Biblio

Export 21393 results:
2004
Archibugi, Daniele. "Cosmopolitan Democracy and its Critics: A Review." European Journal of International Relations 10 (2004): 437-473.
Beck, Ulrich. "Cosmopolitical Realism: On the Distinction Between Cosmopolitanism in Philosophy and the Social Sciences." Global Networks 4, no. 2 (2004): 131-156.
"Council Directive 2004/67/EC concerning measures to safeguard security of natural gas supply." Official Journal L 127 (2004): 0092-0096.
Jenkins, Brian Michael. "Countering Al Qaeda." In Defeating Terrorism: Shaping the New Security Environment. Guilford, CT: McGraw-Hill, 2004.
Jenkins, Brian Michael. "Countering Al Qaeda." In Defeating Terrorism: Shaping the New Security Environment. Guilford: CT: McGraw-Hill, 2004.
Country Factsheets Eurasian Narcotics: Ukraine 2004., 2004.
Solovei, Valery. "Crisis For Export." Rodnaya Gazeta 48 (2004).
Stern, Eric K., and Dan Hansén. Crisis Management in a Transitional Society: the Latvian Experience. Elanders Gotab AB: Vällingby, 2004.
Lewis, Bernard. The Crisis of Islam . New York: Random House, 2004.
Yalowitz, Kenneth, and Svante E. Cornell. "The Critical but Perilous Caucasus." Orbis 48, no. 1 (2004): 105-16.
Chang, Ting-Yi, Min-Shiang Hwang, and Wei-Pang Yang. "Cryptanalysis of the Tseng-Jan Anonymous Conference Key Distribution System Without Using A One-Way Hash Function." Information & Security: An International Journal 15, no. 1 (2004): 110-114.
Ambainis, Andris, Markus Jakobsson, and Helger Lipmaa. Cryptographic Randomized Response Techniques In Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Edited by Feng Bao, Robert H. Deng and Jianying Zhou. Singapore: Computer Science 2947, 2004.
Cryptographic Randomized Response Techniques In Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography. Singapore: Computer Science 2947, 2004.
Backes, Michael. "A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol." In Computer Security – ESORICS 2004. Berlin, Germany, 2004.
Borgomano-Loup, Laure. "A Cultural Approach to the Southern Mediterranean Crisis." Connections: The Quarterly Journal 3, no. 2 (2004): 93-98.
Ratner, Carl. "A Cultural Critique of Psychological Explanations of Terrorism." Cross-Cultural Psychology Bulletin 38 (2004).
Milanovic, Nikola, and Miroslaw Malek. "Current Solutions for Web Service Composition." IEEE Internet Computing 8, no. 6 (2004): 51-59.
San Wang, Wen-. Current Status & Future Perspective of PKI Development in Taiwan In paper presented at the International Conference of Collaboration of e-Commerce Applications and Security. Taipei, Taiwan, 2004.
Metzger, Stephen. "Current Trends in Tactical Naval Communications." Information & Security: An International Journal 13 (2004): 126-131.
Hinnen, Todd M.. "The Cyber-Front in the War on Terrorism: Curbing Terrorist Use of the Internet." Columbia Science and Technology Law Review 5 (2004).
Hébert, Jean-Paul. "D’Une Production Commune à Une Production Unique? La coopération Européenne en Matière de Production d’Armement Comme Moyen de Renforcement de l’Autonomie Stratégique Européenne." In Historie de la Coopération Européenne dans L’Armement, 200-17. Paris: CNRS Éditions, 2004.
Seifert, Jeffrey W.. Data Mining: An Overview. Washington, DC: Congressional Research Service, 2004.
Lieshout, Robert, Mathieu Segers, and Anna Vleuten. "De Gaulle, Moravcsik, and The Choice for Europe: Soft Sources, Weak Evidence." Journal of Cold War Studies 6, no. 4 (2004): 89-139.
Levi, Jean-Daniel, and Hughes Verdier. De L’Arsenal à L’Entreprise. Paris: Albin Michel, 2004.
Ulvila, Jacob W., and John E. Gaffney, Jr. "A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems." Decision Analysis 1, no. 1 (2004): 35-50.

Pages