Pan, Jen-Yi, Tzer-Long Chen, and Tzer-Shyong Chen. A Novel Key Management and Access Control Scheme for Mobile Agent In
Computational Intelligence. ICIC 2006. Lecture Notes in Computer Science. Vol. 4114. Berlin, Heidelberg: Springer, 2006.
Moore, James W.. "
Nuclear Terrorism: Exaggerating the Threat?"
The Journal of Conflict Studies 26, no. 1 (2006): 121-142.
One Man Can. South Africa: Sonke Gender Justice Network, 2006.
Yamazaki, Mayuka. Origin, Developments and Prospects for the Proliferation Security Initiative. Institute for the Study of Diplomacy, Edmund A. Walsh School of Foreign Service, Georgetown University, 2006.
Parliamentary Oversight of Intelligence Services In
DCAF Backgrounder. Geneva: Geneva Centre for the Democratic Control of Armed Forces, 2006.