Biblio

Export 21423 results:
Filters: Filter is   [Clear All Filters]
1996
Primakov, Yevgeny. Primakov, Speech to the OSCE Permanent Council., 1996.
Jaynes, E.T.. Probability Theory: The Logic of Science(link is external). Cambridge, MA: Cambridge Univ. Press, 1996.
Linz, Juan J., and Alfred Stepan. Problems of Democratic Transition and Consolidation: Southern Europe, South America and Post-Communist Europe(link is external). Baltimore & London, The Johns Hopkins University Press, 1996.
Shalamanov, Velizar. Problems of Information Security and Life Cycle Support of the Information Environment(link is external) In 1996 AFCEA Sofia Seminar. Sofia: AFCEA-Sofia, 1996.
Shalamanov, Velizar. "Problems of security and maintenance of life cycle of information systems(link is external)." Military Journal 58, no. 6 (1996): 83-90.
Jackson, Janet, and Janet Herbrink. Profiling Organised Crime: The Current State of the Art In Report NSCR. Leiden: Netherlands Institute for the Study of Criminality and Law Enforcement (NISCALE), 1996.
Program statement of the Government of the Czech Republic., 1996.
Braudaway, Gordon W., Karen A. Magerlein, and Frederick C. Mintzer. Protecting Publicly-Available Images with a Visible Image Watermark(link is external) In SPIE International Conference on Electronic Imaging, Science and Technology: Optical Security and Counterfeit Deterrence Techniques. San Jose, CA, 1996.
Mambo, Masahiro, Eiji Okamoto, and Keisuke Usuda. "Proxy Signatures: Delegation of the Power to Sign Messages(link is external)." IEICE Transactions on Fundamentals (1996): 1338-1354.
Mambo, Masahiro, Eiji Okamoto, and Keisuke Usuda. Proxy Signatures for Delegating Signing Operation(link is external) In 3rd ACM Conference on Computer and Communications Security. New Delhi, India: ACM Press New York, 1996.
Shanahan, William O.. Prussian Military Reforms 1786-1813 (link is external). New York: AMS Press, Inc, 1996.
van Rensburg, A., and Sebastiaan H. von Solms. A Reference Framework for Certification Authorities/Trusted Third Parties(link is external) In 13th IFIP International Information Security Conference., 1996.
Resolution 1077 (1996)(link is external). Strasbourg: Council of Europe, 1996.
Walt, Stephen. Revolution and War. Ithaca, NY: Cornell University Press, 1996.
Mazen, Abu. The Road to Oslo. Institute Blizhneva Vostoka, 1996.
Smith, Martin. On Rocky Foundations: NATO, the UN and Peace Operations in the Post Cold War Era(link is external). Bradford, Bradford University, 1996.
Barenblatt, G.I.. Scaling, Self Similarity and Intermediate Asymptotics(link is external) In Cambridge Texts in Applied Mathematics. Cambridge University Press, 1996.
Smith, Sean W.. Secure Coprocessing Applications and Research Issues In Los Alamos Unclassified Release. Los Alamos: National Laboratory, 1996.
Pargov, Dragomir, Veselin Tselkov, Rusin Petrov, and Iliya Kraytchev. Security in Computer Systems(link is external) In Information Aspects of Security and Development of Modern Societies, Edited by Velizar Shalamanov and Todor Tagarev. Sofia, Bulgaria: AFSEA-Sofia, 1996.
Pargov, Dragomir, Veselin Tselkov, Rusin Petrov, and Iliya Kraytchev. Security in Computer Systems(link is external) In AFSEA-Sofia Information Aspects of Security and Development of Modern Societies, Edited by Velizar Shalamanov and Todor Tagarev. Sofia:, 1996.
Wiberg, Hakan. "Security Problems of Small Nations." In Small States and the Security in the New Europe. London: Brassey’s, 1996.
Farmer, Dan. "Shall We Dust Moscow(link is external)." Security Survey of Key Internet Hosts & Various Semi-Relevant Reflections (1996).
H., Ullman, and Wade J.. Shock and Awe: Achieving Rapid Dominance. ACT, NDU, 1996.
Wang, Shiuh-Jeng, and Jin-Fu Chang. "Smart Card Based Secure Password Authentication Scheme." Computers & Security 15, no. 3 (1996): 231-237.
Tagarev, Todor, Petya Ivanova, and Alfredo Moscardini. Soft - Computing Methods for Early Warning of Violent Conflicts(link is external) In 1996 AFCEA-Europe Sofia Seminar. Sofia, Bulgaria, 1996.

Pages