Biblio

Export 8062 results:
1996
Primakov, Yevgeny. Primakov, Speech to the OSCE Permanent Council., 1996.
Jaynes, E.T.. Probability Theory: The Logic of Science. Cambridge, MA: Cambridge Univ. Press, 1996.
Linz, Juan J., and Alfred Stepan. Problems of Democratic Transition and Consolidation: Southern Europe, South America and Post-Communist Europe. Baltimore & London, The Johns Hopkins University Press, 1996.
Shalamanov, Velizar. Problems of Information Security and Life Cycle Support of the Information Environment In 1996 AFCEA Sofia Seminar. Sofia: AFCEA-Sofia, 1996.
Shalamanov, Velizar. "Problems of security and maintenance of life cycle of information systems." Military Journal 58, no. 6 (1996): 83-90.
Program statement of the Government of the Czech Republic., 1996.
Braudaway, Gordon W., Karen A. Magerlein, and Frederick C. Mintzer. Protecting Publicly-Available Images with a Visible Image Watermark In SPIE International Conference on Electronic Imaging, Science and Technology: Optical Security and Counterfeit Deterrence Techniques. San Jose, CA, 1996.
Mambo, Masahiro, Eiji Okamoto, and Keisuke Usuda. "Proxy Signatures: Delegation of the Power to Sign Messages." IEICE Transactions on Fundamentals (1996): 1338-1354.
Mambo, Masahiro, Eiji Okamoto, and Keisuke Usuda. Proxy Signatures for Delegating Signing Operation In 3rd ACM Conference on Computer and Communications Security. New Delhi, India: ACM Press New York, 1996.
Shanahan, William O.. Prussian Military Reforms 1786-1813 . New York: AMS Press, Inc, 1996.
van Rensburg, A., and Sebastiaan H. von Solms. A Reference Framework for Certification Authorities/Trusted Third Parties In 13th IFIP International Information Security Conference., 1996.
Resolution 1077 (1996). Strasbourg: Council of Europe, 1996.
Walt, Stephen. Revolution and War. Ithaca, NY: Cornell University Press, 1996.
Smith, Martin. On Rocky Foundations: NATO, the UN and Peace Operations in the Post Cold War Era. Bradford, Bradford University, 1996.
Barenblatt, G.I.. Scaling, Self Similarity and Intermediate Asymptotics In Cambridge Texts in Applied Mathematics. Cambridge University Press, 1996.
Smith, Sean W.. Secure Coprocessing Applications and Research Issues In Los Alamos Unclassified Release. Los Alamos: National Laboratory, 1996.
Pargov, Dragomir, Veselin Tselkov, Rusin Petrov, and Iliya Kraytchev. Security in Computer Systems In AFSEA-Sofia Information Aspects of Security and Development of Modern Societies, Edited by Velizar Shalamanov and Todor Tagarev. Sofia:, 1996.
Pargov, Dragomir, Veselin Tselkov, Rusin Petrov, and Iliya Kraytchev. Security in Computer Systems In Information Aspects of Security and Development of Modern Societies, Edited by Velizar Shalamanov and Todor Tagarev. Sofia, Bulgaria: AFSEA-Sofia, 1996.
Farmer, Dan. "Shall We Dust Moscow." Security Survey of Key Internet Hosts & Various Semi-Relevant Reflections (1996).
Wang, Shiuh-Jeng, and Jin-Fu Chang. "Smart Card Based Secure Password Authentication Scheme." Computers & Security 15, no. 3 (1996): 231-237.
Tagarev, Todor, Petya Ivanova, and Alfredo Moscardini. Soft - Computing Methods for Early Warning of Violent Conflicts In 1996 AFCEA-Europe Sofia Seminar. Sofia, Bulgaria, 1996.
S.Nwana, Hyacinth. "Software agents: An overview." Knowledge Engineering Review 11, no. 3 (1996): 205-224.
Goldreich, Oded, and Rafail Ostrovsky. "Software Protection and Simulation on Oblivious RAMs." Journal of the ACM 43, no. 3 (1996): 431-473.
Buzan, Barry. "Sovereignty." In The Concise Oxford Dictionary of Politics, edited by Iain McLean, 464. Oxford and New York: Oxford University Press, 1996.
A.O., Freier, Karlton P., and Kocher P.C.. SSL Protocol Version 3.0 Internet Draft. IETF, 1996.

Страници