Mambo, Masahiro, Eiji Okamoto, and Keisuke Usuda. Proxy Signatures for Delegating Signing Operation In
3rd ACM Conference on Computer and Communications Security. New Delhi, India: ACM Press New York, 1996.
Resolution 1077 (1996). Strasbourg: Council of Europe, 1996.
Walt, Stephen. Revolution and War. Ithaca, NY: Cornell University Press, 1996.
Barenblatt, G.I.. Scaling, Self Similarity and Intermediate Asymptotics In
Cambridge Texts in Applied Mathematics. Cambridge University Press, 1996.
Smith, Sean W.. Secure Coprocessing Applications and Research Issues In
Los Alamos Unclassified Release. Los Alamos: National Laboratory, 1996.
Pargov, Dragomir, Veselin Tselkov, Rusin Petrov, and Iliya Kraytchev. Security in Computer Systems In
Information Aspects of Security and Development of Modern Societies, Edited by
Velizar Shalamanov and
Todor Tagarev. Sofia, Bulgaria: AFSEA-Sofia, 1996.
S.Nwana, Hyacinth. "
Software agents: An overview."
Knowledge Engineering Review 11, no. 3 (1996): 205-224.
Buzan, Barry. "
Sovereignty." In
The Concise Oxford Dictionary of Politics, edited by
Iain McLean, 464. Oxford and New York: Oxford University Press, 1996.