Biblio

Export 21372 results:
2004
McGeary, Johanna. "The Scandal’s Growing Stain." Time (2004).
Sherstyuk, Vladimir P.. Scientific and Methodological Problems of Information Security . Moscow: Information Security Institute of Moscow State University, 2004.
Liaw, Horng-Twu. "A Secure Electronic Voting Protocol for General Elections." Computers and Security 23, no. 2 (2004): 107-119.
Surendro, Kridanto, and Setiyo Cahyono. "Secure e-Mail Application Software for Government in Indonesia." Information & Security: An International Journal 15, no. 2 (2004): 135-150.
Tahir, Muhammad Nabeel. "A Secure Online Medical Information System in Distributed and Heterogeneous Computing Environment." Information & Security: An International Journal 15 (2004): 211-215.
Canada, Government of. Securing an Open Society: Canada’s National Security Strategy., 2004.
Awasthi, Amit Kumar, and Sunder Lal. Security Analysis of a Dynamic I-Based Remote User Authentication Scheme., 2004.
Forsberg, Tuomas. "Security and Defense Policy in the New European Constitution: A Critical Assessment." Connections: The Quarterly Journal 3, no. 3 (2004): 13-27.
Aradau, Claudia. "Security and the democratic scene: desecuritization and emancipation." Journal of International Relations and Development 7, no. 4 (2004): 388-413.
Huasheng, Zhao. Security Building in Central Asia and the Shanghai Cooperation Organization. Slavic Research Center, 2004.
Barstow, David. "Security Firm Says Its Workers Were Lured Into Iraqi Ambush." New York Times (2004).
Chandler, Jennifer A.. "Security in Cyberspace: Combating Distributed Denial of Service Attacks." University of Ottawa Law & Technology Journal (2004): 231-261.
Donnelly, Christopher. "Security in the 21st Century: New Challenges and New Responses." In NATO and New International Relations, 24-26. Zagreb: Atlantic Council of Croatia & Political Culture Publishing and Research Institute, 2004.
Hsu, Chien-Lung. "Security of Chien et al.’s Remote User Authentication Scheme Using Smart Cards." Computer Standards and Interfaces 26, no. 3 (2004): 167-169.
Luciani, Giacomo. "Security of Supply for Natural Gas Markets." In NDES Working Paper No. 2. Center for European Policy Studies, 2004.
Caparini, Marina. "Security Sector Reconstruction: Western Balkans." In Reform and Reconstruction of the Security Sector, 167-68. Münster: LIT Verlag/DCAF, 2004.
Edmunds, Timothy. "Security Sector Reform: Concepts and Implementation." In Sourcebook on Security Sector Reform, 50. Belgrade: Goragraf, Geneva Centre for the Democratic Control of Armed Forces, Centre for Civil-Military Relations, Belgrade, 2004.
"Selected Non-State Armed Groups." The Military Balance 104, no. 1 (2004): 363-64.
Peter, B.. "Semantische Datenintegration: Strategien zur Integration von Datenbanken." (2004).
Dodds, Philip. The Sharable Content Object Reference Model., 2004.
Sharable Content Object Reference Model (SCORM) 2004, 4th Edition Run-Time Environment (RTE), Version 1.1 In 4th Edition Run-Time Environment (RTE), Version 1.1 . Alexandria, VA: ADL Initiative, 2004.
Dodds, Philip V. W., and Schawn E. Thropp. Sharable Content Object Reference Model, SCORM 2004 Overview. ADL Resource Center, 2004.
Boneh, Dan, and Xavier Boyen. "Short Signatures without Random Oracles." In Cryptology – Eurocrypt 04, Lecture Notes in Computer Science., 2004.
Henriques, Mendo Castro. "Si nolis bellum para pacem. The rule of law and NATO's Mediterranean Initiative." Nação e Defesa (2004).
Gustenau, Gustav. Sicherheitspolitische Aspekte der Homeland Security aus österreichischer Sicht ., 2004.

Pages