Biblio

Export 21386 results:
2004
Yermukanov, Marat. "Astana Offers Clumsy Explanations for Banning ‘Terrorist Organizations'." Eurasia Daily Monitor 1, no. 108 (2004).
Sunnafrank, Michael, and Artemio Ramirez. "At First Sight: Persistent Relational Effects of Get-Acquainted Conversations." Journal of Social and Personal Relationships 21, no. 3 (2004): 361-379.
Coessens, Philippe. "At Least in Fighting Terrorism, Transatlantic Cooperation Is Working." Connections: The Quarterly Journal 3, no. 1 (2004): 15-17.
Mykletun, Einar, Maithili Narasimha, and Gene Tsudik. "Authentication and Integrity in Outsourced Databases." In 11th Annual Network and Distributed System Security Symposium –NDSS04. California, USA, 2004.
Hager, Mark A., and Jeffrey L. Brudney. Balancing Act, The Challenges and Benefits of Volunteers. The Urban Institute, 2004.
Ionescu, Mihail E.. "The Balkans after the 2004 Enlargement of NATO and the European Union:What Next?" Connections: The Quarterly Journal 3, no. 2 (2004): 115-121.
Avizienis, Algirdas, Jean-Claude Laprie, Brian Randell, and Carl E. Landwehr. "Basic Concepts and Taxonomy of Dependable and Secure Computing." IEEE Transactions on Dependable and Secure Computin 1, no. 1 (2004): 11-33.
Avizienis, Algirdas, Jean-Claude Laprie, Brian Randell, and Carl Landwehr. "Basic Concepts and Taxonomy of Dependable and Secure Computing." IEEE Transactions on Dependable and Secure Computing 1, no. 1 (2004): 11-33.
Gennaro, Rosario, Darren Leigh, Ravi Sundaram, and William Yerazunis. "Batching Schnorr Identification Scheme with Applications to Privacy- Preserving Authorization and Low-Band width Communication Devices." Advances in Cryptology – ASIACRYPT 2004, Lecture Notes in Computer Sciences 3329 (2004).
Satloff, Robert. The Battle of Ideas in the War on Terror: Essays on US Public Diplomacy in the Middle East. Washington, DC: Washington Institute for Near East Policy, 2004.
Cronin, Audrey Kurth. "Behind the Curve: Globalization and International Terrorism." In Defeating Terrorism–Shaping the New Security Environment . New York: McGraw-Hill/Dushkin, 2004.
Beirut Wants ‘Terrorism’ Defined. AlJazeera, 2004.
Ristic, B., and P. Smets. Belief function theory on the continuous space with an application to model based classification. Italy: IPMU 2004, 2004.
Tavlas, George S.. "Benefits and Costs of Entering the Eurozone." Cato Journal 24 (2004): 89-106.
Lutterbeck, Derek. "Between Police and Military: The New Security Agenda and the Rise of Gendarmeries." Cooperation and Conflict 39, no. 1 (2004): 45-68.
Lutterbeck, Derek. "Between the Police and Military: The New Security Agenda and the Rise of the Gendarmeries." Cooperation and Conflict 39, no. 1 (2004): 45-68.
Ortega, Martin. "Beyond Petersberg: Missions for the EU Military Forces." In EU Security and Defence Policy: The First Five Years (1999-2004), 82. Paris: EU Institute for Security Studies, 2004.
Jain, A. K., S. Pankanti, S. Prabhakar, L. Hong, and A. Ross. "Biometrics: A Grand Challenge." In Proceedings of the International Conference on Pattern Recognition, 935-942. Vol. 2., 2004.
Council, National Research. Biotechnology Research in an Age of Terrorism. Washington, DC: National Academies Press, 2004.
Asmus, Ronald D., and Bruce P. Jackson. The Black Sea and the Frontiers of Freedom In Policy Review. Vol. 125., 2004.
Asmus, Ronald, and Bruce Jackson. "The Black Sea and the Frontiers of Freedom." Policy Review (2004).
BlackSeaFor Agreement., 2004.
Ahlers, Mike M.. Blueprints for Terrorists., 2004.
Taran, Tatyana A., and Volodymyr N. Shemayev. "Boolean Reflexive Control Models and Their Application to Describe the Information Struggle in Socio-Economic Systems." Automation and Remote Control 65, no. 11 (2004).
Wasem, Ruth Ellen. Border Security: Inspections Practices, Policies, and Issues. Washington, D.C.: Congressional Research Service, Library of Congress, 2004.

Pages