Biblio

Export 21386 results:
2004
Stern, Eric K., and Dan Hansén. Crisis Management in a Transitional Society: the Latvian Experience. Elanders Gotab AB: Vällingby, 2004.
Lewis, Bernard. The Crisis of Islam . New York: Random House, 2004.
Yalowitz, Kenneth, and Svante E. Cornell. "The Critical but Perilous Caucasus." Orbis 48, no. 1 (2004): 105-16.
Chang, Ting-Yi, Min-Shiang Hwang, and Wei-Pang Yang. "Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System Without Using A One-Way Hash Function." Information & Security: An International Journal 15, no. 1 (2004): 110-114.
Ambainis, Andris, Markus Jakobsson, and Helger Lipmaa. Cryptographic Randomized Response Techniques In Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Edited by Feng Bao, Robert H. Deng and Jianying Zhou. Singapore: Computer Science 2947, 2004.
Cryptographic Randomized Response Techniques In Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography. Singapore: Computer Science 2947, 2004.
Backes, Michael. "A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol." In Computer Security – ESORICS 2004. Berlin, Germany, 2004.
Borgomano-Loup, Laure. "A Cultural Approach to the Southern Mediterranean Crisis." Connections: The Quarterly Journal 3, no. 2 (2004): 93-98.
Ratner, Carl. "A Cultural Critique of Psychological Explanations of Terrorism." Cross-Cultural Psychology Bulletin 38 (2004).
Milanovic, Nikola, and Miroslaw Malek. "Current Solutions for Web Service Composition." IEEE Internet Computing 8, no. 6 (2004): 51-59.
San Wang, Wen-. Current Status & Future Perspective of PKI Development in Taiwan In paper presented at the International Conference of Collaboration of e-Commerce Applications and Security. Taipei, Taiwan, 2004.
Metzger, Stephen. "Current Trends in Tactical Naval Communications." Information & Security: An International Journal 13 (2004): 126-131.
Hinnen, Todd M.. "The Cyber-Front in the War on Terrorism: Curbing Terrorist Use of the Internet." Columbia Science and Technology Law Review 5 (2004).
Hébert, Jean-Paul. "D’Une Production Commune à Une Production Unique? La coopération Européenne en Matière de Production d’Armement Comme Moyen de Renforcement de l’Autonomie Stratégique Européenne." In Historie de la Coopération Européenne dans L’Armement, 200-17. Paris: CNRS Éditions, 2004.
Seifert, Jeffrey W.. Data Mining: An Overview. Washington, DC: Congressional Research Service, 2004.
Lieshout, Robert, Mathieu Segers, and Anna Vleuten. "De Gaulle, Moravcsik, and The Choice for Europe: Soft Sources, Weak Evidence." Journal of Cold War Studies 6, no. 4 (2004): 89-139.
Levi, Jean-Daniel, and Hughes Verdier. De L’Arsenal à L’Entreprise. Paris: Albin Michel, 2004.
Ulvila, Jacob W., and John E. Gaffney, Jr. "A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems." Decision Analysis 1, no. 1 (2004): 35-50.
Orfila, Agustin, Javier Carbo, and Arturo Ribagorda. "Decision Model Analysis for Spam." Information & Security: An International Journal 15, no. 2 (2004): 151-161.
Decision no. 1489 of 9 September 2004 on the organisation and functioning of the National Committee for Emergency Situations., 2004.
Decision no. 1490 of 9 September 2004 on the GIES., 2004.
Decision no. 1491 of 9 September 2004 approving the Framework Regulation on the organisation, competence, functioning and endowment committees and operational centres for emergency situations., 2004.
Decision no. 1492 of 9 September 2004 concerning the organisation, functioning and responsibilities of the professional emergency services. Vol. replacing Government Ordinance no. 88/2001., 2004.
"Decreto." Diario Oficial de la Federacion (2004).
Defence and Security Sector Governance and Reform in South East Europe Self-Assessment Studies: Regional Perspectives. Baden-Baden: Nomos, 2004.

Pages