Biblio

Export 8060 results:
1999
Sun, Hung-Min, and B.-T. Hsieh. Remark on Two Nonrepudiable Proxy Signature Schemes(link is external) In 9th National Conference on Information Security. Taiwan, 1999.
Remarks by the President at the Close of the Washington Summit. USIS Washington File, 1999.
Tan, Kaijun, and Hongwen Zhu. "Remote Password Authentication Scheme Based on Cross-Product." Computer Communications 22, no. 4 (1999): 390-393.
Gross, David. Report from the Fidelity Implementation Study Group(link is external) In Spring Simulation Interoperability Workshop., 1999.
Carlsson, Ingvar, Han Sung-Joo, and M. Kupolati. Report of the Independent Inquiry into United Nations Actions during the 1994 Rwanda Genocide(link is external)., 1999.
Franke, Volker C.. "Resolving Identity Tensions: The Case of the Peacekeeper(link is external)." Journal of Conflict Studies (1999).
Franke, Volker C.. "Resolving Identity Tensions: The Case of the Peacekeeper(link is external)." Journal of Conflict Studies 19 (1999).
Sapolsky, Harvey, and Eugene Gholz. "Restructuring the U.S. Defense Industry." International Security 24, no. 3 (1999): 5.
Van Creveld, Martin. The Rise and Decline of the State. Cambridge: Cambridge University Press, 1999.
Dyson, Kenneth, and Kevin Featherstone. The Road to Maastricht: Negotiating Economic and Monetary Union(link is external). Oxford: Oxford University Press, 1999.
Lakov, Dimitar, and Georgi Kirov. Routing of Computer Nets via Fuzzy Logic(link is external) In Youth Science Session, Sofia, Bulgaria., 1999.
Pavliatenko, Viktor N.. "Russian Security in the Pacific Asian Region. The Dangers of Isolation(link is external)." In Russia and East Asia. The 21st Century Security Environment, edited by Gilbert Rozman, Mikhail G. Nosov and Koji Watanabe, 20. New York: M. E. Sharpe, East West Institute, 1999.
Belokrenitsky, Vyacheslav. "Russian–Afghan Relations(link is external)." In Russia and Asia: The Emerging Security Agenda, 205. Stockholm: Stockholm International Peace Research Institute, 1999.
Bertrand, Gilles, Anna Michalski, and Lucio R. Pench. Scenarios Europe 2010 (link is external). EU Commission, 1999.
Scenarios Europe 2010 – Five Possible Futures For Europe(link is external). Brussels: European Commission, Forward Studies Unit, 1999.
Zhou, Jianying, and Kwok-Yan Lam. "Securing Digital Signatures for Non-Repudiation(link is external)." Computer Communications 22, no. 8 (1999): 710-716.
Vukadinovic, Radovan. Security in the southeast of Europe [Sigurnost na jugoistoku Europe]. Zagreb: HUMS, 1999.
Jorge, P., J.G. Silva, and L.M. Silva. "Security mechanisms for using mobile agents in electronic commerce." 18th IEEE symposium on Reliable Distributed Systems (1999): 378-383.
Lee, Narn-Yih, and Tzonelih Hwang. "On the Security of Fair Blind Signature Scheme Using Oblivious Transfer(link is external)." Computer Communications 22, no. 3 (1999): 287-290.
Barnett, Thomas P. M.. The Seven Deadly Sins of Network-Centric Warfare(link is external). U.S. Naval Institute , 1999.
Tursunov, Bakhrom, and Marina Pikulina. Severe Lessons of Batken In Conflict Studies Research Centre. Defence Academy of the United Kingdom, 1999.
Gigerenzer, Gerd, and Peter M. Todd. Simple Heuristics that Make Us Smart(link is external). New York: Oxford University Press, 1999.
Coakley, John. "Society and Political Culture." In Politics in the Republic of Ireland, 63. London: Routledge, 1999.
Maamar, Z., B. Moulin, and Y. Bédard. "Software agent-oriented frameworks for the interoperability of georeferenced digital libraries on the World Wide Web: The SIGAL project." In Interoperating Geographic Information Systems, 335-354. Boston: Kluwer Academic Publishers, 1999.
Standards for Internal Control in the Federal Government. Washington, D.C.: GAO, U. S. Government Accountability Office, 1999.

Страници