Biblio

Export 21423 results:
2004
SAS-054 “Methods and Models for Life Cycle Costing"(link is external)., 2004.
S.C. Res. 1566., 2004.
McGeary, Johanna. "The Scandal’s Growing Stain(link is external)." Time (2004).
Sherstyuk, Vladimir P.. Scientific and Methodological Problems of Information Security (link is external). Moscow: Information Security Institute of Moscow State University, 2004.
Liaw, Horng-Twu. "A Secure Electronic Voting Protocol for General Elections." Computers and Security 23, no. 2 (2004): 107-119.
Surendro, Kridanto, and Setiyo Cahyono. "Secure e-Mail Application Software for Government in Indonesia." Information & Security: An International Journal 15, no. 2 (2004): 135-150.
Tahir, Muhammad Nabeel. "A Secure Online Medical Information System in Distributed and Heterogeneous Computing Environment." Information & Security: An International Journal 15 (2004): 211-215.
Canada, Government of. Securing an Open Society: Canada’s National Security Strategy(link is external)., 2004.
Awasthi, Amit Kumar, and Sunder Lal. Security Analysis of a Dynamic I-Based Remote User Authentication Scheme(link is external)., 2004.
Forsberg, Tuomas. "Security and Defense Policy in the New European Constitution: A Critical Assessment." Connections: The Quarterly Journal 3, no. 3 (2004): 13-27.
Aradau, Claudia. "Security and the democratic scene: desecuritization and emancipation." Journal of International Relations and Development 7, no. 4 (2004): 388-413.
Huasheng, Zhao. Security Building in Central Asia and the Shanghai Cooperation Organization(link is external). Slavic Research Center, 2004.
Barstow, David. "Security Firm Says Its Workers Were Lured Into Iraqi Ambush(link is external)." New York Times (2004).
Chandler, Jennifer A.. "Security in Cyberspace: Combating Distributed Denial of Service Attacks(link is external)." University of Ottawa Law & Technology Journal (2004): 231-261.
Donnelly, Christopher. "Security in the 21st Century: New Challenges and New Responses." In NATO and New International Relations, 24-26. Zagreb: Atlantic Council of Croatia & Political Culture Publishing and Research Institute, 2004.
Hsu, Chien-Lung. "Security of Chien et al.’s Remote User Authentication Scheme Using Smart Cards." Computer Standards and Interfaces 26, no. 3 (2004): 167-169.
Luciani, Giacomo. "Security of Supply for Natural Gas Markets(link is external)." In NDES Working Paper No. 2. Center for European Policy Studies, 2004.
Caparini, Marina. "Security Sector Reconstruction: Western Balkans." In Reform and Reconstruction of the Security Sector, 167-68. Münster: LIT Verlag/DCAF, 2004.
Edmunds, Timothy. "Security Sector Reform: Concepts and Implementation." In Sourcebook on Security Sector Reform, 50. Belgrade: Goragraf, Geneva Centre for the Democratic Control of Armed Forces, Centre for Civil-Military Relations, Belgrade, 2004.
"Selected Non-State Armed Groups(link is external)." The Military Balance 104, no. 1 (2004): 363-64.
Peter, B.. "Semantische Datenintegration: Strategien zur Integration von Datenbanken(link is external)." (2004).
Dodds, Philip. The Sharable Content Object Reference Model(link is external)., 2004.
Sharable Content Object Reference Model (SCORM) 2004, 4th Edition Run-Time Environment (RTE), Version 1.1 In 4th Edition Run-Time Environment (RTE), Version 1.1 . Alexandria, VA: ADL Initiative, 2004.
Dodds, Philip V. W., and Schawn E. Thropp. Sharable Content Object Reference Model, SCORM 2004 Overview(link is external). ADL Resource Center, 2004.
Boneh, Dan, and Xavier Boyen. "Short Signatures without Random Oracles." In Cryptology – Eurocrypt 04, Lecture Notes in Computer Science., 2004.

Pages