Jackson, Janet, and Janet Herbrink. Profiling Organised Crime: The Current State of the Art In 
Report NSCR. Leiden: Netherlands Institute for the Study of Criminality and Law Enforcement (NISCALE), 1996.
 Mambo, Masahiro, Eiji Okamoto, and Keisuke Usuda. Proxy Signatures for Delegating Signing Operation In 
3rd ACM Conference on Computer and Communications Security. New Delhi, India: ACM Press New York, 1996.
 Resolution 1077 (1996). Strasbourg: Council of Europe, 1996.
 Walt, Stephen. Revolution and War. Ithaca, NY: Cornell University Press, 1996.
 Mazen, Abu. The Road to Oslo. Institute Blizhneva Vostoka, 1996.
 Barenblatt, G.I.. Scaling, Self Similarity and Intermediate Asymptotics In 
Cambridge Texts in Applied Mathematics. Cambridge University Press, 1996.
 Smith, Sean W.. Secure Coprocessing Applications and Research Issues In 
Los Alamos Unclassified Release. Los Alamos: National Laboratory, 1996.
 Pargov, Dragomir, Veselin Tselkov, Rusin Petrov, and Iliya Kraytchev. Security in Computer Systems In 
Information Aspects of Security and Development of Modern Societies, Edited by 
Velizar Shalamanov and 
Todor Tagarev. Sofia, Bulgaria: AFSEA-Sofia, 1996.
 Wiberg, Hakan. "
Security Problems of Small Nations." In 
Small States and the Security in the New Europe. London: Brassey’s, 1996.