Biblio

Export 21404 results:
2004
Avizienis, Algirdas, Jean-Claude Laprie, Brian Randell, and Carl E. Landwehr. "Basic Concepts and Taxonomy of Dependable and Secure Computing." IEEE Transactions on Dependable and Secure Computin 1, no. 1 (2004): 11-33.
Gennaro, Rosario, Darren Leigh, Ravi Sundaram, and William Yerazunis. "Batching Schnorr Identification Scheme with Applications to Privacy- Preserving Authorization and Low-Band width Communication Devices." Advances in Cryptology – ASIACRYPT 2004, Lecture Notes in Computer Sciences 3329 (2004).
Satloff, Robert. The Battle of Ideas in the War on Terror: Essays on US Public Diplomacy in the Middle East. Washington, DC: Washington Institute for Near East Policy, 2004.
Cronin, Audrey Kurth. "Behind the Curve: Globalization and International Terrorism." In Defeating Terrorism–Shaping the New Security Environment . New York: McGraw-Hill/Dushkin, 2004.
Beirut Wants ‘Terrorism’ Defined. AlJazeera, 2004.
Ristic, B., and P. Smets. Belief function theory on the continuous space with an application to model based classification. Italy: IPMU 2004, 2004.
Tavlas, George S.. "Benefits and Costs of Entering the Eurozone." Cato Journal 24 (2004): 89-106.
Lutterbeck, Derek. "Between Police and Military: The New Security Agenda and the Rise of Gendarmeries." Cooperation and Conflict 39, no. 1 (2004): 45-68.
Lutterbeck, Derek. "Between the Police and Military: The New Security Agenda and the Rise of the Gendarmeries." Cooperation and Conflict 39, no. 1 (2004): 45-68.
Ortega, Martin. "Beyond Petersberg: Missions for the EU Military Forces." In EU Security and Defence Policy: The First Five Years (1999-2004), 82. Paris: EU Institute for Security Studies, 2004.
Jain, A. K., S. Pankanti, S. Prabhakar, L. Hong, and A. Ross. "Biometrics: A Grand Challenge." In Proceedings of the International Conference on Pattern Recognition, 935-942. Vol. 2., 2004.
Council, National Research. Biotechnology Research in an Age of Terrorism. Washington, DC: National Academies Press, 2004.
Asmus, Ronald, and Bruce Jackson. "The Black Sea and the Frontiers of Freedom." Policy Review (2004).
Asmus, Ronald D., and Bruce P. Jackson. The Black Sea and the Frontiers of Freedom In Policy Review. Vol. 125., 2004.
BlackSeaFor Agreement., 2004.
Ahlers, Mike M.. Blueprints for Terrorists., 2004.
Taran, Tatyana A., and Volodymyr N. Shemayev. "Boolean Reflexive Control Models and Their Application to Describe the Information Struggle in Socio-Economic Systems." Automation and Remote Control 65, no. 11 (2004).
Wasem, Ruth Ellen. Border Security: Inspections Practices, Policies, and Issues. Washington, D.C.: Congressional Research Service, Library of Congress, 2004.
Cooper, Robert. The Breaking of Nations: Order and Chaos in the 21st Century. London: Grove Press, 2004.
Mintz, John, and Kamran Khan. "Britain Charges 8 in Alleged Terror Plot." The Washington Post (2004).
Tu, Shu-Fen, and Ching-Sheng Hsu. "A BTC-Based Watermarking Scheme for Digital Images." Information & Security: An International Journal 15, no. 2 (2004): 216-228.
Realuyo, Celina. "Building a Counterterrorist Finance Regime." US Department of State Bureau of International Information Programs, E-Journal USA Economic Perspectives, No. 3 ( 9, no. 3 (2004): 10-13.
On Building of Information Society in the Republic of Moldova In President of the Republic of Moldova Decree., 2004.
Lyutzkanov, Emil. "Bulgaria in NATO:New Roles and Capabilities of the Navy." Information & Security: An International Journal 13 (2004): 9-24.
Tagarev, Todor. "Bulgaria: Integrated Defence Resource Management." In Security-Sector Reform and Transparency Building. Needs and Options for Ukraine and Moldova, 39-47. Groningen, The Netherlands: Centre for European Security Studies, 2004.

Pages