Biblio

Export 21414 results:
1995
Devost, Matthew. Political Aspects of Class III Information Warfare: Global Conflict and Terrorism(link is external) In Second International Conference on Information Warfare. Montreal, Canada, 1995.
Bukharin, Oleg, and William Potter. "Potatoes Were Guarded Better(link is external)." Bulletin of the Atomic Scientists (1995).
Chor, Benny, Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan. "Private Information Retrieval." In 36th Annual IEEE Symposium on Foundations of Computer Science. USA, 1995.
Webler, Thomas, Hans Kastenholz, and Ortwin Renn. "Public Participation in Impact Assessment: A Social Learning Perspective." Environmental Impact Assessment Review 15, no. 5 (1995): 443-463.
Fionda, Julia. Public Prosecutors and Discretion, A Comparative Study(link is external). Oxford: Clarendon Press, 1995.
Glaser, Charles. "Realists as Optimists: Cooperation as Self-Help." International Security 19 (1995): 50-90.
Sako, Kazue, and Joe Kilian. Receipt-Free Mix-Type Voting Scheme – a Practical Solution to the Implementation of a Voting Booth(link is external) In Advances in Cryptology - EUROCRYPT’95, Edited by Louis C. Guillou and Jean-Jacques Quisquater. Saint-Malo, France: Computer Science 921, 1995.
Smith, J.E.. Recent Developments in ModSAF Terrain Representation(link is external) In Fifth Conference on Computer Generated Forces and Behavioral Representation . Orlando, Florida: Institute for Simulation and Training , 1995.
Kutz, Martin. "Reform als Weg aus der Katastrophe. Über den Vorbildcharakter der Preußischen Reformen 1808–1818 und die Vergleichbarkeit der Situationen von 1806 und 1945 für Arbeit und Denken Baudissins." In Innere Führung. Zum Gedenken an Wolf Graf Baudissin. Baden-Baden, 1995.
Bishop, Paul, and Rose Gripaios. "The Regional Impact of Cuts in U.K. Defense Spending." Defense Analysis 11, no. 2 (1995): 175-87.
Francisco, Ronald A.. "The Relationship between Coercion and Protest: An Empirical Evaluation in Three Coercive States(link is external)." Journal of Conflict Resolution 39, no. 2 (1995).
Wu, Tzong-Chen. "Remote Login Authentication Scheme Based on a Geometric Approach." Computer Communications 18, no. 2 (1995): 959-963.
Report of the WEU Assembly on European Cooperation in the Mediterranean. Paris, 1995.
Report of the World Summit for Social Development In UN Document. Copenhagen : United Nations, 1995.
Resolution of the Government of the Czech Republic of 21 December 1995(link is external) In Military Strategy of the Czech Republic., 1995.
Tchamova, Albena. "Resolving Conflict Assignment in Attributes Data Association Systems(link is external)." Comptes rendus de l'Academie Bulgare des Sciences 48 (1995): 57-60.
Revised UNMIH Training Schedule In Battle Command Training Program. BCTP archives, 1995.
Kirkpatrick, David. "The Rising Unit Cost of Defence Equipment–The Reasons and The Results." Defence and Peace Economics 6 (1995): 263-88.
Vagg, Jon. "Rough Seas? Contemporary Piracy in South East Asia." British Journal of Criminology 35, no. 1 (1995): 63-80.
Zagorski, Andrej. "Rußland und die OSZE—Erwartungen und Enttäuschungen." In OSZE-Jahrbuch 1995, 112. Baden-Baden: Nomos, 1995.
Baranovsky, V.G.. "Russian Foreign Policy Priorities and Euro-Atlantic Multilateral Institutions(link is external)." The International Spectator 30, no. 1 (1995).
Thirunavukkarasu, Chelliah, James Mayfield, and Tim Finin. Secret agents - a security architecture for the KQML agent communication language(link is external) In ACM CIKM Intelligent Information Agents Workshop. New York: Association of Computing Machinery, 1995.
Sawyer, N., and C. Monckton. "‘Shoe-fit’ - A Computerised Shoe Print Database." In European Convention on Security and Detection, 86-89. Brighton, UK, 1995.
Bracken, Paul. "The Significance of DBK(link is external)." In Dominant Battlespace Awareness, edited by Stuart Johnson and Martin Libicki. Washington, DC: NDU Press, 1995.
Haller, N.. The S/KEY One-Time Password System(link is external). Bellcore, 1995.

Pages