Ivan. editor.
(1)
Wu, Jie. editor.
(1)
XING, KAI. editor.
(1)
Xu, Ming. editor.
(1)
Yang, Kan. author.
(1)
More
View All
Fewer
Collapse All
Language
Include
Exclude
English
(4)
Publication Date
Include
Exclude
-
2005
(1)
2006
(1)
2013
(1)
2014
(1)
Subject
Include
Exclude
Algorithms.
(3)
Application software.
(3)
Computer Communication Networks.
(3)
Computer and Information Systems Applications.
(3)
Computer networks .
(3)
Cryptography.
(3)
Cryptology.
(3)
Data encryption (Computer science).
(3)
Communications Engineering, Networks.
(2)
Electronic data processing-Management.
(2)
IT Operations.
(2)
Telecommunication.
(2)
Computer science.
(1)
Data and Information Security.
(1)
Data protection.
(1)
Electronic digital computers-Evaluation.
(1)
System Performance and Evaluation.
(1)
More
View All
Fewer
Collapse All
Material Type
Include
Exclude
E-Book
Shelf Location
Include
Exclude
Springer E-Book Collection
Library
Include
Exclude
Ferit Melen Library
false
{sortLabel}
{alphabetical}
{relevance}
{include}
{exclude}
{facetName}
{results}
{displayName}
{count}
{error}
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
4 Results Found
1
Sort By:
Relevance (Default)
Publication Date (Ascending)
Publication Date (Descending)
Title
Author
0000
DEFAULT
Select a list
Temporary List
Make this your default list.
The following items were successfully added.
There was an error while adding the following items. Please try again.
One or more items could not be added because you are not logged in.
1.
Mobile Ad-hoc and Sensor Networks First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings
Mobile Ad-hoc and Sensor Networks First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings
by
Jia, Xiaohua. editor.
https://doi.org/10.1007/11599463
Format:
Excerpt:
13-15, 2005, Proceedings / Jia, Xiaohua. editor.
Marc View
SD_ILS:171466
2.
Security for Cloud Storage Systems
Security for Cloud Storage Systems
by
Yang, Kan. author.
https://doi.org/10.1007/978-1-4614-7873-7
Format:
Excerpt:
Jia, Xiaohua. author.
Marc View
SD_ILS:156774
3.
Wireless Algorithms, Systems, and Applications 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings
Wireless Algorithms, Systems, and Applications 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10,2013, Proceedings
by
Ren, Kui. editor.
https://doi.org/10.1007/978-3-642-39701-1
Format:
Excerpt:
Jia, Xiaohua. editor.
Marc View
SD_ILS:135701
4.
Mobile Ad-hoc and Sensor Networks Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings
Mobile Ad-hoc and Sensor Networks Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings
by
Cao, Jiannong. editor.
https://doi.org/10.1007/11943952
Format:
Excerpt:
Jia, Xiaohua. editor.
Marc View
SD_ILS:170638
Select an Action
Place Hold(s)
Add to My Lists
Email
Print
1
Go to:
Search Results
|
Search Facets
|
Top of Page