Showing
1 - 4
results of
4
for search '
Jia, Xiaohua
'
Skip to content
Language
English
Русский
123
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced
Author
Jia, Xiaohua
Xiaohua Jia
Showing
1 - 4
results of
4
for search '
Jia, Xiaohua
'
, query time: 0.02s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Security for Cloud Storage Systems
by
Yang, Kan
,
Jia
,
Xiaohua
Published in
Springer eBooks
(2014)
Call Number:
Loading...
Located:
Loading...
Get full text
Перейти в каталог НБ ТГУ
eBook
2
Mobile Ad-hoc and Sensor Networks (vol. # 3794) First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings
by
He, Yanxiang
Published in
Springer e-books
(2005)
Other Authors:
“
...
Jia
,
Xiaohua
...
”
Call Number:
Loading...
Located:
Loading...
Get full text
Перейти в каталог НБ ТГУ
eBook
3
Mobile Ad-hoc and Sensor Networks (vol. # 4325) Second International Conference, MSN 2006, Hong Kong, China, December 13-15, 2006, Proceedings
by
Cao, Jiannong
Published in
Springer e-books
(2006)
Other Authors:
“
...
Jia
,
Xiaohua
...
”
Call Number:
Loading...
Located:
Loading...
Get full text
Перейти в каталог НБ ТГУ
eBook
4
Wireless Algorithms, Systems, and Applications 8th International Conference, WASA 2013, Zhangjiajie, China, August 7-10, 2013. Proceedings /
Published in
Springer eBooks
(2013)
Other Authors:
“
...
Jia
,
Xiaohua
...
”
Call Number:
Loading...
Located:
Loading...
Get full text
Перейти в каталог НБ ТГУ
eBook
Search Tools:
Get RSS Feed
Related Subjects
Computer Science
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Computer software
Data Encryption
Data encryption (Computer science)
Communications Engineering, Networks
Information Systems Applications (incl.Internet)
Information systems
Management of Computing and Information Systems
Telecommunication
Computer Science, general
Computer system performance
Data protection
Information Systems
Information Systems Applications (incl. Internet)
System Performance and Evaluation
Systems and Data Security
Loading...